Hay
Date
June 7, 2025, 10:40 a.m.

Environment
qemu-arm64
qemu-x86_64

[   22.215132] ==================================================================
[   22.215260] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   22.215392] Write of size 1 at addr fff00000c57b0ceb by task kunit_try_catch/162
[   22.215531] 
[   22.215624] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   22.215837] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.215906] Hardware name: linux,dummy-virt (DT)
[   22.215995] Call trace:
[   22.216080]  show_stack+0x20/0x38 (C)
[   22.216254]  dump_stack_lvl+0x8c/0xd0
[   22.216424]  print_report+0x118/0x608
[   22.216527]  kasan_report+0xdc/0x128
[   22.216633]  __asan_report_store1_noabort+0x20/0x30
[   22.216762]  krealloc_less_oob_helper+0xa58/0xc50
[   22.216888]  krealloc_less_oob+0x20/0x38
[   22.217072]  kunit_try_run_case+0x170/0x3f0
[   22.217215]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.217350]  kthread+0x328/0x630
[   22.217472]  ret_from_fork+0x10/0x20
[   22.217593] 
[   22.217658] Allocated by task 162:
[   22.217770]  kasan_save_stack+0x3c/0x68
[   22.217868]  kasan_save_track+0x20/0x40
[   22.217964]  kasan_save_alloc_info+0x40/0x58
[   22.218073]  __kasan_krealloc+0x118/0x178
[   22.218200]  krealloc_noprof+0x128/0x360
[   22.218325]  krealloc_less_oob_helper+0x168/0xc50
[   22.218549]  krealloc_less_oob+0x20/0x38
[   22.218677]  kunit_try_run_case+0x170/0x3f0
[   22.218790]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.218904]  kthread+0x328/0x630
[   22.218989]  ret_from_fork+0x10/0x20
[   22.219059] 
[   22.219096] The buggy address belongs to the object at fff00000c57b0c00
[   22.219096]  which belongs to the cache kmalloc-256 of size 256
[   22.219227] The buggy address is located 34 bytes to the right of
[   22.219227]  allocated 201-byte region [fff00000c57b0c00, fff00000c57b0cc9)
[   22.219908] 
[   22.219987] The buggy address belongs to the physical page:
[   22.220209] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057b0
[   22.220602] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.221291] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   22.221896] page_type: f5(slab)
[   22.222172] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   22.222597] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.222711] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   22.222804] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.222916] head: 0bfffe0000000001 ffffc1ffc315ec01 00000000ffffffff 00000000ffffffff
[   22.224420] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   22.225499] page dumped because: kasan: bad access detected
[   22.225946] 
[   22.226005] Memory state around the buggy address:
[   22.226298]  fff00000c57b0b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.227364]  fff00000c57b0c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.227493] >fff00000c57b0c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   22.227648]                                                           ^
[   22.227912]  fff00000c57b0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.228170]  fff00000c57b0d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.228281] ==================================================================
[   22.325019] ==================================================================
[   22.325128] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   22.325277] Write of size 1 at addr fff00000c777e0ea by task kunit_try_catch/166
[   22.325419] 
[   22.325501] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   22.325711] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.325779] Hardware name: linux,dummy-virt (DT)
[   22.325857] Call trace:
[   22.325911]  show_stack+0x20/0x38 (C)
[   22.326030]  dump_stack_lvl+0x8c/0xd0
[   22.326152]  print_report+0x118/0x608
[   22.326283]  kasan_report+0xdc/0x128
[   22.326410]  __asan_report_store1_noabort+0x20/0x30
[   22.326578]  krealloc_less_oob_helper+0xae4/0xc50
[   22.326706]  krealloc_large_less_oob+0x20/0x38
[   22.326845]  kunit_try_run_case+0x170/0x3f0
[   22.326981]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.327127]  kthread+0x328/0x630
[   22.327292]  ret_from_fork+0x10/0x20
[   22.327447] 
[   22.327518] The buggy address belongs to the physical page:
[   22.327609] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10777c
[   22.327818] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.327934] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   22.328043] page_type: f8(unknown)
[   22.328305] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   22.328455] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   22.328587] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   22.328715] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   22.328841] head: 0bfffe0000000002 ffffc1ffc31ddf01 00000000ffffffff 00000000ffffffff
[   22.329822] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.330362] page dumped because: kasan: bad access detected
[   22.330466] 
[   22.330699] Memory state around the buggy address:
[   22.330972]  fff00000c777df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.331092]  fff00000c777e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.331191] >fff00000c777e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   22.331277]                                                           ^
[   22.331545]  fff00000c777e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.331780]  fff00000c777e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.331995] ==================================================================
[   22.333792] ==================================================================
[   22.333919] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   22.334057] Write of size 1 at addr fff00000c777e0eb by task kunit_try_catch/166
[   22.334187] 
[   22.334274] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   22.335269] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.335479] Hardware name: linux,dummy-virt (DT)
[   22.335605] Call trace:
[   22.335748]  show_stack+0x20/0x38 (C)
[   22.336076]  dump_stack_lvl+0x8c/0xd0
[   22.336320]  print_report+0x118/0x608
[   22.336548]  kasan_report+0xdc/0x128
[   22.336909]  __asan_report_store1_noabort+0x20/0x30
[   22.337431]  krealloc_less_oob_helper+0xa58/0xc50
[   22.337570]  krealloc_large_less_oob+0x20/0x38
[   22.338147]  kunit_try_run_case+0x170/0x3f0
[   22.338318]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.338606]  kthread+0x328/0x630
[   22.338841]  ret_from_fork+0x10/0x20
[   22.338952] 
[   22.338993] The buggy address belongs to the physical page:
[   22.339071] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10777c
[   22.339885] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.340187] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   22.340964] page_type: f8(unknown)
[   22.341236] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   22.342156] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   22.342327] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   22.342537] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   22.342666] head: 0bfffe0000000002 ffffc1ffc31ddf01 00000000ffffffff 00000000ffffffff
[   22.343194] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.343365] page dumped because: kasan: bad access detected
[   22.343441] 
[   22.343475] Memory state around the buggy address:
[   22.343573]  fff00000c777df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.343676]  fff00000c777e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.343756] >fff00000c777e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   22.343821]                                                           ^
[   22.343913]  fff00000c777e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.344068]  fff00000c777e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.344176] ==================================================================
[   22.195307] ==================================================================
[   22.195449] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   22.195584] Write of size 1 at addr fff00000c57b0cda by task kunit_try_catch/162
[   22.195708] 
[   22.195795] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   22.196002] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.196069] Hardware name: linux,dummy-virt (DT)
[   22.196148] Call trace:
[   22.196241]  show_stack+0x20/0x38 (C)
[   22.196356]  dump_stack_lvl+0x8c/0xd0
[   22.196486]  print_report+0x118/0x608
[   22.196608]  kasan_report+0xdc/0x128
[   22.196718]  __asan_report_store1_noabort+0x20/0x30
[   22.196916]  krealloc_less_oob_helper+0xa80/0xc50
[   22.197114]  krealloc_less_oob+0x20/0x38
[   22.197290]  kunit_try_run_case+0x170/0x3f0
[   22.197482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.197637]  kthread+0x328/0x630
[   22.197798]  ret_from_fork+0x10/0x20
[   22.197966] 
[   22.198029] Allocated by task 162:
[   22.198124]  kasan_save_stack+0x3c/0x68
[   22.198257]  kasan_save_track+0x20/0x40
[   22.198423]  kasan_save_alloc_info+0x40/0x58
[   22.198514]  __kasan_krealloc+0x118/0x178
[   22.198602]  krealloc_noprof+0x128/0x360
[   22.198865]  krealloc_less_oob_helper+0x168/0xc50
[   22.199088]  krealloc_less_oob+0x20/0x38
[   22.199416]  kunit_try_run_case+0x170/0x3f0
[   22.199897]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.200052]  kthread+0x328/0x630
[   22.200136]  ret_from_fork+0x10/0x20
[   22.200230] 
[   22.200279] The buggy address belongs to the object at fff00000c57b0c00
[   22.200279]  which belongs to the cache kmalloc-256 of size 256
[   22.200430] The buggy address is located 17 bytes to the right of
[   22.200430]  allocated 201-byte region [fff00000c57b0c00, fff00000c57b0cc9)
[   22.200545] 
[   22.200581] The buggy address belongs to the physical page:
[   22.200650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057b0
[   22.200838] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.200960] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   22.201118] page_type: f5(slab)
[   22.201255] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   22.201434] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.201593] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   22.201709] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.202085] head: 0bfffe0000000001 ffffc1ffc315ec01 00000000ffffffff 00000000ffffffff
[   22.202793] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   22.202941] page dumped because: kasan: bad access detected
[   22.203009] 
[   22.203044] Memory state around the buggy address:
[   22.203141]  fff00000c57b0b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.203243]  fff00000c57b0c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.203372] >fff00000c57b0c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   22.203474]                                                     ^
[   22.203779]  fff00000c57b0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.203900]  fff00000c57b0d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.203989] ==================================================================
[   22.313277] ==================================================================
[   22.313423] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   22.313573] Write of size 1 at addr fff00000c777e0d0 by task kunit_try_catch/166
[   22.313755] 
[   22.313833] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   22.314037] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.314130] Hardware name: linux,dummy-virt (DT)
[   22.314228] Call trace:
[   22.314306]  show_stack+0x20/0x38 (C)
[   22.314481]  dump_stack_lvl+0x8c/0xd0
[   22.314718]  print_report+0x118/0x608
[   22.314910]  kasan_report+0xdc/0x128
[   22.315031]  __asan_report_store1_noabort+0x20/0x30
[   22.315160]  krealloc_less_oob_helper+0xb9c/0xc50
[   22.315269]  krealloc_large_less_oob+0x20/0x38
[   22.315597]  kunit_try_run_case+0x170/0x3f0
[   22.315745]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.315892]  kthread+0x328/0x630
[   22.316010]  ret_from_fork+0x10/0x20
[   22.316139] 
[   22.316194] The buggy address belongs to the physical page:
[   22.316277] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10777c
[   22.316444] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.316627] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   22.316788] page_type: f8(unknown)
[   22.316893] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   22.317022] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   22.317150] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   22.317276] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   22.317411] head: 0bfffe0000000002 ffffc1ffc31ddf01 00000000ffffffff 00000000ffffffff
[   22.317524] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.317624] page dumped because: kasan: bad access detected
[   22.317695] 
[   22.317740] Memory state around the buggy address:
[   22.317895]  fff00000c777df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.318013]  fff00000c777e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.318123] >fff00000c777e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   22.318212]                                                  ^
[   22.318355]  fff00000c777e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.318489]  fff00000c777e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.318572] ==================================================================
[   22.306748] ==================================================================
[   22.306859] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   22.306960] Write of size 1 at addr fff00000c777e0c9 by task kunit_try_catch/166
[   22.307020] 
[   22.307074] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   22.307174] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.307205] Hardware name: linux,dummy-virt (DT)
[   22.307242] Call trace:
[   22.307271]  show_stack+0x20/0x38 (C)
[   22.307331]  dump_stack_lvl+0x8c/0xd0
[   22.307388]  print_report+0x118/0x608
[   22.307541]  kasan_report+0xdc/0x128
[   22.307702]  __asan_report_store1_noabort+0x20/0x30
[   22.307883]  krealloc_less_oob_helper+0xa48/0xc50
[   22.308009]  krealloc_large_less_oob+0x20/0x38
[   22.308107]  kunit_try_run_case+0x170/0x3f0
[   22.308223]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.308419]  kthread+0x328/0x630
[   22.308594]  ret_from_fork+0x10/0x20
[   22.308770] 
[   22.308843] The buggy address belongs to the physical page:
[   22.308966] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10777c
[   22.309107] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.309229] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   22.309371] page_type: f8(unknown)
[   22.309476] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   22.309683] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   22.310106] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   22.310451] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   22.310632] head: 0bfffe0000000002 ffffc1ffc31ddf01 00000000ffffffff 00000000ffffffff
[   22.310781] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.310900] page dumped because: kasan: bad access detected
[   22.310978] 
[   22.311040] Memory state around the buggy address:
[   22.311158]  fff00000c777df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.311268]  fff00000c777e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.311365] >fff00000c777e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   22.311452]                                               ^
[   22.311540]  fff00000c777e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.311642]  fff00000c777e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.311752] ==================================================================
[   22.188150] ==================================================================
[   22.188251] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   22.188339] Write of size 1 at addr fff00000c57b0cd0 by task kunit_try_catch/162
[   22.188398] 
[   22.188514] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   22.188803] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.188866] Hardware name: linux,dummy-virt (DT)
[   22.188929] Call trace:
[   22.188976]  show_stack+0x20/0x38 (C)
[   22.189084]  dump_stack_lvl+0x8c/0xd0
[   22.189193]  print_report+0x118/0x608
[   22.189296]  kasan_report+0xdc/0x128
[   22.189838]  __asan_report_store1_noabort+0x20/0x30
[   22.190013]  krealloc_less_oob_helper+0xb9c/0xc50
[   22.190162]  krealloc_less_oob+0x20/0x38
[   22.190323]  kunit_try_run_case+0x170/0x3f0
[   22.190501]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.190657]  kthread+0x328/0x630
[   22.190757]  ret_from_fork+0x10/0x20
[   22.190860] 
[   22.190922] Allocated by task 162:
[   22.190995]  kasan_save_stack+0x3c/0x68
[   22.191097]  kasan_save_track+0x20/0x40
[   22.191151]  kasan_save_alloc_info+0x40/0x58
[   22.191196]  __kasan_krealloc+0x118/0x178
[   22.191238]  krealloc_noprof+0x128/0x360
[   22.191279]  krealloc_less_oob_helper+0x168/0xc50
[   22.191330]  krealloc_less_oob+0x20/0x38
[   22.191373]  kunit_try_run_case+0x170/0x3f0
[   22.191445]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.191499]  kthread+0x328/0x630
[   22.191539]  ret_from_fork+0x10/0x20
[   22.191579] 
[   22.191604] The buggy address belongs to the object at fff00000c57b0c00
[   22.191604]  which belongs to the cache kmalloc-256 of size 256
[   22.191671] The buggy address is located 7 bytes to the right of
[   22.191671]  allocated 201-byte region [fff00000c57b0c00, fff00000c57b0cc9)
[   22.191741] 
[   22.191766] The buggy address belongs to the physical page:
[   22.191803] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057b0
[   22.191866] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.191920] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   22.191988] page_type: f5(slab)
[   22.192038] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   22.192093] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.192148] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   22.192201] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.192255] head: 0bfffe0000000001 ffffc1ffc315ec01 00000000ffffffff 00000000ffffffff
[   22.192307] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   22.192351] page dumped because: kasan: bad access detected
[   22.192386] 
[   22.192416] Memory state around the buggy address:
[   22.192458]  fff00000c57b0b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.192509]  fff00000c57b0c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.192556] >fff00000c57b0c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   22.192597]                                                  ^
[   22.192638]  fff00000c57b0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.192685]  fff00000c57b0d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.192727] ==================================================================
[   22.319632] ==================================================================
[   22.319753] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   22.319883] Write of size 1 at addr fff00000c777e0da by task kunit_try_catch/166
[   22.320012] 
[   22.320100] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   22.320311] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.320378] Hardware name: linux,dummy-virt (DT)
[   22.320464] Call trace:
[   22.320512]  show_stack+0x20/0x38 (C)
[   22.320628]  dump_stack_lvl+0x8c/0xd0
[   22.320828]  print_report+0x118/0x608
[   22.320935]  kasan_report+0xdc/0x128
[   22.321051]  __asan_report_store1_noabort+0x20/0x30
[   22.321175]  krealloc_less_oob_helper+0xa80/0xc50
[   22.321352]  krealloc_large_less_oob+0x20/0x38
[   22.321523]  kunit_try_run_case+0x170/0x3f0
[   22.321696]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.321831]  kthread+0x328/0x630
[   22.321944]  ret_from_fork+0x10/0x20
[   22.322073] 
[   22.322124] The buggy address belongs to the physical page:
[   22.322204] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10777c
[   22.322352] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.322486] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   22.322669] page_type: f8(unknown)
[   22.322757] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   22.322879] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   22.323050] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   22.323177] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   22.323330] head: 0bfffe0000000002 ffffc1ffc31ddf01 00000000ffffffff 00000000ffffffff
[   22.323487] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.323617] page dumped because: kasan: bad access detected
[   22.323722] 
[   22.323787] Memory state around the buggy address:
[   22.323937]  fff00000c777df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.324050]  fff00000c777e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.324171] >fff00000c777e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   22.324268]                                                     ^
[   22.324364]  fff00000c777e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.324467]  fff00000c777e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.324540] ==================================================================
[   22.178047] ==================================================================
[   22.178232] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   22.178475] Write of size 1 at addr fff00000c57b0cc9 by task kunit_try_catch/162
[   22.178612] 
[   22.178702] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   22.178929] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.179002] Hardware name: linux,dummy-virt (DT)
[   22.179082] Call trace:
[   22.179147]  show_stack+0x20/0x38 (C)
[   22.179321]  dump_stack_lvl+0x8c/0xd0
[   22.179438]  print_report+0x118/0x608
[   22.179529]  kasan_report+0xdc/0x128
[   22.179611]  __asan_report_store1_noabort+0x20/0x30
[   22.179749]  krealloc_less_oob_helper+0xa48/0xc50
[   22.179895]  krealloc_less_oob+0x20/0x38
[   22.180004]  kunit_try_run_case+0x170/0x3f0
[   22.180122]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.180239]  kthread+0x328/0x630
[   22.180337]  ret_from_fork+0x10/0x20
[   22.180502] 
[   22.180560] Allocated by task 162:
[   22.180635]  kasan_save_stack+0x3c/0x68
[   22.180739]  kasan_save_track+0x20/0x40
[   22.180838]  kasan_save_alloc_info+0x40/0x58
[   22.180970]  __kasan_krealloc+0x118/0x178
[   22.181099]  krealloc_noprof+0x128/0x360
[   22.181224]  krealloc_less_oob_helper+0x168/0xc50
[   22.181356]  krealloc_less_oob+0x20/0x38
[   22.181462]  kunit_try_run_case+0x170/0x3f0
[   22.181602]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.181758]  kthread+0x328/0x630
[   22.181878]  ret_from_fork+0x10/0x20
[   22.182003] 
[   22.182068] The buggy address belongs to the object at fff00000c57b0c00
[   22.182068]  which belongs to the cache kmalloc-256 of size 256
[   22.182273] The buggy address is located 0 bytes to the right of
[   22.182273]  allocated 201-byte region [fff00000c57b0c00, fff00000c57b0cc9)
[   22.182503] 
[   22.182553] The buggy address belongs to the physical page:
[   22.182630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057b0
[   22.182782] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.182898] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   22.183032] page_type: f5(slab)
[   22.183143] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   22.183267] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.183412] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   22.183590] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.183725] head: 0bfffe0000000001 ffffc1ffc315ec01 00000000ffffffff 00000000ffffffff
[   22.184201] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   22.184291] page dumped because: kasan: bad access detected
[   22.184388] 
[   22.184445] Memory state around the buggy address:
[   22.184521]  fff00000c57b0b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.184619]  fff00000c57b0c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.184800] >fff00000c57b0c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   22.184897]                                               ^
[   22.184991]  fff00000c57b0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.185099]  fff00000c57b0d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.185231] ==================================================================
[   22.205540] ==================================================================
[   22.205667] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   22.205795] Write of size 1 at addr fff00000c57b0cea by task kunit_try_catch/162
[   22.205918] 
[   22.206003] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT 
[   22.206207] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.206274] Hardware name: linux,dummy-virt (DT)
[   22.206365] Call trace:
[   22.206476]  show_stack+0x20/0x38 (C)
[   22.206591]  dump_stack_lvl+0x8c/0xd0
[   22.206752]  print_report+0x118/0x608
[   22.207048]  kasan_report+0xdc/0x128
[   22.207282]  __asan_report_store1_noabort+0x20/0x30
[   22.207613]  krealloc_less_oob_helper+0xae4/0xc50
[   22.207732]  krealloc_less_oob+0x20/0x38
[   22.207835]  kunit_try_run_case+0x170/0x3f0
[   22.207972]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.208108]  kthread+0x328/0x630
[   22.208218]  ret_from_fork+0x10/0x20
[   22.208374] 
[   22.208459] Allocated by task 162:
[   22.208538]  kasan_save_stack+0x3c/0x68
[   22.208664]  kasan_save_track+0x20/0x40
[   22.208756]  kasan_save_alloc_info+0x40/0x58
[   22.208871]  __kasan_krealloc+0x118/0x178
[   22.209004]  krealloc_noprof+0x128/0x360
[   22.209119]  krealloc_less_oob_helper+0x168/0xc50
[   22.209247]  krealloc_less_oob+0x20/0x38
[   22.209386]  kunit_try_run_case+0x170/0x3f0
[   22.209498]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.209611]  kthread+0x328/0x630
[   22.209702]  ret_from_fork+0x10/0x20
[   22.209796] 
[   22.209855] The buggy address belongs to the object at fff00000c57b0c00
[   22.209855]  which belongs to the cache kmalloc-256 of size 256
[   22.210023] The buggy address is located 33 bytes to the right of
[   22.210023]  allocated 201-byte region [fff00000c57b0c00, fff00000c57b0cc9)
[   22.210177] 
[   22.210230] The buggy address belongs to the physical page:
[   22.210327] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057b0
[   22.210585] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.211190] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   22.211429] page_type: f5(slab)
[   22.211607] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   22.211850] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.211981] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   22.212131] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.212253] head: 0bfffe0000000001 ffffc1ffc315ec01 00000000ffffffff 00000000ffffffff
[   22.212368] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   22.212500] page dumped because: kasan: bad access detected
[   22.212580] 
[   22.212624] Memory state around the buggy address:
[   22.212708]  fff00000c57b0b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.212854]  fff00000c57b0c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.212985] >fff00000c57b0c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   22.213090]                                                           ^
[   22.213195]  fff00000c57b0d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.213306]  fff00000c57b0d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.213414] ==================================================================

[   13.414064] ==================================================================
[   13.415101] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   13.415541] Write of size 1 at addr ffff8881029be0c9 by task kunit_try_catch/182
[   13.415905] 
[   13.416050] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   13.416148] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.416178] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.416209] Call Trace:
[   13.416226]  <TASK>
[   13.416248]  dump_stack_lvl+0x73/0xb0
[   13.416283]  print_report+0xd1/0x650
[   13.416309]  ? __virt_addr_valid+0x1db/0x2d0
[   13.416334]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   13.416369]  ? kasan_addr_to_slab+0x11/0xa0
[   13.416554]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   13.416955]  kasan_report+0x141/0x180
[   13.417035]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   13.417095]  __asan_report_store1_noabort+0x1b/0x30
[   13.417135]  krealloc_less_oob_helper+0xd70/0x11d0
[   13.417168]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   13.417191]  ? finish_task_switch.isra.0+0x153/0x700
[   13.417216]  ? __switch_to+0x5d9/0xf60
[   13.417237]  ? dequeue_task_fair+0x166/0x4e0
[   13.417259]  ? __schedule+0x10cc/0x2b30
[   13.417281]  ? __pfx_read_tsc+0x10/0x10
[   13.417304]  krealloc_large_less_oob+0x1c/0x30
[   13.417325]  kunit_try_run_case+0x1a5/0x480
[   13.417348]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.417368]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.417390]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.417411]  ? __kthread_parkme+0x82/0x180
[   13.417432]  ? preempt_count_sub+0x50/0x80
[   13.417455]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.417476]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.417497]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.417518]  kthread+0x337/0x6f0
[   13.417534]  ? trace_preempt_on+0x20/0xc0
[   13.417576]  ? __pfx_kthread+0x10/0x10
[   13.417602]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.417662]  ? calculate_sigpending+0x7b/0xa0
[   13.417709]  ? __pfx_kthread+0x10/0x10
[   13.417742]  ret_from_fork+0x41/0x80
[   13.417767]  ? __pfx_kthread+0x10/0x10
[   13.417784]  ret_from_fork_asm+0x1a/0x30
[   13.417813]  </TASK>
[   13.417827] 
[   13.431444] The buggy address belongs to the physical page:
[   13.432250] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029bc
[   13.432714] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.433253] flags: 0x200000000000040(head|node=0|zone=2)
[   13.433449] page_type: f8(unknown)
[   13.433616] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.434456] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.434990] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.435439] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.435719] head: 0200000000000002 ffffea00040a6f01 00000000ffffffff 00000000ffffffff
[   13.435941] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   13.436156] page dumped because: kasan: bad access detected
[   13.436320] 
[   13.436403] Memory state around the buggy address:
[   13.436570]  ffff8881029bdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.436774]  ffff8881029be000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.436980] >ffff8881029be080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   13.437177]                                               ^
[   13.437347]  ffff8881029be100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.437554]  ffff8881029be180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.437829] ==================================================================
[   13.438383] ==================================================================
[   13.440388] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   13.440675] Write of size 1 at addr ffff8881029be0d0 by task kunit_try_catch/182
[   13.440890] 
[   13.440993] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   13.441045] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.441058] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.441080] Call Trace:
[   13.441094]  <TASK>
[   13.441113]  dump_stack_lvl+0x73/0xb0
[   13.441143]  print_report+0xd1/0x650
[   13.441167]  ? __virt_addr_valid+0x1db/0x2d0
[   13.441189]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   13.441210]  ? kasan_addr_to_slab+0x11/0xa0
[   13.441230]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   13.441252]  kasan_report+0x141/0x180
[   13.441273]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   13.441299]  __asan_report_store1_noabort+0x1b/0x30
[   13.441318]  krealloc_less_oob_helper+0xe23/0x11d0
[   13.441342]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   13.441364]  ? finish_task_switch.isra.0+0x153/0x700
[   13.441387]  ? __switch_to+0x5d9/0xf60
[   13.441407]  ? dequeue_task_fair+0x166/0x4e0
[   13.441429]  ? __schedule+0x10cc/0x2b30
[   13.441451]  ? __pfx_read_tsc+0x10/0x10
[   13.441473]  krealloc_large_less_oob+0x1c/0x30
[   13.441495]  kunit_try_run_case+0x1a5/0x480
[   13.441520]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.441541]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.441580]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.441604]  ? __kthread_parkme+0x82/0x180
[   13.441625]  ? preempt_count_sub+0x50/0x80
[   13.441648]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.441669]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.441690]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.441712]  kthread+0x337/0x6f0
[   13.441729]  ? trace_preempt_on+0x20/0xc0
[   13.441751]  ? __pfx_kthread+0x10/0x10
[   13.441769]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.441789]  ? calculate_sigpending+0x7b/0xa0
[   13.441810]  ? __pfx_kthread+0x10/0x10
[   13.441828]  ret_from_fork+0x41/0x80
[   13.441847]  ? __pfx_kthread+0x10/0x10
[   13.441864]  ret_from_fork_asm+0x1a/0x30
[   13.441891]  </TASK>
[   13.441903] 
[   13.455448] The buggy address belongs to the physical page:
[   13.456536] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029bc
[   13.457175] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.457408] flags: 0x200000000000040(head|node=0|zone=2)
[   13.458003] page_type: f8(unknown)
[   13.458168] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.458388] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.459435] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.459806] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.460157] head: 0200000000000002 ffffea00040a6f01 00000000ffffffff 00000000ffffffff
[   13.460696] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   13.461532] page dumped because: kasan: bad access detected
[   13.462035] 
[   13.462286] Memory state around the buggy address:
[   13.462582]  ffff8881029bdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.463577]  ffff8881029be000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.464048] >ffff8881029be080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   13.464476]                                                  ^
[   13.464830]  ffff8881029be100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.465269]  ffff8881029be180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.465652] ==================================================================
[   13.529199] ==================================================================
[   13.529543] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   13.530472] Write of size 1 at addr ffff8881029be0eb by task kunit_try_catch/182
[   13.531100] 
[   13.531284] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   13.531370] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.531395] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.531433] Call Trace:
[   13.531507]  <TASK>
[   13.531568]  dump_stack_lvl+0x73/0xb0
[   13.531638]  print_report+0xd1/0x650
[   13.531787]  ? __virt_addr_valid+0x1db/0x2d0
[   13.531935]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   13.531994]  ? kasan_addr_to_slab+0x11/0xa0
[   13.532044]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   13.532097]  kasan_report+0x141/0x180
[   13.532136]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   13.532165]  __asan_report_store1_noabort+0x1b/0x30
[   13.532187]  krealloc_less_oob_helper+0xd47/0x11d0
[   13.532213]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   13.532237]  ? finish_task_switch.isra.0+0x153/0x700
[   13.532263]  ? __switch_to+0x5d9/0xf60
[   13.532284]  ? dequeue_task_fair+0x166/0x4e0
[   13.532308]  ? __schedule+0x10cc/0x2b30
[   13.532331]  ? __pfx_read_tsc+0x10/0x10
[   13.532356]  krealloc_large_less_oob+0x1c/0x30
[   13.532379]  kunit_try_run_case+0x1a5/0x480
[   13.532405]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.532427]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.532450]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.532473]  ? __kthread_parkme+0x82/0x180
[   13.532496]  ? preempt_count_sub+0x50/0x80
[   13.532520]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.532542]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.532588]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.532623]  kthread+0x337/0x6f0
[   13.532656]  ? trace_preempt_on+0x20/0xc0
[   13.532691]  ? __pfx_kthread+0x10/0x10
[   13.532718]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.532747]  ? calculate_sigpending+0x7b/0xa0
[   13.532778]  ? __pfx_kthread+0x10/0x10
[   13.532806]  ret_from_fork+0x41/0x80
[   13.532836]  ? __pfx_kthread+0x10/0x10
[   13.532863]  ret_from_fork_asm+0x1a/0x30
[   13.532907]  </TASK>
[   13.532926] 
[   13.545943] The buggy address belongs to the physical page:
[   13.546419] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029bc
[   13.547178] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.547610] flags: 0x200000000000040(head|node=0|zone=2)
[   13.548184] page_type: f8(unknown)
[   13.548418] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.549322] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.549682] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.550579] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.550958] head: 0200000000000002 ffffea00040a6f01 00000000ffffffff 00000000ffffffff
[   13.551533] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   13.552299] page dumped because: kasan: bad access detected
[   13.552596] 
[   13.552979] Memory state around the buggy address:
[   13.553215]  ffff8881029bdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.553733]  ffff8881029be000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.554028] >ffff8881029be080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   13.554493]                                                           ^
[   13.555610]  ffff8881029be100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.556542]  ffff8881029be180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.557186] ==================================================================
[   13.161550] ==================================================================
[   13.162313] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   13.162593] Write of size 1 at addr ffff8881003412c9 by task kunit_try_catch/178
[   13.162890] 
[   13.163041] CPU: 0 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   13.163104] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.163119] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.163154] Call Trace:
[   13.163181]  <TASK>
[   13.163218]  dump_stack_lvl+0x73/0xb0
[   13.163284]  print_report+0xd1/0x650
[   13.163331]  ? __virt_addr_valid+0x1db/0x2d0
[   13.163376]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   13.163417]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.163461]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   13.163508]  kasan_report+0x141/0x180
[   13.163552]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   13.164284]  __asan_report_store1_noabort+0x1b/0x30
[   13.164328]  krealloc_less_oob_helper+0xd70/0x11d0
[   13.164357]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   13.164382]  ? finish_task_switch.isra.0+0x153/0x700
[   13.164410]  ? __switch_to+0x5d9/0xf60
[   13.164433]  ? dequeue_task_fair+0x166/0x4e0
[   13.164458]  ? __schedule+0x10cc/0x2b30
[   13.164480]  ? __pfx_read_tsc+0x10/0x10
[   13.164504]  krealloc_less_oob+0x1c/0x30
[   13.164525]  kunit_try_run_case+0x1a5/0x480
[   13.164552]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.164587]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.164620]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.164667]  ? __kthread_parkme+0x82/0x180
[   13.164697]  ? preempt_count_sub+0x50/0x80
[   13.164720]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.164743]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.164765]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.164786]  kthread+0x337/0x6f0
[   13.164803]  ? trace_preempt_on+0x20/0xc0
[   13.164827]  ? __pfx_kthread+0x10/0x10
[   13.164845]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.164865]  ? calculate_sigpending+0x7b/0xa0
[   13.164887]  ? __pfx_kthread+0x10/0x10
[   13.164904]  ret_from_fork+0x41/0x80
[   13.164924]  ? __pfx_kthread+0x10/0x10
[   13.164941]  ret_from_fork_asm+0x1a/0x30
[   13.164970]  </TASK>
[   13.164983] 
[   13.177739] Allocated by task 178:
[   13.178009]  kasan_save_stack+0x45/0x70
[   13.178269]  kasan_save_track+0x18/0x40
[   13.178516]  kasan_save_alloc_info+0x3b/0x50
[   13.179826]  __kasan_krealloc+0x190/0x1f0
[   13.180246]  krealloc_noprof+0xf3/0x340
[   13.180536]  krealloc_less_oob_helper+0x1aa/0x11d0
[   13.181394]  krealloc_less_oob+0x1c/0x30
[   13.181973]  kunit_try_run_case+0x1a5/0x480
[   13.182276]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.182464]  kthread+0x337/0x6f0
[   13.182721]  ret_from_fork+0x41/0x80
[   13.183503]  ret_from_fork_asm+0x1a/0x30
[   13.184079] 
[   13.184195] The buggy address belongs to the object at ffff888100341200
[   13.184195]  which belongs to the cache kmalloc-256 of size 256
[   13.185097] The buggy address is located 0 bytes to the right of
[   13.185097]  allocated 201-byte region [ffff888100341200, ffff8881003412c9)
[   13.185989] 
[   13.186182] The buggy address belongs to the physical page:
[   13.186589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100340
[   13.186891] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.187195] flags: 0x200000000000040(head|node=0|zone=2)
[   13.187401] page_type: f5(slab)
[   13.187534] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.187940] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.188162] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.188380] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.189859] head: 0200000000000001 ffffea000400d001 00000000ffffffff 00000000ffffffff
[   13.190117] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   13.190336] page dumped because: kasan: bad access detected
[   13.190505] 
[   13.190606] Memory state around the buggy address:
[   13.190796]  ffff888100341180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.191053]  ffff888100341200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.192354] >ffff888100341280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   13.193142]                                               ^
[   13.193408]  ffff888100341300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.193857]  ffff888100341380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.194431] ==================================================================
[   13.494428] ==================================================================
[   13.495068] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   13.495520] Write of size 1 at addr ffff8881029be0ea by task kunit_try_catch/182
[   13.496115] 
[   13.496335] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   13.496450] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.496477] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.496517] Call Trace:
[   13.496553]  <TASK>
[   13.496596]  dump_stack_lvl+0x73/0xb0
[   13.497193]  print_report+0xd1/0x650
[   13.498148]  ? __virt_addr_valid+0x1db/0x2d0
[   13.498237]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   13.498723]  ? kasan_addr_to_slab+0x11/0xa0
[   13.498763]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   13.498801]  kasan_report+0x141/0x180
[   13.498841]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   13.498886]  __asan_report_store1_noabort+0x1b/0x30
[   13.498918]  krealloc_less_oob_helper+0xe90/0x11d0
[   13.498955]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   13.498990]  ? finish_task_switch.isra.0+0x153/0x700
[   13.499025]  ? __switch_to+0x5d9/0xf60
[   13.499053]  ? dequeue_task_fair+0x166/0x4e0
[   13.499089]  ? __schedule+0x10cc/0x2b30
[   13.499140]  ? __pfx_read_tsc+0x10/0x10
[   13.499187]  krealloc_large_less_oob+0x1c/0x30
[   13.499229]  kunit_try_run_case+0x1a5/0x480
[   13.499275]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.499310]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.499343]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.499377]  ? __kthread_parkme+0x82/0x180
[   13.499410]  ? preempt_count_sub+0x50/0x80
[   13.499627]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.499677]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.499722]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.499763]  kthread+0x337/0x6f0
[   13.499797]  ? trace_preempt_on+0x20/0xc0
[   13.499841]  ? __pfx_kthread+0x10/0x10
[   13.499876]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.499915]  ? calculate_sigpending+0x7b/0xa0
[   13.499955]  ? __pfx_kthread+0x10/0x10
[   13.499992]  ret_from_fork+0x41/0x80
[   13.500031]  ? __pfx_kthread+0x10/0x10
[   13.500064]  ret_from_fork_asm+0x1a/0x30
[   13.500117]  </TASK>
[   13.500141] 
[   13.518284] The buggy address belongs to the physical page:
[   13.518483] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029bc
[   13.519983] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.520234] flags: 0x200000000000040(head|node=0|zone=2)
[   13.520418] page_type: f8(unknown)
[   13.520554] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.521123] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.521363] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.521586] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.522241] head: 0200000000000002 ffffea00040a6f01 00000000ffffffff 00000000ffffffff
[   13.523213] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   13.523781] page dumped because: kasan: bad access detected
[   13.524004] 
[   13.524386] Memory state around the buggy address:
[   13.524926]  ffff8881029bdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.525916]  ffff8881029be000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.526158] >ffff8881029be080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   13.526768]                                                           ^
[   13.527311]  ffff8881029be100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.527624]  ffff8881029be180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.528251] ==================================================================
[   13.270268] ==================================================================
[   13.270510] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   13.270795] Write of size 1 at addr ffff8881003412ea by task kunit_try_catch/178
[   13.271316] 
[   13.271446] CPU: 0 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   13.271507] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.271521] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.271546] Call Trace:
[   13.271582]  <TASK>
[   13.271611]  dump_stack_lvl+0x73/0xb0
[   13.271669]  print_report+0xd1/0x650
[   13.271708]  ? __virt_addr_valid+0x1db/0x2d0
[   13.271747]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   13.271777]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.271802]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   13.271828]  kasan_report+0x141/0x180
[   13.271852]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   13.271883]  __asan_report_store1_noabort+0x1b/0x30
[   13.271905]  krealloc_less_oob_helper+0xe90/0x11d0
[   13.271933]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   13.271957]  ? finish_task_switch.isra.0+0x153/0x700
[   13.271981]  ? __switch_to+0x5d9/0xf60
[   13.272001]  ? dequeue_task_fair+0x166/0x4e0
[   13.272025]  ? __schedule+0x10cc/0x2b30
[   13.272047]  ? __pfx_read_tsc+0x10/0x10
[   13.272071]  krealloc_less_oob+0x1c/0x30
[   13.272093]  kunit_try_run_case+0x1a5/0x480
[   13.272118]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.272139]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.272163]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.272184]  ? __kthread_parkme+0x82/0x180
[   13.272206]  ? preempt_count_sub+0x50/0x80
[   13.272230]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.272252]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.272273]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.272295]  kthread+0x337/0x6f0
[   13.272312]  ? trace_preempt_on+0x20/0xc0
[   13.272335]  ? __pfx_kthread+0x10/0x10
[   13.272353]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.272373]  ? calculate_sigpending+0x7b/0xa0
[   13.272394]  ? __pfx_kthread+0x10/0x10
[   13.272412]  ret_from_fork+0x41/0x80
[   13.272433]  ? __pfx_kthread+0x10/0x10
[   13.272450]  ret_from_fork_asm+0x1a/0x30
[   13.272480]  </TASK>
[   13.272493] 
[   13.289260] Allocated by task 178:
[   13.289534]  kasan_save_stack+0x45/0x70
[   13.289837]  kasan_save_track+0x18/0x40
[   13.290110]  kasan_save_alloc_info+0x3b/0x50
[   13.290444]  __kasan_krealloc+0x190/0x1f0
[   13.290886]  krealloc_noprof+0xf3/0x340
[   13.291127]  krealloc_less_oob_helper+0x1aa/0x11d0
[   13.291363]  krealloc_less_oob+0x1c/0x30
[   13.291593]  kunit_try_run_case+0x1a5/0x480
[   13.292070]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.292671]  kthread+0x337/0x6f0
[   13.293014]  ret_from_fork+0x41/0x80
[   13.293321]  ret_from_fork_asm+0x1a/0x30
[   13.293521] 
[   13.293982] The buggy address belongs to the object at ffff888100341200
[   13.293982]  which belongs to the cache kmalloc-256 of size 256
[   13.295107] The buggy address is located 33 bytes to the right of
[   13.295107]  allocated 201-byte region [ffff888100341200, ffff8881003412c9)
[   13.295711] 
[   13.295843] The buggy address belongs to the physical page:
[   13.296430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100340
[   13.297073] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.297340] flags: 0x200000000000040(head|node=0|zone=2)
[   13.297898] page_type: f5(slab)
[   13.298284] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.299231] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.299539] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.300101] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.301401] head: 0200000000000001 ffffea000400d001 00000000ffffffff 00000000ffffffff
[   13.301799] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   13.302228] page dumped because: kasan: bad access detected
[   13.302515] 
[   13.302686] Memory state around the buggy address:
[   13.303059]  ffff888100341180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.303340]  ffff888100341200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.303904] >ffff888100341280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   13.304318]                                                           ^
[   13.305636]  ffff888100341300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.305910]  ffff888100341380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.306475] ==================================================================
[   13.230329] ==================================================================
[   13.230827] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   13.231434] Write of size 1 at addr ffff8881003412da by task kunit_try_catch/178
[   13.232524] 
[   13.233532] CPU: 0 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   13.234073] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.234112] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.234151] Call Trace:
[   13.234190]  <TASK>
[   13.234224]  dump_stack_lvl+0x73/0xb0
[   13.234284]  print_report+0xd1/0x650
[   13.234325]  ? __virt_addr_valid+0x1db/0x2d0
[   13.234363]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   13.234403]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.234442]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   13.234482]  kasan_report+0x141/0x180
[   13.234520]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   13.235044]  __asan_report_store1_noabort+0x1b/0x30
[   13.235148]  krealloc_less_oob_helper+0xec6/0x11d0
[   13.235204]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   13.235248]  ? finish_task_switch.isra.0+0x153/0x700
[   13.235291]  ? __switch_to+0x5d9/0xf60
[   13.235326]  ? dequeue_task_fair+0x166/0x4e0
[   13.235362]  ? __schedule+0x10cc/0x2b30
[   13.235397]  ? __pfx_read_tsc+0x10/0x10
[   13.235432]  krealloc_less_oob+0x1c/0x30
[   13.235466]  kunit_try_run_case+0x1a5/0x480
[   13.235507]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.235544]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.235604]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.235643]  ? __kthread_parkme+0x82/0x180
[   13.235683]  ? preempt_count_sub+0x50/0x80
[   13.235721]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.235757]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.235790]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.235824]  kthread+0x337/0x6f0
[   13.235850]  ? trace_preempt_on+0x20/0xc0
[   13.235884]  ? __pfx_kthread+0x10/0x10
[   13.235915]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.235937]  ? calculate_sigpending+0x7b/0xa0
[   13.235959]  ? __pfx_kthread+0x10/0x10
[   13.235978]  ret_from_fork+0x41/0x80
[   13.235999]  ? __pfx_kthread+0x10/0x10
[   13.236017]  ret_from_fork_asm+0x1a/0x30
[   13.236049]  </TASK>
[   13.236063] 
[   13.253176] Allocated by task 178:
[   13.253530]  kasan_save_stack+0x45/0x70
[   13.253725]  kasan_save_track+0x18/0x40
[   13.254498]  kasan_save_alloc_info+0x3b/0x50
[   13.254831]  __kasan_krealloc+0x190/0x1f0
[   13.255004]  krealloc_noprof+0xf3/0x340
[   13.255163]  krealloc_less_oob_helper+0x1aa/0x11d0
[   13.255290]  krealloc_less_oob+0x1c/0x30
[   13.255385]  kunit_try_run_case+0x1a5/0x480
[   13.255482]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.255628]  kthread+0x337/0x6f0
[   13.255771]  ret_from_fork+0x41/0x80
[   13.255911]  ret_from_fork_asm+0x1a/0x30
[   13.256167] 
[   13.256353] The buggy address belongs to the object at ffff888100341200
[   13.256353]  which belongs to the cache kmalloc-256 of size 256
[   13.257355] The buggy address is located 17 bytes to the right of
[   13.257355]  allocated 201-byte region [ffff888100341200, ffff8881003412c9)
[   13.258418] 
[   13.258629] The buggy address belongs to the physical page:
[   13.259119] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100340
[   13.259821] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.260355] flags: 0x200000000000040(head|node=0|zone=2)
[   13.260900] page_type: f5(slab)
[   13.261177] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.261911] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.262509] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.263105] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.263697] head: 0200000000000001 ffffea000400d001 00000000ffffffff 00000000ffffffff
[   13.264163] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   13.264458] page dumped because: kasan: bad access detected
[   13.265190] 
[   13.265313] Memory state around the buggy address:
[   13.265739]  ffff888100341180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.266283]  ffff888100341200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.266986] >ffff888100341280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   13.267567]                                                     ^
[   13.268155]  ffff888100341300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.268539]  ffff888100341380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.269620] ==================================================================
[   13.195115] ==================================================================
[   13.195308] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   13.195477] Write of size 1 at addr ffff8881003412d0 by task kunit_try_catch/178
[   13.195768] 
[   13.197236] CPU: 0 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   13.197391] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.197420] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.197454] Call Trace:
[   13.197492]  <TASK>
[   13.197526]  dump_stack_lvl+0x73/0xb0
[   13.197597]  print_report+0xd1/0x650
[   13.198025]  ? __virt_addr_valid+0x1db/0x2d0
[   13.198052]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   13.198076]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.198097]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   13.198120]  kasan_report+0x141/0x180
[   13.198141]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   13.198168]  __asan_report_store1_noabort+0x1b/0x30
[   13.198187]  krealloc_less_oob_helper+0xe23/0x11d0
[   13.198212]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   13.198235]  ? finish_task_switch.isra.0+0x153/0x700
[   13.198258]  ? __switch_to+0x5d9/0xf60
[   13.198277]  ? dequeue_task_fair+0x166/0x4e0
[   13.198300]  ? __schedule+0x10cc/0x2b30
[   13.198322]  ? __pfx_read_tsc+0x10/0x10
[   13.198344]  krealloc_less_oob+0x1c/0x30
[   13.198365]  kunit_try_run_case+0x1a5/0x480
[   13.198388]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.198408]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.198431]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.198452]  ? __kthread_parkme+0x82/0x180
[   13.198473]  ? preempt_count_sub+0x50/0x80
[   13.198497]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.198518]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.198539]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.198581]  kthread+0x337/0x6f0
[   13.198606]  ? trace_preempt_on+0x20/0xc0
[   13.198671]  ? __pfx_kthread+0x10/0x10
[   13.198700]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.198733]  ? calculate_sigpending+0x7b/0xa0
[   13.198761]  ? __pfx_kthread+0x10/0x10
[   13.198779]  ret_from_fork+0x41/0x80
[   13.198800]  ? __pfx_kthread+0x10/0x10
[   13.198817]  ret_from_fork_asm+0x1a/0x30
[   13.198847]  </TASK>
[   13.198861] 
[   13.210076] Allocated by task 178:
[   13.210739]  kasan_save_stack+0x45/0x70
[   13.211336]  kasan_save_track+0x18/0x40
[   13.212011]  kasan_save_alloc_info+0x3b/0x50
[   13.212427]  __kasan_krealloc+0x190/0x1f0
[   13.212960]  krealloc_noprof+0xf3/0x340
[   13.213262]  krealloc_less_oob_helper+0x1aa/0x11d0
[   13.213625]  krealloc_less_oob+0x1c/0x30
[   13.214076]  kunit_try_run_case+0x1a5/0x480
[   13.214375]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.214919]  kthread+0x337/0x6f0
[   13.215546]  ret_from_fork+0x41/0x80
[   13.215974]  ret_from_fork_asm+0x1a/0x30
[   13.216167] 
[   13.216249] The buggy address belongs to the object at ffff888100341200
[   13.216249]  which belongs to the cache kmalloc-256 of size 256
[   13.216600] The buggy address is located 7 bytes to the right of
[   13.216600]  allocated 201-byte region [ffff888100341200, ffff8881003412c9)
[   13.217966] 
[   13.218266] The buggy address belongs to the physical page:
[   13.219051] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100340
[   13.219742] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.220117] flags: 0x200000000000040(head|node=0|zone=2)
[   13.220396] page_type: f5(slab)
[   13.220681] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.221515] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.222198] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.222439] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.223449] head: 0200000000000001 ffffea000400d001 00000000ffffffff 00000000ffffffff
[   13.224085] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   13.224606] page dumped because: kasan: bad access detected
[   13.224828] 
[   13.224987] Memory state around the buggy address:
[   13.225251]  ffff888100341180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.225536]  ffff888100341200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.226618] >ffff888100341280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   13.227447]                                                  ^
[   13.228061]  ffff888100341300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.228586]  ffff888100341380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.229008] ==================================================================
[   13.467549] ==================================================================
[   13.468017] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   13.468502] Write of size 1 at addr ffff8881029be0da by task kunit_try_catch/182
[   13.469249] 
[   13.469847] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   13.469911] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.469924] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.469946] Call Trace:
[   13.469964]  <TASK>
[   13.469984]  dump_stack_lvl+0x73/0xb0
[   13.470021]  print_report+0xd1/0x650
[   13.470044]  ? __virt_addr_valid+0x1db/0x2d0
[   13.470065]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   13.470086]  ? kasan_addr_to_slab+0x11/0xa0
[   13.470106]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   13.470127]  kasan_report+0x141/0x180
[   13.470148]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   13.470174]  __asan_report_store1_noabort+0x1b/0x30
[   13.470193]  krealloc_less_oob_helper+0xec6/0x11d0
[   13.470216]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   13.470238]  ? finish_task_switch.isra.0+0x153/0x700
[   13.470260]  ? __switch_to+0x5d9/0xf60
[   13.470279]  ? dequeue_task_fair+0x166/0x4e0
[   13.470301]  ? __schedule+0x10cc/0x2b30
[   13.470322]  ? __pfx_read_tsc+0x10/0x10
[   13.470343]  krealloc_large_less_oob+0x1c/0x30
[   13.470364]  kunit_try_run_case+0x1a5/0x480
[   13.470386]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.470406]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.470426]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.470446]  ? __kthread_parkme+0x82/0x180
[   13.470466]  ? preempt_count_sub+0x50/0x80
[   13.470488]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.470508]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.470529]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.470549]  kthread+0x337/0x6f0
[   13.470589]  ? trace_preempt_on+0x20/0xc0
[   13.470625]  ? __pfx_kthread+0x10/0x10
[   13.470656]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.470692]  ? calculate_sigpending+0x7b/0xa0
[   13.470727]  ? __pfx_kthread+0x10/0x10
[   13.471193]  ret_from_fork+0x41/0x80
[   13.471224]  ? __pfx_kthread+0x10/0x10
[   13.471243]  ret_from_fork_asm+0x1a/0x30
[   13.471274]  </TASK>
[   13.471287] 
[   13.482835] The buggy address belongs to the physical page:
[   13.483285] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029bc
[   13.484375] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.485039] flags: 0x200000000000040(head|node=0|zone=2)
[   13.485502] page_type: f8(unknown)
[   13.485934] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.486779] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.487229] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   13.487749] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   13.488089] head: 0200000000000002 ffffea00040a6f01 00000000ffffffff 00000000ffffffff
[   13.488425] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   13.489226] page dumped because: kasan: bad access detected
[   13.489583] 
[   13.489931] Memory state around the buggy address:
[   13.490278]  ffff8881029bdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.490941]  ffff8881029be000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.491333] >ffff8881029be080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   13.492036]                                                     ^
[   13.492310]  ffff8881029be100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.493201]  ffff8881029be180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   13.493526] ==================================================================
[   13.307309] ==================================================================
[   13.307879] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   13.308539] Write of size 1 at addr ffff8881003412eb by task kunit_try_catch/178
[   13.309423] 
[   13.309651] CPU: 0 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G    B            N  6.15.2-rc1 #1 PREEMPT(voluntary) 
[   13.309740] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.309764] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.309802] Call Trace:
[   13.309841]  <TASK>
[   13.309880]  dump_stack_lvl+0x73/0xb0
[   13.309943]  print_report+0xd1/0x650
[   13.309990]  ? __virt_addr_valid+0x1db/0x2d0
[   13.310035]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   13.310079]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.310294]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   13.310347]  kasan_report+0x141/0x180
[   13.310396]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   13.310458]  __asan_report_store1_noabort+0x1b/0x30
[   13.310501]  krealloc_less_oob_helper+0xd47/0x11d0
[   13.310546]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   13.310595]  ? finish_task_switch.isra.0+0x153/0x700
[   13.310688]  ? __switch_to+0x5d9/0xf60
[   13.310740]  ? dequeue_task_fair+0x166/0x4e0
[   13.310769]  ? __schedule+0x10cc/0x2b30
[   13.310793]  ? __pfx_read_tsc+0x10/0x10
[   13.310817]  krealloc_less_oob+0x1c/0x30
[   13.310841]  kunit_try_run_case+0x1a5/0x480
[   13.310866]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.310888]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.310912]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.310935]  ? __kthread_parkme+0x82/0x180
[   13.310957]  ? preempt_count_sub+0x50/0x80
[   13.310982]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.311005]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.311027]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.311049]  kthread+0x337/0x6f0
[   13.311067]  ? trace_preempt_on+0x20/0xc0
[   13.311090]  ? __pfx_kthread+0x10/0x10
[   13.311108]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.311129]  ? calculate_sigpending+0x7b/0xa0
[   13.311165]  ? __pfx_kthread+0x10/0x10
[   13.311184]  ret_from_fork+0x41/0x80
[   13.311206]  ? __pfx_kthread+0x10/0x10
[   13.311225]  ret_from_fork_asm+0x1a/0x30
[   13.311258]  </TASK>
[   13.311272] 
[   13.324157] Allocated by task 178:
[   13.324310]  kasan_save_stack+0x45/0x70
[   13.324469]  kasan_save_track+0x18/0x40
[   13.324978]  kasan_save_alloc_info+0x3b/0x50
[   13.325968]  __kasan_krealloc+0x190/0x1f0
[   13.326232]  krealloc_noprof+0xf3/0x340
[   13.326532]  krealloc_less_oob_helper+0x1aa/0x11d0
[   13.326813]  krealloc_less_oob+0x1c/0x30
[   13.328050]  kunit_try_run_case+0x1a5/0x480
[   13.328356]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.329090]  kthread+0x337/0x6f0
[   13.329379]  ret_from_fork+0x41/0x80
[   13.329769]  ret_from_fork_asm+0x1a/0x30
[   13.329995] 
[   13.330179] The buggy address belongs to the object at ffff888100341200
[   13.330179]  which belongs to the cache kmalloc-256 of size 256
[   13.331194] The buggy address is located 34 bytes to the right of
[   13.331194]  allocated 201-byte region [ffff888100341200, ffff8881003412c9)
[   13.331992] 
[   13.332204] The buggy address belongs to the physical page:
[   13.332693] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100340
[   13.333237] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   13.333787] flags: 0x200000000000040(head|node=0|zone=2)
[   13.334339] page_type: f5(slab)
[   13.334515] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.335038] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.336242] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   13.337041] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   13.337352] head: 0200000000000001 ffffea000400d001 00000000ffffffff 00000000ffffffff
[   13.337932] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   13.338578] page dumped because: kasan: bad access detected
[   13.339067] 
[   13.339296] Memory state around the buggy address:
[   13.339511]  ffff888100341180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.340404]  ffff888100341200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.340992] >ffff888100341280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   13.341641]                                                           ^
[   13.342234]  ffff888100341300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.342477]  ffff888100341380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.343140] ==================================================================