Hay
Date
June 24, 2025, 12:47 p.m.

Environment
qemu-arm64
qemu-x86_64

[   23.702063] ==================================================================
[   23.702219] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   23.702327] Write of size 1 at addr fff00000c77e20eb by task kunit_try_catch/164
[   23.702465] 
[   23.702528] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   23.702729] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.702809] Hardware name: linux,dummy-virt (DT)
[   23.702929] Call trace:
[   23.702990]  show_stack+0x20/0x38 (C)
[   23.703127]  dump_stack_lvl+0x8c/0xd0
[   23.703455]  print_report+0x118/0x608
[   23.703573]  kasan_report+0xdc/0x128
[   23.703682]  __asan_report_store1_noabort+0x20/0x30
[   23.703809]  krealloc_less_oob_helper+0xa58/0xc50
[   23.703925]  krealloc_large_less_oob+0x20/0x38
[   23.704045]  kunit_try_run_case+0x170/0x3f0
[   23.704376]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.704538]  kthread+0x328/0x630
[   23.704653]  ret_from_fork+0x10/0x20
[   23.704766] 
[   23.704811] The buggy address belongs to the physical page:
[   23.704878] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e0
[   23.704995] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.705103] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.705218] page_type: f8(unknown)
[   23.705304] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.705449] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   23.705635] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.705776] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   23.705979] head: 0bfffe0000000002 ffffc1ffc31df801 00000000ffffffff 00000000ffffffff
[   23.706123] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   23.706237] page dumped because: kasan: bad access detected
[   23.706320] 
[   23.706367] Memory state around the buggy address:
[   23.706537]  fff00000c77e1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.706656]  fff00000c77e2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.706820] >fff00000c77e2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   23.706926]                                                           ^
[   23.707026]  fff00000c77e2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.707178]  fff00000c77e2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.707277] ==================================================================
[   23.683774] ==================================================================
[   23.683872] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   23.683991] Write of size 1 at addr fff00000c77e20da by task kunit_try_catch/164
[   23.684127] 
[   23.684847] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   23.685061] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.685135] Hardware name: linux,dummy-virt (DT)
[   23.685243] Call trace:
[   23.685301]  show_stack+0x20/0x38 (C)
[   23.685568]  dump_stack_lvl+0x8c/0xd0
[   23.686144]  print_report+0x118/0x608
[   23.686680]  kasan_report+0xdc/0x128
[   23.686804]  __asan_report_store1_noabort+0x20/0x30
[   23.687114]  krealloc_less_oob_helper+0xa80/0xc50
[   23.687301]  krealloc_large_less_oob+0x20/0x38
[   23.687456]  kunit_try_run_case+0x170/0x3f0
[   23.687609]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.687818]  kthread+0x328/0x630
[   23.688093]  ret_from_fork+0x10/0x20
[   23.688415] 
[   23.688489] The buggy address belongs to the physical page:
[   23.688571] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e0
[   23.688707] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.688873] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.689011] page_type: f8(unknown)
[   23.689117] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.689976] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   23.690120] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.690255] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   23.690406] head: 0bfffe0000000002 ffffc1ffc31df801 00000000ffffffff 00000000ffffffff
[   23.690832] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   23.690993] page dumped because: kasan: bad access detected
[   23.691141] 
[   23.691213] Memory state around the buggy address:
[   23.691360]  fff00000c77e1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.691507]  fff00000c77e2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.691906] >fff00000c77e2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   23.692060]                                                     ^
[   23.692174]  fff00000c77e2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.692468]  fff00000c77e2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.692684] ==================================================================
[   23.657960] ==================================================================
[   23.658067] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   23.658184] Write of size 1 at addr fff00000c77e20c9 by task kunit_try_catch/164
[   23.658317] 
[   23.658414] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   23.658809] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.659005] Hardware name: linux,dummy-virt (DT)
[   23.659215] Call trace:
[   23.659271]  show_stack+0x20/0x38 (C)
[   23.659404]  dump_stack_lvl+0x8c/0xd0
[   23.659528]  print_report+0x118/0x608
[   23.659641]  kasan_report+0xdc/0x128
[   23.659748]  __asan_report_store1_noabort+0x20/0x30
[   23.659866]  krealloc_less_oob_helper+0xa48/0xc50
[   23.659980]  krealloc_large_less_oob+0x20/0x38
[   23.660422]  kunit_try_run_case+0x170/0x3f0
[   23.660842]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.661179]  kthread+0x328/0x630
[   23.661322]  ret_from_fork+0x10/0x20
[   23.661778] 
[   23.662035] The buggy address belongs to the physical page:
[   23.662137] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e0
[   23.663075] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.663307] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.663448] page_type: f8(unknown)
[   23.664356] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.664846] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   23.665938] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.666133] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   23.666254] head: 0bfffe0000000002 ffffc1ffc31df801 00000000ffffffff 00000000ffffffff
[   23.666374] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   23.667708] page dumped because: kasan: bad access detected
[   23.668092] 
[   23.668142] Memory state around the buggy address:
[   23.668216]  fff00000c77e1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.668321]  fff00000c77e2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.668440] >fff00000c77e2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   23.669059]                                               ^
[   23.669847]  fff00000c77e2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.670803]  fff00000c77e2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.670906] ==================================================================
[   23.561082] ==================================================================
[   23.561180] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   23.561282] Write of size 1 at addr fff00000c1921ada by task kunit_try_catch/160
[   23.561414] 
[   23.561482] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   23.561671] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.561734] Hardware name: linux,dummy-virt (DT)
[   23.561805] Call trace:
[   23.561867]  show_stack+0x20/0x38 (C)
[   23.562203]  dump_stack_lvl+0x8c/0xd0
[   23.562457]  print_report+0x118/0x608
[   23.562730]  kasan_report+0xdc/0x128
[   23.562844]  __asan_report_store1_noabort+0x20/0x30
[   23.562984]  krealloc_less_oob_helper+0xa80/0xc50
[   23.563121]  krealloc_less_oob+0x20/0x38
[   23.564520]  kunit_try_run_case+0x170/0x3f0
[   23.564761]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.565133]  kthread+0x328/0x630
[   23.565288]  ret_from_fork+0x10/0x20
[   23.565632] 
[   23.565760] Allocated by task 160:
[   23.565865]  kasan_save_stack+0x3c/0x68
[   23.565977]  kasan_save_track+0x20/0x40
[   23.566074]  kasan_save_alloc_info+0x40/0x58
[   23.566181]  __kasan_krealloc+0x118/0x178
[   23.566393]  krealloc_noprof+0x128/0x360
[   23.566506]  krealloc_less_oob_helper+0x168/0xc50
[   23.566620]  krealloc_less_oob+0x20/0x38
[   23.567183]  kunit_try_run_case+0x170/0x3f0
[   23.567295]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.567839]  kthread+0x328/0x630
[   23.568132]  ret_from_fork+0x10/0x20
[   23.568393] 
[   23.568463] The buggy address belongs to the object at fff00000c1921a00
[   23.568463]  which belongs to the cache kmalloc-256 of size 256
[   23.568606] The buggy address is located 17 bytes to the right of
[   23.568606]  allocated 201-byte region [fff00000c1921a00, fff00000c1921ac9)
[   23.568761] 
[   23.568809] The buggy address belongs to the physical page:
[   23.569455] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101920
[   23.569595] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.569720] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.569900] page_type: f5(slab)
[   23.570202] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   23.570333] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.571030] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   23.571168] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.571913] head: 0bfffe0000000001 ffffc1ffc3064801 00000000ffffffff 00000000ffffffff
[   23.572037] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   23.572830] page dumped because: kasan: bad access detected
[   23.573269] 
[   23.573396] Memory state around the buggy address:
[   23.573482]  fff00000c1921980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.574327]  fff00000c1921a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.575193] >fff00000c1921a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   23.575434]                                                     ^
[   23.575524]  fff00000c1921b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.575626]  fff00000c1921b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.575720] ==================================================================
[   23.594807] ==================================================================
[   23.594904] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   23.595011] Write of size 1 at addr fff00000c1921aeb by task kunit_try_catch/160
[   23.595126] 
[   23.595189] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   23.595373] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.595463] Hardware name: linux,dummy-virt (DT)
[   23.595534] Call trace:
[   23.595581]  show_stack+0x20/0x38 (C)
[   23.595699]  dump_stack_lvl+0x8c/0xd0
[   23.595823]  print_report+0x118/0x608
[   23.595932]  kasan_report+0xdc/0x128
[   23.596039]  __asan_report_store1_noabort+0x20/0x30
[   23.596550]  krealloc_less_oob_helper+0xa58/0xc50
[   23.596705]  krealloc_less_oob+0x20/0x38
[   23.596953]  kunit_try_run_case+0x170/0x3f0
[   23.597122]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.597521]  kthread+0x328/0x630
[   23.597701]  ret_from_fork+0x10/0x20
[   23.598027] 
[   23.598091] Allocated by task 160:
[   23.598242]  kasan_save_stack+0x3c/0x68
[   23.598336]  kasan_save_track+0x20/0x40
[   23.598452]  kasan_save_alloc_info+0x40/0x58
[   23.598563]  __kasan_krealloc+0x118/0x178
[   23.598768]  krealloc_noprof+0x128/0x360
[   23.598980]  krealloc_less_oob_helper+0x168/0xc50
[   23.599091]  krealloc_less_oob+0x20/0x38
[   23.599192]  kunit_try_run_case+0x170/0x3f0
[   23.599313]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.599657]  kthread+0x328/0x630
[   23.599776]  ret_from_fork+0x10/0x20
[   23.599880] 
[   23.599932] The buggy address belongs to the object at fff00000c1921a00
[   23.599932]  which belongs to the cache kmalloc-256 of size 256
[   23.600192] The buggy address is located 34 bytes to the right of
[   23.600192]  allocated 201-byte region [fff00000c1921a00, fff00000c1921ac9)
[   23.600398] 
[   23.600464] The buggy address belongs to the physical page:
[   23.600566] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101920
[   23.600786] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.600938] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.601063] page_type: f5(slab)
[   23.601229] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   23.601357] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.601501] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   23.601673] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.601884] head: 0bfffe0000000001 ffffc1ffc3064801 00000000ffffffff 00000000ffffffff
[   23.602045] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   23.602184] page dumped because: kasan: bad access detected
[   23.602321] 
[   23.602428] Memory state around the buggy address:
[   23.602504]  fff00000c1921980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.602617]  fff00000c1921a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.602851] >fff00000c1921a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   23.602947]                                                           ^
[   23.603035]  fff00000c1921b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.603165]  fff00000c1921b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.603263] ==================================================================
[   23.694609] ==================================================================
[   23.694699] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   23.694799] Write of size 1 at addr fff00000c77e20ea by task kunit_try_catch/164
[   23.694911] 
[   23.694972] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   23.695157] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.695221] Hardware name: linux,dummy-virt (DT)
[   23.695290] Call trace:
[   23.695336]  show_stack+0x20/0x38 (C)
[   23.695473]  dump_stack_lvl+0x8c/0xd0
[   23.696813]  print_report+0x118/0x608
[   23.696921]  kasan_report+0xdc/0x128
[   23.697050]  __asan_report_store1_noabort+0x20/0x30
[   23.697196]  krealloc_less_oob_helper+0xae4/0xc50
[   23.697332]  krealloc_large_less_oob+0x20/0x38
[   23.697564]  kunit_try_run_case+0x170/0x3f0
[   23.697701]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.697833]  kthread+0x328/0x630
[   23.697962]  ret_from_fork+0x10/0x20
[   23.698148] 
[   23.698198] The buggy address belongs to the physical page:
[   23.698352] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e0
[   23.698496] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.698605] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.698728] page_type: f8(unknown)
[   23.698814] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.699167] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   23.699315] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.699509] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   23.699719] head: 0bfffe0000000002 ffffc1ffc31df801 00000000ffffffff 00000000ffffffff
[   23.699885] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   23.699996] page dumped because: kasan: bad access detected
[   23.700081] 
[   23.700150] Memory state around the buggy address:
[   23.700234]  fff00000c77e1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.700426]  fff00000c77e2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.700650] >fff00000c77e2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   23.700749]                                                           ^
[   23.700842]  fff00000c77e2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.700945]  fff00000c77e2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.701039] ==================================================================
[   23.549563] ==================================================================
[   23.549674] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   23.549995] Write of size 1 at addr fff00000c1921ad0 by task kunit_try_catch/160
[   23.550115] 
[   23.550189] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   23.550398] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.550475] Hardware name: linux,dummy-virt (DT)
[   23.550563] Call trace:
[   23.550620]  show_stack+0x20/0x38 (C)
[   23.550742]  dump_stack_lvl+0x8c/0xd0
[   23.550862]  print_report+0x118/0x608
[   23.550972]  kasan_report+0xdc/0x128
[   23.551078]  __asan_report_store1_noabort+0x20/0x30
[   23.551197]  krealloc_less_oob_helper+0xb9c/0xc50
[   23.551310]  krealloc_less_oob+0x20/0x38
[   23.551696]  kunit_try_run_case+0x170/0x3f0
[   23.552511]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.552728]  kthread+0x328/0x630
[   23.553086]  ret_from_fork+0x10/0x20
[   23.553242] 
[   23.553336] Allocated by task 160:
[   23.553477]  kasan_save_stack+0x3c/0x68
[   23.553676]  kasan_save_track+0x20/0x40
[   23.553767]  kasan_save_alloc_info+0x40/0x58
[   23.553869]  __kasan_krealloc+0x118/0x178
[   23.554048]  krealloc_noprof+0x128/0x360
[   23.554173]  krealloc_less_oob_helper+0x168/0xc50
[   23.554264]  krealloc_less_oob+0x20/0x38
[   23.554357]  kunit_try_run_case+0x170/0x3f0
[   23.554620]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.554800]  kthread+0x328/0x630
[   23.554919]  ret_from_fork+0x10/0x20
[   23.555011] 
[   23.555105] The buggy address belongs to the object at fff00000c1921a00
[   23.555105]  which belongs to the cache kmalloc-256 of size 256
[   23.555240] The buggy address is located 7 bytes to the right of
[   23.555240]  allocated 201-byte region [fff00000c1921a00, fff00000c1921ac9)
[   23.555404] 
[   23.555450] The buggy address belongs to the physical page:
[   23.555524] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101920
[   23.555663] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.556194] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.556660] page_type: f5(slab)
[   23.556810] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   23.557073] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.557225] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   23.557400] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.557536] head: 0bfffe0000000001 ffffc1ffc3064801 00000000ffffffff 00000000ffffffff
[   23.557672] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   23.558002] page dumped because: kasan: bad access detected
[   23.558113] 
[   23.558154] Memory state around the buggy address:
[   23.558234]  fff00000c1921980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.558338]  fff00000c1921a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.558487] >fff00000c1921a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   23.558600]                                                  ^
[   23.558691]  fff00000c1921b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.558797]  fff00000c1921b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.558918] ==================================================================
[   23.580554] ==================================================================
[   23.580670] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   23.580784] Write of size 1 at addr fff00000c1921aea by task kunit_try_catch/160
[   23.580909] 
[   23.580983] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   23.581173] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.581248] Hardware name: linux,dummy-virt (DT)
[   23.581467] Call trace:
[   23.581613]  show_stack+0x20/0x38 (C)
[   23.581862]  dump_stack_lvl+0x8c/0xd0
[   23.582099]  print_report+0x118/0x608
[   23.582404]  kasan_report+0xdc/0x128
[   23.582537]  __asan_report_store1_noabort+0x20/0x30
[   23.582750]  krealloc_less_oob_helper+0xae4/0xc50
[   23.582950]  krealloc_less_oob+0x20/0x38
[   23.583636]  kunit_try_run_case+0x170/0x3f0
[   23.583850]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.584125]  kthread+0x328/0x630
[   23.584399]  ret_from_fork+0x10/0x20
[   23.584971] 
[   23.585028] Allocated by task 160:
[   23.585317]  kasan_save_stack+0x3c/0x68
[   23.585635]  kasan_save_track+0x20/0x40
[   23.586071]  kasan_save_alloc_info+0x40/0x58
[   23.586272]  __kasan_krealloc+0x118/0x178
[   23.586622]  krealloc_noprof+0x128/0x360
[   23.586720]  krealloc_less_oob_helper+0x168/0xc50
[   23.586815]  krealloc_less_oob+0x20/0x38
[   23.586899]  kunit_try_run_case+0x170/0x3f0
[   23.586990]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.587092]  kthread+0x328/0x630
[   23.587176]  ret_from_fork+0x10/0x20
[   23.588904] 
[   23.589059] The buggy address belongs to the object at fff00000c1921a00
[   23.589059]  which belongs to the cache kmalloc-256 of size 256
[   23.589956] The buggy address is located 33 bytes to the right of
[   23.589956]  allocated 201-byte region [fff00000c1921a00, fff00000c1921ac9)
[   23.590200] 
[   23.590327] The buggy address belongs to the physical page:
[   23.590504] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101920
[   23.590685] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.590799] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.590926] page_type: f5(slab)
[   23.591083] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   23.591321] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.591599] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   23.591961] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.592141] head: 0bfffe0000000001 ffffc1ffc3064801 00000000ffffffff 00000000ffffffff
[   23.592283] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   23.592651] page dumped because: kasan: bad access detected
[   23.592740] 
[   23.592789] Memory state around the buggy address:
[   23.592872]  fff00000c1921980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.592994]  fff00000c1921a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.593156] >fff00000c1921a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   23.593254]                                                           ^
[   23.593348]  fff00000c1921b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.593524]  fff00000c1921b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.593713] ==================================================================
[   23.533725] ==================================================================
[   23.533889] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   23.534030] Write of size 1 at addr fff00000c1921ac9 by task kunit_try_catch/160
[   23.534149] 
[   23.534341] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   23.534940] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.535098] Hardware name: linux,dummy-virt (DT)
[   23.535178] Call trace:
[   23.535310]  show_stack+0x20/0x38 (C)
[   23.535499]  dump_stack_lvl+0x8c/0xd0
[   23.535646]  print_report+0x118/0x608
[   23.535782]  kasan_report+0xdc/0x128
[   23.535964]  __asan_report_store1_noabort+0x20/0x30
[   23.536138]  krealloc_less_oob_helper+0xa48/0xc50
[   23.536294]  krealloc_less_oob+0x20/0x38
[   23.536541]  kunit_try_run_case+0x170/0x3f0
[   23.536880]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.537021]  kthread+0x328/0x630
[   23.537145]  ret_from_fork+0x10/0x20
[   23.537263] 
[   23.537324] Allocated by task 160:
[   23.537655]  kasan_save_stack+0x3c/0x68
[   23.537759]  kasan_save_track+0x20/0x40
[   23.537905]  kasan_save_alloc_info+0x40/0x58
[   23.538014]  __kasan_krealloc+0x118/0x178
[   23.538332]  krealloc_noprof+0x128/0x360
[   23.538809]  krealloc_less_oob_helper+0x168/0xc50
[   23.539304]  krealloc_less_oob+0x20/0x38
[   23.539706]  kunit_try_run_case+0x170/0x3f0
[   23.540402]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.540546]  kthread+0x328/0x630
[   23.540939]  ret_from_fork+0x10/0x20
[   23.541166] 
[   23.541286] The buggy address belongs to the object at fff00000c1921a00
[   23.541286]  which belongs to the cache kmalloc-256 of size 256
[   23.541605] The buggy address is located 0 bytes to the right of
[   23.541605]  allocated 201-byte region [fff00000c1921a00, fff00000c1921ac9)
[   23.541776] 
[   23.541943] The buggy address belongs to the physical page:
[   23.542316] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101920
[   23.542509] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.542821] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.543085] page_type: f5(slab)
[   23.543203] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   23.543484] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.543721] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   23.543847] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.543990] head: 0bfffe0000000001 ffffc1ffc3064801 00000000ffffffff 00000000ffffffff
[   23.544341] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   23.544744] page dumped because: kasan: bad access detected
[   23.545041] 
[   23.545091] Memory state around the buggy address:
[   23.545482]  fff00000c1921980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.545857]  fff00000c1921a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.546038] >fff00000c1921a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   23.546441]                                               ^
[   23.546602]  fff00000c1921b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.546853]  fff00000c1921b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.546966] ==================================================================
[   23.674780] ==================================================================
[   23.674871] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   23.674972] Write of size 1 at addr fff00000c77e20d0 by task kunit_try_catch/164
[   23.675085] 
[   23.675145] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT 
[   23.675328] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.675421] Hardware name: linux,dummy-virt (DT)
[   23.675618] Call trace:
[   23.675762]  show_stack+0x20/0x38 (C)
[   23.676136]  dump_stack_lvl+0x8c/0xd0
[   23.676282]  print_report+0x118/0x608
[   23.677063]  kasan_report+0xdc/0x128
[   23.677193]  __asan_report_store1_noabort+0x20/0x30
[   23.677466]  krealloc_less_oob_helper+0xb9c/0xc50
[   23.677596]  krealloc_large_less_oob+0x20/0x38
[   23.677829]  kunit_try_run_case+0x170/0x3f0
[   23.678089]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.678242]  kthread+0x328/0x630
[   23.678355]  ret_from_fork+0x10/0x20
[   23.678782] 
[   23.678858] The buggy address belongs to the physical page:
[   23.679285] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077e0
[   23.679428] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.679553] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.679685] page_type: f8(unknown)
[   23.679777] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.680307] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   23.680589] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.680865] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   23.681047] head: 0bfffe0000000002 ffffc1ffc31df801 00000000ffffffff 00000000ffffffff
[   23.681169] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   23.681268] page dumped because: kasan: bad access detected
[   23.681349] 
[   23.681413] Memory state around the buggy address:
[   23.681487]  fff00000c77e1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.681670]  fff00000c77e2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.681941] >fff00000c77e2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   23.682080]                                                  ^
[   23.682172]  fff00000c77e2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.682425]  fff00000c77e2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.682527] ==================================================================

[   11.339764] ==================================================================
[   11.340046] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   11.340289] Write of size 1 at addr ffff8881003454da by task kunit_try_catch/178
[   11.340469] 
[   11.340583] CPU: 0 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   11.340678] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.340697] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.340733] Call Trace:
[   11.340763]  <TASK>
[   11.340796]  dump_stack_lvl+0x73/0xb0
[   11.340846]  print_report+0xd1/0x650
[   11.340888]  ? __virt_addr_valid+0x1db/0x2d0
[   11.340927]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.340964]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.341006]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.341043]  kasan_report+0x141/0x180
[   11.341080]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.341123]  __asan_report_store1_noabort+0x1b/0x30
[   11.341163]  krealloc_less_oob_helper+0xec6/0x11d0
[   11.341207]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.341246]  ? finish_task_switch.isra.0+0x153/0x700
[   11.341290]  ? __switch_to+0x5d9/0xf60
[   11.341328]  ? dequeue_task_fair+0x166/0x4e0
[   11.341367]  ? __schedule+0x10cc/0x2b60
[   11.341422]  ? __pfx_read_tsc+0x10/0x10
[   11.341464]  krealloc_less_oob+0x1c/0x30
[   11.341490]  kunit_try_run_case+0x1a5/0x480
[   11.341525]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.341555]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.341586]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.341615]  ? __kthread_parkme+0x82/0x180
[   11.341661]  ? preempt_count_sub+0x50/0x80
[   11.341693]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.341729]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.341761]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.341796]  kthread+0x337/0x6f0
[   11.341821]  ? trace_preempt_on+0x20/0xc0
[   11.341853]  ? __pfx_kthread+0x10/0x10
[   11.341877]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.341906]  ? calculate_sigpending+0x7b/0xa0
[   11.341939]  ? __pfx_kthread+0x10/0x10
[   11.341977]  ret_from_fork+0x41/0x80
[   11.342012]  ? __pfx_kthread+0x10/0x10
[   11.342047]  ret_from_fork_asm+0x1a/0x30
[   11.342106]  </TASK>
[   11.342130] 
[   11.350646] Allocated by task 178:
[   11.350909]  kasan_save_stack+0x45/0x70
[   11.351201]  kasan_save_track+0x18/0x40
[   11.351423]  kasan_save_alloc_info+0x3b/0x50
[   11.351746]  __kasan_krealloc+0x190/0x1f0
[   11.352026]  krealloc_noprof+0xf3/0x340
[   11.352183]  krealloc_less_oob_helper+0x1aa/0x11d0
[   11.352488]  krealloc_less_oob+0x1c/0x30
[   11.352853]  kunit_try_run_case+0x1a5/0x480
[   11.353089]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.353339]  kthread+0x337/0x6f0
[   11.353508]  ret_from_fork+0x41/0x80
[   11.353753]  ret_from_fork_asm+0x1a/0x30
[   11.353925] 
[   11.354092] The buggy address belongs to the object at ffff888100345400
[   11.354092]  which belongs to the cache kmalloc-256 of size 256
[   11.354722] The buggy address is located 17 bytes to the right of
[   11.354722]  allocated 201-byte region [ffff888100345400, ffff8881003454c9)
[   11.355155] 
[   11.355310] The buggy address belongs to the physical page:
[   11.355725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100344
[   11.356011] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.356384] flags: 0x200000000000040(head|node=0|zone=2)
[   11.356638] page_type: f5(slab)
[   11.356902] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.357473] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.357857] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.358121] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.358369] head: 0200000000000001 ffffea000400d101 00000000ffffffff 00000000ffffffff
[   11.358658] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.359157] page dumped because: kasan: bad access detected
[   11.359538] 
[   11.359714] Memory state around the buggy address:
[   11.360082]  ffff888100345380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.360576]  ffff888100345400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.360867] >ffff888100345480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.361142]                                                     ^
[   11.361517]  ffff888100345500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.361895]  ffff888100345580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.362244] ==================================================================
[   11.538283] ==================================================================
[   11.539571] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec6/0x11d0
[   11.540103] Write of size 1 at addr ffff8881028620da by task kunit_try_catch/182
[   11.540525] 
[   11.540765] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   11.540913] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.540938] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.540991] Call Trace:
[   11.541028]  <TASK>
[   11.541067]  dump_stack_lvl+0x73/0xb0
[   11.541115]  print_report+0xd1/0x650
[   11.541145]  ? __virt_addr_valid+0x1db/0x2d0
[   11.541173]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.541197]  ? kasan_addr_to_slab+0x11/0xa0
[   11.541225]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.541255]  kasan_report+0x141/0x180
[   11.541289]  ? krealloc_less_oob_helper+0xec6/0x11d0
[   11.541333]  __asan_report_store1_noabort+0x1b/0x30
[   11.541397]  krealloc_less_oob_helper+0xec6/0x11d0
[   11.541453]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.541511]  ? finish_task_switch.isra.0+0x153/0x700
[   11.541566]  ? __switch_to+0x5d9/0xf60
[   11.541608]  ? dequeue_task_fair+0x166/0x4e0
[   11.541666]  ? __schedule+0x10cc/0x2b60
[   11.541712]  ? __pfx_read_tsc+0x10/0x10
[   11.541752]  krealloc_large_less_oob+0x1c/0x30
[   11.541780]  kunit_try_run_case+0x1a5/0x480
[   11.541804]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.541823]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.541846]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.541867]  ? __kthread_parkme+0x82/0x180
[   11.541888]  ? preempt_count_sub+0x50/0x80
[   11.541909]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.541931]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.541965]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.541988]  kthread+0x337/0x6f0
[   11.542005]  ? trace_preempt_on+0x20/0xc0
[   11.542029]  ? __pfx_kthread+0x10/0x10
[   11.542046]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.542067]  ? calculate_sigpending+0x7b/0xa0
[   11.542088]  ? __pfx_kthread+0x10/0x10
[   11.542105]  ret_from_fork+0x41/0x80
[   11.542124]  ? __pfx_kthread+0x10/0x10
[   11.542140]  ret_from_fork_asm+0x1a/0x30
[   11.542169]  </TASK>
[   11.542182] 
[   11.551401] The buggy address belongs to the physical page:
[   11.551960] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102860
[   11.552588] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.553144] flags: 0x200000000000040(head|node=0|zone=2)
[   11.553366] page_type: f8(unknown)
[   11.553538] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.553813] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.554238] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.554782] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.555112] head: 0200000000000002 ffffea00040a1801 00000000ffffffff 00000000ffffffff
[   11.555356] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   11.555616] page dumped because: kasan: bad access detected
[   11.555997] 
[   11.556153] Memory state around the buggy address:
[   11.556499]  ffff888102861f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.557043]  ffff888102862000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.557434] >ffff888102862080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   11.557903]                                                     ^
[   11.559130]  ffff888102862100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.559389]  ffff888102862180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.559610] ==================================================================
[   11.560819] ==================================================================
[   11.561402] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   11.562482] Write of size 1 at addr ffff8881028620ea by task kunit_try_catch/182
[   11.563425] 
[   11.563800] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   11.563875] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.563893] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.563917] Call Trace:
[   11.563943]  <TASK>
[   11.563968]  dump_stack_lvl+0x73/0xb0
[   11.564007]  print_report+0xd1/0x650
[   11.564030]  ? __virt_addr_valid+0x1db/0x2d0
[   11.564050]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   11.564069]  ? kasan_addr_to_slab+0x11/0xa0
[   11.564087]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   11.564106]  kasan_report+0x141/0x180
[   11.564126]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   11.564149]  __asan_report_store1_noabort+0x1b/0x30
[   11.564169]  krealloc_less_oob_helper+0xe90/0x11d0
[   11.564189]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.564208]  ? finish_task_switch.isra.0+0x153/0x700
[   11.564229]  ? __switch_to+0x5d9/0xf60
[   11.564248]  ? dequeue_task_fair+0x166/0x4e0
[   11.564270]  ? __schedule+0x10cc/0x2b60
[   11.564472]  ? __pfx_read_tsc+0x10/0x10
[   11.564518]  krealloc_large_less_oob+0x1c/0x30
[   11.564548]  kunit_try_run_case+0x1a5/0x480
[   11.564580]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.564668]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.564702]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.564732]  ? __kthread_parkme+0x82/0x180
[   11.564761]  ? preempt_count_sub+0x50/0x80
[   11.564791]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.564821]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.564850]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.564879]  kthread+0x337/0x6f0
[   11.564900]  ? trace_preempt_on+0x20/0xc0
[   11.564930]  ? __pfx_kthread+0x10/0x10
[   11.564956]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.564985]  ? calculate_sigpending+0x7b/0xa0
[   11.565015]  ? __pfx_kthread+0x10/0x10
[   11.565042]  ret_from_fork+0x41/0x80
[   11.565070]  ? __pfx_kthread+0x10/0x10
[   11.565095]  ret_from_fork_asm+0x1a/0x30
[   11.565169]  </TASK>
[   11.565198] 
[   11.577069] The buggy address belongs to the physical page:
[   11.577351] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102860
[   11.577902] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.578274] flags: 0x200000000000040(head|node=0|zone=2)
[   11.578551] page_type: f8(unknown)
[   11.578761] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.579123] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.579470] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.579924] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.580268] head: 0200000000000002 ffffea00040a1801 00000000ffffffff 00000000ffffffff
[   11.580593] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   11.580965] page dumped because: kasan: bad access detected
[   11.581328] 
[   11.581433] Memory state around the buggy address:
[   11.581831]  ffff888102861f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.582180]  ffff888102862000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.582493] >ffff888102862080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   11.582835]                                                           ^
[   11.583345]  ffff888102862100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.583581]  ffff888102862180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.583932] ==================================================================
[   11.394108] ==================================================================
[   11.395427] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   11.395717] Write of size 1 at addr ffff8881003454eb by task kunit_try_catch/178
[   11.395981] 
[   11.396126] CPU: 0 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   11.396208] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.396229] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.396267] Call Trace:
[   11.396305]  <TASK>
[   11.396342]  dump_stack_lvl+0x73/0xb0
[   11.396397]  print_report+0xd1/0x650
[   11.396437]  ? __virt_addr_valid+0x1db/0x2d0
[   11.396475]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   11.396511]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.396563]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   11.396606]  kasan_report+0x141/0x180
[   11.396666]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   11.396714]  __asan_report_store1_noabort+0x1b/0x30
[   11.396747]  krealloc_less_oob_helper+0xd47/0x11d0
[   11.396786]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.396822]  ? finish_task_switch.isra.0+0x153/0x700
[   11.396863]  ? __switch_to+0x5d9/0xf60
[   11.396902]  ? dequeue_task_fair+0x166/0x4e0
[   11.396943]  ? __schedule+0x10cc/0x2b60
[   11.396979]  ? __pfx_read_tsc+0x10/0x10
[   11.397022]  krealloc_less_oob+0x1c/0x30
[   11.397055]  kunit_try_run_case+0x1a5/0x480
[   11.397102]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.397143]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.397189]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.397226]  ? __kthread_parkme+0x82/0x180
[   11.397270]  ? preempt_count_sub+0x50/0x80
[   11.397304]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.397334]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.397364]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.397394]  kthread+0x337/0x6f0
[   11.397416]  ? trace_preempt_on+0x20/0xc0
[   11.397448]  ? __pfx_kthread+0x10/0x10
[   11.397471]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.397491]  ? calculate_sigpending+0x7b/0xa0
[   11.397512]  ? __pfx_kthread+0x10/0x10
[   11.397529]  ret_from_fork+0x41/0x80
[   11.397564]  ? __pfx_kthread+0x10/0x10
[   11.397587]  ret_from_fork_asm+0x1a/0x30
[   11.397640]  </TASK>
[   11.397655] 
[   11.409841] Allocated by task 178:
[   11.410228]  kasan_save_stack+0x45/0x70
[   11.410676]  kasan_save_track+0x18/0x40
[   11.410936]  kasan_save_alloc_info+0x3b/0x50
[   11.411210]  __kasan_krealloc+0x190/0x1f0
[   11.411523]  krealloc_noprof+0xf3/0x340
[   11.411759]  krealloc_less_oob_helper+0x1aa/0x11d0
[   11.412073]  krealloc_less_oob+0x1c/0x30
[   11.412379]  kunit_try_run_case+0x1a5/0x480
[   11.412662]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.413002]  kthread+0x337/0x6f0
[   11.413253]  ret_from_fork+0x41/0x80
[   11.413567]  ret_from_fork_asm+0x1a/0x30
[   11.413801] 
[   11.413989] The buggy address belongs to the object at ffff888100345400
[   11.413989]  which belongs to the cache kmalloc-256 of size 256
[   11.414694] The buggy address is located 34 bytes to the right of
[   11.414694]  allocated 201-byte region [ffff888100345400, ffff8881003454c9)
[   11.415401] 
[   11.415580] The buggy address belongs to the physical page:
[   11.415880] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100344
[   11.416356] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.416696] flags: 0x200000000000040(head|node=0|zone=2)
[   11.417097] page_type: f5(slab)
[   11.417348] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.417649] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.418181] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.418679] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.419034] head: 0200000000000001 ffffea000400d101 00000000ffffffff 00000000ffffffff
[   11.419452] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.419799] page dumped because: kasan: bad access detected
[   11.420145] 
[   11.420290] Memory state around the buggy address:
[   11.420590]  ffff888100345380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.420985]  ffff888100345400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.421467] >ffff888100345480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.421759]                                                           ^
[   11.422219]  ffff888100345500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.422584]  ffff888100345580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.423074] ==================================================================
[   11.305837] ==================================================================
[   11.306298] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   11.306547] Write of size 1 at addr ffff8881003454d0 by task kunit_try_catch/178
[   11.307117] 
[   11.307380] CPU: 0 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   11.307482] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.307506] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.307553] Call Trace:
[   11.307596]  <TASK>
[   11.307795]  dump_stack_lvl+0x73/0xb0
[   11.307840]  print_report+0xd1/0x650
[   11.307866]  ? __virt_addr_valid+0x1db/0x2d0
[   11.307888]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.307907]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.307937]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.307966]  kasan_report+0x141/0x180
[   11.308001]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.308044]  __asan_report_store1_noabort+0x1b/0x30
[   11.308103]  krealloc_less_oob_helper+0xe23/0x11d0
[   11.308142]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.308179]  ? finish_task_switch.isra.0+0x153/0x700
[   11.308223]  ? __switch_to+0x5d9/0xf60
[   11.308257]  ? dequeue_task_fair+0x166/0x4e0
[   11.308448]  ? __schedule+0x10cc/0x2b60
[   11.308496]  ? __pfx_read_tsc+0x10/0x10
[   11.308531]  krealloc_less_oob+0x1c/0x30
[   11.308569]  kunit_try_run_case+0x1a5/0x480
[   11.308597]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.308618]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.308662]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.308685]  ? __kthread_parkme+0x82/0x180
[   11.308708]  ? preempt_count_sub+0x50/0x80
[   11.308731]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.308754]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.308777]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.308799]  kthread+0x337/0x6f0
[   11.308815]  ? trace_preempt_on+0x20/0xc0
[   11.308838]  ? __pfx_kthread+0x10/0x10
[   11.308855]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.308876]  ? calculate_sigpending+0x7b/0xa0
[   11.308897]  ? __pfx_kthread+0x10/0x10
[   11.308914]  ret_from_fork+0x41/0x80
[   11.308934]  ? __pfx_kthread+0x10/0x10
[   11.308951]  ret_from_fork_asm+0x1a/0x30
[   11.308981]  </TASK>
[   11.308993] 
[   11.322999] Allocated by task 178:
[   11.323311]  kasan_save_stack+0x45/0x70
[   11.323564]  kasan_save_track+0x18/0x40
[   11.323755]  kasan_save_alloc_info+0x3b/0x50
[   11.323918]  __kasan_krealloc+0x190/0x1f0
[   11.324104]  krealloc_noprof+0xf3/0x340
[   11.324839]  krealloc_less_oob_helper+0x1aa/0x11d0
[   11.325370]  krealloc_less_oob+0x1c/0x30
[   11.325763]  kunit_try_run_case+0x1a5/0x480
[   11.326046]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.326315]  kthread+0x337/0x6f0
[   11.327164]  ret_from_fork+0x41/0x80
[   11.327503]  ret_from_fork_asm+0x1a/0x30
[   11.327678] 
[   11.327771] The buggy address belongs to the object at ffff888100345400
[   11.327771]  which belongs to the cache kmalloc-256 of size 256
[   11.328323] The buggy address is located 7 bytes to the right of
[   11.328323]  allocated 201-byte region [ffff888100345400, ffff8881003454c9)
[   11.328964] 
[   11.329177] The buggy address belongs to the physical page:
[   11.329655] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100344
[   11.330085] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.330414] flags: 0x200000000000040(head|node=0|zone=2)
[   11.330832] page_type: f5(slab)
[   11.331124] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.332531] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.332885] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.333261] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.333805] head: 0200000000000001 ffffea000400d101 00000000ffffffff 00000000ffffffff
[   11.334087] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.334601] page dumped because: kasan: bad access detected
[   11.334844] 
[   11.334997] Memory state around the buggy address:
[   11.335258]  ffff888100345380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.335586]  ffff888100345400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.335979] >ffff888100345480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.336357]                                                  ^
[   11.336964]  ffff888100345500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.337324]  ffff888100345580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.338392] ==================================================================
[   11.585078] ==================================================================
[   11.586417] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd47/0x11d0
[   11.587356] Write of size 1 at addr ffff8881028620eb by task kunit_try_catch/182
[   11.587896] 
[   11.588077] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   11.588171] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.588195] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.588231] Call Trace:
[   11.588272]  <TASK>
[   11.588310]  dump_stack_lvl+0x73/0xb0
[   11.588371]  print_report+0xd1/0x650
[   11.588414]  ? __virt_addr_valid+0x1db/0x2d0
[   11.588455]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   11.588494]  ? kasan_addr_to_slab+0x11/0xa0
[   11.588530]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   11.588806]  kasan_report+0x141/0x180
[   11.588875]  ? krealloc_less_oob_helper+0xd47/0x11d0
[   11.588917]  __asan_report_store1_noabort+0x1b/0x30
[   11.588942]  krealloc_less_oob_helper+0xd47/0x11d0
[   11.588964]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.588983]  ? finish_task_switch.isra.0+0x153/0x700
[   11.589006]  ? __switch_to+0x5d9/0xf60
[   11.589028]  ? dequeue_task_fair+0x166/0x4e0
[   11.589051]  ? __schedule+0x10cc/0x2b60
[   11.589073]  ? __pfx_read_tsc+0x10/0x10
[   11.589095]  krealloc_large_less_oob+0x1c/0x30
[   11.589113]  kunit_try_run_case+0x1a5/0x480
[   11.589137]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.589156]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.589179]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.589200]  ? __kthread_parkme+0x82/0x180
[   11.589222]  ? preempt_count_sub+0x50/0x80
[   11.589244]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.589265]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.589328]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.589370]  kthread+0x337/0x6f0
[   11.589396]  ? trace_preempt_on+0x20/0xc0
[   11.589429]  ? __pfx_kthread+0x10/0x10
[   11.589453]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.589482]  ? calculate_sigpending+0x7b/0xa0
[   11.589508]  ? __pfx_kthread+0x10/0x10
[   11.589533]  ret_from_fork+0x41/0x80
[   11.589571]  ? __pfx_kthread+0x10/0x10
[   11.589597]  ret_from_fork_asm+0x1a/0x30
[   11.589653]  </TASK>
[   11.589672] 
[   11.603384] The buggy address belongs to the physical page:
[   11.603770] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102860
[   11.604367] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.604908] flags: 0x200000000000040(head|node=0|zone=2)
[   11.605319] page_type: f8(unknown)
[   11.605788] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.606051] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.606574] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.606908] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.607302] head: 0200000000000002 ffffea00040a1801 00000000ffffffff 00000000ffffffff
[   11.607773] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   11.608182] page dumped because: kasan: bad access detected
[   11.608503] 
[   11.608705] Memory state around the buggy address:
[   11.609030]  ffff888102861f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.609390]  ffff888102862000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.609747] >ffff888102862080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   11.610245]                                                           ^
[   11.610706]  ffff888102862100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.611138]  ffff888102862180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.611484] ==================================================================
[   11.490236] ==================================================================
[   11.490977] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   11.491492] Write of size 1 at addr ffff8881028620c9 by task kunit_try_catch/182
[   11.492343] 
[   11.492732] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   11.492840] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.492864] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.492905] Call Trace:
[   11.492932]  <TASK>
[   11.492965]  dump_stack_lvl+0x73/0xb0
[   11.493027]  print_report+0xd1/0x650
[   11.493070]  ? __virt_addr_valid+0x1db/0x2d0
[   11.493111]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.493142]  ? kasan_addr_to_slab+0x11/0xa0
[   11.493173]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.493206]  kasan_report+0x141/0x180
[   11.493245]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.493288]  __asan_report_store1_noabort+0x1b/0x30
[   11.493325]  krealloc_less_oob_helper+0xd70/0x11d0
[   11.493367]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.493402]  ? finish_task_switch.isra.0+0x153/0x700
[   11.493440]  ? __switch_to+0x5d9/0xf60
[   11.493473]  ? dequeue_task_fair+0x166/0x4e0
[   11.493531]  ? __schedule+0x10cc/0x2b60
[   11.493572]  ? __pfx_read_tsc+0x10/0x10
[   11.493615]  krealloc_large_less_oob+0x1c/0x30
[   11.493673]  kunit_try_run_case+0x1a5/0x480
[   11.493721]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.493780]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.493831]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.493866]  ? __kthread_parkme+0x82/0x180
[   11.493899]  ? preempt_count_sub+0x50/0x80
[   11.493930]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.493963]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.493988]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.494009]  kthread+0x337/0x6f0
[   11.494026]  ? trace_preempt_on+0x20/0xc0
[   11.494049]  ? __pfx_kthread+0x10/0x10
[   11.494066]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.494086]  ? calculate_sigpending+0x7b/0xa0
[   11.494106]  ? __pfx_kthread+0x10/0x10
[   11.494124]  ret_from_fork+0x41/0x80
[   11.494144]  ? __pfx_kthread+0x10/0x10
[   11.494161]  ret_from_fork_asm+0x1a/0x30
[   11.494191]  </TASK>
[   11.494205] 
[   11.505195] The buggy address belongs to the physical page:
[   11.505541] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102860
[   11.506255] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.506508] flags: 0x200000000000040(head|node=0|zone=2)
[   11.507088] page_type: f8(unknown)
[   11.507950] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.508328] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.508709] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.509003] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.509258] head: 0200000000000002 ffffea00040a1801 00000000ffffffff 00000000ffffffff
[   11.509715] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   11.510427] page dumped because: kasan: bad access detected
[   11.510741] 
[   11.511044] Memory state around the buggy address:
[   11.511308]  ffff888102861f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.511573]  ffff888102862000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.512128] >ffff888102862080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   11.512361]                                               ^
[   11.512831]  ffff888102862100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.513080]  ffff888102862180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.513458] ==================================================================
[   11.516123] ==================================================================
[   11.516487] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe23/0x11d0
[   11.516746] Write of size 1 at addr ffff8881028620d0 by task kunit_try_catch/182
[   11.516937] 
[   11.517139] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   11.517223] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.517244] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.517283] Call Trace:
[   11.517333]  <TASK>
[   11.517371]  dump_stack_lvl+0x73/0xb0
[   11.517429]  print_report+0xd1/0x650
[   11.517475]  ? __virt_addr_valid+0x1db/0x2d0
[   11.517508]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.517542]  ? kasan_addr_to_slab+0x11/0xa0
[   11.517576]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.517610]  kasan_report+0x141/0x180
[   11.517686]  ? krealloc_less_oob_helper+0xe23/0x11d0
[   11.517727]  __asan_report_store1_noabort+0x1b/0x30
[   11.517761]  krealloc_less_oob_helper+0xe23/0x11d0
[   11.517802]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.517838]  ? finish_task_switch.isra.0+0x153/0x700
[   11.517878]  ? __switch_to+0x5d9/0xf60
[   11.517916]  ? dequeue_task_fair+0x166/0x4e0
[   11.517965]  ? __schedule+0x10cc/0x2b60
[   11.518006]  ? __pfx_read_tsc+0x10/0x10
[   11.518045]  krealloc_large_less_oob+0x1c/0x30
[   11.518080]  kunit_try_run_case+0x1a5/0x480
[   11.518116]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.518146]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.518180]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.518534]  ? __kthread_parkme+0x82/0x180
[   11.518585]  ? preempt_count_sub+0x50/0x80
[   11.518636]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.518673]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.518712]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.518744]  kthread+0x337/0x6f0
[   11.518776]  ? trace_preempt_on+0x20/0xc0
[   11.518809]  ? __pfx_kthread+0x10/0x10
[   11.518835]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.518865]  ? calculate_sigpending+0x7b/0xa0
[   11.518894]  ? __pfx_kthread+0x10/0x10
[   11.518921]  ret_from_fork+0x41/0x80
[   11.518952]  ? __pfx_kthread+0x10/0x10
[   11.518970]  ret_from_fork_asm+0x1a/0x30
[   11.519000]  </TASK>
[   11.519013] 
[   11.528784] The buggy address belongs to the physical page:
[   11.529147] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102860
[   11.529451] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.529882] flags: 0x200000000000040(head|node=0|zone=2)
[   11.530324] page_type: f8(unknown)
[   11.530640] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.531154] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.531582] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.531903] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   11.532338] head: 0200000000000002 ffffea00040a1801 00000000ffffffff 00000000ffffffff
[   11.533029] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   11.533312] page dumped because: kasan: bad access detected
[   11.533696] 
[   11.533870] Memory state around the buggy address:
[   11.534157]  ffff888102861f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.534563]  ffff888102862000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.534978] >ffff888102862080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   11.535409]                                                  ^
[   11.535796]  ffff888102862100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.536186]  ffff888102862180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.536511] ==================================================================
[   11.270207] ==================================================================
[   11.271339] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd70/0x11d0
[   11.271874] Write of size 1 at addr ffff8881003454c9 by task kunit_try_catch/178
[   11.272171] 
[   11.272313] CPU: 0 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   11.272405] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.272426] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.272464] Call Trace:
[   11.272493]  <TASK>
[   11.272528]  dump_stack_lvl+0x73/0xb0
[   11.272579]  print_report+0xd1/0x650
[   11.272611]  ? __virt_addr_valid+0x1db/0x2d0
[   11.272679]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.273039]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.273076]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.273098]  kasan_report+0x141/0x180
[   11.273121]  ? krealloc_less_oob_helper+0xd70/0x11d0
[   11.273145]  __asan_report_store1_noabort+0x1b/0x30
[   11.273164]  krealloc_less_oob_helper+0xd70/0x11d0
[   11.273185]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.273204]  ? finish_task_switch.isra.0+0x153/0x700
[   11.273228]  ? __switch_to+0x5d9/0xf60
[   11.273249]  ? dequeue_task_fair+0x166/0x4e0
[   11.273272]  ? __schedule+0x10cc/0x2b60
[   11.273312]  ? __pfx_read_tsc+0x10/0x10
[   11.273346]  krealloc_less_oob+0x1c/0x30
[   11.273374]  kunit_try_run_case+0x1a5/0x480
[   11.273407]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.273428]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.273451]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.273473]  ? __kthread_parkme+0x82/0x180
[   11.273495]  ? preempt_count_sub+0x50/0x80
[   11.273518]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.273540]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.273570]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.273591]  kthread+0x337/0x6f0
[   11.273608]  ? trace_preempt_on+0x20/0xc0
[   11.273650]  ? __pfx_kthread+0x10/0x10
[   11.273669]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.273690]  ? calculate_sigpending+0x7b/0xa0
[   11.273711]  ? __pfx_kthread+0x10/0x10
[   11.273729]  ret_from_fork+0x41/0x80
[   11.273749]  ? __pfx_kthread+0x10/0x10
[   11.273766]  ret_from_fork_asm+0x1a/0x30
[   11.273797]  </TASK>
[   11.273810] 
[   11.288185] Allocated by task 178:
[   11.288716]  kasan_save_stack+0x45/0x70
[   11.289063]  kasan_save_track+0x18/0x40
[   11.289324]  kasan_save_alloc_info+0x3b/0x50
[   11.289619]  __kasan_krealloc+0x190/0x1f0
[   11.289962]  krealloc_noprof+0xf3/0x340
[   11.290456]  krealloc_less_oob_helper+0x1aa/0x11d0
[   11.290860]  krealloc_less_oob+0x1c/0x30
[   11.291111]  kunit_try_run_case+0x1a5/0x480
[   11.291432]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.291897]  kthread+0x337/0x6f0
[   11.292134]  ret_from_fork+0x41/0x80
[   11.292734]  ret_from_fork_asm+0x1a/0x30
[   11.292986] 
[   11.293094] The buggy address belongs to the object at ffff888100345400
[   11.293094]  which belongs to the cache kmalloc-256 of size 256
[   11.293727] The buggy address is located 0 bytes to the right of
[   11.293727]  allocated 201-byte region [ffff888100345400, ffff8881003454c9)
[   11.294118] 
[   11.294283] The buggy address belongs to the physical page:
[   11.295384] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100344
[   11.295891] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.296213] flags: 0x200000000000040(head|node=0|zone=2)
[   11.296636] page_type: f5(slab)
[   11.296923] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.297268] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.297752] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.298265] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.299025] head: 0200000000000001 ffffea000400d101 00000000ffffffff 00000000ffffffff
[   11.299315] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.300038] page dumped because: kasan: bad access detected
[   11.300463] 
[   11.300826] Memory state around the buggy address:
[   11.301184]  ffff888100345380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.301961]  ffff888100345400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.302749] >ffff888100345480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.302961]                                               ^
[   11.303384]  ffff888100345500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.303674]  ffff888100345580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.304046] ==================================================================
[   11.363817] ==================================================================
[   11.365285] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe90/0x11d0
[   11.365731] Write of size 1 at addr ffff8881003454ea by task kunit_try_catch/178
[   11.366003] 
[   11.366147] CPU: 0 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc2 #1 PREEMPT(voluntary) 
[   11.366251] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.366277] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.366321] Call Trace:
[   11.366359]  <TASK>
[   11.366399]  dump_stack_lvl+0x73/0xb0
[   11.366455]  print_report+0xd1/0x650
[   11.366505]  ? __virt_addr_valid+0x1db/0x2d0
[   11.366551]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   11.366594]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.366654]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   11.366700]  kasan_report+0x141/0x180
[   11.366748]  ? krealloc_less_oob_helper+0xe90/0x11d0
[   11.366802]  __asan_report_store1_noabort+0x1b/0x30
[   11.366832]  krealloc_less_oob_helper+0xe90/0x11d0
[   11.366855]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.366875]  ? finish_task_switch.isra.0+0x153/0x700
[   11.366900]  ? __switch_to+0x5d9/0xf60
[   11.366922]  ? dequeue_task_fair+0x166/0x4e0
[   11.366945]  ? __schedule+0x10cc/0x2b60
[   11.366969]  ? __pfx_read_tsc+0x10/0x10
[   11.366992]  krealloc_less_oob+0x1c/0x30
[   11.367010]  kunit_try_run_case+0x1a5/0x480
[   11.367035]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.367058]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.367081]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.367103]  ? __kthread_parkme+0x82/0x180
[   11.367124]  ? preempt_count_sub+0x50/0x80
[   11.367146]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.367168]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.367189]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.367210]  kthread+0x337/0x6f0
[   11.367226]  ? trace_preempt_on+0x20/0xc0
[   11.367248]  ? __pfx_kthread+0x10/0x10
[   11.367265]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.367285]  ? calculate_sigpending+0x7b/0xa0
[   11.367305]  ? __pfx_kthread+0x10/0x10
[   11.367322]  ret_from_fork+0x41/0x80
[   11.367341]  ? __pfx_kthread+0x10/0x10
[   11.367357]  ret_from_fork_asm+0x1a/0x30
[   11.367386]  </TASK>
[   11.367399] 
[   11.378880] Allocated by task 178:
[   11.379348]  kasan_save_stack+0x45/0x70
[   11.379784]  kasan_save_track+0x18/0x40
[   11.380067]  kasan_save_alloc_info+0x3b/0x50
[   11.380389]  __kasan_krealloc+0x190/0x1f0
[   11.380692]  krealloc_noprof+0xf3/0x340
[   11.381011]  krealloc_less_oob_helper+0x1aa/0x11d0
[   11.381388]  krealloc_less_oob+0x1c/0x30
[   11.381778]  kunit_try_run_case+0x1a5/0x480
[   11.382022]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.382427]  kthread+0x337/0x6f0
[   11.382768]  ret_from_fork+0x41/0x80
[   11.383009]  ret_from_fork_asm+0x1a/0x30
[   11.383301] 
[   11.383447] The buggy address belongs to the object at ffff888100345400
[   11.383447]  which belongs to the cache kmalloc-256 of size 256
[   11.384118] The buggy address is located 33 bytes to the right of
[   11.384118]  allocated 201-byte region [ffff888100345400, ffff8881003454c9)
[   11.384866] 
[   11.385041] The buggy address belongs to the physical page:
[   11.385311] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100344
[   11.385639] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.385933] flags: 0x200000000000040(head|node=0|zone=2)
[   11.386207] page_type: f5(slab)
[   11.386487] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.386855] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.387112] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.387377] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.387786] head: 0200000000000001 ffffea000400d101 00000000ffffffff 00000000ffffffff
[   11.388449] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   11.389004] page dumped because: kasan: bad access detected
[   11.389396] 
[   11.389582] Memory state around the buggy address:
[   11.389822]  ffff888100345380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.390301]  ffff888100345400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.390712] >ffff888100345480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.391168]                                                           ^
[   11.391581]  ffff888100345500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.392030]  ffff888100345580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.392443] ==================================================================