Hay
Date
July 15, 2025, 2:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[  105.159714] ==================================================================
[  105.161761] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x140/0x5b0
[  105.162793] Write of size 1 at addr ffff0000c62606d0 by task kunit_try_catch/214
[  105.163675] 
[  105.163950] CPU: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  105.164775] Hardware name: linux,dummy-virt (DT)
[  105.165441] Call trace:
[  105.165848]  dump_backtrace+0xe0/0x134
[  105.166434]  show_stack+0x20/0x2c
[  105.166964]  dump_stack_lvl+0x88/0xb4
[  105.167567]  print_report+0x158/0x44c
[  105.168129]  kasan_report+0xc8/0x180
[  105.168827]  __asan_store1+0x68/0x7c
[  105.169215]  krealloc_less_oob_helper+0x140/0x5b0
[  105.169680]  krealloc_less_oob+0x20/0x30
[  105.170061]  kunit_try_run_case+0x8c/0x124
[  105.170468]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  105.170982]  kthread+0x15c/0x170
[  105.171458]  ret_from_fork+0x10/0x20
[  105.171923] 
[  105.172136] Allocated by task 214:
[  105.172495]  kasan_save_stack+0x3c/0x70
[  105.173294]  kasan_set_track+0x2c/0x40
[  105.173900]  kasan_save_alloc_info+0x24/0x34
[  105.174547]  __kasan_krealloc+0x10c/0x140
[  105.175165]  krealloc+0x158/0x1c0
[  105.175692]  krealloc_less_oob_helper+0xd8/0x5b0
[  105.176570]  krealloc_less_oob+0x20/0x30
[  105.177250]  kunit_try_run_case+0x8c/0x124
[  105.177898]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  105.178674]  kthread+0x15c/0x170
[  105.179222]  ret_from_fork+0x10/0x20
[  105.179791] 
[  105.180069] The buggy address belongs to the object at ffff0000c6260600
[  105.180069]  which belongs to the cache kmalloc-256 of size 256
[  105.182350] The buggy address is located 208 bytes inside of
[  105.182350]  256-byte region [ffff0000c6260600, ffff0000c6260700)
[  105.183275] 
[  105.183461] The buggy address belongs to the physical page:
[  105.183847] page:0000000090416edb refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106260
[  105.185001] head:0000000090416edb order:1 compound_mapcount:0 compound_pincount:0
[  105.185495] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  105.186247] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[  105.186823] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  105.187306] page dumped because: kasan: bad access detected
[  105.187680] 
[  105.187963] Memory state around the buggy address:
[  105.188806]  ffff0000c6260580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  105.189681]  ffff0000c6260600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  105.190570] >ffff0000c6260680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[  105.191410]                                                  ^
[  105.192135]  ffff0000c6260700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  105.193336]  ffff0000c6260780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  105.194237] ==================================================================
[  105.225303] ==================================================================
[  105.225910] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1b0/0x5b0
[  105.226684] Write of size 1 at addr ffff0000c62606ea by task kunit_try_catch/214
[  105.227283] 
[  105.227526] CPU: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  105.228274] Hardware name: linux,dummy-virt (DT)
[  105.229455] Call trace:
[  105.229764]  dump_backtrace+0xe0/0x134
[  105.230222]  show_stack+0x20/0x2c
[  105.230611]  dump_stack_lvl+0x88/0xb4
[  105.231103]  print_report+0x158/0x44c
[  105.231525]  kasan_report+0xc8/0x180
[  105.231952]  __asan_store1+0x68/0x7c
[  105.232411]  krealloc_less_oob_helper+0x1b0/0x5b0
[  105.232949]  krealloc_less_oob+0x20/0x30
[  105.233390]  kunit_try_run_case+0x8c/0x124
[  105.233874]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  105.234423]  kthread+0x15c/0x170
[  105.235035]  ret_from_fork+0x10/0x20
[  105.235482] 
[  105.235687] Allocated by task 214:
[  105.236030]  kasan_save_stack+0x3c/0x70
[  105.236691]  kasan_set_track+0x2c/0x40
[  105.237128]  kasan_save_alloc_info+0x24/0x34
[  105.237631]  __kasan_krealloc+0x10c/0x140
[  105.238112]  krealloc+0x158/0x1c0
[  105.238521]  krealloc_less_oob_helper+0xd8/0x5b0
[  105.239023]  krealloc_less_oob+0x20/0x30
[  105.239455]  kunit_try_run_case+0x8c/0x124
[  105.239921]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  105.240663]  kthread+0x15c/0x170
[  105.241080]  ret_from_fork+0x10/0x20
[  105.241511] 
[  105.241708] The buggy address belongs to the object at ffff0000c6260600
[  105.241708]  which belongs to the cache kmalloc-256 of size 256
[  105.242622] The buggy address is located 234 bytes inside of
[  105.242622]  256-byte region [ffff0000c6260600, ffff0000c6260700)
[  105.243524] 
[  105.243760] The buggy address belongs to the physical page:
[  105.244221] page:0000000090416edb refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106260
[  105.245192] head:0000000090416edb order:1 compound_mapcount:0 compound_pincount:0
[  105.245823] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  105.246496] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[  105.247170] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  105.247800] page dumped because: kasan: bad access detected
[  105.248276] 
[  105.249314] Memory state around the buggy address:
[  105.249754]  ffff0000c6260580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  105.250362]  ffff0000c6260600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  105.250988] >ffff0000c6260680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[  105.251570]                                                           ^
[  105.252132]  ffff0000c6260700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  105.253078]  ffff0000c6260780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  105.253646] ==================================================================
[  105.442803] ==================================================================
[  105.443374] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1d4/0x5b0
[  105.444511] Write of size 1 at addr ffff0000c68420eb by task kunit_try_catch/216
[  105.445658] 
[  105.445957] CPU: 1 PID: 216 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  105.446517] Hardware name: linux,dummy-virt (DT)
[  105.446866] Call trace:
[  105.447176]  dump_backtrace+0xe0/0x134
[  105.447567]  show_stack+0x20/0x2c
[  105.448027]  dump_stack_lvl+0x88/0xb4
[  105.448552]  print_report+0x158/0x44c
[  105.448920]  kasan_report+0xc8/0x180
[  105.449288]  __asan_store1+0x68/0x7c
[  105.449775]  krealloc_less_oob_helper+0x1d4/0x5b0
[  105.450398]  krealloc_pagealloc_less_oob+0x20/0x30
[  105.450968]  kunit_try_run_case+0x8c/0x124
[  105.451497]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  105.452105]  kthread+0x15c/0x170
[  105.452524]  ret_from_fork+0x10/0x20
[  105.453005] 
[  105.453585] The buggy address belongs to the physical page:
[  105.453989] page:00000000c34535d9 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106840
[  105.454584] head:00000000c34535d9 order:2 compound_mapcount:0 compound_pincount:0
[  105.455438] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[  105.456215] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[  105.457365] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  105.458090] page dumped because: kasan: bad access detected
[  105.458515] 
[  105.458701] Memory state around the buggy address:
[  105.459317]  ffff0000c6841f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  105.459953]  ffff0000c6842000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  105.460932] >ffff0000c6842080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  105.461490]                                                           ^
[  105.462050]  ffff0000c6842100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  105.462677]  ffff0000c6842180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  105.463257] ==================================================================
[  105.254674] ==================================================================
[  105.255222] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1d4/0x5b0
[  105.255955] Write of size 1 at addr ffff0000c62606eb by task kunit_try_catch/214
[  105.256897] 
[  105.257151] CPU: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  105.257841] Hardware name: linux,dummy-virt (DT)
[  105.258267] Call trace:
[  105.258528]  dump_backtrace+0xe0/0x134
[  105.259002]  show_stack+0x20/0x2c
[  105.259362]  dump_stack_lvl+0x88/0xb4
[  105.259834]  print_report+0x158/0x44c
[  105.260261]  kasan_report+0xc8/0x180
[  105.260704]  __asan_store1+0x68/0x7c
[  105.261120]  krealloc_less_oob_helper+0x1d4/0x5b0
[  105.261631]  krealloc_less_oob+0x20/0x30
[  105.262051]  kunit_try_run_case+0x8c/0x124
[  105.262508]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  105.263296]  kthread+0x15c/0x170
[  105.263728]  ret_from_fork+0x10/0x20
[  105.264142] 
[  105.264359] Allocated by task 214:
[  105.264908]  kasan_save_stack+0x3c/0x70
[  105.265361]  kasan_set_track+0x2c/0x40
[  105.265773]  kasan_save_alloc_info+0x24/0x34
[  105.266270]  __kasan_krealloc+0x10c/0x140
[  105.266694]  krealloc+0x158/0x1c0
[  105.267117]  krealloc_less_oob_helper+0xd8/0x5b0
[  105.267620]  krealloc_less_oob+0x20/0x30
[  105.268052]  kunit_try_run_case+0x8c/0x124
[  105.268683]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  105.269248]  kthread+0x15c/0x170
[  105.269664]  ret_from_fork+0x10/0x20
[  105.270102] 
[  105.270297] The buggy address belongs to the object at ffff0000c6260600
[  105.270297]  which belongs to the cache kmalloc-256 of size 256
[  105.271284] The buggy address is located 235 bytes inside of
[  105.271284]  256-byte region [ffff0000c6260600, ffff0000c6260700)
[  105.272196] 
[  105.272609] The buggy address belongs to the physical page:
[  105.273127] page:0000000090416edb refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106260
[  105.273866] head:0000000090416edb order:1 compound_mapcount:0 compound_pincount:0
[  105.274486] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  105.275160] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[  105.275830] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  105.277702] page dumped because: kasan: bad access detected
[  105.278209] 
[  105.278403] Memory state around the buggy address:
[  105.278885]  ffff0000c6260580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  105.279503]  ffff0000c6260600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  105.280149] >ffff0000c6260680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[  105.281038]                                                           ^
[  105.281594]  ffff0000c6260700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  105.282227]  ffff0000c6260780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  105.282828] ==================================================================
[  105.195379] ==================================================================
[  105.196249] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x188/0x5b0
[  105.197831] Write of size 1 at addr ffff0000c62606da by task kunit_try_catch/214
[  105.198338] 
[  105.198537] CPU: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  105.199184] Hardware name: linux,dummy-virt (DT)
[  105.199621] Call trace:
[  105.199942]  dump_backtrace+0xe0/0x134
[  105.200406]  show_stack+0x20/0x2c
[  105.200812]  dump_stack_lvl+0x88/0xb4
[  105.201314]  print_report+0x158/0x44c
[  105.201719]  kasan_report+0xc8/0x180
[  105.202336]  __asan_store1+0x68/0x7c
[  105.202731]  krealloc_less_oob_helper+0x188/0x5b0
[  105.203275]  krealloc_less_oob+0x20/0x30
[  105.203715]  kunit_try_run_case+0x8c/0x124
[  105.204203]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  105.204962]  kthread+0x15c/0x170
[  105.205377]  ret_from_fork+0x10/0x20
[  105.205816] 
[  105.206027] Allocated by task 214:
[  105.206376]  kasan_save_stack+0x3c/0x70
[  105.206840]  kasan_set_track+0x2c/0x40
[  105.207287]  kasan_save_alloc_info+0x24/0x34
[  105.207764]  __kasan_krealloc+0x10c/0x140
[  105.208224]  krealloc+0x158/0x1c0
[  105.208809]  krealloc_less_oob_helper+0xd8/0x5b0
[  105.209383]  krealloc_less_oob+0x20/0x30
[  105.209827]  kunit_try_run_case+0x8c/0x124
[  105.210306]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  105.210868]  kthread+0x15c/0x170
[  105.211284]  ret_from_fork+0x10/0x20
[  105.211707] 
[  105.211944] The buggy address belongs to the object at ffff0000c6260600
[  105.211944]  which belongs to the cache kmalloc-256 of size 256
[  105.213157] The buggy address is located 218 bytes inside of
[  105.213157]  256-byte region [ffff0000c6260600, ffff0000c6260700)
[  105.214092] 
[  105.214300] The buggy address belongs to the physical page:
[  105.214764] page:0000000090416edb refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106260
[  105.215545] head:0000000090416edb order:1 compound_mapcount:0 compound_pincount:0
[  105.216176] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  105.217802] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[  105.218479] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  105.219115] page dumped because: kasan: bad access detected
[  105.219616] 
[  105.219825] Memory state around the buggy address:
[  105.220300]  ffff0000c6260580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  105.221168]  ffff0000c6260600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  105.221794] >ffff0000c6260680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[  105.222385]                                                     ^
[  105.222903]  ffff0000c6260700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  105.223524]  ffff0000c6260780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  105.224124] ==================================================================
[  105.371222] ==================================================================
[  105.371688] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x140/0x5b0
[  105.373223] Write of size 1 at addr ffff0000c68420d0 by task kunit_try_catch/216
[  105.373941] 
[  105.374177] CPU: 1 PID: 216 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  105.374918] Hardware name: linux,dummy-virt (DT)
[  105.375370] Call trace:
[  105.375645]  dump_backtrace+0xe0/0x134
[  105.376118]  show_stack+0x20/0x2c
[  105.376723]  dump_stack_lvl+0x88/0xb4
[  105.377197]  print_report+0x158/0x44c
[  105.378476]  kasan_report+0xc8/0x180
[  105.378964]  __asan_store1+0x68/0x7c
[  105.379435]  krealloc_less_oob_helper+0x140/0x5b0
[  105.379990]  krealloc_pagealloc_less_oob+0x20/0x30
[  105.380948]  kunit_try_run_case+0x8c/0x124
[  105.381487]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  105.382068]  kthread+0x15c/0x170
[  105.382516]  ret_from_fork+0x10/0x20
[  105.383009] 
[  105.383228] The buggy address belongs to the physical page:
[  105.383732] page:00000000c34535d9 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106840
[  105.384686] head:00000000c34535d9 order:2 compound_mapcount:0 compound_pincount:0
[  105.385301] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[  105.386675] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[  105.387390] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  105.388047] page dumped because: kasan: bad access detected
[  105.388590] 
[  105.388803] Memory state around the buggy address:
[  105.389268]  ffff0000c6841f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  105.389951]  ffff0000c6842000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  105.390527] >ffff0000c6842080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  105.391504]                                                  ^
[  105.392077]  ffff0000c6842100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  105.393504]  ffff0000c6842180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  105.394161] ==================================================================
[  105.395636] ==================================================================
[  105.397013] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x188/0x5b0
[  105.397796] Write of size 1 at addr ffff0000c68420da by task kunit_try_catch/216
[  105.398488] 
[  105.398762] CPU: 1 PID: 216 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  105.399555] Hardware name: linux,dummy-virt (DT)
[  105.400037] Call trace:
[  105.400358]  dump_backtrace+0xe0/0x134
[  105.400820]  show_stack+0x20/0x2c
[  105.402020]  dump_stack_lvl+0x88/0xb4
[  105.402490]  print_report+0x158/0x44c
[  105.402938]  kasan_report+0xc8/0x180
[  105.403366]  __asan_store1+0x68/0x7c
[  105.403838]  krealloc_less_oob_helper+0x188/0x5b0
[  105.404392]  krealloc_pagealloc_less_oob+0x20/0x30
[  105.404931]  kunit_try_run_case+0x8c/0x124
[  105.405770]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  105.406351]  kthread+0x15c/0x170
[  105.406814]  ret_from_fork+0x10/0x20
[  105.407285] 
[  105.407503] The buggy address belongs to the physical page:
[  105.408030] page:00000000c34535d9 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106840
[  105.409608] head:00000000c34535d9 order:2 compound_mapcount:0 compound_pincount:0
[  105.410242] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[  105.410946] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[  105.411642] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  105.412266] page dumped because: kasan: bad access detected
[  105.413075] 
[  105.413323] Memory state around the buggy address:
[  105.413814]  ffff0000c6841f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  105.414459]  ffff0000c6842000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  105.415114] >ffff0000c6842080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  105.415713]                                                     ^
[  105.416281]  ffff0000c6842100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  105.417703]  ffff0000c6842180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  105.418346] ==================================================================
[  105.342897] ==================================================================
[  105.343707] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x114/0x5b0
[  105.344345] Write of size 1 at addr ffff0000c68420c9 by task kunit_try_catch/216
[  105.345992] 
[  105.346317] CPU: 1 PID: 216 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  105.347421] Hardware name: linux,dummy-virt (DT)
[  105.348041] Call trace:
[  105.348442]  dump_backtrace+0xe0/0x134
[  105.349429]  show_stack+0x20/0x2c
[  105.350000]  dump_stack_lvl+0x88/0xb4
[  105.350634]  print_report+0x158/0x44c
[  105.351210]  kasan_report+0xc8/0x180
[  105.351812]  __asan_store1+0x68/0x7c
[  105.352646]  krealloc_less_oob_helper+0x114/0x5b0
[  105.353579]  krealloc_pagealloc_less_oob+0x20/0x30
[  105.354296]  kunit_try_run_case+0x8c/0x124
[  105.354965]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  105.355781]  kthread+0x15c/0x170
[  105.356218]  ret_from_fork+0x10/0x20
[  105.357288] 
[  105.357609] The buggy address belongs to the physical page:
[  105.358321] page:00000000c34535d9 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106840
[  105.359135] head:00000000c34535d9 order:2 compound_mapcount:0 compound_pincount:0
[  105.359617] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[  105.360165] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[  105.361412] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  105.362340] page dumped because: kasan: bad access detected
[  105.363048] 
[  105.363345] Memory state around the buggy address:
[  105.363996]  ffff0000c6841f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  105.365129]  ffff0000c6842000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  105.366242] >ffff0000c6842080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  105.367128]                                               ^
[  105.367851]  ffff0000c6842100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  105.368970]  ffff0000c6842180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  105.370022] ==================================================================
[  105.419356] ==================================================================
[  105.419954] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1b0/0x5b0
[  105.420827] Write of size 1 at addr ffff0000c68420ea by task kunit_try_catch/216
[  105.421999] 
[  105.422476] CPU: 1 PID: 216 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  105.423196] Hardware name: linux,dummy-virt (DT)
[  105.423644] Call trace:
[  105.423919]  dump_backtrace+0xe0/0x134
[  105.424375]  show_stack+0x20/0x2c
[  105.425580]  dump_stack_lvl+0x88/0xb4
[  105.426056]  print_report+0x158/0x44c
[  105.426497]  kasan_report+0xc8/0x180
[  105.426939]  __asan_store1+0x68/0x7c
[  105.427411]  krealloc_less_oob_helper+0x1b0/0x5b0
[  105.428005]  krealloc_pagealloc_less_oob+0x20/0x30
[  105.428702]  kunit_try_run_case+0x8c/0x124
[  105.429269]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  105.430006]  kthread+0x15c/0x170
[  105.430434]  ret_from_fork+0x10/0x20
[  105.430900] 
[  105.431120] The buggy address belongs to the physical page:
[  105.431585] page:00000000c34535d9 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106840
[  105.432363] head:00000000c34535d9 order:2 compound_mapcount:0 compound_pincount:0
[  105.433810] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[  105.434515] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[  105.435221] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  105.435844] page dumped because: kasan: bad access detected
[  105.436334] 
[  105.436626] Memory state around the buggy address:
[  105.437383]  ffff0000c6841f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  105.438026]  ffff0000c6842000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  105.438676] >ffff0000c6842080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  105.439263]                                                           ^
[  105.439861]  ffff0000c6842100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  105.440484]  ffff0000c6842180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  105.441102] ==================================================================
[  105.128376] ==================================================================
[  105.129952] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x114/0x5b0
[  105.130981] Write of size 1 at addr ffff0000c62606c9 by task kunit_try_catch/214
[  105.131870] 
[  105.132157] CPU: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  105.133296] Hardware name: linux,dummy-virt (DT)
[  105.134003] Call trace:
[  105.134318]  dump_backtrace+0xe0/0x134
[  105.134689]  show_stack+0x20/0x2c
[  105.135105]  dump_stack_lvl+0x88/0xb4
[  105.135533]  print_report+0x158/0x44c
[  105.135992]  kasan_report+0xc8/0x180
[  105.136643]  __asan_store1+0x68/0x7c
[  105.137077]  krealloc_less_oob_helper+0x114/0x5b0
[  105.137591]  krealloc_less_oob+0x20/0x30
[  105.138042]  kunit_try_run_case+0x8c/0x124
[  105.138489]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  105.139035]  kthread+0x15c/0x170
[  105.139413]  ret_from_fork+0x10/0x20
[  105.139813] 
[  105.140028] Allocated by task 214:
[  105.140368]  kasan_save_stack+0x3c/0x70
[  105.140839]  kasan_set_track+0x2c/0x40
[  105.141279]  kasan_save_alloc_info+0x24/0x34
[  105.141734]  __kasan_krealloc+0x10c/0x140
[  105.142204]  krealloc+0x158/0x1c0
[  105.142610]  krealloc_less_oob_helper+0xd8/0x5b0
[  105.143324]  krealloc_less_oob+0x20/0x30
[  105.143779]  kunit_try_run_case+0x8c/0x124
[  105.144209]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  105.145606]  kthread+0x15c/0x170
[  105.146068]  ret_from_fork+0x10/0x20
[  105.146510] 
[  105.146701] The buggy address belongs to the object at ffff0000c6260600
[  105.146701]  which belongs to the cache kmalloc-256 of size 256
[  105.147651] The buggy address is located 201 bytes inside of
[  105.147651]  256-byte region [ffff0000c6260600, ffff0000c6260700)
[  105.148769] 
[  105.148985] The buggy address belongs to the physical page:
[  105.149442] page:0000000090416edb refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106260
[  105.150210] head:0000000090416edb order:1 compound_mapcount:0 compound_pincount:0
[  105.150845] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  105.151546] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[  105.152180] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  105.153052] page dumped because: kasan: bad access detected
[  105.153536] 
[  105.153721] Memory state around the buggy address:
[  105.154216]  ffff0000c6260580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  105.154853]  ffff0000c6260600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  105.155457] >ffff0000c6260680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[  105.156060]                                               ^
[  105.156825]  ffff0000c6260700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  105.157422]  ffff0000c6260780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  105.158157] ==================================================================

[   75.141585] ==================================================================
[   75.142449] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x158/0x4b8
[   75.143460] Write of size 1 at addr ffff0000c5a260d0 by task kunit_try_catch/132
[   75.144319] 
[   75.144514] CPU: 1 PID: 132 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.145824] Hardware name: linux,dummy-virt (DT)
[   75.146439] Call trace:
[   75.146823]  dump_backtrace+0xf8/0x118
[   75.147454]  show_stack+0x18/0x24
[   75.147939]  __dump_stack+0x28/0x38
[   75.148322]  dump_stack_lvl+0x54/0x6c
[   75.149031]  print_address_description+0x7c/0x1ec
[   75.149793]  print_report+0x50/0x68
[   75.150400]  kasan_report+0xac/0x100
[   75.151016]  __asan_store1+0x6c/0x70
[   75.151622]  krealloc_less_oob_helper+0x158/0x4b8
[   75.152339]  krealloc_pagealloc_less_oob+0x18/0x24
[   75.153233]  kunit_try_run_case+0x80/0x184
[   75.153911]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.154705]  kthread+0x16c/0x21c
[   75.155240]  ret_from_fork+0x10/0x20
[   75.155617] 
[   75.155812] The buggy address belongs to the physical page:
[   75.156296] page:0000000021e95fe4 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a24
[   75.157256] head:0000000021e95fe4 order:2 compound_mapcount:0 compound_pincount:0
[   75.157883] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   75.158564] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   75.159262] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   75.159858] page dumped because: kasan: bad access detected
[   75.160305] 
[   75.160521] Memory state around the buggy address:
[   75.160954]  ffff0000c5a25f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   75.161570]  ffff0000c5a26000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   75.162228] >ffff0000c5a26080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   75.162977]                                                  ^
[   75.163509]  ffff0000c5a26100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   75.164150]  ffff0000c5a26180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   75.165285] ==================================================================
[   74.907949] ==================================================================
[   74.908812] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x104/0x4b8
[   74.909829] Write of size 1 at addr ffff0000c56f16c9 by task kunit_try_catch/130
[   74.910500] 
[   74.910856] CPU: 0 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.911931] Hardware name: linux,dummy-virt (DT)
[   74.912556] Call trace:
[   74.913033]  dump_backtrace+0xf8/0x118
[   74.913774]  show_stack+0x18/0x24
[   74.914398]  __dump_stack+0x28/0x38
[   74.915018]  dump_stack_lvl+0x54/0x6c
[   74.915481]  print_address_description+0x7c/0x1ec
[   74.916252]  print_report+0x50/0x68
[   74.916979]  kasan_report+0xac/0x100
[   74.917651]  __asan_store1+0x6c/0x70
[   74.918322]  krealloc_less_oob_helper+0x104/0x4b8
[   74.919068]  krealloc_less_oob+0x18/0x24
[   74.919701]  kunit_try_run_case+0x80/0x184
[   74.920362]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.921263]  kthread+0x16c/0x21c
[   74.922059]  ret_from_fork+0x10/0x20
[   74.922750] 
[   74.923151] Allocated by task 130:
[   74.923689]  kasan_set_track+0x4c/0x80
[   74.924384]  kasan_save_alloc_info+0x28/0x34
[   74.925139]  __kasan_krealloc+0xcc/0xf8
[   74.925884]  krealloc+0x150/0x270
[   74.926296]  krealloc_less_oob_helper+0x9c/0x4b8
[   74.926739]  krealloc_less_oob+0x18/0x24
[   74.927173]  kunit_try_run_case+0x80/0x184
[   74.927587]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.928401]  kthread+0x16c/0x21c
[   74.929461]  ret_from_fork+0x10/0x20
[   74.930056] 
[   74.930327] The buggy address belongs to the object at ffff0000c56f1600
[   74.930327]  which belongs to the cache kmalloc-256 of size 256
[   74.931710] The buggy address is located 201 bytes inside of
[   74.931710]  256-byte region [ffff0000c56f1600, ffff0000c56f1700)
[   74.933204] 
[   74.933400] The buggy address belongs to the physical page:
[   74.933784] page:00000000b1c7ebef refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f0
[   74.934719] head:00000000b1c7ebef order:1 compound_mapcount:0 compound_pincount:0
[   74.935365] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   74.936067] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   74.936735] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.937384] page dumped because: kasan: bad access detected
[   74.937845] 
[   74.938037] Memory state around the buggy address:
[   74.938441]  ffff0000c56f1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.939445]  ffff0000c56f1600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.940147] >ffff0000c56f1680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   74.940735]                                               ^
[   74.941280]  ffff0000c56f1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.941932]  ffff0000c56f1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.942848] ==================================================================
[   75.114913] ==================================================================
[   75.115663] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x104/0x4b8
[   75.117179] Write of size 1 at addr ffff0000c5a260c9 by task kunit_try_catch/132
[   75.118273] 
[   75.118567] CPU: 1 PID: 132 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.119647] Hardware name: linux,dummy-virt (DT)
[   75.120295] Call trace:
[   75.120780]  dump_backtrace+0xf8/0x118
[   75.121484]  show_stack+0x18/0x24
[   75.122122]  __dump_stack+0x28/0x38
[   75.122711]  dump_stack_lvl+0x54/0x6c
[   75.123105]  print_address_description+0x7c/0x1ec
[   75.123576]  print_report+0x50/0x68
[   75.124113]  kasan_report+0xac/0x100
[   75.124703]  __asan_store1+0x6c/0x70
[   75.125268]  krealloc_less_oob_helper+0x104/0x4b8
[   75.125827]  krealloc_pagealloc_less_oob+0x18/0x24
[   75.126356]  kunit_try_run_case+0x80/0x184
[   75.126862]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.127415]  kthread+0x16c/0x21c
[   75.127857]  ret_from_fork+0x10/0x20
[   75.128294] 
[   75.128489] The buggy address belongs to the physical page:
[   75.129098] page:0000000021e95fe4 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a24
[   75.130222] head:0000000021e95fe4 order:2 compound_mapcount:0 compound_pincount:0
[   75.131119] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   75.132051] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   75.133125] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   75.134025] page dumped because: kasan: bad access detected
[   75.134695] 
[   75.134975] Memory state around the buggy address:
[   75.135412]  ffff0000c5a25f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   75.136022]  ffff0000c5a26000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   75.136977] >ffff0000c5a26080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   75.138225]                                               ^
[   75.138965]  ffff0000c5a26100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   75.139869]  ffff0000c5a26180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   75.140531] ==================================================================
[   75.035662] ==================================================================
[   75.036215] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x260/0x4b8
[   75.037336] Write of size 1 at addr ffff0000c56f16eb by task kunit_try_catch/130
[   75.037991] 
[   75.038209] CPU: 0 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.038938] Hardware name: linux,dummy-virt (DT)
[   75.039380] Call trace:
[   75.039650]  dump_backtrace+0xf8/0x118
[   75.040119]  show_stack+0x18/0x24
[   75.040557]  __dump_stack+0x28/0x38
[   75.041446]  dump_stack_lvl+0x54/0x6c
[   75.041897]  print_address_description+0x7c/0x1ec
[   75.042419]  print_report+0x50/0x68
[   75.042868]  kasan_report+0xac/0x100
[   75.043301]  __asan_store1+0x6c/0x70
[   75.043743]  krealloc_less_oob_helper+0x260/0x4b8
[   75.044288]  krealloc_less_oob+0x18/0x24
[   75.045023]  kunit_try_run_case+0x80/0x184
[   75.045510]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.046130]  kthread+0x16c/0x21c
[   75.046533]  ret_from_fork+0x10/0x20
[   75.046959] 
[   75.047144] Allocated by task 130:
[   75.047478]  kasan_set_track+0x4c/0x80
[   75.047946]  kasan_save_alloc_info+0x28/0x34
[   75.048446]  __kasan_krealloc+0xcc/0xf8
[   75.048939]  krealloc+0x150/0x270
[   75.049355]  krealloc_less_oob_helper+0x9c/0x4b8
[   75.049860]  krealloc_less_oob+0x18/0x24
[   75.050329]  kunit_try_run_case+0x80/0x184
[   75.051281]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.051878]  kthread+0x16c/0x21c
[   75.052291]  ret_from_fork+0x10/0x20
[   75.053007] 
[   75.053227] The buggy address belongs to the object at ffff0000c56f1600
[   75.053227]  which belongs to the cache kmalloc-256 of size 256
[   75.054145] The buggy address is located 235 bytes inside of
[   75.054145]  256-byte region [ffff0000c56f1600, ffff0000c56f1700)
[   75.055043] 
[   75.055262] The buggy address belongs to the physical page:
[   75.055731] page:00000000b1c7ebef refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f0
[   75.056526] head:00000000b1c7ebef order:1 compound_mapcount:0 compound_pincount:0
[   75.057616] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   75.058329] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   75.059030] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.059647] page dumped because: kasan: bad access detected
[   75.060119] 
[   75.060306] Memory state around the buggy address:
[   75.061059]  ffff0000c56f1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.061660]  ffff0000c56f1600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   75.062253] >ffff0000c56f1680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   75.062857]                                                           ^
[   75.063434]  ffff0000c56f1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.064064]  ffff0000c56f1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.065146] ==================================================================
[   75.165986] ==================================================================
[   75.166536] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1c4/0x4b8
[   75.167318] Write of size 1 at addr ffff0000c5a260da by task kunit_try_catch/132
[   75.167970] 
[   75.168189] CPU: 1 PID: 132 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.169115] Hardware name: linux,dummy-virt (DT)
[   75.169558] Call trace:
[   75.169851]  dump_backtrace+0xf8/0x118
[   75.170379]  show_stack+0x18/0x24
[   75.170821]  __dump_stack+0x28/0x38
[   75.171246]  dump_stack_lvl+0x54/0x6c
[   75.171677]  print_address_description+0x7c/0x1ec
[   75.172227]  print_report+0x50/0x68
[   75.172844]  kasan_report+0xac/0x100
[   75.173301]  __asan_store1+0x6c/0x70
[   75.173736]  krealloc_less_oob_helper+0x1c4/0x4b8
[   75.174255]  krealloc_pagealloc_less_oob+0x18/0x24
[   75.174752]  kunit_try_run_case+0x80/0x184
[   75.175222]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.175798]  kthread+0x16c/0x21c
[   75.176244]  ret_from_fork+0x10/0x20
[   75.176803] 
[   75.177039] The buggy address belongs to the physical page:
[   75.177510] page:0000000021e95fe4 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a24
[   75.178295] head:0000000021e95fe4 order:2 compound_mapcount:0 compound_pincount:0
[   75.178963] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   75.179645] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   75.180304] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   75.181047] page dumped because: kasan: bad access detected
[   75.181651] 
[   75.181867] Memory state around the buggy address:
[   75.182262]  ffff0000c5a25f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   75.182902]  ffff0000c5a26000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   75.183557] >ffff0000c5a26080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   75.184142]                                                     ^
[   75.185225]  ffff0000c5a26100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   75.185822]  ffff0000c5a26180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   75.186444] ==================================================================
[   75.005533] ==================================================================
[   75.006060] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x214/0x4b8
[   75.006891] Write of size 1 at addr ffff0000c56f16ea by task kunit_try_catch/130
[   75.007516] 
[   75.007732] CPU: 0 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.008469] Hardware name: linux,dummy-virt (DT)
[   75.009062] Call trace:
[   75.009350]  dump_backtrace+0xf8/0x118
[   75.009816]  show_stack+0x18/0x24
[   75.010244]  __dump_stack+0x28/0x38
[   75.010671]  dump_stack_lvl+0x54/0x6c
[   75.011491]  print_address_description+0x7c/0x1ec
[   75.012032]  print_report+0x50/0x68
[   75.012473]  kasan_report+0xac/0x100
[   75.013166]  __asan_store1+0x6c/0x70
[   75.013613]  krealloc_less_oob_helper+0x214/0x4b8
[   75.014167]  krealloc_less_oob+0x18/0x24
[   75.014600]  kunit_try_run_case+0x80/0x184
[   75.015072]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.015623]  kthread+0x16c/0x21c
[   75.016084]  ret_from_fork+0x10/0x20
[   75.016557] 
[   75.017238] Allocated by task 130:
[   75.017586]  kasan_set_track+0x4c/0x80
[   75.018047]  kasan_save_alloc_info+0x28/0x34
[   75.018545]  __kasan_krealloc+0xcc/0xf8
[   75.019002]  krealloc+0x150/0x270
[   75.019424]  krealloc_less_oob_helper+0x9c/0x4b8
[   75.019940]  krealloc_less_oob+0x18/0x24
[   75.020379]  kunit_try_run_case+0x80/0x184
[   75.021113]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.021741]  kthread+0x16c/0x21c
[   75.022195]  ret_from_fork+0x10/0x20
[   75.022637] 
[   75.022849] The buggy address belongs to the object at ffff0000c56f1600
[   75.022849]  which belongs to the cache kmalloc-256 of size 256
[   75.023783] The buggy address is located 234 bytes inside of
[   75.023783]  256-byte region [ffff0000c56f1600, ffff0000c56f1700)
[   75.024667] 
[   75.025367] The buggy address belongs to the physical page:
[   75.025852] page:00000000b1c7ebef refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f0
[   75.026645] head:00000000b1c7ebef order:1 compound_mapcount:0 compound_pincount:0
[   75.027290] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   75.027995] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   75.028648] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.029289] page dumped because: kasan: bad access detected
[   75.029769] 
[   75.029978] Memory state around the buggy address:
[   75.030405]  ffff0000c56f1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.031295]  ffff0000c56f1600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   75.031949] >ffff0000c56f1680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   75.032547]                                                           ^
[   75.033570]  ffff0000c56f1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.034253]  ffff0000c56f1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.034827] ==================================================================
[   75.187158] ==================================================================
[   75.187671] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x214/0x4b8
[   75.188403] Write of size 1 at addr ffff0000c5a260ea by task kunit_try_catch/132
[   75.189246] 
[   75.189503] CPU: 1 PID: 132 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.190222] Hardware name: linux,dummy-virt (DT)
[   75.190608] Call trace:
[   75.190927]  dump_backtrace+0xf8/0x118
[   75.191436]  show_stack+0x18/0x24
[   75.191865]  __dump_stack+0x28/0x38
[   75.192304]  dump_stack_lvl+0x54/0x6c
[   75.192896]  print_address_description+0x7c/0x1ec
[   75.193479]  print_report+0x50/0x68
[   75.193953]  kasan_report+0xac/0x100
[   75.194396]  __asan_store1+0x6c/0x70
[   75.194853]  krealloc_less_oob_helper+0x214/0x4b8
[   75.195360]  krealloc_pagealloc_less_oob+0x18/0x24
[   75.195906]  kunit_try_run_case+0x80/0x184
[   75.196387]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.197097]  kthread+0x16c/0x21c
[   75.197516]  ret_from_fork+0x10/0x20
[   75.197942] 
[   75.198139] The buggy address belongs to the physical page:
[   75.198616] page:0000000021e95fe4 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a24
[   75.199393] head:0000000021e95fe4 order:2 compound_mapcount:0 compound_pincount:0
[   75.200023] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   75.200900] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   75.201574] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   75.202176] page dumped because: kasan: bad access detected
[   75.202647] 
[   75.202839] Memory state around the buggy address:
[   75.203309]  ffff0000c5a25f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   75.203942]  ffff0000c5a26000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   75.204560] >ffff0000c5a26080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   75.205649]                                                           ^
[   75.206241]  ffff0000c5a26100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   75.206881]  ffff0000c5a26180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   75.207427] ==================================================================
[   75.208258] ==================================================================
[   75.208816] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x260/0x4b8
[   75.209543] Write of size 1 at addr ffff0000c5a260eb by task kunit_try_catch/132
[   75.210235] 
[   75.210432] CPU: 1 PID: 132 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.211255] Hardware name: linux,dummy-virt (DT)
[   75.211712] Call trace:
[   75.211997]  dump_backtrace+0xf8/0x118
[   75.212521]  show_stack+0x18/0x24
[   75.213085]  __dump_stack+0x28/0x38
[   75.213498]  dump_stack_lvl+0x54/0x6c
[   75.213925]  print_address_description+0x7c/0x1ec
[   75.214444]  print_report+0x50/0x68
[   75.214913]  kasan_report+0xac/0x100
[   75.215384]  __asan_store1+0x6c/0x70
[   75.215834]  krealloc_less_oob_helper+0x260/0x4b8
[   75.216355]  krealloc_pagealloc_less_oob+0x18/0x24
[   75.217002]  kunit_try_run_case+0x80/0x184
[   75.217477]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.218058]  kthread+0x16c/0x21c
[   75.218463]  ret_from_fork+0x10/0x20
[   75.218911] 
[   75.219105] The buggy address belongs to the physical page:
[   75.219563] page:0000000021e95fe4 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a24
[   75.220377] head:0000000021e95fe4 order:2 compound_mapcount:0 compound_pincount:0
[   75.221240] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   75.221943] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   75.222627] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   75.223217] page dumped because: kasan: bad access detected
[   75.223663] 
[   75.223892] Memory state around the buggy address:
[   75.224308]  ffff0000c5a25f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   75.225494]  ffff0000c5a26000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   75.226117] >ffff0000c5a26080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   75.226700]                                                           ^
[   75.227262]  ffff0000c5a26100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   75.227870]  ffff0000c5a26180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   75.228459] ==================================================================
[   74.943949] ==================================================================
[   74.944470] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x158/0x4b8
[   74.945214] Write of size 1 at addr ffff0000c56f16d0 by task kunit_try_catch/130
[   74.946372] 
[   74.946605] CPU: 0 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.947346] Hardware name: linux,dummy-virt (DT)
[   74.947802] Call trace:
[   74.948109]  dump_backtrace+0xf8/0x118
[   74.948594]  show_stack+0x18/0x24
[   74.949046]  __dump_stack+0x28/0x38
[   74.949753]  dump_stack_lvl+0x54/0x6c
[   74.950215]  print_address_description+0x7c/0x1ec
[   74.950773]  print_report+0x50/0x68
[   74.951230]  kasan_report+0xac/0x100
[   74.951691]  __asan_store1+0x6c/0x70
[   74.952162]  krealloc_less_oob_helper+0x158/0x4b8
[   74.952840]  krealloc_less_oob+0x18/0x24
[   74.953282]  kunit_try_run_case+0x80/0x184
[   74.954187]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.954780]  kthread+0x16c/0x21c
[   74.955209]  ret_from_fork+0x10/0x20
[   74.955639] 
[   74.955872] Allocated by task 130:
[   74.956248]  kasan_set_track+0x4c/0x80
[   74.956881]  kasan_save_alloc_info+0x28/0x34
[   74.957329]  __kasan_krealloc+0xcc/0xf8
[   74.958026]  krealloc+0x150/0x270
[   74.958485]  krealloc_less_oob_helper+0x9c/0x4b8
[   74.959008]  krealloc_less_oob+0x18/0x24
[   74.959461]  kunit_try_run_case+0x80/0x184
[   74.960007]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.960594]  kthread+0x16c/0x21c
[   74.961511]  ret_from_fork+0x10/0x20
[   74.961968] 
[   74.962178] The buggy address belongs to the object at ffff0000c56f1600
[   74.962178]  which belongs to the cache kmalloc-256 of size 256
[   74.963156] The buggy address is located 208 bytes inside of
[   74.963156]  256-byte region [ffff0000c56f1600, ffff0000c56f1700)
[   74.964115] 
[   74.964377] The buggy address belongs to the physical page:
[   74.965118] page:00000000b1c7ebef refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f0
[   74.965890] head:00000000b1c7ebef order:1 compound_mapcount:0 compound_pincount:0
[   74.966527] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   74.967255] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   74.967948] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.968618] page dumped because: kasan: bad access detected
[   74.969119] 
[   74.969306] Memory state around the buggy address:
[   74.969745]  ffff0000c56f1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.970381]  ffff0000c56f1600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.971516] >ffff0000c56f1680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   74.972123]                                                  ^
[   74.972902]  ffff0000c56f1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.973517]  ffff0000c56f1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.974165] ==================================================================
[   74.974973] ==================================================================
[   74.975510] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1c4/0x4b8
[   74.976300] Write of size 1 at addr ffff0000c56f16da by task kunit_try_catch/130
[   74.977395] 
[   74.977624] CPU: 0 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.978409] Hardware name: linux,dummy-virt (DT)
[   74.978839] Call trace:
[   74.979115]  dump_backtrace+0xf8/0x118
[   74.979569]  show_stack+0x18/0x24
[   74.980022]  __dump_stack+0x28/0x38
[   74.980433]  dump_stack_lvl+0x54/0x6c
[   74.980901]  print_address_description+0x7c/0x1ec
[   74.981422]  print_report+0x50/0x68
[   74.981869]  kasan_report+0xac/0x100
[   74.982301]  __asan_store1+0x6c/0x70
[   74.982734]  krealloc_less_oob_helper+0x1c4/0x4b8
[   74.983525]  krealloc_less_oob+0x18/0x24
[   74.984022]  kunit_try_run_case+0x80/0x184
[   74.984488]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.985538]  kthread+0x16c/0x21c
[   74.986002]  ret_from_fork+0x10/0x20
[   74.986443] 
[   74.986627] Allocated by task 130:
[   74.986986]  kasan_set_track+0x4c/0x80
[   74.987503]  kasan_save_alloc_info+0x28/0x34
[   74.987995]  __kasan_krealloc+0xcc/0xf8
[   74.988505]  krealloc+0x150/0x270
[   74.989166]  krealloc_less_oob_helper+0x9c/0x4b8
[   74.989718]  krealloc_less_oob+0x18/0x24
[   74.990193]  kunit_try_run_case+0x80/0x184
[   74.990685]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.991278]  kthread+0x16c/0x21c
[   74.991673]  ret_from_fork+0x10/0x20
[   74.992113] 
[   74.992308] The buggy address belongs to the object at ffff0000c56f1600
[   74.992308]  which belongs to the cache kmalloc-256 of size 256
[   74.993896] The buggy address is located 218 bytes inside of
[   74.993896]  256-byte region [ffff0000c56f1600, ffff0000c56f1700)
[   74.994791] 
[   74.994982] The buggy address belongs to the physical page:
[   74.995414] page:00000000b1c7ebef refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f0
[   74.996266] head:00000000b1c7ebef order:1 compound_mapcount:0 compound_pincount:0
[   74.997204] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   74.997942] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   74.998582] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.999182] page dumped because: kasan: bad access detected
[   74.999648] 
[   74.999853] Memory state around the buggy address:
[   75.000307]  ffff0000c56f1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.001410]  ffff0000c56f1600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   75.002022] >ffff0000c56f1680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   75.002636]                                                     ^
[   75.003178]  ffff0000c56f1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.003837]  ffff0000c56f1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.004434] ==================================================================

[   73.915408] ==================================================================
[   73.916609] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x104/0x4b8
[   73.917359] Write of size 1 at addr ffff0000c4b2bac9 by task kunit_try_catch/130
[   73.918007] 
[   73.918268] CPU: 1 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   73.919023] Hardware name: linux,dummy-virt (DT)
[   73.919501] Call trace:
[   73.919950]  dump_backtrace+0xf4/0x114
[   73.920428]  show_stack+0x18/0x24
[   73.921078]  __dump_stack+0x28/0x38
[   73.921525]  dump_stack_lvl+0x50/0x68
[   73.921982]  print_address_description+0x7c/0x1ec
[   73.922549]  print_report+0x50/0x68
[   73.923015]  kasan_report+0xac/0xfc
[   73.923480]  __asan_store1+0x6c/0x70
[   73.924225]  krealloc_less_oob_helper+0x104/0x4b8
[   73.924770]  krealloc_less_oob+0x18/0x24
[   73.925227]  kunit_try_run_case+0x80/0x184
[   73.925722]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   73.926315]  kthread+0x16c/0x21c
[   73.926756]  ret_from_fork+0x10/0x20
[   73.927182] 
[   73.927386] Allocated by task 130:
[   73.927912]  kasan_set_track+0x4c/0x80
[   73.928376]  kasan_save_alloc_info+0x28/0x34
[   73.929044]  __kasan_krealloc+0xcc/0xf8
[   73.929533]  krealloc+0x14c/0x26c
[   73.930015]  krealloc_less_oob_helper+0x9c/0x4b8
[   73.930526]  krealloc_less_oob+0x18/0x24
[   73.930990]  kunit_try_run_case+0x80/0x184
[   73.931474]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   73.932331]  kthread+0x16c/0x21c
[   73.932786]  ret_from_fork+0x10/0x20
[   73.933211] 
[   73.933423] The buggy address belongs to the object at ffff0000c4b2ba00
[   73.933423]  which belongs to the cache kmalloc-256 of size 256
[   73.934422] The buggy address is located 201 bytes inside of
[   73.934422]  256-byte region [ffff0000c4b2ba00, ffff0000c4b2bb00)
[   73.935395] 
[   73.935643] The buggy address belongs to the physical page:
[   73.936383] page:00000000c9970dfc refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104b2a
[   73.937175] head:00000000c9970dfc order:1 compound_mapcount:0 compound_pincount:0
[   73.937824] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   73.938663] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   73.939334] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   73.939978] page dumped because: kasan: bad access detected
[   73.940515] 
[   73.940989] Memory state around the buggy address:
[   73.941428]  ffff0000c4b2b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.942064]  ffff0000c4b2ba00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   73.942725] >ffff0000c4b2ba80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   73.943300]                                               ^
[   73.943841]  ffff0000c4b2bb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.944690]  ffff0000c4b2bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.945304] ==================================================================
[   74.222734] ==================================================================
[   74.223267] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x260/0x4b8
[   74.224053] Write of size 1 at addr ffff0000c58ca0eb by task kunit_try_catch/132
[   74.224702] 
[   74.224919] CPU: 1 PID: 132 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.225643] Hardware name: linux,dummy-virt (DT)
[   74.226581] Call trace:
[   74.226883]  dump_backtrace+0xf4/0x114
[   74.227356]  show_stack+0x18/0x24
[   74.227784]  __dump_stack+0x28/0x38
[   74.228194]  dump_stack_lvl+0x50/0x68
[   74.228607]  print_address_description+0x7c/0x1ec
[   74.229165]  print_report+0x50/0x68
[   74.229605]  kasan_report+0xac/0xfc
[   74.230067]  __asan_store1+0x6c/0x70
[   74.230519]  krealloc_less_oob_helper+0x260/0x4b8
[   74.231025]  krealloc_pagealloc_less_oob+0x18/0x24
[   74.231571]  kunit_try_run_case+0x80/0x184
[   74.232620]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.233216]  kthread+0x16c/0x21c
[   74.233655]  ret_from_fork+0x10/0x20
[   74.234114] 
[   74.234300] The buggy address belongs to the physical page:
[   74.234799] page:000000000dfb6053 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c8
[   74.235622] head:000000000dfb6053 order:2 compound_mapcount:0 compound_pincount:0
[   74.236253] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   74.236942] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   74.237607] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   74.238249] page dumped because: kasan: bad access detected
[   74.238746] 
[   74.238936] Memory state around the buggy address:
[   74.239401]  ffff0000c58c9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.240312]  ffff0000c58ca000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.240927] >ffff0000c58ca080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   74.241527]                                                           ^
[   74.242099]  ffff0000c58ca100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   74.242718]  ffff0000c58ca180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   74.243761] ==================================================================
[   74.052025] ==================================================================
[   74.052611] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x260/0x4b8
[   74.053416] Write of size 1 at addr ffff0000c4b2baeb by task kunit_try_catch/130
[   74.054032] 
[   74.054249] CPU: 1 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.055017] Hardware name: linux,dummy-virt (DT)
[   74.055427] Call trace:
[   74.055709]  dump_backtrace+0xf4/0x114
[   74.056735]  show_stack+0x18/0x24
[   74.057182]  __dump_stack+0x28/0x38
[   74.057596]  dump_stack_lvl+0x50/0x68
[   74.058039]  print_address_description+0x7c/0x1ec
[   74.058579]  print_report+0x50/0x68
[   74.059065]  kasan_report+0xac/0xfc
[   74.059512]  __asan_store1+0x6c/0x70
[   74.060358]  krealloc_less_oob_helper+0x260/0x4b8
[   74.060903]  krealloc_less_oob+0x18/0x24
[   74.061337]  kunit_try_run_case+0x80/0x184
[   74.061818]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.062397]  kthread+0x16c/0x21c
[   74.062851]  ret_from_fork+0x10/0x20
[   74.063287] 
[   74.063473] Allocated by task 130:
[   74.064349]  kasan_set_track+0x4c/0x80
[   74.064843]  kasan_save_alloc_info+0x28/0x34
[   74.065312]  __kasan_krealloc+0xcc/0xf8
[   74.065841]  krealloc+0x14c/0x26c
[   74.066246]  krealloc_less_oob_helper+0x9c/0x4b8
[   74.066752]  krealloc_less_oob+0x18/0x24
[   74.067228]  kunit_try_run_case+0x80/0x184
[   74.067954]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.068551]  kthread+0x16c/0x21c
[   74.068974]  ret_from_fork+0x10/0x20
[   74.069420] 
[   74.069617] The buggy address belongs to the object at ffff0000c4b2ba00
[   74.069617]  which belongs to the cache kmalloc-256 of size 256
[   74.070577] The buggy address is located 235 bytes inside of
[   74.070577]  256-byte region [ffff0000c4b2ba00, ffff0000c4b2bb00)
[   74.071473] 
[   74.072178] The buggy address belongs to the physical page:
[   74.072634] page:00000000c9970dfc refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104b2a
[   74.073403] head:00000000c9970dfc order:1 compound_mapcount:0 compound_pincount:0
[   74.074085] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   74.074812] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   74.075478] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.076396] page dumped because: kasan: bad access detected
[   74.076916] 
[   74.077111] Memory state around the buggy address:
[   74.077604]  ffff0000c4b2b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.078246]  ffff0000c4b2ba00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.078890] >ffff0000c4b2ba80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   74.079479]                                                           ^
[   74.080604]  ffff0000c4b2bb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.081233]  ffff0000c4b2bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.081883] ==================================================================
[   73.984169] ==================================================================
[   73.985072] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1c4/0x4b8
[   73.986090] Write of size 1 at addr ffff0000c4b2bada by task kunit_try_catch/130
[   73.987014] 
[   73.987304] CPU: 1 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   73.988444] Hardware name: linux,dummy-virt (DT)
[   73.989006] Call trace:
[   73.989254]  dump_backtrace+0xf4/0x114
[   73.989695]  show_stack+0x18/0x24
[   73.990151]  __dump_stack+0x28/0x38
[   73.990626]  dump_stack_lvl+0x50/0x68
[   73.991115]  print_address_description+0x7c/0x1ec
[   73.991661]  print_report+0x50/0x68
[   73.992138]  kasan_report+0xac/0xfc
[   73.992562]  __asan_store1+0x6c/0x70
[   73.993104]  krealloc_less_oob_helper+0x1c4/0x4b8
[   73.993703]  krealloc_less_oob+0x18/0x24
[   73.994195]  kunit_try_run_case+0x80/0x184
[   73.994754]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   73.995560]  kthread+0x16c/0x21c
[   73.996368]  ret_from_fork+0x10/0x20
[   73.996774] 
[   73.996958] Allocated by task 130:
[   73.997250]  kasan_set_track+0x4c/0x80
[   73.997671]  kasan_save_alloc_info+0x28/0x34
[   73.998336]  __kasan_krealloc+0xcc/0xf8
[   73.998987]  krealloc+0x14c/0x26c
[   73.999544]  krealloc_less_oob_helper+0x9c/0x4b8
[   74.000763]  krealloc_less_oob+0x18/0x24
[   74.001400]  kunit_try_run_case+0x80/0x184
[   74.002062]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.002870]  kthread+0x16c/0x21c
[   74.003437]  ret_from_fork+0x10/0x20
[   74.004322] 
[   74.004605] The buggy address belongs to the object at ffff0000c4b2ba00
[   74.004605]  which belongs to the cache kmalloc-256 of size 256
[   74.006015] The buggy address is located 218 bytes inside of
[   74.006015]  256-byte region [ffff0000c4b2ba00, ffff0000c4b2bb00)
[   74.007371] 
[   74.007647] The buggy address belongs to the physical page:
[   74.008864] page:00000000c9970dfc refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104b2a
[   74.009691] head:00000000c9970dfc order:1 compound_mapcount:0 compound_pincount:0
[   74.010198] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   74.010792] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   74.011479] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.012138] page dumped because: kasan: bad access detected
[   74.013478] 
[   74.013725] Memory state around the buggy address:
[   74.014213]  ffff0000c4b2b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.014836]  ffff0000c4b2ba00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.015474] >ffff0000c4b2ba80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   74.016613]                                                     ^
[   74.017211]  ffff0000c4b2bb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.017840]  ffff0000c4b2bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.018449] ==================================================================
[   74.201152] ==================================================================
[   74.202125] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x214/0x4b8
[   74.202933] Write of size 1 at addr ffff0000c58ca0ea by task kunit_try_catch/132
[   74.203497] 
[   74.203719] CPU: 1 PID: 132 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.204489] Hardware name: linux,dummy-virt (DT)
[   74.204897] Call trace:
[   74.205184]  dump_backtrace+0xf4/0x114
[   74.205708]  show_stack+0x18/0x24
[   74.206152]  __dump_stack+0x28/0x38
[   74.206594]  dump_stack_lvl+0x50/0x68
[   74.207026]  print_address_description+0x7c/0x1ec
[   74.207594]  print_report+0x50/0x68
[   74.208037]  kasan_report+0xac/0xfc
[   74.208470]  __asan_store1+0x6c/0x70
[   74.208918]  krealloc_less_oob_helper+0x214/0x4b8
[   74.209421]  krealloc_pagealloc_less_oob+0x18/0x24
[   74.210540]  kunit_try_run_case+0x80/0x184
[   74.211031]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.211607]  kthread+0x16c/0x21c
[   74.212055]  ret_from_fork+0x10/0x20
[   74.212475] 
[   74.212664] The buggy address belongs to the physical page:
[   74.213155] page:000000000dfb6053 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c8
[   74.213913] head:000000000dfb6053 order:2 compound_mapcount:0 compound_pincount:0
[   74.214530] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   74.215224] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   74.216479] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   74.217126] page dumped because: kasan: bad access detected
[   74.217605] 
[   74.217827] Memory state around the buggy address:
[   74.218266]  ffff0000c58c9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.218889]  ffff0000c58ca000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.219515] >ffff0000c58ca080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   74.220119]                                                           ^
[   74.220688]  ffff0000c58ca100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   74.221331]  ffff0000c58ca180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   74.221926] ==================================================================
[   74.179197] ==================================================================
[   74.179769] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1c4/0x4b8
[   74.180489] Write of size 1 at addr ffff0000c58ca0da by task kunit_try_catch/132
[   74.181157] 
[   74.181425] CPU: 1 PID: 132 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.182218] Hardware name: linux,dummy-virt (DT)
[   74.182656] Call trace:
[   74.182968]  dump_backtrace+0xf4/0x114
[   74.183444]  show_stack+0x18/0x24
[   74.184506]  __dump_stack+0x28/0x38
[   74.184971]  dump_stack_lvl+0x50/0x68
[   74.185444]  print_address_description+0x7c/0x1ec
[   74.185987]  print_report+0x50/0x68
[   74.186417]  kasan_report+0xac/0xfc
[   74.186854]  __asan_store1+0x6c/0x70
[   74.187293]  krealloc_less_oob_helper+0x1c4/0x4b8
[   74.187817]  krealloc_pagealloc_less_oob+0x18/0x24
[   74.188301]  kunit_try_run_case+0x80/0x184
[   74.188771]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.189360]  kthread+0x16c/0x21c
[   74.189771]  ret_from_fork+0x10/0x20
[   74.190224] 
[   74.190408] The buggy address belongs to the physical page:
[   74.190867] page:000000000dfb6053 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c8
[   74.191640] head:000000000dfb6053 order:2 compound_mapcount:0 compound_pincount:0
[   74.192300] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   74.193540] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   74.194222] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   74.194847] page dumped because: kasan: bad access detected
[   74.195351] 
[   74.195544] Memory state around the buggy address:
[   74.196010]  ffff0000c58c9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.196623]  ffff0000c58ca000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.197238] >ffff0000c58ca080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   74.197855]                                                     ^
[   74.198385]  ffff0000c58ca100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   74.199021]  ffff0000c58ca180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   74.199593] ==================================================================
[   73.946940] ==================================================================
[   73.947440] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x158/0x4b8
[   73.948713] Write of size 1 at addr ffff0000c4b2bad0 by task kunit_try_catch/130
[   73.949658] 
[   73.949992] CPU: 1 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   73.951036] Hardware name: linux,dummy-virt (DT)
[   73.951389] Call trace:
[   73.951630]  dump_backtrace+0xf4/0x114
[   73.952457]  show_stack+0x18/0x24
[   73.953137]  __dump_stack+0x28/0x38
[   73.953767]  dump_stack_lvl+0x50/0x68
[   73.954406]  print_address_description+0x7c/0x1ec
[   73.955172]  print_report+0x50/0x68
[   73.955869]  kasan_report+0xac/0xfc
[   73.956580]  __asan_store1+0x6c/0x70
[   73.957236]  krealloc_less_oob_helper+0x158/0x4b8
[   73.957991]  krealloc_less_oob+0x18/0x24
[   73.958640]  kunit_try_run_case+0x80/0x184
[   73.959236]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   73.959950]  kthread+0x16c/0x21c
[   73.960566]  ret_from_fork+0x10/0x20
[   73.961222] 
[   73.961522] Allocated by task 130:
[   73.962032]  kasan_set_track+0x4c/0x80
[   73.962693]  kasan_save_alloc_info+0x28/0x34
[   73.963376]  __kasan_krealloc+0xcc/0xf8
[   73.964172]  krealloc+0x14c/0x26c
[   73.964808]  krealloc_less_oob_helper+0x9c/0x4b8
[   73.965336]  krealloc_less_oob+0x18/0x24
[   73.965748]  kunit_try_run_case+0x80/0x184
[   73.966340]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   73.966987]  kthread+0x16c/0x21c
[   73.967587]  ret_from_fork+0x10/0x20
[   73.968289] 
[   73.968568] The buggy address belongs to the object at ffff0000c4b2ba00
[   73.968568]  which belongs to the cache kmalloc-256 of size 256
[   73.970070] The buggy address is located 208 bytes inside of
[   73.970070]  256-byte region [ffff0000c4b2ba00, ffff0000c4b2bb00)
[   73.970994] 
[   73.971180] The buggy address belongs to the physical page:
[   73.971546] page:00000000c9970dfc refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104b2a
[   73.972183] head:00000000c9970dfc order:1 compound_mapcount:0 compound_pincount:0
[   73.972678] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   73.973769] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   73.974796] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   73.975753] page dumped because: kasan: bad access detected
[   73.976529] 
[   73.976829] Memory state around the buggy address:
[   73.977485]  ffff0000c4b2b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.978390]  ffff0000c4b2ba00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   73.979298] >ffff0000c4b2ba80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   73.980308]                                                  ^
[   73.981153]  ffff0000c4b2bb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.982088]  ffff0000c4b2bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.982973] ==================================================================
[   74.154369] ==================================================================
[   74.154889] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x158/0x4b8
[   74.156821] Write of size 1 at addr ffff0000c58ca0d0 by task kunit_try_catch/132
[   74.157375] 
[   74.157575] CPU: 1 PID: 132 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.158179] Hardware name: linux,dummy-virt (DT)
[   74.158522] Call trace:
[   74.159915]  dump_backtrace+0xf4/0x114
[   74.161076]  show_stack+0x18/0x24
[   74.162501]  __dump_stack+0x28/0x38
[   74.163247]  dump_stack_lvl+0x50/0x68
[   74.163712]  print_address_description+0x7c/0x1ec
[   74.164283]  print_report+0x50/0x68
[   74.164751]  kasan_report+0xac/0xfc
[   74.165214]  __asan_store1+0x6c/0x70
[   74.165684]  krealloc_less_oob_helper+0x158/0x4b8
[   74.166217]  krealloc_pagealloc_less_oob+0x18/0x24
[   74.166728]  kunit_try_run_case+0x80/0x184
[   74.167220]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.167817]  kthread+0x16c/0x21c
[   74.168284]  ret_from_fork+0x10/0x20
[   74.168780] 
[   74.168997] The buggy address belongs to the physical page:
[   74.169526] page:000000000dfb6053 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c8
[   74.170301] head:000000000dfb6053 order:2 compound_mapcount:0 compound_pincount:0
[   74.170969] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   74.171678] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   74.172342] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   74.172974] page dumped because: kasan: bad access detected
[   74.173466] 
[   74.173673] Memory state around the buggy address:
[   74.174147]  ffff0000c58c9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.174797]  ffff0000c58ca000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.175446] >ffff0000c58ca080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   74.176054]                                                  ^
[   74.176617]  ffff0000c58ca100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   74.177269]  ffff0000c58ca180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   74.177879] ==================================================================
[   74.019627] ==================================================================
[   74.020472] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x214/0x4b8
[   74.021220] Write of size 1 at addr ffff0000c4b2baea by task kunit_try_catch/130
[   74.021984] 
[   74.022226] CPU: 1 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.023138] Hardware name: linux,dummy-virt (DT)
[   74.023648] Call trace:
[   74.023998]  dump_backtrace+0xf4/0x114
[   74.025002]  show_stack+0x18/0x24
[   74.025507]  __dump_stack+0x28/0x38
[   74.026061]  dump_stack_lvl+0x50/0x68
[   74.026604]  print_address_description+0x7c/0x1ec
[   74.027258]  print_report+0x50/0x68
[   74.028124]  kasan_report+0xac/0xfc
[   74.028706]  __asan_store1+0x6c/0x70
[   74.029282]  krealloc_less_oob_helper+0x214/0x4b8
[   74.029921]  krealloc_less_oob+0x18/0x24
[   74.030396]  kunit_try_run_case+0x80/0x184
[   74.030896]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.031452]  kthread+0x16c/0x21c
[   74.031995]  ret_from_fork+0x10/0x20
[   74.032471] 
[   74.032664] Allocated by task 130:
[   74.033024]  kasan_set_track+0x4c/0x80
[   74.033540]  kasan_save_alloc_info+0x28/0x34
[   74.034441]  __kasan_krealloc+0xcc/0xf8
[   74.034964]  krealloc+0x14c/0x26c
[   74.035406]  krealloc_less_oob_helper+0x9c/0x4b8
[   74.036209]  krealloc_less_oob+0x18/0x24
[   74.036695]  kunit_try_run_case+0x80/0x184
[   74.037174]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.037752]  kthread+0x16c/0x21c
[   74.038162]  ret_from_fork+0x10/0x20
[   74.038576] 
[   74.038798] The buggy address belongs to the object at ffff0000c4b2ba00
[   74.038798]  which belongs to the cache kmalloc-256 of size 256
[   74.039702] The buggy address is located 234 bytes inside of
[   74.039702]  256-byte region [ffff0000c4b2ba00, ffff0000c4b2bb00)
[   74.040622] 
[   74.040857] The buggy address belongs to the physical page:
[   74.041331] page:00000000c9970dfc refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104b2a
[   74.042569] head:00000000c9970dfc order:1 compound_mapcount:0 compound_pincount:0
[   74.043255] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   74.044273] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   74.044978] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.045576] page dumped because: kasan: bad access detected
[   74.046108] 
[   74.046311] Memory state around the buggy address:
[   74.046756]  ffff0000c4b2b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.047403]  ffff0000c4b2ba00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.048599] >ffff0000c4b2ba80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   74.049216]                                                           ^
[   74.049805]  ffff0000c4b2bb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.050440]  ffff0000c4b2bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.051060] ==================================================================
[   74.133654] ==================================================================
[   74.134527] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x104/0x4b8
[   74.135243] Write of size 1 at addr ffff0000c58ca0c9 by task kunit_try_catch/132
[   74.135819] 
[   74.136060] CPU: 1 PID: 132 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.136816] Hardware name: linux,dummy-virt (DT)
[   74.137237] Call trace:
[   74.137539]  dump_backtrace+0xf4/0x114
[   74.138033]  show_stack+0x18/0x24
[   74.138460]  __dump_stack+0x28/0x38
[   74.138897]  dump_stack_lvl+0x50/0x68
[   74.139345]  print_address_description+0x7c/0x1ec
[   74.139901]  print_report+0x50/0x68
[   74.140402]  kasan_report+0xac/0xfc
[   74.140861]  __asan_store1+0x6c/0x70
[   74.141303]  krealloc_less_oob_helper+0x104/0x4b8
[   74.141820]  krealloc_pagealloc_less_oob+0x18/0x24
[   74.142346]  kunit_try_run_case+0x80/0x184
[   74.142831]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.143394]  kthread+0x16c/0x21c
[   74.143820]  ret_from_fork+0x10/0x20
[   74.144255] 
[   74.144444] The buggy address belongs to the physical page:
[   74.144926] page:000000000dfb6053 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c8
[   74.145712] head:000000000dfb6053 order:2 compound_mapcount:0 compound_pincount:0
[   74.146352] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   74.147050] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   74.147701] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   74.148343] page dumped because: kasan: bad access detected
[   74.148816] 
[   74.149002] Memory state around the buggy address:
[   74.149462]  ffff0000c58c9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.150079]  ffff0000c58ca000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.150686] >ffff0000c58ca080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   74.151316]                                               ^
[   74.151834]  ffff0000c58ca100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   74.152439]  ffff0000c58ca180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   74.153031] ==================================================================

[   72.795260] ==================================================================
[   72.795800] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x180/0x5b0
[   72.796872] Write of size 1 at addr ffff0000c5a360da by task kunit_try_catch/132
[   72.797462] 
[   72.797664] CPU: 0 PID: 132 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   72.798841] Hardware name: linux,dummy-virt (DT)
[   72.799231] Call trace:
[   72.799494]  dump_backtrace.part.0+0xdc/0xf0
[   72.800029]  show_stack+0x18/0x30
[   72.800452]  dump_stack_lvl+0x64/0x80
[   72.800905]  print_report+0x158/0x438
[   72.801339]  kasan_report+0xb4/0xf4
[   72.801737]  __asan_store1+0x68/0x7c
[   72.802124]  krealloc_less_oob_helper+0x180/0x5b0
[   72.802917]  krealloc_pagealloc_less_oob+0x18/0x24
[   72.803460]  kunit_try_run_case+0x84/0x120
[   72.803932]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.804481]  kthread+0x180/0x190
[   72.804847]  ret_from_fork+0x10/0x20
[   72.805243] 
[   72.805436] The buggy address belongs to the physical page:
[   72.806378] page:00000000172f0408 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a34
[   72.807109] head:00000000172f0408 order:2 compound_mapcount:0 compound_pincount:0
[   72.807712] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   72.808357] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   72.809007] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   72.809598] page dumped because: kasan: bad access detected
[   72.810106] 
[   72.810314] Memory state around the buggy address:
[   72.810762]  ffff0000c5a35f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.811364]  ffff0000c5a36000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.811973] >ffff0000c5a36080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   72.812814]                                                     ^
[   72.813310]  ffff0000c5a36100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   72.814384]  ffff0000c5a36180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   72.814930] ==================================================================
[   72.815645] ==================================================================
[   72.816115] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1a8/0x5b0
[   72.816905] Write of size 1 at addr ffff0000c5a360ea by task kunit_try_catch/132
[   72.817508] 
[   72.817696] CPU: 0 PID: 132 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   72.818628] Hardware name: linux,dummy-virt (DT)
[   72.819017] Call trace:
[   72.819313]  dump_backtrace.part.0+0xdc/0xf0
[   72.819832]  show_stack+0x18/0x30
[   72.820287]  dump_stack_lvl+0x64/0x80
[   72.820736]  print_report+0x158/0x438
[   72.821173]  kasan_report+0xb4/0xf4
[   72.821577]  __asan_store1+0x68/0x7c
[   72.822574]  krealloc_less_oob_helper+0x1a8/0x5b0
[   72.823078]  krealloc_pagealloc_less_oob+0x18/0x24
[   72.823573]  kunit_try_run_case+0x84/0x120
[   72.824041]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.824653]  kthread+0x180/0x190
[   72.825024]  ret_from_fork+0x10/0x20
[   72.825439] 
[   72.825614] The buggy address belongs to the physical page:
[   72.826424] page:00000000172f0408 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a34
[   72.827150] head:00000000172f0408 order:2 compound_mapcount:0 compound_pincount:0
[   72.827760] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   72.828430] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   72.829109] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   72.829722] page dumped because: kasan: bad access detected
[   72.830709] 
[   72.830899] Memory state around the buggy address:
[   72.831332]  ffff0000c5a35f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.831940]  ffff0000c5a36000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.832548] >ffff0000c5a36080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   72.833099]                                                           ^
[   72.833651]  ffff0000c5a36100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   72.834542]  ffff0000c5a36180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   72.835107] ==================================================================
[   72.744269] ==================================================================
[   72.745740] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x10c/0x5b0
[   72.747075] Write of size 1 at addr ffff0000c5a360c9 by task kunit_try_catch/132
[   72.747572] 
[   72.747762] CPU: 0 PID: 132 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   72.748297] Hardware name: linux,dummy-virt (DT)
[   72.749065] Call trace:
[   72.749726]  dump_backtrace.part.0+0xdc/0xf0
[   72.750622]  show_stack+0x18/0x30
[   72.751346]  dump_stack_lvl+0x64/0x80
[   72.752049]  print_report+0x158/0x438
[   72.752792]  kasan_report+0xb4/0xf4
[   72.753454]  __asan_store1+0x68/0x7c
[   72.754175]  krealloc_less_oob_helper+0x10c/0x5b0
[   72.755114]  krealloc_pagealloc_less_oob+0x18/0x24
[   72.755961]  kunit_try_run_case+0x84/0x120
[   72.756699]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.757570]  kthread+0x180/0x190
[   72.758112]  ret_from_fork+0x10/0x20
[   72.758856] 
[   72.759237] The buggy address belongs to the physical page:
[   72.759642] page:00000000172f0408 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a34
[   72.760213] head:00000000172f0408 order:2 compound_mapcount:0 compound_pincount:0
[   72.761298] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   72.762406] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   72.763572] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   72.764505] page dumped because: kasan: bad access detected
[   72.765201] 
[   72.765514] Memory state around the buggy address:
[   72.766220]  ffff0000c5a35f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.767333]  ffff0000c5a36000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.768450] >ffff0000c5a36080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   72.769425]                                               ^
[   72.770187]  ffff0000c5a36100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   72.771281]  ffff0000c5a36180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   72.772284] ==================================================================
[   72.566922] ==================================================================
[   72.567869] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x138/0x5b0
[   72.568933] Write of size 1 at addr ffff0000c55e62d0 by task kunit_try_catch/130
[   72.570108] 
[   72.570426] CPU: 1 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   72.571817] Hardware name: linux,dummy-virt (DT)
[   72.572428] Call trace:
[   72.572809]  dump_backtrace.part.0+0xdc/0xf0
[   72.573513]  show_stack+0x18/0x30
[   72.574493]  dump_stack_lvl+0x64/0x80
[   72.575089]  print_report+0x158/0x438
[   72.575709]  kasan_report+0xb4/0xf4
[   72.576263]  __asan_store1+0x68/0x7c
[   72.576823]  krealloc_less_oob_helper+0x138/0x5b0
[   72.577533]  krealloc_less_oob+0x18/0x2c
[   72.578366]  kunit_try_run_case+0x84/0x120
[   72.579525]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.580127]  kthread+0x180/0x190
[   72.580456]  ret_from_fork+0x10/0x20
[   72.580800] 
[   72.580964] Allocated by task 130:
[   72.581227]  kasan_save_stack+0x3c/0x70
[   72.581800]  kasan_set_track+0x2c/0x40
[   72.582583]  kasan_save_alloc_info+0x24/0x34
[   72.583292]  __kasan_krealloc+0xf0/0x120
[   72.583961]  krealloc+0x154/0x1a0
[   72.584517]  krealloc_less_oob_helper+0xd0/0x5b0
[   72.585220]  krealloc_less_oob+0x18/0x2c
[   72.585867]  kunit_try_run_case+0x84/0x120
[   72.586592]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.587547]  kthread+0x180/0x190
[   72.588101]  ret_from_fork+0x10/0x20
[   72.588666] 
[   72.588945] The buggy address belongs to the object at ffff0000c55e6200
[   72.588945]  which belongs to the cache kmalloc-256 of size 256
[   72.590472] The buggy address is located 208 bytes inside of
[   72.590472]  256-byte region [ffff0000c55e6200, ffff0000c55e6300)
[   72.591928] 
[   72.592232] The buggy address belongs to the physical page:
[   72.592597] page:0000000087736949 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055e6
[   72.593146] head:0000000087736949 order:1 compound_mapcount:0 compound_pincount:0
[   72.593962] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   72.595067] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   72.596056] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   72.596979] page dumped because: kasan: bad access detected
[   72.597679] 
[   72.598029] Memory state around the buggy address:
[   72.598799]  ffff0000c55e6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.599708]  ffff0000c55e6200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.600592] >ffff0000c55e6280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   72.601242]                                                  ^
[   72.601632]  ffff0000c55e6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.602499]  ffff0000c55e6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.603003] ==================================================================
[   72.604176] ==================================================================
[   72.605072] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x180/0x5b0
[   72.606173] Write of size 1 at addr ffff0000c55e62da by task kunit_try_catch/130
[   72.607107] 
[   72.607292] CPU: 1 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   72.607839] Hardware name: linux,dummy-virt (DT)
[   72.608148] Call trace:
[   72.608359]  dump_backtrace.part.0+0xdc/0xf0
[   72.609113]  show_stack+0x18/0x30
[   72.609689]  dump_stack_lvl+0x64/0x80
[   72.610318]  print_report+0x158/0x438
[   72.610975]  kasan_report+0xb4/0xf4
[   72.611665]  __asan_store1+0x68/0x7c
[   72.612233]  krealloc_less_oob_helper+0x180/0x5b0
[   72.612952]  krealloc_less_oob+0x18/0x2c
[   72.613589]  kunit_try_run_case+0x84/0x120
[   72.614271]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.615248]  kthread+0x180/0x190
[   72.615811]  ret_from_fork+0x10/0x20
[   72.616377] 
[   72.616665] Allocated by task 130:
[   72.617139]  kasan_save_stack+0x3c/0x70
[   72.617735]  kasan_set_track+0x2c/0x40
[   72.618389]  kasan_save_alloc_info+0x24/0x34
[   72.619055]  __kasan_krealloc+0xf0/0x120
[   72.619660]  krealloc+0x154/0x1a0
[   72.620236]  krealloc_less_oob_helper+0xd0/0x5b0
[   72.620949]  krealloc_less_oob+0x18/0x2c
[   72.621589]  kunit_try_run_case+0x84/0x120
[   72.621990]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.622594]  kthread+0x180/0x190
[   72.623084]  ret_from_fork+0x10/0x20
[   72.623644] 
[   72.623867] The buggy address belongs to the object at ffff0000c55e6200
[   72.623867]  which belongs to the cache kmalloc-256 of size 256
[   72.624701] The buggy address is located 218 bytes inside of
[   72.624701]  256-byte region [ffff0000c55e6200, ffff0000c55e6300)
[   72.626072] 
[   72.626360] The buggy address belongs to the physical page:
[   72.627241] page:0000000087736949 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055e6
[   72.628347] head:0000000087736949 order:1 compound_mapcount:0 compound_pincount:0
[   72.629195] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   72.630179] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   72.631250] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   72.631879] page dumped because: kasan: bad access detected
[   72.632232] 
[   72.632404] Memory state around the buggy address:
[   72.632938]  ffff0000c55e6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.633575]  ffff0000c55e6200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.634269] >ffff0000c55e6280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   72.634818]                                                     ^
[   72.635288]  ffff0000c55e6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.635926]  ffff0000c55e6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.636978] ==================================================================
[   72.667172] ==================================================================
[   72.667836] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1cc/0x5b0
[   72.668581] Write of size 1 at addr ffff0000c55e62eb by task kunit_try_catch/130
[   72.669052] 
[   72.669235] CPU: 1 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   72.670101] Hardware name: linux,dummy-virt (DT)
[   72.670627] Call trace:
[   72.671036]  dump_backtrace.part.0+0xdc/0xf0
[   72.671595]  show_stack+0x18/0x30
[   72.672078]  dump_stack_lvl+0x64/0x80
[   72.672527]  print_report+0x158/0x438
[   72.673012]  kasan_report+0xb4/0xf4
[   72.673427]  __asan_store1+0x68/0x7c
[   72.673840]  krealloc_less_oob_helper+0x1cc/0x5b0
[   72.674426]  krealloc_less_oob+0x18/0x2c
[   72.675009]  kunit_try_run_case+0x84/0x120
[   72.675478]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.676067]  kthread+0x180/0x190
[   72.676464]  ret_from_fork+0x10/0x20
[   72.676878] 
[   72.677085] Allocated by task 130:
[   72.677446]  kasan_save_stack+0x3c/0x70
[   72.677887]  kasan_set_track+0x2c/0x40
[   72.678294]  kasan_save_alloc_info+0x24/0x34
[   72.678875]  __kasan_krealloc+0xf0/0x120
[   72.679440]  krealloc+0x154/0x1a0
[   72.679861]  krealloc_less_oob_helper+0xd0/0x5b0
[   72.680419]  krealloc_less_oob+0x18/0x2c
[   72.680868]  kunit_try_run_case+0x84/0x120
[   72.681347]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.681955]  kthread+0x180/0x190
[   72.682357]  ret_from_fork+0x10/0x20
[   72.682794] 
[   72.683019] The buggy address belongs to the object at ffff0000c55e6200
[   72.683019]  which belongs to the cache kmalloc-256 of size 256
[   72.683997] The buggy address is located 235 bytes inside of
[   72.683997]  256-byte region [ffff0000c55e6200, ffff0000c55e6300)
[   72.684974] 
[   72.685148] The buggy address belongs to the physical page:
[   72.685520] page:0000000087736949 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055e6
[   72.686453] head:0000000087736949 order:1 compound_mapcount:0 compound_pincount:0
[   72.687215] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   72.688079] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   72.688754] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   72.689367] page dumped because: kasan: bad access detected
[   72.689894] 
[   72.690087] Memory state around the buggy address:
[   72.690597]  ffff0000c55e6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.691240]  ffff0000c55e6200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.691913] >ffff0000c55e6280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   72.692522]                                                           ^
[   72.693072]  ffff0000c55e6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.693681]  ffff0000c55e6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.694411] ==================================================================
[   72.773183] ==================================================================
[   72.773837] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x138/0x5b0
[   72.774679] Write of size 1 at addr ffff0000c5a360d0 by task kunit_try_catch/132
[   72.775634] 
[   72.776013] CPU: 0 PID: 132 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   72.776809] Hardware name: linux,dummy-virt (DT)
[   72.777144] Call trace:
[   72.777362]  dump_backtrace.part.0+0xdc/0xf0
[   72.778374]  show_stack+0x18/0x30
[   72.778797]  dump_stack_lvl+0x64/0x80
[   72.779284]  print_report+0x158/0x438
[   72.779856]  kasan_report+0xb4/0xf4
[   72.780332]  __asan_store1+0x68/0x7c
[   72.780823]  krealloc_less_oob_helper+0x138/0x5b0
[   72.781422]  krealloc_pagealloc_less_oob+0x18/0x24
[   72.782052]  kunit_try_run_case+0x84/0x120
[   72.782619]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.783302]  kthread+0x180/0x190
[   72.783772]  ret_from_fork+0x10/0x20
[   72.784264] 
[   72.784577] The buggy address belongs to the physical page:
[   72.785106] page:00000000172f0408 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a34
[   72.785984] head:00000000172f0408 order:2 compound_mapcount:0 compound_pincount:0
[   72.786551] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   72.787172] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   72.788049] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   72.788800] page dumped because: kasan: bad access detected
[   72.789351] 
[   72.789693] Memory state around the buggy address:
[   72.790311]  ffff0000c5a35f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.790940]  ffff0000c5a36000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.791717] >ffff0000c5a36080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   72.792270]                                                  ^
[   72.792773]  ffff0000c5a36100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   72.793363]  ffff0000c5a36180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   72.794407] ==================================================================
[   72.530299] ==================================================================
[   72.531671] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x10c/0x5b0
[   72.532738] Write of size 1 at addr ffff0000c55e62c9 by task kunit_try_catch/130
[   72.533646] 
[   72.534024] CPU: 1 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   72.535224] Hardware name: linux,dummy-virt (DT)
[   72.535834] Call trace:
[   72.536237]  dump_backtrace.part.0+0xdc/0xf0
[   72.536955]  show_stack+0x18/0x30
[   72.537502]  dump_stack_lvl+0x64/0x80
[   72.537857]  print_report+0x158/0x438
[   72.538233]  kasan_report+0xb4/0xf4
[   72.538573]  __asan_store1+0x68/0x7c
[   72.538905]  krealloc_less_oob_helper+0x10c/0x5b0
[   72.539329]  krealloc_less_oob+0x18/0x2c
[   72.539990]  kunit_try_run_case+0x84/0x120
[   72.540792]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.541682]  kthread+0x180/0x190
[   72.542282]  ret_from_fork+0x10/0x20
[   72.542913] 
[   72.543192] Allocated by task 130:
[   72.543746]  kasan_save_stack+0x3c/0x70
[   72.544339]  kasan_set_track+0x2c/0x40
[   72.544920]  kasan_save_alloc_info+0x24/0x34
[   72.545561]  __kasan_krealloc+0xf0/0x120
[   72.546230]  krealloc+0x154/0x1a0
[   72.546837]  krealloc_less_oob_helper+0xd0/0x5b0
[   72.547643]  krealloc_less_oob+0x18/0x2c
[   72.548300]  kunit_try_run_case+0x84/0x120
[   72.548937]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.549722]  kthread+0x180/0x190
[   72.550314]  ret_from_fork+0x10/0x20
[   72.550948] 
[   72.551271] The buggy address belongs to the object at ffff0000c55e6200
[   72.551271]  which belongs to the cache kmalloc-256 of size 256
[   72.552668] The buggy address is located 201 bytes inside of
[   72.552668]  256-byte region [ffff0000c55e6200, ffff0000c55e6300)
[   72.554033] 
[   72.554322] The buggy address belongs to the physical page:
[   72.555135] page:0000000087736949 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055e6
[   72.556312] head:0000000087736949 order:1 compound_mapcount:0 compound_pincount:0
[   72.557193] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   72.557977] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   72.559020] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   72.559706] page dumped because: kasan: bad access detected
[   72.560060] 
[   72.560222] Memory state around the buggy address:
[   72.560571]  ffff0000c55e6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.561032]  ffff0000c55e6200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.561559] >ffff0000c55e6280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   72.562523]                                               ^
[   72.563422]  ffff0000c55e6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.564411]  ffff0000c55e6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.565354] ==================================================================
[   72.835940] ==================================================================
[   72.836492] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1cc/0x5b0
[   72.837207] Write of size 1 at addr ffff0000c5a360eb by task kunit_try_catch/132
[   72.838460] 
[   72.838766] CPU: 0 PID: 132 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   72.839308] Hardware name: linux,dummy-virt (DT)
[   72.839814] Call trace:
[   72.840189]  dump_backtrace.part.0+0xdc/0xf0
[   72.840770]  show_stack+0x18/0x30
[   72.841130]  dump_stack_lvl+0x64/0x80
[   72.841490]  print_report+0x158/0x438
[   72.842286]  kasan_report+0xb4/0xf4
[   72.842784]  __asan_store1+0x68/0x7c
[   72.843177]  krealloc_less_oob_helper+0x1cc/0x5b0
[   72.843782]  krealloc_pagealloc_less_oob+0x18/0x24
[   72.844311]  kunit_try_run_case+0x84/0x120
[   72.844805]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.845265]  kthread+0x180/0x190
[   72.845642]  ret_from_fork+0x10/0x20
[   72.846695] 
[   72.846898] The buggy address belongs to the physical page:
[   72.847328] page:00000000172f0408 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a34
[   72.848122] head:00000000172f0408 order:2 compound_mapcount:0 compound_pincount:0
[   72.848754] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   72.849405] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   72.850050] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   72.850927] page dumped because: kasan: bad access detected
[   72.851384] 
[   72.851591] Memory state around the buggy address:
[   72.852023]  ffff0000c5a35f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.852658]  ffff0000c5a36000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.853219] >ffff0000c5a36080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   72.853792]                                                           ^
[   72.854890]  ffff0000c5a36100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   72.855500]  ffff0000c5a36180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   72.856052] ==================================================================
[   72.638069] ==================================================================
[   72.638621] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1a8/0x5b0
[   72.639360] Write of size 1 at addr ffff0000c55e62ea by task kunit_try_catch/130
[   72.640287] 
[   72.640508] CPU: 1 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   72.641208] Hardware name: linux,dummy-virt (DT)
[   72.641585] Call trace:
[   72.642360]  dump_backtrace.part.0+0xdc/0xf0
[   72.642869]  show_stack+0x18/0x30
[   72.643288]  dump_stack_lvl+0x64/0x80
[   72.643738]  print_report+0x158/0x438
[   72.644177]  kasan_report+0xb4/0xf4
[   72.644578]  __asan_store1+0x68/0x7c
[   72.644957]  krealloc_less_oob_helper+0x1a8/0x5b0
[   72.645446]  krealloc_less_oob+0x18/0x2c
[   72.645964]  kunit_try_run_case+0x84/0x120
[   72.646431]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.646957]  kthread+0x180/0x190
[   72.647326]  ret_from_fork+0x10/0x20
[   72.647754] 
[   72.647932] Allocated by task 130:
[   72.648276]  kasan_save_stack+0x3c/0x70
[   72.648941]  kasan_set_track+0x2c/0x40
[   72.649350]  kasan_save_alloc_info+0x24/0x34
[   72.650294]  __kasan_krealloc+0xf0/0x120
[   72.650753]  krealloc+0x154/0x1a0
[   72.651138]  krealloc_less_oob_helper+0xd0/0x5b0
[   72.651623]  krealloc_less_oob+0x18/0x2c
[   72.652084]  kunit_try_run_case+0x84/0x120
[   72.652552]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.653059]  kthread+0x180/0x190
[   72.653435]  ret_from_fork+0x10/0x20
[   72.654133] 
[   72.654338] The buggy address belongs to the object at ffff0000c55e6200
[   72.654338]  which belongs to the cache kmalloc-256 of size 256
[   72.655230] The buggy address is located 234 bytes inside of
[   72.655230]  256-byte region [ffff0000c55e6200, ffff0000c55e6300)
[   72.656139] 
[   72.656322] The buggy address belongs to the physical page:
[   72.656759] page:0000000087736949 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055e6
[   72.657536] head:0000000087736949 order:1 compound_mapcount:0 compound_pincount:0
[   72.658945] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   72.659635] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   72.660275] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   72.660883] page dumped because: kasan: bad access detected
[   72.661323] 
[   72.661520] Memory state around the buggy address:
[   72.662002]  ffff0000c55e6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.662559]  ffff0000c55e6200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.663158] >ffff0000c55e6280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   72.664067]                                                           ^
[   72.664635]  ffff0000c55e6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.665248]  ffff0000c55e6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.665824] ==================================================================

[   64.397006] ==================================================================
[   64.397601] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x150/0x5c0
[   64.398342] Write of size 1 at addr ffff0000c595e0d0 by task kunit_try_catch/130
[   64.398884] 
[   64.399085] CPU: 0 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   64.399725] Hardware name: linux,dummy-virt (DT)
[   64.400060] Call trace:
[   64.400371]  dump_backtrace+0x110/0x120
[   64.400802]  show_stack+0x18/0x28
[   64.401200]  dump_stack_lvl+0x68/0x84
[   64.401612]  print_report+0x158/0x484
[   64.402014]  kasan_report+0x98/0xe0
[   64.402395]  __asan_store1+0x68/0x78
[   64.402765]  krealloc_less_oob_helper+0x150/0x5c0
[   64.403301]  krealloc_pagealloc_less_oob+0x18/0x28
[   64.403753]  kunit_try_run_case+0x7c/0x120
[   64.404173]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   64.404687]  kthread+0x1a4/0x1b8
[   64.405038]  ret_from_fork+0x10/0x20
[   64.405441] 
[   64.405620] The buggy address belongs to the physical page:
[   64.406033] page:000000002033b139 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595c
[   64.406716] head:000000002033b139 order:2 compound_mapcount:0 compound_pincount:0
[   64.407280] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   64.407963] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   64.408601] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   64.409163] page dumped because: kasan: bad access detected
[   64.409584] 
[   64.409772] Memory state around the buggy address:
[   64.410166]  ffff0000c595df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   64.410699]  ffff0000c595e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   64.411277] >ffff0000c595e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   64.411789]                                                  ^
[   64.412253]  ffff0000c595e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   64.412801]  ffff0000c595e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   64.413336] ==================================================================
[   64.283870] ==================================================================
[   64.284395] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1d0/0x5c0
[   64.285041] Write of size 1 at addr ffff0000c17a66ea by task kunit_try_catch/128
[   64.285930] 
[   64.286124] CPU: 0 PID: 128 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   64.286783] Hardware name: linux,dummy-virt (DT)
[   64.287123] Call trace:
[   64.287389]  dump_backtrace+0x110/0x120
[   64.287840]  show_stack+0x18/0x28
[   64.288245]  dump_stack_lvl+0x68/0x84
[   64.288656]  print_report+0x158/0x484
[   64.289007]  kasan_report+0x98/0xe0
[   64.289391]  __asan_store1+0x68/0x78
[   64.290200]  krealloc_less_oob_helper+0x1d0/0x5c0
[   64.290677]  krealloc_less_oob+0x18/0x28
[   64.291104]  kunit_try_run_case+0x7c/0x120
[   64.291528]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   64.292043]  kthread+0x1a4/0x1b8
[   64.292403]  ret_from_fork+0x10/0x20
[   64.292777] 
[   64.292943] Allocated by task 128:
[   64.293269]  kasan_save_stack+0x2c/0x58
[   64.293863]  kasan_set_track+0x2c/0x40
[   64.294266]  kasan_save_alloc_info+0x24/0x38
[   64.294684]  __kasan_krealloc+0xec/0x120
[   64.295054]  krealloc+0x13c/0x178
[   64.295398]  krealloc_less_oob_helper+0xdc/0x5c0
[   64.295860]  krealloc_less_oob+0x18/0x28
[   64.296396]  kunit_try_run_case+0x7c/0x120
[   64.296815]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   64.297322]  kthread+0x1a4/0x1b8
[   64.298120]  ret_from_fork+0x10/0x20
[   64.298514] 
[   64.298693] The buggy address belongs to the object at ffff0000c17a6600
[   64.298693]  which belongs to the cache kmalloc-256 of size 256
[   64.299530] The buggy address is located 234 bytes inside of
[   64.299530]  256-byte region [ffff0000c17a6600, ffff0000c17a6700)
[   64.300337] 
[   64.300513] The buggy address belongs to the physical page:
[   64.300981] page:00000000d35011b9 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1017a6
[   64.301839] head:00000000d35011b9 order:1 compound_mapcount:0 compound_pincount:0
[   64.302413] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   64.303041] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   64.303750] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   64.304312] page dumped because: kasan: bad access detected
[   64.304721] 
[   64.304909] Memory state around the buggy address:
[   64.305294]  ffff0000c17a6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.306437]  ffff0000c17a6600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   64.306991] >ffff0000c17a6680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   64.307535]                                                           ^
[   64.308051]  ffff0000c17a6700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.308621]  ffff0000c17a6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.309126] ==================================================================
[   64.431641] ==================================================================
[   64.432145] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1d0/0x5c0
[   64.432874] Write of size 1 at addr ffff0000c595e0ea by task kunit_try_catch/130
[   64.433557] 
[   64.433780] CPU: 0 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   64.434542] Hardware name: linux,dummy-virt (DT)
[   64.435022] Call trace:
[   64.435402]  dump_backtrace+0x110/0x120
[   64.435807]  show_stack+0x18/0x28
[   64.436245]  dump_stack_lvl+0x68/0x84
[   64.436655]  print_report+0x158/0x484
[   64.437190]  kasan_report+0x98/0xe0
[   64.437606]  __asan_store1+0x68/0x78
[   64.437975]  krealloc_less_oob_helper+0x1d0/0x5c0
[   64.438453]  krealloc_pagealloc_less_oob+0x18/0x28
[   64.438907]  kunit_try_run_case+0x7c/0x120
[   64.439356]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   64.439892]  kthread+0x1a4/0x1b8
[   64.440211]  ret_from_fork+0x10/0x20
[   64.440624] 
[   64.440814] The buggy address belongs to the physical page:
[   64.441252] page:000000002033b139 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595c
[   64.441918] head:000000002033b139 order:2 compound_mapcount:0 compound_pincount:0
[   64.442450] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   64.443038] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   64.443679] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   64.444234] page dumped because: kasan: bad access detected
[   64.444650] 
[   64.444831] Memory state around the buggy address:
[   64.445243]  ffff0000c595df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   64.445883]  ffff0000c595e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   64.446451] >ffff0000c595e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   64.446959]                                                           ^
[   64.447503]  ffff0000c595e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   64.448076]  ffff0000c595e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   64.448634] ==================================================================
[   64.310315] ==================================================================
[   64.310827] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1fc/0x5c0
[   64.311472] Write of size 1 at addr ffff0000c17a66eb by task kunit_try_catch/128
[   64.311945] 
[   64.312143] CPU: 0 PID: 128 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   64.312825] Hardware name: linux,dummy-virt (DT)
[   64.313193] Call trace:
[   64.313430]  dump_backtrace+0x110/0x120
[   64.313873]  show_stack+0x18/0x28
[   64.314258]  dump_stack_lvl+0x68/0x84
[   64.314673]  print_report+0x158/0x484
[   64.315037]  kasan_report+0x98/0xe0
[   64.315866]  __asan_store1+0x68/0x78
[   64.316268]  krealloc_less_oob_helper+0x1fc/0x5c0
[   64.316751]  krealloc_less_oob+0x18/0x28
[   64.317152]  kunit_try_run_case+0x7c/0x120
[   64.317849]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   64.318396]  kthread+0x1a4/0x1b8
[   64.318731]  ret_from_fork+0x10/0x20
[   64.319133] 
[   64.319325] Allocated by task 128:
[   64.319653]  kasan_save_stack+0x2c/0x58
[   64.320026]  kasan_set_track+0x2c/0x40
[   64.320398]  kasan_save_alloc_info+0x24/0x38
[   64.320821]  __kasan_krealloc+0xec/0x120
[   64.321202]  krealloc+0x13c/0x178
[   64.321620]  krealloc_less_oob_helper+0xdc/0x5c0
[   64.322081]  krealloc_less_oob+0x18/0x28
[   64.322506]  kunit_try_run_case+0x7c/0x120
[   64.322950]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   64.323452]  kthread+0x1a4/0x1b8
[   64.323794]  ret_from_fork+0x10/0x20
[   64.324165] 
[   64.324356] The buggy address belongs to the object at ffff0000c17a6600
[   64.324356]  which belongs to the cache kmalloc-256 of size 256
[   64.325180] The buggy address is located 235 bytes inside of
[   64.325180]  256-byte region [ffff0000c17a6600, ffff0000c17a6700)
[   64.326690] 
[   64.326857] The buggy address belongs to the physical page:
[   64.327283] page:00000000d35011b9 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1017a6
[   64.327963] head:00000000d35011b9 order:1 compound_mapcount:0 compound_pincount:0
[   64.328549] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   64.329192] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   64.329941] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   64.330734] page dumped because: kasan: bad access detected
[   64.331147] 
[   64.331341] Memory state around the buggy address:
[   64.331716]  ffff0000c17a6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.332307]  ffff0000c17a6600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   64.332871] >ffff0000c17a6680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   64.333870]                                                           ^
[   64.334370]  ffff0000c17a6700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.334940]  ffff0000c17a6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.335478] ==================================================================
[   64.257784] ==================================================================
[   64.258330] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1a0/0x5c0
[   64.258972] Write of size 1 at addr ffff0000c17a66da by task kunit_try_catch/128
[   64.259768] 
[   64.259966] CPU: 0 PID: 128 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   64.260593] Hardware name: linux,dummy-virt (DT)
[   64.261004] Call trace:
[   64.261311]  dump_backtrace+0x110/0x120
[   64.261986]  show_stack+0x18/0x28
[   64.262425]  dump_stack_lvl+0x68/0x84
[   64.262813]  print_report+0x158/0x484
[   64.263180]  kasan_report+0x98/0xe0
[   64.263615]  __asan_store1+0x68/0x78
[   64.263945]  krealloc_less_oob_helper+0x1a0/0x5c0
[   64.264472]  krealloc_less_oob+0x18/0x28
[   64.264859]  kunit_try_run_case+0x7c/0x120
[   64.265307]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   64.265821]  kthread+0x1a4/0x1b8
[   64.266169]  ret_from_fork+0x10/0x20
[   64.266543] 
[   64.266720] Allocated by task 128:
[   64.267033]  kasan_save_stack+0x2c/0x58
[   64.267858]  kasan_set_track+0x2c/0x40
[   64.268251]  kasan_save_alloc_info+0x24/0x38
[   64.268679]  __kasan_krealloc+0xec/0x120
[   64.269076]  krealloc+0x13c/0x178
[   64.269441]  krealloc_less_oob_helper+0xdc/0x5c0
[   64.270129]  krealloc_less_oob+0x18/0x28
[   64.270570]  kunit_try_run_case+0x7c/0x120
[   64.270997]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   64.271486]  kthread+0x1a4/0x1b8
[   64.271812]  ret_from_fork+0x10/0x20
[   64.272184] 
[   64.272373] The buggy address belongs to the object at ffff0000c17a6600
[   64.272373]  which belongs to the cache kmalloc-256 of size 256
[   64.273161] The buggy address is located 218 bytes inside of
[   64.273161]  256-byte region [ffff0000c17a6600, ffff0000c17a6700)
[   64.274161] 
[   64.274348] The buggy address belongs to the physical page:
[   64.274771] page:00000000d35011b9 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1017a6
[   64.275757] head:00000000d35011b9 order:1 compound_mapcount:0 compound_pincount:0
[   64.276335] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   64.276957] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   64.277806] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   64.278350] page dumped because: kasan: bad access detected
[   64.278774] 
[   64.278953] Memory state around the buggy address:
[   64.279322]  ffff0000c17a6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.279899]  ffff0000c17a6600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   64.280440] >ffff0000c17a6680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   64.280957]                                                     ^
[   64.281445]  ffff0000c17a6700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.282031]  ffff0000c17a6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.282608] ==================================================================
[   64.201676] ==================================================================
[   64.203048] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x11c/0x5c0
[   64.204968] Write of size 1 at addr ffff0000c17a66c9 by task kunit_try_catch/128
[   64.206677] 
[   64.206892] CPU: 0 PID: 128 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   64.207536] Hardware name: linux,dummy-virt (DT)
[   64.207909] Call trace:
[   64.208157]  dump_backtrace+0x110/0x120
[   64.208621]  show_stack+0x18/0x28
[   64.209016]  dump_stack_lvl+0x68/0x84
[   64.209585]  print_report+0x158/0x484
[   64.209974]  kasan_report+0x98/0xe0
[   64.210349]  __asan_store1+0x68/0x78
[   64.210704]  krealloc_less_oob_helper+0x11c/0x5c0
[   64.211173]  krealloc_less_oob+0x18/0x28
[   64.211917]  kunit_try_run_case+0x7c/0x120
[   64.212337]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   64.212854]  kthread+0x1a4/0x1b8
[   64.213188]  ret_from_fork+0x10/0x20
[   64.213912] 
[   64.214085] Allocated by task 128:
[   64.214418]  kasan_save_stack+0x2c/0x58
[   64.214841]  kasan_set_track+0x2c/0x40
[   64.215205]  kasan_save_alloc_info+0x24/0x38
[   64.215620]  __kasan_krealloc+0xec/0x120
[   64.215998]  krealloc+0x13c/0x178
[   64.216382]  krealloc_less_oob_helper+0xdc/0x5c0
[   64.216869]  krealloc_less_oob+0x18/0x28
[   64.217292]  kunit_try_run_case+0x7c/0x120
[   64.217711]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   64.218179]  kthread+0x1a4/0x1b8
[   64.218995]  ret_from_fork+0x10/0x20
[   64.219368] 
[   64.219562] The buggy address belongs to the object at ffff0000c17a6600
[   64.219562]  which belongs to the cache kmalloc-256 of size 256
[   64.220371] The buggy address is located 201 bytes inside of
[   64.220371]  256-byte region [ffff0000c17a6600, ffff0000c17a6700)
[   64.221174] 
[   64.221391] The buggy address belongs to the physical page:
[   64.222099] page:00000000d35011b9 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1017a6
[   64.222806] head:00000000d35011b9 order:1 compound_mapcount:0 compound_pincount:0
[   64.223314] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   64.224000] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   64.224597] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   64.225143] page dumped because: kasan: bad access detected
[   64.225732] 
[   64.225902] Memory state around the buggy address:
[   64.226302]  ffff0000c17a6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.226846]  ffff0000c17a6600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   64.227731] >ffff0000c17a6680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   64.228275]                                               ^
[   64.228676]  ffff0000c17a6700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.229266]  ffff0000c17a6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.230048] ==================================================================
[   64.379515] ==================================================================
[   64.380356] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x11c/0x5c0
[   64.380999] Write of size 1 at addr ffff0000c595e0c9 by task kunit_try_catch/130
[   64.381632] 
[   64.381828] CPU: 0 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   64.382613] Hardware name: linux,dummy-virt (DT)
[   64.382952] Call trace:
[   64.383218]  dump_backtrace+0x110/0x120
[   64.383744]  show_stack+0x18/0x28
[   64.384104]  dump_stack_lvl+0x68/0x84
[   64.384532]  print_report+0x158/0x484
[   64.384934]  kasan_report+0x98/0xe0
[   64.385314]  __asan_store1+0x68/0x78
[   64.385689]  krealloc_less_oob_helper+0x11c/0x5c0
[   64.386174]  krealloc_pagealloc_less_oob+0x18/0x28
[   64.386643]  kunit_try_run_case+0x7c/0x120
[   64.387062]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   64.387593]  kthread+0x1a4/0x1b8
[   64.387960]  ret_from_fork+0x10/0x20
[   64.388339] 
[   64.388531] The buggy address belongs to the physical page:
[   64.388957] page:000000002033b139 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595c
[   64.389642] head:000000002033b139 order:2 compound_mapcount:0 compound_pincount:0
[   64.390168] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   64.390745] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   64.391355] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   64.391895] page dumped because: kasan: bad access detected
[   64.392301] 
[   64.392490] Memory state around the buggy address:
[   64.392874]  ffff0000c595df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   64.393447]  ffff0000c595e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   64.394037] >ffff0000c595e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   64.394570]                                               ^
[   64.395001]  ffff0000c595e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   64.395558]  ffff0000c595e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   64.396074] ==================================================================
[   64.449352] ==================================================================
[   64.449855] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1fc/0x5c0
[   64.450585] Write of size 1 at addr ffff0000c595e0eb by task kunit_try_catch/130
[   64.451127] 
[   64.451331] CPU: 0 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   64.451928] Hardware name: linux,dummy-virt (DT)
[   64.452319] Call trace:
[   64.452579]  dump_backtrace+0x110/0x120
[   64.452982]  show_stack+0x18/0x28
[   64.453439]  dump_stack_lvl+0x68/0x84
[   64.453842]  print_report+0x158/0x484
[   64.454238]  kasan_report+0x98/0xe0
[   64.454575]  __asan_store1+0x68/0x78
[   64.455007]  krealloc_less_oob_helper+0x1fc/0x5c0
[   64.455477]  krealloc_pagealloc_less_oob+0x18/0x28
[   64.456003]  kunit_try_run_case+0x7c/0x120
[   64.456512]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   64.457034]  kthread+0x1a4/0x1b8
[   64.457401]  ret_from_fork+0x10/0x20
[   64.457763] 
[   64.457934] The buggy address belongs to the physical page:
[   64.458355] page:000000002033b139 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595c
[   64.459049] head:000000002033b139 order:2 compound_mapcount:0 compound_pincount:0
[   64.459596] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   64.460183] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   64.460791] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   64.461356] page dumped because: kasan: bad access detected
[   64.461813] 
[   64.462029] Memory state around the buggy address:
[   64.462436]  ffff0000c595df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   64.462982]  ffff0000c595e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   64.463526] >ffff0000c595e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   64.464024]                                                           ^
[   64.464548]  ffff0000c595e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   64.465097]  ffff0000c595e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   64.465655] ==================================================================
[   64.414930] ==================================================================
[   64.415462] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1a0/0x5c0
[   64.416066] Write of size 1 at addr ffff0000c595e0da by task kunit_try_catch/130
[   64.416586] 
[   64.416792] CPU: 0 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   64.417456] Hardware name: linux,dummy-virt (DT)
[   64.417899] Call trace:
[   64.418152]  dump_backtrace+0x110/0x120
[   64.418575]  show_stack+0x18/0x28
[   64.418999]  dump_stack_lvl+0x68/0x84
[   64.419408]  print_report+0x158/0x484
[   64.419782]  kasan_report+0x98/0xe0
[   64.420145]  __asan_store1+0x68/0x78
[   64.420519]  krealloc_less_oob_helper+0x1a0/0x5c0
[   64.420987]  krealloc_pagealloc_less_oob+0x18/0x28
[   64.421498]  kunit_try_run_case+0x7c/0x120
[   64.421906]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   64.422397]  kthread+0x1a4/0x1b8
[   64.422738]  ret_from_fork+0x10/0x20
[   64.423109] 
[   64.423295] The buggy address belongs to the physical page:
[   64.423718] page:000000002033b139 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595c
[   64.424385] head:000000002033b139 order:2 compound_mapcount:0 compound_pincount:0
[   64.424925] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   64.425529] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   64.426121] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   64.426694] page dumped because: kasan: bad access detected
[   64.427115] 
[   64.427297] Memory state around the buggy address:
[   64.427678]  ffff0000c595df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   64.428212]  ffff0000c595e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   64.428745] >ffff0000c595e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   64.429263]                                                     ^
[   64.429745]  ffff0000c595e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   64.430329]  ffff0000c595e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   64.430860] ==================================================================
[   64.231362] ==================================================================
[   64.231879] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x150/0x5c0
[   64.232540] Write of size 1 at addr ffff0000c17a66d0 by task kunit_try_catch/128
[   64.233050] 
[   64.233266] CPU: 0 PID: 128 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   64.234022] Hardware name: linux,dummy-virt (DT)
[   64.234432] Call trace:
[   64.234672]  dump_backtrace+0x110/0x120
[   64.235114]  show_stack+0x18/0x28
[   64.235518]  dump_stack_lvl+0x68/0x84
[   64.235909]  print_report+0x158/0x484
[   64.236773]  kasan_report+0x98/0xe0
[   64.237155]  __asan_store1+0x68/0x78
[   64.237586]  krealloc_less_oob_helper+0x150/0x5c0
[   64.238317]  krealloc_less_oob+0x18/0x28
[   64.238744]  kunit_try_run_case+0x7c/0x120
[   64.239156]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   64.239642]  kthread+0x1a4/0x1b8
[   64.239984]  ret_from_fork+0x10/0x20
[   64.240352] 
[   64.240531] Allocated by task 128:
[   64.240863]  kasan_save_stack+0x2c/0x58
[   64.241258]  kasan_set_track+0x2c/0x40
[   64.242070]  kasan_save_alloc_info+0x24/0x38
[   64.242494]  __kasan_krealloc+0xec/0x120
[   64.242892]  krealloc+0x13c/0x178
[   64.243249]  krealloc_less_oob_helper+0xdc/0x5c0
[   64.243709]  krealloc_less_oob+0x18/0x28
[   64.244137]  kunit_try_run_case+0x7c/0x120
[   64.244588]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   64.245106]  kthread+0x1a4/0x1b8
[   64.245714]  ret_from_fork+0x10/0x20
[   64.246079] 
[   64.246278] The buggy address belongs to the object at ffff0000c17a6600
[   64.246278]  which belongs to the cache kmalloc-256 of size 256
[   64.247117] The buggy address is located 208 bytes inside of
[   64.247117]  256-byte region [ffff0000c17a6600, ffff0000c17a6700)
[   64.247949] 
[   64.248125] The buggy address belongs to the physical page:
[   64.248575] page:00000000d35011b9 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1017a6
[   64.249264] head:00000000d35011b9 order:1 compound_mapcount:0 compound_pincount:0
[   64.250341] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   64.250964] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   64.251584] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   64.252134] page dumped because: kasan: bad access detected
[   64.252586] 
[   64.252774] Memory state around the buggy address:
[   64.253152]  ffff0000c17a6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.253932]  ffff0000c17a6600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   64.254683] >ffff0000c17a6680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   64.255301]                                                  ^
[   64.255829]  ffff0000c17a6700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.256469]  ffff0000c17a6780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.257013] ==================================================================

[   30.663683] ==================================================================
[   30.664406] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x18d/0x620
[   30.665083] Write of size 1 at addr ffff88810370a0d0 by task kunit_try_catch/236
[   30.665371] 
[   30.665474] CPU: 1 PID: 236 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   30.665778] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.666087] Call Trace:
[   30.667114]  <TASK>
[   30.667979]  dump_stack_lvl+0x49/0x62
[   30.668449]  print_report+0x189/0x492
[   30.668993]  ? kasan_addr_to_slab+0xd/0xb0
[   30.669692]  ? krealloc_less_oob_helper+0x18d/0x620
[   30.670202]  kasan_report+0x10c/0x190
[   30.671642]  ? krealloc_less_oob_helper+0x18d/0x620
[   30.671903]  __asan_store1+0x65/0x70
[   30.672085]  krealloc_less_oob_helper+0x18d/0x620
[   30.672348]  ? krealloc_uaf+0x2e0/0x2e0
[   30.672531]  ? __kunit_add_resource+0xd1/0x100
[   30.672730]  ? preempt_count_sub+0x4c/0x70
[   30.673102]  ? _raw_spin_unlock_irqrestore+0x2d/0x60
[   30.674028]  ? __kunit_add_resource+0xd1/0x100
[   30.674394]  krealloc_pagealloc_less_oob+0x18/0x20
[   30.674896]  kunit_try_run_case+0x8f/0xd0
[   30.675345]  ? kunit_catch_run_case+0x80/0x80
[   30.675804]  ? kunit_try_catch_throw+0x40/0x40
[   30.676145]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   30.676832]  kthread+0x17b/0x1b0
[   30.677428]  ? kthread_complete_and_exit+0x30/0x30
[   30.678022]  ret_from_fork+0x22/0x30
[   30.678246]  </TASK>
[   30.678370] 
[   30.678585] The buggy address belongs to the physical page:
[   30.679113] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103708
[   30.680186] head:(____ptrval____) order:2 compound_mapcount:0 compound_pincount:0
[   30.681034] flags: 0x200000000010000(head|node=0|zone=2)
[   30.681393] raw: 0200000000010000 0000000000000000 dead000000000122 0000000000000000
[   30.682456] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.682801] page dumped because: kasan: bad access detected
[   30.683447] 
[   30.683628] Memory state around the buggy address:
[   30.683892]  ffff888103709f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.684148]  ffff88810370a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.684779] >ffff88810370a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.685514]                                                  ^
[   30.686189]  ffff88810370a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.687199]  ffff88810370a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.687905] ==================================================================
[   30.734228] ==================================================================
[   30.734827] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x25e/0x620
[   30.735852] Write of size 1 at addr ffff88810370a0eb by task kunit_try_catch/236
[   30.736858] 
[   30.736970] CPU: 1 PID: 236 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   30.737352] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.738572] Call Trace:
[   30.738917]  <TASK>
[   30.739155]  dump_stack_lvl+0x49/0x62
[   30.739932]  print_report+0x189/0x492
[   30.740387]  ? kasan_addr_to_slab+0xd/0xb0
[   30.740586]  ? krealloc_less_oob_helper+0x25e/0x620
[   30.740799]  kasan_report+0x10c/0x190
[   30.740991]  ? krealloc_less_oob_helper+0x25e/0x620
[   30.741235]  __asan_store1+0x65/0x70
[   30.741469]  krealloc_less_oob_helper+0x25e/0x620
[   30.741676]  ? krealloc_uaf+0x2e0/0x2e0
[   30.741940]  ? __kunit_add_resource+0xd1/0x100
[   30.742228]  ? preempt_count_sub+0x4c/0x70
[   30.742597]  ? _raw_spin_unlock_irqrestore+0x2d/0x60
[   30.742830]  ? __kunit_add_resource+0xd1/0x100
[   30.743113]  krealloc_pagealloc_less_oob+0x18/0x20
[   30.743542]  kunit_try_run_case+0x8f/0xd0
[   30.743762]  ? kunit_catch_run_case+0x80/0x80
[   30.743998]  ? kunit_try_catch_throw+0x40/0x40
[   30.744212]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   30.744526]  kthread+0x17b/0x1b0
[   30.744730]  ? kthread_complete_and_exit+0x30/0x30
[   30.745471]  ret_from_fork+0x22/0x30
[   30.745741]  </TASK>
[   30.745876] 
[   30.745993] The buggy address belongs to the physical page:
[   30.746271] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103708
[   30.746817] head:(____ptrval____) order:2 compound_mapcount:0 compound_pincount:0
[   30.747142] flags: 0x200000000010000(head|node=0|zone=2)
[   30.747446] raw: 0200000000010000 0000000000000000 dead000000000122 0000000000000000
[   30.747919] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.748308] page dumped because: kasan: bad access detected
[   30.748569] 
[   30.748673] Memory state around the buggy address:
[   30.748885]  ffff888103709f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.749232]  ffff88810370a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.749624] >ffff88810370a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.749975]                                                           ^
[   30.750288]  ffff88810370a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.750838]  ffff88810370a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.751218] ==================================================================
[   30.639775] ==================================================================
[   30.641005] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x141/0x620
[   30.641709] Write of size 1 at addr ffff88810370a0c9 by task kunit_try_catch/236
[   30.642531] 
[   30.642786] CPU: 1 PID: 236 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   30.643715] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.644039] Call Trace:
[   30.644180]  <TASK>
[   30.644303]  dump_stack_lvl+0x49/0x62
[   30.644738]  print_report+0x189/0x492
[   30.645188]  ? kasan_addr_to_slab+0xd/0xb0
[   30.645790]  ? krealloc_less_oob_helper+0x141/0x620
[   30.646359]  kasan_report+0x10c/0x190
[   30.646798]  ? krealloc_less_oob_helper+0x141/0x620
[   30.647202]  __asan_store1+0x65/0x70
[   30.647694]  krealloc_less_oob_helper+0x141/0x620
[   30.648212]  ? krealloc_uaf+0x2e0/0x2e0
[   30.648648]  ? __kunit_add_resource+0xd1/0x100
[   30.648990]  ? preempt_count_sub+0x4c/0x70
[   30.649500]  ? _raw_spin_unlock_irqrestore+0x2d/0x60
[   30.649772]  ? __kunit_add_resource+0xd1/0x100
[   30.649985]  krealloc_pagealloc_less_oob+0x18/0x20
[   30.650203]  kunit_try_run_case+0x8f/0xd0
[   30.650398]  ? kunit_catch_run_case+0x80/0x80
[   30.650602]  ? kunit_try_catch_throw+0x40/0x40
[   30.650800]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   30.651027]  kthread+0x17b/0x1b0
[   30.651223]  ? kthread_complete_and_exit+0x30/0x30
[   30.651696]  ret_from_fork+0x22/0x30
[   30.652080]  </TASK>
[   30.652344] 
[   30.652540] The buggy address belongs to the physical page:
[   30.653465] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103708
[   30.654433] head:(____ptrval____) order:2 compound_mapcount:0 compound_pincount:0
[   30.655145] flags: 0x200000000010000(head|node=0|zone=2)
[   30.655795] raw: 0200000000010000 0000000000000000 dead000000000122 0000000000000000
[   30.656632] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.657688] page dumped because: kasan: bad access detected
[   30.658208] 
[   30.658392] Memory state around the buggy address:
[   30.658948]  ffff888103709f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.659693]  ffff88810370a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.660447] >ffff88810370a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.661144]                                               ^
[   30.661799]  ffff88810370a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.662105]  ffff88810370a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.662585] ==================================================================
[   30.510302] ==================================================================
[   30.510758] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x18d/0x620
[   30.511093] Write of size 1 at addr ffff88810090c8d0 by task kunit_try_catch/234
[   30.511519] 
[   30.511642] CPU: 1 PID: 234 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   30.511999] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.512607] Call Trace:
[   30.512775]  <TASK>
[   30.512908]  dump_stack_lvl+0x49/0x62
[   30.513171]  print_report+0x189/0x492
[   30.513709]  ? kasan_complete_mode_report_info+0x3c/0x200
[   30.514027]  ? krealloc_less_oob_helper+0x18d/0x620
[   30.514278]  kasan_report+0x10c/0x190
[   30.514633]  ? krealloc_less_oob_helper+0x18d/0x620
[   30.514921]  __asan_store1+0x65/0x70
[   30.515137]  krealloc_less_oob_helper+0x18d/0x620
[   30.515425]  ? krealloc_uaf+0x2e0/0x2e0
[   30.515669]  ? __kunit_add_resource+0xd1/0x100
[   30.515882]  ? preempt_count_sub+0x4c/0x70
[   30.516137]  ? _raw_spin_unlock_irqrestore+0x2d/0x60
[   30.516587]  ? __kunit_add_resource+0xd1/0x100
[   30.516855]  krealloc_less_oob+0x18/0x20
[   30.517098]  kunit_try_run_case+0x8f/0xd0
[   30.517605]  ? kunit_catch_run_case+0x80/0x80
[   30.517857]  ? kunit_try_catch_throw+0x40/0x40
[   30.518115]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   30.518563]  kthread+0x17b/0x1b0
[   30.518757]  ? kthread_complete_and_exit+0x30/0x30
[   30.519031]  ret_from_fork+0x22/0x30
[   30.519263]  </TASK>
[   30.519524] 
[   30.519622] Allocated by task 234:
[   30.519819]  kasan_save_stack+0x41/0x70
[   30.520035]  kasan_set_track+0x25/0x40
[   30.520255]  kasan_save_alloc_info+0x1e/0x30
[   30.520617]  __kasan_krealloc+0x12e/0x180
[   30.520816]  krealloc+0xae/0x140
[   30.521020]  krealloc_less_oob_helper+0xe8/0x620
[   30.521324]  krealloc_less_oob+0x18/0x20
[   30.521566]  kunit_try_run_case+0x8f/0xd0
[   30.521783]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   30.522063]  kthread+0x17b/0x1b0
[   30.522618]  ret_from_fork+0x22/0x30
[   30.522815] 
[   30.522926] The buggy address belongs to the object at ffff88810090c800
[   30.522926]  which belongs to the cache kmalloc-256 of size 256
[   30.523571] The buggy address is located 208 bytes inside of
[   30.523571]  256-byte region [ffff88810090c800, ffff88810090c900)
[   30.524070] 
[   30.524192] The buggy address belongs to the physical page:
[   30.524568] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10090c
[   30.524985] head:(____ptrval____) order:1 compound_mapcount:0 compound_pincount:0
[   30.525617] flags: 0x200000000010200(slab|head|node=0|zone=2)
[   30.525925] raw: 0200000000010200 0000000000000000 dead000000000122 ffff888100041b40
[   30.526282] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   30.526757] page dumped because: kasan: bad access detected
[   30.527020] 
[   30.527135] Memory state around the buggy address:
[   30.527506]  ffff88810090c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.527814]  ffff88810090c800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.528141] >ffff88810090c880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.528564]                                                  ^
[   30.528869]  ffff88810090c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.529170]  ffff88810090c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.529777] ==================================================================
[   30.489242] ==================================================================
[   30.490129] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x141/0x620
[   30.490947] Write of size 1 at addr ffff88810090c8c9 by task kunit_try_catch/234
[   30.491485] 
[   30.491628] CPU: 1 PID: 234 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   30.492017] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.492532] Call Trace:
[   30.492703]  <TASK>
[   30.492826]  dump_stack_lvl+0x49/0x62
[   30.493086]  print_report+0x189/0x492
[   30.493614]  ? kasan_complete_mode_report_info+0x3c/0x200
[   30.493901]  ? krealloc_less_oob_helper+0x141/0x620
[   30.494181]  kasan_report+0x10c/0x190
[   30.494429]  ? krealloc_less_oob_helper+0x141/0x620
[   30.494800]  __asan_store1+0x65/0x70
[   30.495018]  krealloc_less_oob_helper+0x141/0x620
[   30.495415]  ? krealloc_uaf+0x2e0/0x2e0
[   30.495633]  ? __kunit_add_resource+0xd1/0x100
[   30.495908]  ? preempt_count_sub+0x4c/0x70
[   30.496188]  ? _raw_spin_unlock_irqrestore+0x2d/0x60
[   30.496592]  ? __kunit_add_resource+0xd1/0x100
[   30.496854]  krealloc_less_oob+0x18/0x20
[   30.497080]  kunit_try_run_case+0x8f/0xd0
[   30.497388]  ? kunit_catch_run_case+0x80/0x80
[   30.497624]  ? kunit_try_catch_throw+0x40/0x40
[   30.497868]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   30.498140]  kthread+0x17b/0x1b0
[   30.498681]  ? kthread_complete_and_exit+0x30/0x30
[   30.498956]  ret_from_fork+0x22/0x30
[   30.499203]  </TASK>
[   30.499466] 
[   30.499575] Allocated by task 234:
[   30.499739]  kasan_save_stack+0x41/0x70
[   30.499981]  kasan_set_track+0x25/0x40
[   30.500183]  kasan_save_alloc_info+0x1e/0x30
[   30.500544]  __kasan_krealloc+0x12e/0x180
[   30.500770]  krealloc+0xae/0x140
[   30.500983]  krealloc_less_oob_helper+0xe8/0x620
[   30.501229]  krealloc_less_oob+0x18/0x20
[   30.501738]  kunit_try_run_case+0x8f/0xd0
[   30.501952]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   30.502268]  kthread+0x17b/0x1b0
[   30.502546]  ret_from_fork+0x22/0x30
[   30.502770] 
[   30.502875] The buggy address belongs to the object at ffff88810090c800
[   30.502875]  which belongs to the cache kmalloc-256 of size 256
[   30.503442] The buggy address is located 201 bytes inside of
[   30.503442]  256-byte region [ffff88810090c800, ffff88810090c900)
[   30.503918] 
[   30.504035] The buggy address belongs to the physical page:
[   30.504316] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10090c
[   30.504749] head:(____ptrval____) order:1 compound_mapcount:0 compound_pincount:0
[   30.505245] flags: 0x200000000010200(slab|head|node=0|zone=2)
[   30.505846] raw: 0200000000010200 0000000000000000 dead000000000122 ffff888100041b40
[   30.506192] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   30.506679] page dumped because: kasan: bad access detected
[   30.506930] 
[   30.507040] Memory state around the buggy address:
[   30.507309]  ffff88810090c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.507756]  ffff88810090c800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.508055] >ffff88810090c880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.508522]                                               ^
[   30.508798]  ffff88810090c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.509133]  ffff88810090c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.509729] ==================================================================
[   30.548804] ==================================================================
[   30.549299] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x229/0x620
[   30.549687] Write of size 1 at addr ffff88810090c8ea by task kunit_try_catch/234
[   30.550079] 
[   30.550216] CPU: 1 PID: 234 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   30.550587] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.550927] Call Trace:
[   30.551082]  <TASK>
[   30.551304]  dump_stack_lvl+0x49/0x62
[   30.551552]  print_report+0x189/0x492
[   30.551742]  ? kasan_complete_mode_report_info+0x3c/0x200
[   30.552064]  ? krealloc_less_oob_helper+0x229/0x620
[   30.552468]  kasan_report+0x10c/0x190
[   30.552707]  ? asm_sysvec_apic_timer_interrupt+0x1b/0x20
[   30.552946]  ? krealloc_less_oob_helper+0x229/0x620
[   30.553277]  __asan_store1+0x65/0x70
[   30.553570]  krealloc_less_oob_helper+0x229/0x620
[   30.553835]  ? krealloc_uaf+0x2e0/0x2e0
[   30.554091]  ? __kunit_add_resource+0xd1/0x100
[   30.554412]  ? preempt_count_sub+0x4c/0x70
[   30.554650]  ? _raw_spin_unlock_irqrestore+0x2d/0x60
[   30.554916]  ? __kunit_add_resource+0xd1/0x100
[   30.555181]  krealloc_less_oob+0x18/0x20
[   30.555391]  kunit_try_run_case+0x8f/0xd0
[   30.555815]  ? kunit_catch_run_case+0x80/0x80
[   30.556047]  ? kunit_try_catch_throw+0x40/0x40
[   30.556398]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   30.556669]  kthread+0x17b/0x1b0
[   30.556885]  ? kthread_complete_and_exit+0x30/0x30
[   30.557184]  ret_from_fork+0x22/0x30
[   30.557415]  </TASK>
[   30.557574] 
[   30.557696] Allocated by task 234:
[   30.557912]  kasan_save_stack+0x41/0x70
[   30.558146]  kasan_set_track+0x25/0x40
[   30.558384]  kasan_save_alloc_info+0x1e/0x30
[   30.558660]  __kasan_krealloc+0x12e/0x180
[   30.558879]  krealloc+0xae/0x140
[   30.559120]  krealloc_less_oob_helper+0xe8/0x620
[   30.559479]  krealloc_less_oob+0x18/0x20
[   30.559693]  kunit_try_run_case+0x8f/0xd0
[   30.559942]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   30.560225]  kthread+0x17b/0x1b0
[   30.560430]  ret_from_fork+0x22/0x30
[   30.560658] 
[   30.560743] The buggy address belongs to the object at ffff88810090c800
[   30.560743]  which belongs to the cache kmalloc-256 of size 256
[   30.561328] The buggy address is located 234 bytes inside of
[   30.561328]  256-byte region [ffff88810090c800, ffff88810090c900)
[   30.561906] 
[   30.562020] The buggy address belongs to the physical page:
[   30.562328] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10090c
[   30.562816] head:(____ptrval____) order:1 compound_mapcount:0 compound_pincount:0
[   30.563108] flags: 0x200000000010200(slab|head|node=0|zone=2)
[   30.563592] raw: 0200000000010200 0000000000000000 dead000000000122 ffff888100041b40
[   30.563996] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   30.564410] page dumped because: kasan: bad access detected
[   30.564656] 
[   30.564741] Memory state around the buggy address:
[   30.564992]  ffff88810090c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.565412]  ffff88810090c800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.565758] >ffff88810090c880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.566030]                                                           ^
[   30.566490]  ffff88810090c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.566851]  ffff88810090c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.567193] ==================================================================
[   30.688257] ==================================================================
[   30.688905] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1f3/0x620
[   30.689699] Write of size 1 at addr ffff88810370a0da by task kunit_try_catch/236
[   30.690394] 
[   30.690602] CPU: 1 PID: 236 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   30.691064] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.692034] Call Trace:
[   30.692322]  <TASK>
[   30.692594]  dump_stack_lvl+0x49/0x62
[   30.692794]  print_report+0x189/0x492
[   30.692984]  ? kasan_addr_to_slab+0xd/0xb0
[   30.693189]  ? krealloc_less_oob_helper+0x1f3/0x620
[   30.693401]  kasan_report+0x10c/0x190
[   30.693633]  ? krealloc_less_oob_helper+0x1f3/0x620
[   30.693916]  __asan_store1+0x65/0x70
[   30.694102]  krealloc_less_oob_helper+0x1f3/0x620
[   30.694724]  ? krealloc_uaf+0x2e0/0x2e0
[   30.694975]  ? __kunit_add_resource+0xd1/0x100
[   30.695224]  ? preempt_count_sub+0x4c/0x70
[   30.695549]  ? _raw_spin_unlock_irqrestore+0x2d/0x60
[   30.695809]  ? __kunit_add_resource+0xd1/0x100
[   30.696070]  krealloc_pagealloc_less_oob+0x18/0x20
[   30.696398]  kunit_try_run_case+0x8f/0xd0
[   30.696619]  ? kunit_catch_run_case+0x80/0x80
[   30.696855]  ? kunit_try_catch_throw+0x40/0x40
[   30.697121]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   30.697387]  kthread+0x17b/0x1b0
[   30.697626]  ? kthread_complete_and_exit+0x30/0x30
[   30.697919]  ret_from_fork+0x22/0x30
[   30.698181]  </TASK>
[   30.698427] 
[   30.698542] The buggy address belongs to the physical page:
[   30.698831] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103708
[   30.699295] head:(____ptrval____) order:2 compound_mapcount:0 compound_pincount:0
[   30.700537] flags: 0x200000000010000(head|node=0|zone=2)
[   30.700986] raw: 0200000000010000 0000000000000000 dead000000000122 0000000000000000
[   30.701659] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.702681] page dumped because: kasan: bad access detected
[   30.703415] 
[   30.703817] Memory state around the buggy address:
[   30.704708]  ffff888103709f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.704986]  ffff88810370a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.705268] >ffff88810370a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.706053]                                                     ^
[   30.706800]  ffff88810370a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.707523]  ffff88810370a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.708256] ==================================================================
[   30.708983] ==================================================================
[   30.709291] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x229/0x620
[   30.710081] Write of size 1 at addr ffff88810370a0ea by task kunit_try_catch/236
[   30.710928] 
[   30.711143] CPU: 1 PID: 236 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   30.712154] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.713199] Call Trace:
[   30.713642]  <TASK>
[   30.713997]  dump_stack_lvl+0x49/0x62
[   30.714497]  print_report+0x189/0x492
[   30.715212]  ? kasan_addr_to_slab+0xd/0xb0
[   30.715692]  ? krealloc_less_oob_helper+0x229/0x620
[   30.716059]  kasan_report+0x10c/0x190
[   30.716280]  ? krealloc_less_oob_helper+0x229/0x620
[   30.716929]  __asan_store1+0x65/0x70
[   30.717379]  krealloc_less_oob_helper+0x229/0x620
[   30.717941]  ? krealloc_uaf+0x2e0/0x2e0
[   30.718481]  ? __kunit_add_resource+0xd1/0x100
[   30.718862]  ? preempt_count_sub+0x4c/0x70
[   30.719204]  ? _raw_spin_unlock_irqrestore+0x2d/0x60
[   30.719875]  ? __kunit_add_resource+0xd1/0x100
[   30.720470]  krealloc_pagealloc_less_oob+0x18/0x20
[   30.720690]  kunit_try_run_case+0x8f/0xd0
[   30.720877]  ? kunit_catch_run_case+0x80/0x80
[   30.721073]  ? kunit_try_catch_throw+0x40/0x40
[   30.721515]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   30.722286]  kthread+0x17b/0x1b0
[   30.722726]  ? kthread_complete_and_exit+0x30/0x30
[   30.723227]  ret_from_fork+0x22/0x30
[   30.723738]  </TASK>
[   30.724057] 
[   30.724337] The buggy address belongs to the physical page:
[   30.724970] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103708
[   30.726402] head:(____ptrval____) order:2 compound_mapcount:0 compound_pincount:0
[   30.727004] flags: 0x200000000010000(head|node=0|zone=2)
[   30.727253] raw: 0200000000010000 0000000000000000 dead000000000122 0000000000000000
[   30.727880] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.728639] page dumped because: kasan: bad access detected
[   30.729218] 
[   30.729491] Memory state around the buggy address:
[   30.729965]  ffff888103709f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.730797]  ffff88810370a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.731055] >ffff88810370a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.731330]                                                           ^
[   30.732091]  ffff88810370a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.732897]  ffff88810370a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.733600] ==================================================================
[   30.568327] ==================================================================
[   30.569121] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x25e/0x620
[   30.569607] Write of size 1 at addr ffff88810090c8eb by task kunit_try_catch/234
[   30.569984] 
[   30.570114] CPU: 1 PID: 234 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   30.570553] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.570988] Call Trace:
[   30.571154]  <TASK>
[   30.571307]  dump_stack_lvl+0x49/0x62
[   30.572025]  print_report+0x189/0x492
[   30.572341]  ? kasan_complete_mode_report_info+0x3c/0x200
[   30.572631]  ? krealloc_less_oob_helper+0x25e/0x620
[   30.572899]  kasan_report+0x10c/0x190
[   30.573150]  ? asm_sysvec_apic_timer_interrupt+0x1b/0x20
[   30.573496]  ? krealloc_less_oob_helper+0x25e/0x620
[   30.573830]  __asan_store1+0x65/0x70
[   30.574046]  krealloc_less_oob_helper+0x25e/0x620
[   30.574350]  ? krealloc_uaf+0x2e0/0x2e0
[   30.574606]  ? __kunit_add_resource+0xd1/0x100
[   30.574866]  ? preempt_count_sub+0x4c/0x70
[   30.575093]  ? _raw_spin_unlock_irqrestore+0x2d/0x60
[   30.575365]  ? __kunit_add_resource+0xd1/0x100
[   30.575773]  krealloc_less_oob+0x18/0x20
[   30.575972]  kunit_try_run_case+0x8f/0xd0
[   30.576553]  ? kunit_catch_run_case+0x80/0x80
[   30.576824]  ? kunit_try_catch_throw+0x40/0x40
[   30.577102]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   30.577479]  kthread+0x17b/0x1b0
[   30.577726]  ? kthread_complete_and_exit+0x30/0x30
[   30.577990]  ret_from_fork+0x22/0x30
[   30.578254]  </TASK>
[   30.578389] 
[   30.578518] Allocated by task 234:
[   30.578711]  kasan_save_stack+0x41/0x70
[   30.578950]  kasan_set_track+0x25/0x40
[   30.579213]  kasan_save_alloc_info+0x1e/0x30
[   30.579472]  __kasan_krealloc+0x12e/0x180
[   30.580048]  krealloc+0xae/0x140
[   30.580305]  krealloc_less_oob_helper+0xe8/0x620
[   30.580562]  krealloc_less_oob+0x18/0x20
[   30.580811]  kunit_try_run_case+0x8f/0xd0
[   30.581083]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   30.581414]  kthread+0x17b/0x1b0
[   30.581640]  ret_from_fork+0x22/0x30
[   30.581842] 
[   30.581970] The buggy address belongs to the object at ffff88810090c800
[   30.581970]  which belongs to the cache kmalloc-256 of size 256
[   30.582559] The buggy address is located 235 bytes inside of
[   30.582559]  256-byte region [ffff88810090c800, ffff88810090c900)
[   30.583089] 
[   30.583228] The buggy address belongs to the physical page:
[   30.583781] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10090c
[   30.584174] head:(____ptrval____) order:1 compound_mapcount:0 compound_pincount:0
[   30.584780] flags: 0x200000000010200(slab|head|node=0|zone=2)
[   30.585080] raw: 0200000000010200 0000000000000000 dead000000000122 ffff888100041b40
[   30.585482] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   30.585886] page dumped because: kasan: bad access detected
[   30.586138] 
[   30.586232] Memory state around the buggy address:
[   30.586480]  ffff88810090c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.586888]  ffff88810090c800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.587215] >ffff88810090c880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.587536]                                                           ^
[   30.588249]  ffff88810090c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.588538]  ffff88810090c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.588876] ==================================================================
[   30.530545] ==================================================================
[   30.530867] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1f3/0x620
[   30.531296] Write of size 1 at addr ffff88810090c8da by task kunit_try_catch/234
[   30.531614] 
[   30.531742] CPU: 1 PID: 234 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   30.532460] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.532914] Call Trace:
[   30.533089]  <TASK>
[   30.533241]  dump_stack_lvl+0x49/0x62
[   30.533476]  print_report+0x189/0x492
[   30.533695]  ? kasan_complete_mode_report_info+0x3c/0x200
[   30.533954]  ? krealloc_less_oob_helper+0x1f3/0x620
[   30.534261]  kasan_report+0x10c/0x190
[   30.534498]  ? asm_sysvec_apic_timer_interrupt+0x1b/0x20
[   30.534738]  ? krealloc_less_oob_helper+0x1f3/0x620
[   30.535044]  __asan_store1+0x65/0x70
[   30.535261]  krealloc_less_oob_helper+0x1f3/0x620
[   30.535507]  ? krealloc_uaf+0x2e0/0x2e0
[   30.535719]  ? __kunit_add_resource+0xd1/0x100
[   30.535983]  ? preempt_count_sub+0x4c/0x70
[   30.536258]  ? _raw_spin_unlock_irqrestore+0x2d/0x60
[   30.536485]  ? __kunit_add_resource+0xd1/0x100
[   30.536766]  krealloc_less_oob+0x18/0x20
[   30.536986]  kunit_try_run_case+0x8f/0xd0
[   30.537234]  ? kunit_catch_run_case+0x80/0x80
[   30.537527]  ? kunit_try_catch_throw+0x40/0x40
[   30.537881]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   30.538158]  kthread+0x17b/0x1b0
[   30.538344]  ? kthread_complete_and_exit+0x30/0x30
[   30.538636]  ret_from_fork+0x22/0x30
[   30.538870]  </TASK>
[   30.538993] 
[   30.539086] Allocated by task 234:
[   30.539296]  kasan_save_stack+0x41/0x70
[   30.539534]  kasan_set_track+0x25/0x40
[   30.539769]  kasan_save_alloc_info+0x1e/0x30
[   30.539954]  __kasan_krealloc+0x12e/0x180
[   30.540152]  krealloc+0xae/0x140
[   30.540368]  krealloc_less_oob_helper+0xe8/0x620
[   30.540643]  krealloc_less_oob+0x18/0x20
[   30.540847]  kunit_try_run_case+0x8f/0xd0
[   30.541061]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   30.541507]  kthread+0x17b/0x1b0
[   30.541680]  ret_from_fork+0x22/0x30
[   30.541894] 
[   30.541981] The buggy address belongs to the object at ffff88810090c800
[   30.541981]  which belongs to the cache kmalloc-256 of size 256
[   30.542538] The buggy address is located 218 bytes inside of
[   30.542538]  256-byte region [ffff88810090c800, ffff88810090c900)
[   30.543035] 
[   30.543154] The buggy address belongs to the physical page:
[   30.543455] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10090c
[   30.543960] head:(____ptrval____) order:1 compound_mapcount:0 compound_pincount:0
[   30.544299] flags: 0x200000000010200(slab|head|node=0|zone=2)
[   30.544544] raw: 0200000000010200 0000000000000000 dead000000000122 ffff888100041b40
[   30.544956] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   30.545356] page dumped because: kasan: bad access detected
[   30.545558] 
[   30.545660] Memory state around the buggy address:
[   30.545929]  ffff88810090c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.546394]  ffff88810090c800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.546703] >ffff88810090c880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.547026]                                                     ^
[   30.547334]  ffff88810090c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.547591]  ffff88810090c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.547939] ==================================================================