Hay
Date
July 15, 2025, 2:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[  105.315484] ==================================================================
[  105.316042] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x168/0x374
[  105.317325] Write of size 1 at addr ffff0000c68420f0 by task kunit_try_catch/215
[  105.317852] 
[  105.318058] CPU: 1 PID: 215 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  105.319170] Hardware name: linux,dummy-virt (DT)
[  105.319688] Call trace:
[  105.320105]  dump_backtrace+0xe0/0x134
[  105.320779]  show_stack+0x20/0x2c
[  105.321397]  dump_stack_lvl+0x88/0xb4
[  105.321977]  print_report+0x158/0x44c
[  105.322333]  kasan_report+0xc8/0x180
[  105.322700]  __asan_store1+0x68/0x7c
[  105.323134]  krealloc_more_oob_helper+0x168/0x374
[  105.323623]  krealloc_pagealloc_more_oob+0x20/0x2c
[  105.324173]  kunit_try_run_case+0x8c/0x124
[  105.324712]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  105.326150]  kthread+0x15c/0x170
[  105.326608]  ret_from_fork+0x10/0x20
[  105.327038] 
[  105.327259] The buggy address belongs to the physical page:
[  105.327783] page:00000000c34535d9 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106840
[  105.328724] head:00000000c34535d9 order:2 compound_mapcount:0 compound_pincount:0
[  105.329422] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[  105.330262] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[  105.330964] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  105.331585] page dumped because: kasan: bad access detected
[  105.332105] 
[  105.332335] Memory state around the buggy address:
[  105.333583]  ffff0000c6841f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  105.334265]  ffff0000c6842000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  105.334907] >ffff0000c6842080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[  105.335482]                                                              ^
[  105.336133]  ffff0000c6842100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  105.337236]  ffff0000c6842180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  105.338115] ==================================================================
[  105.289993] ==================================================================
[  105.290771] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x13c/0x374
[  105.292781] Write of size 1 at addr ffff0000c68420eb by task kunit_try_catch/215
[  105.294238] 
[  105.294737] CPU: 1 PID: 215 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  105.295900] Hardware name: linux,dummy-virt (DT)
[  105.296949] Call trace:
[  105.297640]  dump_backtrace+0xe0/0x134
[  105.298076]  show_stack+0x20/0x2c
[  105.298512]  dump_stack_lvl+0x88/0xb4
[  105.298990]  print_report+0x158/0x44c
[  105.299419]  kasan_report+0xc8/0x180
[  105.299912]  __asan_store1+0x68/0x7c
[  105.300367]  krealloc_more_oob_helper+0x13c/0x374
[  105.300852]  krealloc_pagealloc_more_oob+0x20/0x2c
[  105.301358]  kunit_try_run_case+0x8c/0x124
[  105.302699]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  105.303296]  kthread+0x15c/0x170
[  105.303692]  ret_from_fork+0x10/0x20
[  105.304136] 
[  105.304337] The buggy address belongs to the physical page:
[  105.305179] page:00000000c34535d9 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106840
[  105.305937] head:00000000c34535d9 order:2 compound_mapcount:0 compound_pincount:0
[  105.306553] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[  105.307234] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[  105.307911] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  105.309380] page dumped because: kasan: bad access detected
[  105.309868] 
[  105.310064] Memory state around the buggy address:
[  105.310529]  ffff0000c6841f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  105.311170]  ffff0000c6842000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  105.311776] >ffff0000c6842080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[  105.312354]                                                           ^
[  105.313294]  ffff0000c6842100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  105.313932]  ffff0000c6842180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  105.314559] ==================================================================
[  105.087376] ==================================================================
[  105.088524] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x168/0x374
[  105.089871] Write of size 1 at addr ffff0000c62604f0 by task kunit_try_catch/213
[  105.091263] 
[  105.091644] CPU: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  105.092730] Hardware name: linux,dummy-virt (DT)
[  105.093298] Call trace:
[  105.093693]  dump_backtrace+0xe0/0x134
[  105.094296]  show_stack+0x20/0x2c
[  105.094859]  dump_stack_lvl+0x88/0xb4
[  105.095413]  print_report+0x158/0x44c
[  105.095776]  kasan_report+0xc8/0x180
[  105.096144]  __asan_store1+0x68/0x7c
[  105.096528]  krealloc_more_oob_helper+0x168/0x374
[  105.097291]  krealloc_more_oob+0x20/0x30
[  105.098057]  kunit_try_run_case+0x8c/0x124
[  105.098751]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  105.099579]  kthread+0x15c/0x170
[  105.100171]  ret_from_fork+0x10/0x20
[  105.100910] 
[  105.101296] Allocated by task 213:
[  105.101829]  kasan_save_stack+0x3c/0x70
[  105.102462]  kasan_set_track+0x2c/0x40
[  105.103090]  kasan_save_alloc_info+0x24/0x34
[  105.103801]  __kasan_krealloc+0x10c/0x140
[  105.104493]  krealloc+0x158/0x1c0
[  105.105092]  krealloc_more_oob_helper+0xd8/0x374
[  105.105779]  krealloc_more_oob+0x20/0x30
[  105.106392]  kunit_try_run_case+0x8c/0x124
[  105.107057]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  105.107867]  kthread+0x15c/0x170
[  105.109292]  ret_from_fork+0x10/0x20
[  105.109895] 
[  105.110083] The buggy address belongs to the object at ffff0000c6260400
[  105.110083]  which belongs to the cache kmalloc-256 of size 256
[  105.110820] The buggy address is located 240 bytes inside of
[  105.110820]  256-byte region [ffff0000c6260400, ffff0000c6260500)
[  105.111812] 
[  105.112049] The buggy address belongs to the physical page:
[  105.112812] page:0000000090416edb refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106260
[  105.113646] head:0000000090416edb order:1 compound_mapcount:0 compound_pincount:0
[  105.114370] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  105.115181] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[  105.116127] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  105.117297] page dumped because: kasan: bad access detected
[  105.117996] 
[  105.118273] Memory state around the buggy address:
[  105.118897]  ffff0000c6260380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  105.119767]  ffff0000c6260400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  105.120906] >ffff0000c6260480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[  105.121691]                                                              ^
[  105.122148]  ffff0000c6260500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  105.122625]  ffff0000c6260580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  105.123520] ==================================================================
[  105.052949] ==================================================================
[  105.053712] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x13c/0x374
[  105.054367] Write of size 1 at addr ffff0000c62604eb by task kunit_try_catch/213
[  105.054997] 
[  105.055226] CPU: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  105.055915] Hardware name: linux,dummy-virt (DT)
[  105.056343] Call trace:
[  105.057379]  dump_backtrace+0xe0/0x134
[  105.057839]  show_stack+0x20/0x2c
[  105.058232]  dump_stack_lvl+0x88/0xb4
[  105.058671]  print_report+0x158/0x44c
[  105.059099]  kasan_report+0xc8/0x180
[  105.059523]  __asan_store1+0x68/0x7c
[  105.059973]  krealloc_more_oob_helper+0x13c/0x374
[  105.060687]  krealloc_more_oob+0x20/0x30
[  105.061127]  kunit_try_run_case+0x8c/0x124
[  105.061626]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  105.062195]  kthread+0x15c/0x170
[  105.062584]  ret_from_fork+0x10/0x20
[  105.063043] 
[  105.063237] Allocated by task 213:
[  105.063618]  kasan_save_stack+0x3c/0x70
[  105.064095]  kasan_set_track+0x2c/0x40
[  105.064753]  kasan_save_alloc_info+0x24/0x34
[  105.065216]  __kasan_krealloc+0x10c/0x140
[  105.065690]  krealloc+0x158/0x1c0
[  105.066106]  krealloc_more_oob_helper+0xd8/0x374
[  105.066637]  krealloc_more_oob+0x20/0x30
[  105.067217]  kunit_try_run_case+0x8c/0x124
[  105.067858]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  105.068854]  kthread+0x15c/0x170
[  105.069408]  ret_from_fork+0x10/0x20
[  105.069982] 
[  105.070261] The buggy address belongs to the object at ffff0000c6260400
[  105.070261]  which belongs to the cache kmalloc-256 of size 256
[  105.071643] The buggy address is located 235 bytes inside of
[  105.071643]  256-byte region [ffff0000c6260400, ffff0000c6260500)
[  105.073853] 
[  105.074142] The buggy address belongs to the physical page:
[  105.074829] page:0000000090416edb refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106260
[  105.075916] head:0000000090416edb order:1 compound_mapcount:0 compound_pincount:0
[  105.077007] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[  105.077943] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[  105.078477] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[  105.079106] page dumped because: kasan: bad access detected
[  105.079784] 
[  105.080054] Memory state around the buggy address:
[  105.080907]  ffff0000c6260380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  105.081795]  ffff0000c6260400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  105.082652] >ffff0000c6260480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[  105.083497]                                                           ^
[  105.084307]  ffff0000c6260500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  105.085387]  ffff0000c6260580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  105.085870] ==================================================================

[   74.833831] ==================================================================
[   74.834568] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x12c/0x2a4
[   74.835176] Write of size 1 at addr ffff0000c56f14eb by task kunit_try_catch/129
[   74.835676] 
[   74.835936] CPU: 0 PID: 129 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.837076] Hardware name: linux,dummy-virt (DT)
[   74.837829] Call trace:
[   74.838212]  dump_backtrace+0xf8/0x118
[   74.838651]  show_stack+0x18/0x24
[   74.839056]  __dump_stack+0x28/0x38
[   74.839763]  dump_stack_lvl+0x54/0x6c
[   74.840196]  print_address_description+0x7c/0x1ec
[   74.840715]  print_report+0x50/0x68
[   74.841290]  kasan_report+0xac/0x100
[   74.841830]  __asan_store1+0x6c/0x70
[   74.842332]  krealloc_more_oob_helper+0x12c/0x2a4
[   74.842942]  krealloc_more_oob+0x18/0x24
[   74.843405]  kunit_try_run_case+0x80/0x184
[   74.843891]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.844474]  kthread+0x16c/0x21c
[   74.845181]  ret_from_fork+0x10/0x20
[   74.845616] 
[   74.845854] Allocated by task 129:
[   74.846233]  kasan_set_track+0x4c/0x80
[   74.846717]  kasan_save_alloc_info+0x28/0x34
[   74.847196]  __kasan_krealloc+0xcc/0xf8
[   74.847666]  krealloc+0x150/0x270
[   74.848091]  krealloc_more_oob_helper+0x9c/0x2a4
[   74.848619]  krealloc_more_oob+0x18/0x24
[   74.849159]  kunit_try_run_case+0x80/0x184
[   74.849781]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.850385]  kthread+0x16c/0x21c
[   74.850870]  ret_from_fork+0x10/0x20
[   74.851281] 
[   74.851491] The buggy address belongs to the object at ffff0000c56f1400
[   74.851491]  which belongs to the cache kmalloc-256 of size 256
[   74.852400] The buggy address is located 235 bytes inside of
[   74.852400]  256-byte region [ffff0000c56f1400, ffff0000c56f1500)
[   74.853680] 
[   74.853925] The buggy address belongs to the physical page:
[   74.854382] page:00000000b1c7ebef refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f0
[   74.855319] head:00000000b1c7ebef order:1 compound_mapcount:0 compound_pincount:0
[   74.855930] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   74.856908] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   74.857565] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.858194] page dumped because: kasan: bad access detected
[   74.858668] 
[   74.858883] Memory state around the buggy address:
[   74.859309]  ffff0000c56f1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.859959]  ffff0000c56f1400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.860578] >ffff0000c56f1480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   74.861425]                                                           ^
[   74.861979]  ffff0000c56f1500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.862612]  ffff0000c56f1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.863215] ==================================================================
[   74.866155] ==================================================================
[   74.866911] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x17c/0x2a4
[   74.867510] Write of size 1 at addr ffff0000c56f14f0 by task kunit_try_catch/129
[   74.868365] 
[   74.869002] CPU: 0 PID: 129 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.869980] Hardware name: linux,dummy-virt (DT)
[   74.870336] Call trace:
[   74.870569]  dump_backtrace+0xf8/0x118
[   74.871008]  show_stack+0x18/0x24
[   74.871399]  __dump_stack+0x28/0x38
[   74.871788]  dump_stack_lvl+0x54/0x6c
[   74.872780]  print_address_description+0x7c/0x1ec
[   74.873636]  print_report+0x50/0x68
[   74.874293]  kasan_report+0xac/0x100
[   74.874968]  __asan_store1+0x6c/0x70
[   74.875603]  krealloc_more_oob_helper+0x17c/0x2a4
[   74.876351]  krealloc_more_oob+0x18/0x24
[   74.877090]  kunit_try_run_case+0x80/0x184
[   74.877912]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.878731]  kthread+0x16c/0x21c
[   74.879324]  ret_from_fork+0x10/0x20
[   74.879930] 
[   74.880235] Allocated by task 129:
[   74.880791]  kasan_set_track+0x4c/0x80
[   74.881496]  kasan_save_alloc_info+0x28/0x34
[   74.882170]  __kasan_krealloc+0xcc/0xf8
[   74.882836]  krealloc+0x150/0x270
[   74.883409]  krealloc_more_oob_helper+0x9c/0x2a4
[   74.884149]  krealloc_more_oob+0x18/0x24
[   74.884860]  kunit_try_run_case+0x80/0x184
[   74.885632]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.886459]  kthread+0x16c/0x21c
[   74.887047]  ret_from_fork+0x10/0x20
[   74.887641] 
[   74.887938] The buggy address belongs to the object at ffff0000c56f1400
[   74.887938]  which belongs to the cache kmalloc-256 of size 256
[   74.889612] The buggy address is located 240 bytes inside of
[   74.889612]  256-byte region [ffff0000c56f1400, ffff0000c56f1500)
[   74.891430] 
[   74.891873] The buggy address belongs to the physical page:
[   74.892463] page:00000000b1c7ebef refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f0
[   74.893715] head:00000000b1c7ebef order:1 compound_mapcount:0 compound_pincount:0
[   74.894835] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   74.895839] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   74.897232] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.897717] page dumped because: kasan: bad access detected
[   74.898203] 
[   74.898451] Memory state around the buggy address:
[   74.898969]  ffff0000c56f1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.899618]  ffff0000c56f1400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.900223] >ffff0000c56f1480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   74.901076]                                                              ^
[   74.901662]  ffff0000c56f1500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.902284]  ffff0000c56f1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.902869] ==================================================================
[   75.069551] ==================================================================
[   75.070411] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x12c/0x2a4
[   75.071144] Write of size 1 at addr ffff0000c5a260eb by task kunit_try_catch/131
[   75.071791] 
[   75.071995] CPU: 1 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.072683] Hardware name: linux,dummy-virt (DT)
[   75.073232] Call trace:
[   75.073517]  dump_backtrace+0xf8/0x118
[   75.074407]  show_stack+0x18/0x24
[   75.074853]  __dump_stack+0x28/0x38
[   75.075285]  dump_stack_lvl+0x54/0x6c
[   75.075703]  print_address_description+0x7c/0x1ec
[   75.076251]  print_report+0x50/0x68
[   75.077156]  kasan_report+0xac/0x100
[   75.077648]  __asan_store1+0x6c/0x70
[   75.078110]  krealloc_more_oob_helper+0x12c/0x2a4
[   75.078636]  krealloc_pagealloc_more_oob+0x18/0x24
[   75.079159]  kunit_try_run_case+0x80/0x184
[   75.079632]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.080218]  kthread+0x16c/0x21c
[   75.080777]  ret_from_fork+0x10/0x20
[   75.081205] 
[   75.081399] The buggy address belongs to the physical page:
[   75.081882] page:0000000021e95fe4 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a24
[   75.082648] head:0000000021e95fe4 order:2 compound_mapcount:0 compound_pincount:0
[   75.083264] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   75.083953] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   75.084632] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   75.085251] page dumped because: kasan: bad access detected
[   75.085712] 
[   75.085919] Memory state around the buggy address:
[   75.086392]  ffff0000c5a25f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   75.087179]  ffff0000c5a26000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   75.087808] >ffff0000c5a26080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   75.088401]                                                           ^
[   75.089038]  ffff0000c5a26100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   75.089803]  ffff0000c5a26180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   75.090384] ==================================================================
[   75.091254] ==================================================================
[   75.091799] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x17c/0x2a4
[   75.092527] Write of size 1 at addr ffff0000c5a260f0 by task kunit_try_catch/131
[   75.093597] 
[   75.093841] CPU: 1 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.094546] Hardware name: linux,dummy-virt (DT)
[   75.094986] Call trace:
[   75.095254]  dump_backtrace+0xf8/0x118
[   75.095707]  show_stack+0x18/0x24
[   75.096135]  __dump_stack+0x28/0x38
[   75.096585]  dump_stack_lvl+0x54/0x6c
[   75.097047]  print_address_description+0x7c/0x1ec
[   75.097569]  print_report+0x50/0x68
[   75.098046]  kasan_report+0xac/0x100
[   75.098519]  __asan_store1+0x6c/0x70
[   75.099185]  krealloc_more_oob_helper+0x17c/0x2a4
[   75.099701]  krealloc_pagealloc_more_oob+0x18/0x24
[   75.100211]  kunit_try_run_case+0x80/0x184
[   75.100842]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.101419]  kthread+0x16c/0x21c
[   75.101844]  ret_from_fork+0x10/0x20
[   75.102247] 
[   75.102461] The buggy address belongs to the physical page:
[   75.102937] page:0000000021e95fe4 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a24
[   75.103661] head:0000000021e95fe4 order:2 compound_mapcount:0 compound_pincount:0
[   75.104307] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   75.105179] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   75.105877] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   75.106505] page dumped because: kasan: bad access detected
[   75.106986] 
[   75.107167] Memory state around the buggy address:
[   75.107606]  ffff0000c5a25f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   75.108243]  ffff0000c5a26000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   75.109110] >ffff0000c5a26080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   75.109717]                                                              ^
[   75.110246]  ffff0000c5a26100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   75.110895]  ffff0000c5a26180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   75.111514] ==================================================================

[   73.879183] ==================================================================
[   73.880287] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x17c/0x2a4
[   73.881008] Write of size 1 at addr ffff0000c4b2b8f0 by task kunit_try_catch/129
[   73.881599] 
[   73.881834] CPU: 1 PID: 129 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   73.882613] Hardware name: linux,dummy-virt (DT)
[   73.883032] Call trace:
[   73.883329]  dump_backtrace+0xf4/0x114
[   73.884160]  show_stack+0x18/0x24
[   73.884601]  __dump_stack+0x28/0x38
[   73.885021]  dump_stack_lvl+0x50/0x68
[   73.885451]  print_address_description+0x7c/0x1ec
[   73.886006]  print_report+0x50/0x68
[   73.886446]  kasan_report+0xac/0xfc
[   73.886890]  __asan_store1+0x6c/0x70
[   73.887332]  krealloc_more_oob_helper+0x17c/0x2a4
[   73.888336]  krealloc_more_oob+0x18/0x24
[   73.888841]  kunit_try_run_case+0x80/0x184
[   73.889376]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   73.889966]  kthread+0x16c/0x21c
[   73.890383]  ret_from_fork+0x10/0x20
[   73.890835] 
[   73.891068] Allocated by task 129:
[   73.891432]  kasan_set_track+0x4c/0x80
[   73.891863]  kasan_save_alloc_info+0x28/0x34
[   73.892420]  __kasan_krealloc+0xcc/0xf8
[   73.892906]  krealloc+0x14c/0x26c
[   73.893328]  krealloc_more_oob_helper+0x9c/0x2a4
[   73.894065]  krealloc_more_oob+0x18/0x24
[   73.894475]  kunit_try_run_case+0x80/0x184
[   73.894990]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   73.895613]  kthread+0x16c/0x21c
[   73.897729]  ret_from_fork+0x10/0x20
[   73.898313] 
[   73.898501] The buggy address belongs to the object at ffff0000c4b2b800
[   73.898501]  which belongs to the cache kmalloc-256 of size 256
[   73.899713] The buggy address is located 240 bytes inside of
[   73.899713]  256-byte region [ffff0000c4b2b800, ffff0000c4b2b900)
[   73.901310] 
[   73.901558] The buggy address belongs to the physical page:
[   73.902041] page:00000000c9970dfc refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104b2a
[   73.903198] head:00000000c9970dfc order:1 compound_mapcount:0 compound_pincount:0
[   73.904089] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   73.905290] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   73.905969] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   73.906533] page dumped because: kasan: bad access detected
[   73.907035] 
[   73.907238] Memory state around the buggy address:
[   73.907655]  ffff0000c4b2b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.908306]  ffff0000c4b2b800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   73.909224] >ffff0000c4b2b880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   73.909865]                                                              ^
[   73.910450]  ffff0000c4b2b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.911059]  ffff0000c4b2b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.911664] ==================================================================
[   73.849006] ==================================================================
[   73.849892] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x12c/0x2a4
[   73.850594] Write of size 1 at addr ffff0000c4b2b8eb by task kunit_try_catch/129
[   73.851194] 
[   73.851419] CPU: 1 PID: 129 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   73.852321] Hardware name: linux,dummy-virt (DT)
[   73.852843] Call trace:
[   73.853089]  dump_backtrace+0xf4/0x114
[   73.853653]  show_stack+0x18/0x24
[   73.854155]  __dump_stack+0x28/0x38
[   73.854607]  dump_stack_lvl+0x50/0x68
[   73.855057]  print_address_description+0x7c/0x1ec
[   73.855636]  print_report+0x50/0x68
[   73.856196]  kasan_report+0xac/0xfc
[   73.856665]  __asan_store1+0x6c/0x70
[   73.857142]  krealloc_more_oob_helper+0x12c/0x2a4
[   73.857664]  krealloc_more_oob+0x18/0x24
[   73.858153]  kunit_try_run_case+0x80/0x184
[   73.858627]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   73.859226]  kthread+0x16c/0x21c
[   73.859659]  ret_from_fork+0x10/0x20
[   73.860329] 
[   73.860530] Allocated by task 129:
[   73.860884]  kasan_set_track+0x4c/0x80
[   73.861352]  kasan_save_alloc_info+0x28/0x34
[   73.861809]  __kasan_krealloc+0xcc/0xf8
[   73.862300]  krealloc+0x14c/0x26c
[   73.862691]  krealloc_more_oob_helper+0x9c/0x2a4
[   73.863233]  krealloc_more_oob+0x18/0x24
[   73.863846]  kunit_try_run_case+0x80/0x184
[   73.864319]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   73.864890]  kthread+0x16c/0x21c
[   73.865301]  ret_from_fork+0x10/0x20
[   73.866100] 
[   73.866320] The buggy address belongs to the object at ffff0000c4b2b800
[   73.866320]  which belongs to the cache kmalloc-256 of size 256
[   73.867278] The buggy address is located 235 bytes inside of
[   73.867278]  256-byte region [ffff0000c4b2b800, ffff0000c4b2b900)
[   73.868438] 
[   73.868675] The buggy address belongs to the physical page:
[   73.869147] page:00000000c9970dfc refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104b2a
[   73.869966] head:00000000c9970dfc order:1 compound_mapcount:0 compound_pincount:0
[   73.870590] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   73.871315] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   73.872550] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   73.873182] page dumped because: kasan: bad access detected
[   73.873669] 
[   73.873870] Memory state around the buggy address:
[   73.874331]  ffff0000c4b2b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.874996]  ffff0000c4b2b800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   73.875608] >ffff0000c4b2b880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   73.876203]                                                           ^
[   73.877051]  ffff0000c4b2b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.877653]  ffff0000c4b2b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.878249] ==================================================================
[   74.109619] ==================================================================
[   74.110188] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x17c/0x2a4
[   74.110899] Write of size 1 at addr ffff0000c58ca0f0 by task kunit_try_catch/131
[   74.111506] 
[   74.111765] CPU: 1 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.112502] Hardware name: linux,dummy-virt (DT)
[   74.112965] Call trace:
[   74.113244]  dump_backtrace+0xf4/0x114
[   74.113746]  show_stack+0x18/0x24
[   74.114175]  __dump_stack+0x28/0x38
[   74.114595]  dump_stack_lvl+0x50/0x68
[   74.115058]  print_address_description+0x7c/0x1ec
[   74.115578]  print_report+0x50/0x68
[   74.116188]  kasan_report+0xac/0xfc
[   74.116630]  __asan_store1+0x6c/0x70
[   74.117081]  krealloc_more_oob_helper+0x17c/0x2a4
[   74.117588]  krealloc_pagealloc_more_oob+0x18/0x24
[   74.118456]  kunit_try_run_case+0x80/0x184
[   74.118984]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.119553]  kthread+0x16c/0x21c
[   74.119984]  ret_from_fork+0x10/0x20
[   74.120405] 
[   74.120592] The buggy address belongs to the physical page:
[   74.121096] page:000000000dfb6053 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c8
[   74.121888] head:000000000dfb6053 order:2 compound_mapcount:0 compound_pincount:0
[   74.122514] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   74.123227] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   74.124442] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   74.125096] page dumped because: kasan: bad access detected
[   74.125609] 
[   74.125833] Memory state around the buggy address:
[   74.126312]  ffff0000c58c9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.126942]  ffff0000c58ca000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.127580] >ffff0000c58ca080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   74.128173]                                                              ^
[   74.128770]  ffff0000c58ca100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   74.129452]  ffff0000c58ca180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   74.130070] ==================================================================
[   74.086636] ==================================================================
[   74.087508] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x12c/0x2a4
[   74.088638] Write of size 1 at addr ffff0000c58ca0eb by task kunit_try_catch/131
[   74.089260] 
[   74.089517] CPU: 1 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.090278] Hardware name: linux,dummy-virt (DT)
[   74.090680] Call trace:
[   74.090973]  dump_backtrace+0xf4/0x114
[   74.091437]  show_stack+0x18/0x24
[   74.092425]  __dump_stack+0x28/0x38
[   74.093007]  dump_stack_lvl+0x50/0x68
[   74.093448]  print_address_description+0x7c/0x1ec
[   74.093948]  print_report+0x50/0x68
[   74.094445]  kasan_report+0xac/0xfc
[   74.094974]  __asan_store1+0x6c/0x70
[   74.095443]  krealloc_more_oob_helper+0x12c/0x2a4
[   74.095959]  krealloc_pagealloc_more_oob+0x18/0x24
[   74.096498]  kunit_try_run_case+0x80/0x184
[   74.096965]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.097527]  kthread+0x16c/0x21c
[   74.097959]  ret_from_fork+0x10/0x20
[   74.098368] 
[   74.098556] The buggy address belongs to the physical page:
[   74.099032] page:000000000dfb6053 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c8
[   74.099794] head:000000000dfb6053 order:2 compound_mapcount:0 compound_pincount:0
[   74.100414] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   74.101155] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   74.101848] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   74.102464] page dumped because: kasan: bad access detected
[   74.103489] 
[   74.103713] Memory state around the buggy address:
[   74.104159]  ffff0000c58c9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.104819]  ffff0000c58ca000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.105460] >ffff0000c58ca080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   74.106065]                                                           ^
[   74.106624]  ffff0000c58ca100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   74.107248]  ffff0000c58ca180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   74.108370] ==================================================================

[   72.489703] ==================================================================
[   72.490576] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x160/0x370
[   72.491816] Write of size 1 at addr ffff0000c3c44ef0 by task kunit_try_catch/129
[   72.492718] 
[   72.492913] CPU: 0 PID: 129 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   72.493460] Hardware name: linux,dummy-virt (DT)
[   72.493855] Call trace:
[   72.494432]  dump_backtrace.part.0+0xdc/0xf0
[   72.495181]  show_stack+0x18/0x30
[   72.495813]  dump_stack_lvl+0x64/0x80
[   72.496388]  print_report+0x158/0x438
[   72.496988]  kasan_report+0xb4/0xf4
[   72.497545]  __asan_store1+0x68/0x7c
[   72.498177]  krealloc_more_oob_helper+0x160/0x370
[   72.498975]  krealloc_more_oob+0x18/0x2c
[   72.499623]  kunit_try_run_case+0x84/0x120
[   72.500247]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.501023]  kthread+0x180/0x190
[   72.501553]  ret_from_fork+0x10/0x20
[   72.502207] 
[   72.502522] Allocated by task 129:
[   72.502995]  kasan_save_stack+0x3c/0x70
[   72.503592]  kasan_set_track+0x2c/0x40
[   72.504161]  kasan_save_alloc_info+0x24/0x34
[   72.504637]  __kasan_krealloc+0xf0/0x120
[   72.504985]  krealloc+0x154/0x1a0
[   72.505316]  krealloc_more_oob_helper+0xd0/0x370
[   72.505816]  krealloc_more_oob+0x18/0x2c
[   72.506325]  kunit_try_run_case+0x84/0x120
[   72.507053]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.507935]  kthread+0x180/0x190
[   72.508500]  ret_from_fork+0x10/0x20
[   72.509055] 
[   72.509337] The buggy address belongs to the object at ffff0000c3c44e00
[   72.509337]  which belongs to the cache kmalloc-256 of size 256
[   72.510988] The buggy address is located 240 bytes inside of
[   72.510988]  256-byte region [ffff0000c3c44e00, ffff0000c3c44f00)
[   72.511963] 
[   72.512141] The buggy address belongs to the physical page:
[   72.512623] page:000000003b9e76ea refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103c44
[   72.513707] head:000000003b9e76ea order:1 compound_mapcount:0 compound_pincount:0
[   72.514747] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   72.515723] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   72.516669] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   72.517561] page dumped because: kasan: bad access detected
[   72.518035] 
[   72.518201] Memory state around the buggy address:
[   72.518548]  ffff0000c3c44d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.519293]  ffff0000c3c44e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.520075] >ffff0000c3c44e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   72.520750]                                                              ^
[   72.521183]  ffff0000c3c44f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.521655]  ffff0000c3c44f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.522685] ==================================================================
[   72.448326] ==================================================================
[   72.449087] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x134/0x370
[   72.449694] Write of size 1 at addr ffff0000c3c44eeb by task kunit_try_catch/129
[   72.451222] 
[   72.451679] CPU: 0 PID: 129 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   72.452947] Hardware name: linux,dummy-virt (DT)
[   72.453727] Call trace:
[   72.454387]  dump_backtrace.part.0+0xdc/0xf0
[   72.455318]  show_stack+0x18/0x30
[   72.455994]  dump_stack_lvl+0x64/0x80
[   72.456735]  print_report+0x158/0x438
[   72.457515]  kasan_report+0xb4/0xf4
[   72.458274]  __asan_store1+0x68/0x7c
[   72.459009]  krealloc_more_oob_helper+0x134/0x370
[   72.459907]  krealloc_more_oob+0x18/0x2c
[   72.460701]  kunit_try_run_case+0x84/0x120
[   72.461497]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.462671]  kthread+0x180/0x190
[   72.463303]  ret_from_fork+0x10/0x20
[   72.463856] 
[   72.464035] Allocated by task 129:
[   72.464305]  kasan_save_stack+0x3c/0x70
[   72.465222]  kasan_set_track+0x2c/0x40
[   72.465951]  kasan_save_alloc_info+0x24/0x34
[   72.466864]  __kasan_krealloc+0xf0/0x120
[   72.467635]  krealloc+0x154/0x1a0
[   72.468365]  krealloc_more_oob_helper+0xd0/0x370
[   72.469318]  krealloc_more_oob+0x18/0x2c
[   72.470355]  kunit_try_run_case+0x84/0x120
[   72.471675]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.472920]  kthread+0x180/0x190
[   72.474869]  ret_from_fork+0x10/0x20
[   72.475253] 
[   72.475441] The buggy address belongs to the object at ffff0000c3c44e00
[   72.475441]  which belongs to the cache kmalloc-256 of size 256
[   72.476322] The buggy address is located 235 bytes inside of
[   72.476322]  256-byte region [ffff0000c3c44e00, ffff0000c3c44f00)
[   72.477123] 
[   72.477312] The buggy address belongs to the physical page:
[   72.478576] page:000000003b9e76ea refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103c44
[   72.479550] head:000000003b9e76ea order:1 compound_mapcount:0 compound_pincount:0
[   72.480131] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   72.480879] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   72.481544] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   72.482297] page dumped because: kasan: bad access detected
[   72.482797] 
[   72.482973] Memory state around the buggy address:
[   72.483426]  ffff0000c3c44d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.484072]  ffff0000c3c44e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.484691] >ffff0000c3c44e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   72.485257]                                                           ^
[   72.485809]  ffff0000c3c44f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.486391]  ffff0000c3c44f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.487286] ==================================================================
[   72.718881] ==================================================================
[   72.719511] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x160/0x370
[   72.720335] Write of size 1 at addr ffff0000c5a320f0 by task kunit_try_catch/131
[   72.720948] 
[   72.721191] CPU: 1 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   72.721974] Hardware name: linux,dummy-virt (DT)
[   72.722476] Call trace:
[   72.722775]  dump_backtrace.part.0+0xdc/0xf0
[   72.723314]  show_stack+0x18/0x30
[   72.723809]  dump_stack_lvl+0x64/0x80
[   72.724253]  print_report+0x158/0x438
[   72.724791]  kasan_report+0xb4/0xf4
[   72.725219]  __asan_store1+0x68/0x7c
[   72.725623]  krealloc_more_oob_helper+0x160/0x370
[   72.726152]  krealloc_pagealloc_more_oob+0x18/0x24
[   72.726694]  kunit_try_run_case+0x84/0x120
[   72.727175]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.727750]  kthread+0x180/0x190
[   72.728141]  ret_from_fork+0x10/0x20
[   72.728550] 
[   72.728757] The buggy address belongs to the physical page:
[   72.729234] page:00000000a668a8fd refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a30
[   72.730350] head:00000000a668a8fd order:2 compound_mapcount:0 compound_pincount:0
[   72.730841] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   72.731356] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   72.732441] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   72.733155] page dumped because: kasan: bad access detected
[   72.733532] 
[   72.733699] Memory state around the buggy address:
[   72.734544]  ffff0000c5a31f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.736115]  ffff0000c5a32000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.737146] >ffff0000c5a32080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   72.737608]                                                              ^
[   72.738664]  ffff0000c5a32100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   72.739499]  ffff0000c5a32180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   72.740286] ==================================================================
[   72.698851] ==================================================================
[   72.699728] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x134/0x370
[   72.700419] Write of size 1 at addr ffff0000c5a320eb by task kunit_try_catch/131
[   72.701074] 
[   72.701324] CPU: 1 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   72.702104] Hardware name: linux,dummy-virt (DT)
[   72.702585] Call trace:
[   72.702826]  dump_backtrace.part.0+0xdc/0xf0
[   72.703410]  show_stack+0x18/0x30
[   72.703907]  dump_stack_lvl+0x64/0x80
[   72.704361]  print_report+0x158/0x438
[   72.704836]  kasan_report+0xb4/0xf4
[   72.705227]  __asan_store1+0x68/0x7c
[   72.705675]  krealloc_more_oob_helper+0x134/0x370
[   72.706277]  krealloc_pagealloc_more_oob+0x18/0x24
[   72.706916]  kunit_try_run_case+0x84/0x120
[   72.707376]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.707965]  kthread+0x180/0x190
[   72.708372]  ret_from_fork+0x10/0x20
[   72.708813] 
[   72.709056] The buggy address belongs to the physical page:
[   72.709571] page:00000000a668a8fd refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a30
[   72.710321] head:00000000a668a8fd order:2 compound_mapcount:0 compound_pincount:0
[   72.710955] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   72.711639] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   72.712301] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   72.712916] page dumped because: kasan: bad access detected
[   72.713402] 
[   72.713597] Memory state around the buggy address:
[   72.714101]  ffff0000c5a31f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.714763]  ffff0000c5a32000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.715346] >ffff0000c5a32080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   72.716009]                                                           ^
[   72.716588]  ffff0000c5a32100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   72.717269]  ffff0000c5a32180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   72.717889] ==================================================================

[   64.358189] ==================================================================
[   64.358711] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x178/0x388
[   64.359466] Write of size 1 at addr ffff0000c595e0f0 by task kunit_try_catch/129
[   64.360151] 
[   64.360422] CPU: 0 PID: 129 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   64.361147] Hardware name: linux,dummy-virt (DT)
[   64.361719] Call trace:
[   64.362110]  dump_backtrace+0x110/0x120
[   64.362644]  show_stack+0x18/0x28
[   64.363131]  dump_stack_lvl+0x68/0x84
[   64.363519]  print_report+0x158/0x484
[   64.363921]  kasan_report+0x98/0xe0
[   64.364281]  __asan_store1+0x68/0x78
[   64.364655]  krealloc_more_oob_helper+0x178/0x388
[   64.365096]  krealloc_pagealloc_more_oob+0x18/0x28
[   64.365648]  kunit_try_run_case+0x7c/0x120
[   64.366046]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   64.366711]  kthread+0x1a4/0x1b8
[   64.367033]  ret_from_fork+0x10/0x20
[   64.367411] 
[   64.367626] The buggy address belongs to the physical page:
[   64.368150] page:000000002033b139 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595c
[   64.368828] head:000000002033b139 order:2 compound_mapcount:0 compound_pincount:0
[   64.369528] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   64.370323] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   64.371044] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   64.371581] page dumped because: kasan: bad access detected
[   64.372057] 
[   64.372279] Memory state around the buggy address:
[   64.372684]  ffff0000c595df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   64.373220]  ffff0000c595e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   64.373830] >ffff0000c595e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   64.374421]                                                              ^
[   64.374978]  ffff0000c595e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   64.375508]  ffff0000c595e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   64.375992] ==================================================================
[   64.173810] ==================================================================
[   64.174310] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x178/0x388
[   64.174981] Write of size 1 at addr ffff0000c55e46f0 by task kunit_try_catch/127
[   64.175503] 
[   64.175698] CPU: 1 PID: 127 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   64.176386] Hardware name: linux,dummy-virt (DT)
[   64.176744] Call trace:
[   64.176975]  dump_backtrace+0x110/0x120
[   64.177433]  show_stack+0x18/0x28
[   64.177820]  dump_stack_lvl+0x68/0x84
[   64.178216]  print_report+0x158/0x484
[   64.178597]  kasan_report+0x98/0xe0
[   64.178955]  __asan_store1+0x68/0x78
[   64.179577]  krealloc_more_oob_helper+0x178/0x388
[   64.180067]  krealloc_more_oob+0x18/0x28
[   64.180493]  kunit_try_run_case+0x7c/0x120
[   64.180919]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   64.181589]  kthread+0x1a4/0x1b8
[   64.181933]  ret_from_fork+0x10/0x20
[   64.182330] 
[   64.182519] Allocated by task 127:
[   64.182822]  kasan_save_stack+0x2c/0x58
[   64.183200]  kasan_set_track+0x2c/0x40
[   64.183576]  kasan_save_alloc_info+0x24/0x38
[   64.184001]  __kasan_krealloc+0xec/0x120
[   64.184391]  krealloc+0x13c/0x178
[   64.184735]  krealloc_more_oob_helper+0xdc/0x388
[   64.185180]  krealloc_more_oob+0x18/0x28
[   64.185824]  kunit_try_run_case+0x7c/0x120
[   64.186243]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   64.186775]  kthread+0x1a4/0x1b8
[   64.187115]  ret_from_fork+0x10/0x20
[   64.187506] 
[   64.187685] The buggy address belongs to the object at ffff0000c55e4600
[   64.187685]  which belongs to the cache kmalloc-256 of size 256
[   64.188511] The buggy address is located 240 bytes inside of
[   64.188511]  256-byte region [ffff0000c55e4600, ffff0000c55e4700)
[   64.189362] 
[   64.189691] The buggy address belongs to the physical page:
[   64.190140] page:000000007e8e1d6e refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055e4
[   64.190873] head:000000007e8e1d6e order:1 compound_mapcount:0 compound_pincount:0
[   64.191440] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   64.192064] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   64.192685] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   64.193283] page dumped because: kasan: bad access detected
[   64.193763] 
[   64.193961] Memory state around the buggy address:
[   64.194325]  ffff0000c55e4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.194872]  ffff0000c55e4600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   64.195640] >ffff0000c55e4680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   64.196143]                                                              ^
[   64.196644]  ffff0000c55e4700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.197192]  ffff0000c55e4780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.198360] ==================================================================
[   64.147159] ==================================================================
[   64.147990] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x144/0x388
[   64.148674] Write of size 1 at addr ffff0000c55e46eb by task kunit_try_catch/127
[   64.149207] 
[   64.149464] CPU: 1 PID: 127 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   64.150106] Hardware name: linux,dummy-virt (DT)
[   64.150661] Call trace:
[   64.150933]  dump_backtrace+0x110/0x120
[   64.151397]  show_stack+0x18/0x28
[   64.151813]  dump_stack_lvl+0x68/0x84
[   64.152253]  print_report+0x158/0x484
[   64.152642]  kasan_report+0x98/0xe0
[   64.153021]  __asan_store1+0x68/0x78
[   64.153421]  krealloc_more_oob_helper+0x144/0x388
[   64.153949]  krealloc_more_oob+0x18/0x28
[   64.154529]  kunit_try_run_case+0x7c/0x120
[   64.154995]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   64.155544]  kthread+0x1a4/0x1b8
[   64.155920]  ret_from_fork+0x10/0x20
[   64.156320] 
[   64.156507] Allocated by task 127:
[   64.156831]  kasan_save_stack+0x2c/0x58
[   64.157277]  kasan_set_track+0x2c/0x40
[   64.157798]  kasan_save_alloc_info+0x24/0x38
[   64.158252]  __kasan_krealloc+0xec/0x120
[   64.158653]  krealloc+0x13c/0x178
[   64.158996]  krealloc_more_oob_helper+0xdc/0x388
[   64.159490]  krealloc_more_oob+0x18/0x28
[   64.159894]  kunit_try_run_case+0x7c/0x120
[   64.160343]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   64.160861]  kthread+0x1a4/0x1b8
[   64.161202]  ret_from_fork+0x10/0x20
[   64.161752] 
[   64.161962] The buggy address belongs to the object at ffff0000c55e4600
[   64.161962]  which belongs to the cache kmalloc-256 of size 256
[   64.162875] The buggy address is located 235 bytes inside of
[   64.162875]  256-byte region [ffff0000c55e4600, ffff0000c55e4700)
[   64.163722] 
[   64.163931] The buggy address belongs to the physical page:
[   64.164448] page:000000007e8e1d6e refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055e4
[   64.165186] head:000000007e8e1d6e order:1 compound_mapcount:0 compound_pincount:0
[   64.165960] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   64.166649] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   64.167249] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   64.167827] page dumped because: kasan: bad access detected
[   64.168283] 
[   64.168470] Memory state around the buggy address:
[   64.168851]  ffff0000c55e4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.169639]  ffff0000c55e4600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   64.170196] >ffff0000c55e4680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   64.170707]                                                           ^
[   64.171219]  ffff0000c55e4700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.172208]  ffff0000c55e4780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   64.172748] ==================================================================
[   64.339206] ==================================================================
[   64.340009] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x144/0x388
[   64.340673] Write of size 1 at addr ffff0000c595e0eb by task kunit_try_catch/129
[   64.341168] 
[   64.341403] CPU: 0 PID: 129 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   64.342021] Hardware name: linux,dummy-virt (DT)
[   64.342426] Call trace:
[   64.342687]  dump_backtrace+0x110/0x120
[   64.343139]  show_stack+0x18/0x28
[   64.343568]  dump_stack_lvl+0x68/0x84
[   64.344070]  print_report+0x158/0x484
[   64.344488]  kasan_report+0x98/0xe0
[   64.344847]  __asan_store1+0x68/0x78
[   64.345213]  krealloc_more_oob_helper+0x144/0x388
[   64.345819]  krealloc_pagealloc_more_oob+0x18/0x28
[   64.346307]  kunit_try_run_case+0x7c/0x120
[   64.346796]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   64.347431]  kthread+0x1a4/0x1b8
[   64.347784]  ret_from_fork+0x10/0x20
[   64.348142] 
[   64.348356] The buggy address belongs to the physical page:
[   64.348756] page:000000002033b139 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595c
[   64.349443] head:000000002033b139 order:2 compound_mapcount:0 compound_pincount:0
[   64.349996] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   64.350645] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   64.351438] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   64.352003] page dumped because: kasan: bad access detected
[   64.352437] 
[   64.352627] Memory state around the buggy address:
[   64.353001]  ffff0000c595df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   64.353596]  ffff0000c595e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   64.354162] >ffff0000c595e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   64.354833]                                                           ^
[   64.355349]  ffff0000c595e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   64.355916]  ffff0000c595e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   64.356629] ==================================================================

[   30.465706] ==================================================================
[   30.466052] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x1b8/0x3b0
[   30.466546] Write of size 1 at addr ffff88810090c6f0 by task kunit_try_catch/233
[   30.466920] 
[   30.467041] CPU: 1 PID: 233 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   30.467468] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.467833] Call Trace:
[   30.467994]  <TASK>
[   30.468284]  dump_stack_lvl+0x49/0x62
[   30.468795]  print_report+0x189/0x492
[   30.469023]  ? kasan_complete_mode_report_info+0x3c/0x200
[   30.469464]  ? krealloc_more_oob_helper+0x1b8/0x3b0
[   30.469732]  kasan_report+0x10c/0x190
[   30.469973]  ? krealloc_more_oob_helper+0x1b8/0x3b0
[   30.470267]  __asan_store1+0x65/0x70
[   30.470577]  krealloc_more_oob_helper+0x1b8/0x3b0
[   30.470866]  ? krealloc_less_oob+0x20/0x20
[   30.471076]  ? __kunit_add_resource+0xd1/0x100
[   30.471396]  ? preempt_count_sub+0x4c/0x70
[   30.471626]  ? _raw_spin_unlock_irqrestore+0x2d/0x60
[   30.471878]  ? __kunit_add_resource+0xd1/0x100
[   30.472150]  krealloc_more_oob+0x18/0x20
[   30.472367]  kunit_try_run_case+0x8f/0xd0
[   30.472602]  ? kunit_catch_run_case+0x80/0x80
[   30.472832]  ? kunit_try_catch_throw+0x40/0x40
[   30.473061]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   30.473742]  kthread+0x17b/0x1b0
[   30.473971]  ? kthread_complete_and_exit+0x30/0x30
[   30.474264]  ret_from_fork+0x22/0x30
[   30.474599]  </TASK>
[   30.474753] 
[   30.474847] Allocated by task 233:
[   30.475043]  kasan_save_stack+0x41/0x70
[   30.475305]  kasan_set_track+0x25/0x40
[   30.475620]  kasan_save_alloc_info+0x1e/0x30
[   30.475866]  __kasan_krealloc+0x12e/0x180
[   30.476110]  krealloc+0xae/0x140
[   30.476604]  krealloc_more_oob_helper+0xe5/0x3b0
[   30.476878]  krealloc_more_oob+0x18/0x20
[   30.477112]  kunit_try_run_case+0x8f/0xd0
[   30.477369]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   30.477751]  kthread+0x17b/0x1b0
[   30.477945]  ret_from_fork+0x22/0x30
[   30.478181] 
[   30.478273] The buggy address belongs to the object at ffff88810090c600
[   30.478273]  which belongs to the cache kmalloc-256 of size 256
[   30.478920] The buggy address is located 240 bytes inside of
[   30.478920]  256-byte region [ffff88810090c600, ffff88810090c700)
[   30.479557] 
[   30.479677] The buggy address belongs to the physical page:
[   30.479957] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10090c
[   30.480669] head:(____ptrval____) order:1 compound_mapcount:0 compound_pincount:0
[   30.481016] flags: 0x200000000010200(slab|head|node=0|zone=2)
[   30.481371] raw: 0200000000010200 0000000000000000 dead000000000122 ffff888100041b40
[   30.481824] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   30.482157] page dumped because: kasan: bad access detected
[   30.482561] 
[   30.482683] Memory state around the buggy address:
[   30.482918]  ffff88810090c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.483247]  ffff88810090c600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.483703] >ffff88810090c680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   30.484026]                                                              ^
[   30.484630]  ffff88810090c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.484957]  ffff88810090c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.485309] ==================================================================
[   30.592504] ==================================================================
[   30.593656] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x17d/0x3b0
[   30.595001] Write of size 1 at addr ffff8881036be0eb by task kunit_try_catch/235
[   30.595457] 
[   30.595574] CPU: 0 PID: 235 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   30.595881] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.596206] Call Trace:
[   30.597098]  <TASK>
[   30.597459]  dump_stack_lvl+0x49/0x62
[   30.598059]  print_report+0x189/0x492
[   30.598843]  ? kasan_addr_to_slab+0xd/0xb0
[   30.599392]  ? krealloc_more_oob_helper+0x17d/0x3b0
[   30.600056]  kasan_report+0x10c/0x190
[   30.600570]  ? krealloc_more_oob_helper+0x17d/0x3b0
[   30.601039]  __asan_store1+0x65/0x70
[   30.601397]  krealloc_more_oob_helper+0x17d/0x3b0
[   30.601623]  ? krealloc_less_oob+0x20/0x20
[   30.601812]  ? __kunit_add_resource+0xd1/0x100
[   30.602014]  ? preempt_count_sub+0x4c/0x70
[   30.602404]  ? _raw_spin_unlock_irqrestore+0x2d/0x60
[   30.603157]  ? __kunit_add_resource+0xd1/0x100
[   30.603764]  krealloc_pagealloc_more_oob+0x18/0x20
[   30.604370]  kunit_try_run_case+0x8f/0xd0
[   30.604957]  ? kunit_catch_run_case+0x80/0x80
[   30.605552]  ? kunit_try_catch_throw+0x40/0x40
[   30.606097]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   30.606808]  kthread+0x17b/0x1b0
[   30.607517]  ? kthread_complete_and_exit+0x30/0x30
[   30.608157]  ret_from_fork+0x22/0x30
[   30.608691]  </TASK>
[   30.608810] 
[   30.608901] The buggy address belongs to the physical page:
[   30.609118] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1036bc
[   30.610204] head:(____ptrval____) order:2 compound_mapcount:0 compound_pincount:0
[   30.611189] flags: 0x200000000010000(head|node=0|zone=2)
[   30.611816] raw: 0200000000010000 0000000000000000 dead000000000122 0000000000000000
[   30.612611] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.612901] page dumped because: kasan: bad access detected
[   30.613106] 
[   30.613205] Memory state around the buggy address:
[   30.613665]  ffff8881036bdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.614441]  ffff8881036be000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.615313] >ffff8881036be080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   30.616071]                                                           ^
[   30.616820]  ffff8881036be100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.617511]  ffff8881036be180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.618024] ==================================================================
[   30.618448] ==================================================================
[   30.619190] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x1b8/0x3b0
[   30.620131] Write of size 1 at addr ffff8881036be0f0 by task kunit_try_catch/235
[   30.620975] 
[   30.621127] CPU: 0 PID: 235 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   30.621911] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.622677] Call Trace:
[   30.622806]  <TASK>
[   30.622920]  dump_stack_lvl+0x49/0x62
[   30.623114]  print_report+0x189/0x492
[   30.623311]  ? kasan_addr_to_slab+0xd/0xb0
[   30.623623]  ? krealloc_more_oob_helper+0x1b8/0x3b0
[   30.623885]  kasan_report+0x10c/0x190
[   30.624108]  ? krealloc_more_oob_helper+0x1b8/0x3b0
[   30.624401]  __asan_store1+0x65/0x70
[   30.624839]  krealloc_more_oob_helper+0x1b8/0x3b0
[   30.625134]  ? krealloc_less_oob+0x20/0x20
[   30.625519]  ? __kunit_add_resource+0xd1/0x100
[   30.625791]  ? preempt_count_sub+0x4c/0x70
[   30.626014]  ? _raw_spin_unlock_irqrestore+0x2d/0x60
[   30.626295]  ? __kunit_add_resource+0xd1/0x100
[   30.626514]  krealloc_pagealloc_more_oob+0x18/0x20
[   30.626870]  kunit_try_run_case+0x8f/0xd0
[   30.627118]  ? kunit_catch_run_case+0x80/0x80
[   30.627513]  ? kunit_try_catch_throw+0x40/0x40
[   30.627776]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   30.628085]  kthread+0x17b/0x1b0
[   30.628322]  ? kthread_complete_and_exit+0x30/0x30
[   30.628643]  ret_from_fork+0x22/0x30
[   30.628835]  </TASK>
[   30.629030] 
[   30.629147] The buggy address belongs to the physical page:
[   30.629528] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1036bc
[   30.629948] head:(____ptrval____) order:2 compound_mapcount:0 compound_pincount:0
[   30.630799] flags: 0x200000000010000(head|node=0|zone=2)
[   30.631075] raw: 0200000000010000 0000000000000000 dead000000000122 0000000000000000
[   30.631608] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.632029] page dumped because: kasan: bad access detected
[   30.632310] 
[   30.632514] Memory state around the buggy address:
[   30.632778]  ffff8881036bdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.633102]  ffff8881036be000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.633562] >ffff8881036be080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   30.633877]                                                              ^
[   30.634327]  ffff8881036be100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.634958]  ffff8881036be180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.635357] ==================================================================
[   30.445320] ==================================================================
[   30.445905] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x17d/0x3b0
[   30.446346] Write of size 1 at addr ffff88810090c6eb by task kunit_try_catch/233
[   30.446703] 
[   30.446836] CPU: 1 PID: 233 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   30.447260] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.447768] Call Trace:
[   30.447941]  <TASK>
[   30.448081]  dump_stack_lvl+0x49/0x62
[   30.448655]  print_report+0x189/0x492
[   30.448905]  ? kasan_complete_mode_report_info+0x3c/0x200
[   30.449245]  ? krealloc_more_oob_helper+0x17d/0x3b0
[   30.449553]  kasan_report+0x10c/0x190
[   30.449752]  ? krealloc_more_oob_helper+0x17d/0x3b0
[   30.450051]  __asan_store1+0x65/0x70
[   30.450265]  krealloc_more_oob_helper+0x17d/0x3b0
[   30.450539]  ? krealloc_less_oob+0x20/0x20
[   30.450782]  ? __kunit_add_resource+0xd1/0x100
[   30.451050]  ? preempt_count_sub+0x4c/0x70
[   30.451463]  ? _raw_spin_unlock_irqrestore+0x2d/0x60
[   30.451762]  ? __kunit_add_resource+0xd1/0x100
[   30.451996]  krealloc_more_oob+0x18/0x20
[   30.452261]  kunit_try_run_case+0x8f/0xd0
[   30.452798]  ? kunit_catch_run_case+0x80/0x80
[   30.453075]  ? kunit_try_catch_throw+0x40/0x40
[   30.453374]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   30.453658]  kthread+0x17b/0x1b0
[   30.453864]  ? kthread_complete_and_exit+0x30/0x30
[   30.454149]  ret_from_fork+0x22/0x30
[   30.454375]  </TASK>
[   30.454520] 
[   30.454629] Allocated by task 233:
[   30.454804]  kasan_save_stack+0x41/0x70
[   30.455048]  kasan_set_track+0x25/0x40
[   30.455461]  kasan_save_alloc_info+0x1e/0x30
[   30.455710]  __kasan_krealloc+0x12e/0x180
[   30.455955]  krealloc+0xae/0x140
[   30.456134]  krealloc_more_oob_helper+0xe5/0x3b0
[   30.456687]  krealloc_more_oob+0x18/0x20
[   30.456945]  kunit_try_run_case+0x8f/0xd0
[   30.457203]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   30.457596]  kthread+0x17b/0x1b0
[   30.457806]  ret_from_fork+0x22/0x30
[   30.458025] 
[   30.458131] The buggy address belongs to the object at ffff88810090c600
[   30.458131]  which belongs to the cache kmalloc-256 of size 256
[   30.458745] The buggy address is located 235 bytes inside of
[   30.458745]  256-byte region [ffff88810090c600, ffff88810090c700)
[   30.459412] 
[   30.459524] The buggy address belongs to the physical page:
[   30.459790] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10090c
[   30.460233] head:(____ptrval____) order:1 compound_mapcount:0 compound_pincount:0
[   30.460852] flags: 0x200000000010200(slab|head|node=0|zone=2)
[   30.461188] raw: 0200000000010200 0000000000000000 dead000000000122 ffff888100041b40
[   30.461625] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   30.461978] page dumped because: kasan: bad access detected
[   30.462247] 
[   30.462475] Memory state around the buggy address:
[   30.462722]  ffff88810090c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.463018]  ffff88810090c600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.463504] >ffff88810090c680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   30.463811]                                                           ^
[   30.464111]  ffff88810090c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.464764]  ffff88810090c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.465106] ==================================================================