Hay
Date
June 2, 2025, 2:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[   19.374197] ==================================================================
[   19.374957] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa2c/0xbc8
[   19.376658] Write of size 1 at addr fff00000c44796c9 by task kunit_try_catch/145
[   19.377226] 
[   19.377577] CPU: 0 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   19.377777] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.377836] Hardware name: linux,dummy-virt (DT)
[   19.377911] Call trace:
[   19.377963]  dump_backtrace+0x9c/0x128
[   19.378078]  show_stack+0x20/0x38
[   19.378158]  dump_stack_lvl+0x8c/0xd0
[   19.378269]  print_report+0x118/0x5f0
[   19.378344]  kasan_report+0xdc/0x128
[   19.378399]  __asan_report_store1_noabort+0x20/0x30
[   19.378448]  krealloc_less_oob_helper+0xa2c/0xbc8
[   19.378496]  krealloc_less_oob+0x20/0x38
[   19.378540]  kunit_try_run_case+0x170/0x3f0
[   19.378586]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.378635]  kthread+0x24c/0x2d0
[   19.378677]  ret_from_fork+0x10/0x20
[   19.378724] 
[   19.383813] Allocated by task 145:
[   19.384080]  kasan_save_stack+0x3c/0x68
[   19.384430]  kasan_save_track+0x20/0x40
[   19.385667]  kasan_save_alloc_info+0x40/0x58
[   19.386259]  __kasan_krealloc+0x118/0x178
[   19.386782]  krealloc_noprof+0x10c/0x1a0
[   19.387746]  krealloc_less_oob_helper+0x170/0xbc8
[   19.388119]  krealloc_less_oob+0x20/0x38
[   19.389203]  kunit_try_run_case+0x170/0x3f0
[   19.389739]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.390282]  kthread+0x24c/0x2d0
[   19.390620]  ret_from_fork+0x10/0x20
[   19.390991] 
[   19.391278] The buggy address belongs to the object at fff00000c4479600
[   19.391278]  which belongs to the cache kmalloc-256 of size 256
[   19.392081] The buggy address is located 0 bytes to the right of
[   19.392081]  allocated 201-byte region [fff00000c4479600, fff00000c44796c9)
[   19.393135] 
[   19.393969] The buggy address belongs to the physical page:
[   19.394611] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104478
[   19.395666] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.395942] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.396179] page_type: f5(slab)
[   19.396362] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.396599] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   19.396829] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.397059] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   19.397407] head: 0bfffe0000000001 ffffc1ffc3111e01 ffffffffffffffff 0000000000000000
[   19.398259] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   19.399067] page dumped because: kasan: bad access detected
[   19.400074] 
[   19.400367] Memory state around the buggy address:
[   19.400874]  fff00000c4479580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.402019]  fff00000c4479600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.402794] >fff00000c4479680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.403814]                                               ^
[   19.404451]  fff00000c4479700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.405012]  fff00000c4479780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.405650] ==================================================================
[   19.511096] ==================================================================
[   19.512656] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa3c/0xbc8
[   19.513291] Write of size 1 at addr fff00000c44796eb by task kunit_try_catch/145
[   19.513937] 
[   19.514194] CPU: 0 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   19.514421] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.514489] Hardware name: linux,dummy-virt (DT)
[   19.514575] Call trace:
[   19.514631]  dump_backtrace+0x9c/0x128
[   19.514743]  show_stack+0x20/0x38
[   19.514828]  dump_stack_lvl+0x8c/0xd0
[   19.514919]  print_report+0x118/0x5f0
[   19.515015]  kasan_report+0xdc/0x128
[   19.515311]  __asan_report_store1_noabort+0x20/0x30
[   19.515434]  krealloc_less_oob_helper+0xa3c/0xbc8
[   19.515495]  krealloc_less_oob+0x20/0x38
[   19.515541]  kunit_try_run_case+0x170/0x3f0
[   19.515589]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.515638]  kthread+0x24c/0x2d0
[   19.515680]  ret_from_fork+0x10/0x20
[   19.515727] 
[   19.522821] Allocated by task 145:
[   19.523287]  kasan_save_stack+0x3c/0x68
[   19.523854]  kasan_save_track+0x20/0x40
[   19.524440]  kasan_save_alloc_info+0x40/0x58
[   19.524874]  __kasan_krealloc+0x118/0x178
[   19.525406]  krealloc_noprof+0x10c/0x1a0
[   19.525676]  krealloc_less_oob_helper+0x170/0xbc8
[   19.526269]  krealloc_less_oob+0x20/0x38
[   19.526749]  kunit_try_run_case+0x170/0x3f0
[   19.527498]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.528130]  kthread+0x24c/0x2d0
[   19.528449]  ret_from_fork+0x10/0x20
[   19.528937] 
[   19.529202] The buggy address belongs to the object at fff00000c4479600
[   19.529202]  which belongs to the cache kmalloc-256 of size 256
[   19.530636] The buggy address is located 34 bytes to the right of
[   19.530636]  allocated 201-byte region [fff00000c4479600, fff00000c44796c9)
[   19.531738] 
[   19.531908] The buggy address belongs to the physical page:
[   19.532181] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104478
[   19.533164] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.533662] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.534206] page_type: f5(slab)
[   19.534646] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.535702] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   19.536123] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.536563] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   19.537392] head: 0bfffe0000000001 ffffc1ffc3111e01 ffffffffffffffff 0000000000000000
[   19.538013] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   19.538729] page dumped because: kasan: bad access detected
[   19.539410] 
[   19.539987] Memory state around the buggy address:
[   19.540463]  fff00000c4479580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.541091]  fff00000c4479600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.541736] >fff00000c4479680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.542337]                                                           ^
[   19.542904]  fff00000c4479700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.543596]  fff00000c4479780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.544190] ==================================================================
[   19.441302] ==================================================================
[   19.441734] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa54/0xbc8
[   19.442002] Write of size 1 at addr fff00000c44796da by task kunit_try_catch/145
[   19.442230] 
[   19.442572] CPU: 0 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   19.442860] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.442940] Hardware name: linux,dummy-virt (DT)
[   19.443049] Call trace:
[   19.443101]  dump_backtrace+0x9c/0x128
[   19.443262]  show_stack+0x20/0x38
[   19.443399]  dump_stack_lvl+0x8c/0xd0
[   19.443503]  print_report+0x118/0x5f0
[   19.443604]  kasan_report+0xdc/0x128
[   19.443701]  __asan_report_store1_noabort+0x20/0x30
[   19.443809]  krealloc_less_oob_helper+0xa54/0xbc8
[   19.443903]  krealloc_less_oob+0x20/0x38
[   19.443990]  kunit_try_run_case+0x170/0x3f0
[   19.444539]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.444683]  kthread+0x24c/0x2d0
[   19.444787]  ret_from_fork+0x10/0x20
[   19.444897] 
[   19.452212] Allocated by task 145:
[   19.452746]  kasan_save_stack+0x3c/0x68
[   19.453317]  kasan_save_track+0x20/0x40
[   19.453862]  kasan_save_alloc_info+0x40/0x58
[   19.454372]  __kasan_krealloc+0x118/0x178
[   19.454878]  krealloc_noprof+0x10c/0x1a0
[   19.455502]  krealloc_less_oob_helper+0x170/0xbc8
[   19.456396]  krealloc_less_oob+0x20/0x38
[   19.456715]  kunit_try_run_case+0x170/0x3f0
[   19.457049]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.457745]  kthread+0x24c/0x2d0
[   19.458100]  ret_from_fork+0x10/0x20
[   19.458521] 
[   19.458783] The buggy address belongs to the object at fff00000c4479600
[   19.458783]  which belongs to the cache kmalloc-256 of size 256
[   19.460147] The buggy address is located 17 bytes to the right of
[   19.460147]  allocated 201-byte region [fff00000c4479600, fff00000c44796c9)
[   19.461050] 
[   19.461358] The buggy address belongs to the physical page:
[   19.461895] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104478
[   19.462561] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.463172] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.463842] page_type: f5(slab)
[   19.464709] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.465416] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   19.465988] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.466664] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   19.467557] head: 0bfffe0000000001 ffffc1ffc3111e01 ffffffffffffffff 0000000000000000
[   19.468218] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   19.468773] page dumped because: kasan: bad access detected
[   19.470071] 
[   19.470271] Memory state around the buggy address:
[   19.470545]  fff00000c4479580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.471701]  fff00000c4479600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.472284] >fff00000c4479680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.472881]                                                     ^
[   19.473427]  fff00000c4479700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.474036]  fff00000c4479780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.474603] ==================================================================
[   19.408199] ==================================================================
[   19.408736] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb20/0xbc8
[   19.409356] Write of size 1 at addr fff00000c44796d0 by task kunit_try_catch/145
[   19.409815] 
[   19.410141] CPU: 0 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   19.410320] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.410381] Hardware name: linux,dummy-virt (DT)
[   19.410459] Call trace:
[   19.410518]  dump_backtrace+0x9c/0x128
[   19.410645]  show_stack+0x20/0x38
[   19.410734]  dump_stack_lvl+0x8c/0xd0
[   19.410826]  print_report+0x118/0x5f0
[   19.410921]  kasan_report+0xdc/0x128
[   19.410994]  __asan_report_store1_noabort+0x20/0x30
[   19.411045]  krealloc_less_oob_helper+0xb20/0xbc8
[   19.411139]  krealloc_less_oob+0x20/0x38
[   19.411215]  kunit_try_run_case+0x170/0x3f0
[   19.411322]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.411409]  kthread+0x24c/0x2d0
[   19.411484]  ret_from_fork+0x10/0x20
[   19.411555] 
[   19.416475] Allocated by task 145:
[   19.416933]  kasan_save_stack+0x3c/0x68
[   19.418546]  kasan_save_track+0x20/0x40
[   19.418833]  kasan_save_alloc_info+0x40/0x58
[   19.419117]  __kasan_krealloc+0x118/0x178
[   19.419411]  krealloc_noprof+0x10c/0x1a0
[   19.419696]  krealloc_less_oob_helper+0x170/0xbc8
[   19.420008]  krealloc_less_oob+0x20/0x38
[   19.420377]  kunit_try_run_case+0x170/0x3f0
[   19.420736]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.421257]  kthread+0x24c/0x2d0
[   19.421548]  ret_from_fork+0x10/0x20
[   19.421815] 
[   19.421987] The buggy address belongs to the object at fff00000c4479600
[   19.421987]  which belongs to the cache kmalloc-256 of size 256
[   19.424110] The buggy address is located 7 bytes to the right of
[   19.424110]  allocated 201-byte region [fff00000c4479600, fff00000c44796c9)
[   19.425735] 
[   19.426040] The buggy address belongs to the physical page:
[   19.426669] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104478
[   19.427290] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.427893] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.428879] page_type: f5(slab)
[   19.429146] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.429959] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   19.430639] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.431344] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   19.432816] head: 0bfffe0000000001 ffffc1ffc3111e01 ffffffffffffffff 0000000000000000
[   19.433446] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   19.434012] page dumped because: kasan: bad access detected
[   19.434825] 
[   19.435326] Memory state around the buggy address:
[   19.435626]  fff00000c4479580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.436612]  fff00000c4479600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.437329] >fff00000c4479680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.437978]                                                  ^
[   19.438339]  fff00000c4479700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.439135]  fff00000c4479780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.440219] ==================================================================
[   19.707961] ==================================================================
[   19.708503] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa3c/0xbc8
[   19.709965] Write of size 1 at addr fff00000c6c6e0eb by task kunit_try_catch/149
[   19.710735] 
[   19.711015] CPU: 1 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   19.711261] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.711752] Hardware name: linux,dummy-virt (DT)
[   19.711854] Call trace:
[   19.711914]  dump_backtrace+0x9c/0x128
[   19.711997]  show_stack+0x20/0x38
[   19.712040]  dump_stack_lvl+0x8c/0xd0
[   19.712087]  print_report+0x118/0x5f0
[   19.712164]  kasan_report+0xdc/0x128
[   19.712206]  __asan_report_store1_noabort+0x20/0x30
[   19.712278]  krealloc_less_oob_helper+0xa3c/0xbc8
[   19.712331]  krealloc_large_less_oob+0x20/0x38
[   19.712377]  kunit_try_run_case+0x170/0x3f0
[   19.712423]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.712471]  kthread+0x24c/0x2d0
[   19.712514]  ret_from_fork+0x10/0x20
[   19.712562] 
[   19.717295] The buggy address belongs to the physical page:
[   19.717590] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106c6c
[   19.717971] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.718348] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.719301] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.719687] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.720032] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.720419] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.720902] head: 0bfffe0000000002 ffffc1ffc31b1b01 ffffffffffffffff 0000000000000000
[   19.721583] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   19.722402] page dumped because: kasan: bad access detected
[   19.723038] 
[   19.723859] Memory state around the buggy address:
[   19.724457]  fff00000c6c6df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.724890]  fff00000c6c6e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.725230] >fff00000c6c6e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.726287]                                                           ^
[   19.726882]  fff00000c6c6e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.728399]  fff00000c6c6e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.728972] ==================================================================
[   19.615539] ==================================================================
[   19.616615] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa2c/0xbc8
[   19.617418] Write of size 1 at addr fff00000c6c6e0c9 by task kunit_try_catch/149
[   19.618042] 
[   19.618300] CPU: 1 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   19.618499] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.618562] Hardware name: linux,dummy-virt (DT)
[   19.618643] Call trace:
[   19.618701]  dump_backtrace+0x9c/0x128
[   19.618822]  show_stack+0x20/0x38
[   19.618914]  dump_stack_lvl+0x8c/0xd0
[   19.619017]  print_report+0x118/0x5f0
[   19.619287]  kasan_report+0xdc/0x128
[   19.619397]  __asan_report_store1_noabort+0x20/0x30
[   19.619502]  krealloc_less_oob_helper+0xa2c/0xbc8
[   19.619624]  krealloc_large_less_oob+0x20/0x38
[   19.619723]  kunit_try_run_case+0x170/0x3f0
[   19.619798]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.619850]  kthread+0x24c/0x2d0
[   19.619894]  ret_from_fork+0x10/0x20
[   19.619944] 
[   19.625596] The buggy address belongs to the physical page:
[   19.626103] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106c6c
[   19.626750] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.627679] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.628347] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.628948] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.629634] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.630273] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.630908] head: 0bfffe0000000002 ffffc1ffc31b1b01 ffffffffffffffff 0000000000000000
[   19.631657] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   19.632272] page dumped because: kasan: bad access detected
[   19.632734] 
[   19.632964] Memory state around the buggy address:
[   19.633912]  fff00000c6c6df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.634378]  fff00000c6c6e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.635076] >fff00000c6c6e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.636028]                                               ^
[   19.636399]  fff00000c6c6e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.637036]  fff00000c6c6e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.637546] ==================================================================
[   19.684356] ==================================================================
[   19.684889] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa98/0xbc8
[   19.685468] Write of size 1 at addr fff00000c6c6e0ea by task kunit_try_catch/149
[   19.686179] 
[   19.686514] CPU: 1 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   19.686731] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.686800] Hardware name: linux,dummy-virt (DT)
[   19.686878] Call trace:
[   19.686933]  dump_backtrace+0x9c/0x128
[   19.687048]  show_stack+0x20/0x38
[   19.687136]  dump_stack_lvl+0x8c/0xd0
[   19.687226]  print_report+0x118/0x5f0
[   19.688047]  kasan_report+0xdc/0x128
[   19.688171]  __asan_report_store1_noabort+0x20/0x30
[   19.688300]  krealloc_less_oob_helper+0xa98/0xbc8
[   19.688414]  krealloc_large_less_oob+0x20/0x38
[   19.688512]  kunit_try_run_case+0x170/0x3f0
[   19.688598]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.688650]  kthread+0x24c/0x2d0
[   19.688695]  ret_from_fork+0x10/0x20
[   19.688743] 
[   19.693089] The buggy address belongs to the physical page:
[   19.694313] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106c6c
[   19.695344] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.696132] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.696844] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.697482] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.698055] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.698645] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.699253] head: 0bfffe0000000002 ffffc1ffc31b1b01 ffffffffffffffff 0000000000000000
[   19.700264] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   19.700875] page dumped because: kasan: bad access detected
[   19.701405] 
[   19.701664] Memory state around the buggy address:
[   19.702096]  fff00000c6c6df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.702792]  fff00000c6c6e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.703674] >fff00000c6c6e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.704292]                                                           ^
[   19.704969]  fff00000c6c6e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.705571]  fff00000c6c6e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.706136] ==================================================================
[   19.661608] ==================================================================
[   19.662214] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa54/0xbc8
[   19.662839] Write of size 1 at addr fff00000c6c6e0da by task kunit_try_catch/149
[   19.663660] 
[   19.664003] CPU: 1 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   19.664225] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.664310] Hardware name: linux,dummy-virt (DT)
[   19.664388] Call trace:
[   19.664447]  dump_backtrace+0x9c/0x128
[   19.664559]  show_stack+0x20/0x38
[   19.664649]  dump_stack_lvl+0x8c/0xd0
[   19.664745]  print_report+0x118/0x5f0
[   19.664807]  kasan_report+0xdc/0x128
[   19.664848]  __asan_report_store1_noabort+0x20/0x30
[   19.664896]  krealloc_less_oob_helper+0xa54/0xbc8
[   19.664943]  krealloc_large_less_oob+0x20/0x38
[   19.664989]  kunit_try_run_case+0x170/0x3f0
[   19.665034]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.665083]  kthread+0x24c/0x2d0
[   19.665124]  ret_from_fork+0x10/0x20
[   19.665170] 
[   19.671764] The buggy address belongs to the physical page:
[   19.672284] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106c6c
[   19.672900] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.673577] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.674082] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.674427] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.675400] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.676063] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.676704] head: 0bfffe0000000002 ffffc1ffc31b1b01 ffffffffffffffff 0000000000000000
[   19.677343] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   19.677943] page dumped because: kasan: bad access detected
[   19.678425] 
[   19.678676] Memory state around the buggy address:
[   19.680111]  fff00000c6c6df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.680619]  fff00000c6c6e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.681105] >fff00000c6c6e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.681798]                                                     ^
[   19.682420]  fff00000c6c6e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.683004]  fff00000c6c6e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.683700] ==================================================================
[   19.639122] ==================================================================
[   19.640302] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb20/0xbc8
[   19.640736] Write of size 1 at addr fff00000c6c6e0d0 by task kunit_try_catch/149
[   19.640977] 
[   19.641100] CPU: 1 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   19.641207] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.641260] Hardware name: linux,dummy-virt (DT)
[   19.641308] Call trace:
[   19.641335]  dump_backtrace+0x9c/0x128
[   19.641390]  show_stack+0x20/0x38
[   19.641430]  dump_stack_lvl+0x8c/0xd0
[   19.641476]  print_report+0x118/0x5f0
[   19.641538]  kasan_report+0xdc/0x128
[   19.641579]  __asan_report_store1_noabort+0x20/0x30
[   19.641626]  krealloc_less_oob_helper+0xb20/0xbc8
[   19.641673]  krealloc_large_less_oob+0x20/0x38
[   19.641719]  kunit_try_run_case+0x170/0x3f0
[   19.641764]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.641813]  kthread+0x24c/0x2d0
[   19.641856]  ret_from_fork+0x10/0x20
[   19.641903] 
[   19.647130] The buggy address belongs to the physical page:
[   19.647750] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106c6c
[   19.648586] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.649756] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.650576] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.651533] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.652052] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.652802] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.653348] head: 0bfffe0000000002 ffffc1ffc31b1b01 ffffffffffffffff 0000000000000000
[   19.654039] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   19.654567] page dumped because: kasan: bad access detected
[   19.654988] 
[   19.656187] Memory state around the buggy address:
[   19.656515]  fff00000c6c6df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.657195]  fff00000c6c6e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.657826] >fff00000c6c6e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.658376]                                                  ^
[   19.658878]  fff00000c6c6e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.659504]  fff00000c6c6e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.660106] ==================================================================
[   19.476045] ==================================================================
[   19.477248] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa98/0xbc8
[   19.477848] Write of size 1 at addr fff00000c44796ea by task kunit_try_catch/145
[   19.478269] 
[   19.478544] CPU: 0 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   19.478769] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.478833] Hardware name: linux,dummy-virt (DT)
[   19.478912] Call trace:
[   19.478964]  dump_backtrace+0x9c/0x128
[   19.479074]  show_stack+0x20/0x38
[   19.479160]  dump_stack_lvl+0x8c/0xd0
[   19.479276]  print_report+0x118/0x5f0
[   19.479802]  kasan_report+0xdc/0x128
[   19.479891]  __asan_report_store1_noabort+0x20/0x30
[   19.479942]  krealloc_less_oob_helper+0xa98/0xbc8
[   19.479991]  krealloc_less_oob+0x20/0x38
[   19.480035]  kunit_try_run_case+0x170/0x3f0
[   19.480083]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.480131]  kthread+0x24c/0x2d0
[   19.480174]  ret_from_fork+0x10/0x20
[   19.480222] 
[   19.486253] Allocated by task 145:
[   19.486723]  kasan_save_stack+0x3c/0x68
[   19.487076]  kasan_save_track+0x20/0x40
[   19.488023]  kasan_save_alloc_info+0x40/0x58
[   19.488456]  __kasan_krealloc+0x118/0x178
[   19.488864]  krealloc_noprof+0x10c/0x1a0
[   19.489802]  krealloc_less_oob_helper+0x170/0xbc8
[   19.490215]  krealloc_less_oob+0x20/0x38
[   19.490798]  kunit_try_run_case+0x170/0x3f0
[   19.491533]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.492133]  kthread+0x24c/0x2d0
[   19.492867]  ret_from_fork+0x10/0x20
[   19.493318] 
[   19.493610] The buggy address belongs to the object at fff00000c4479600
[   19.493610]  which belongs to the cache kmalloc-256 of size 256
[   19.494745] The buggy address is located 33 bytes to the right of
[   19.494745]  allocated 201-byte region [fff00000c4479600, fff00000c44796c9)
[   19.496063] 
[   19.496434] The buggy address belongs to the physical page:
[   19.496865] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104478
[   19.497787] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.498384] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.499026] page_type: f5(slab)
[   19.499378] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.500034] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   19.500730] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.501858] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   19.502543] head: 0bfffe0000000001 ffffc1ffc3111e01 ffffffffffffffff 0000000000000000
[   19.504030] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   19.504543] page dumped because: kasan: bad access detected
[   19.505174] 
[   19.505464] Memory state around the buggy address:
[   19.505867]  fff00000c4479580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.506508]  fff00000c4479600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.507089] >fff00000c4479680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.507637]                                                           ^
[   19.508144]  fff00000c4479700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.509092]  fff00000c4479780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.509525] ==================================================================

[   11.643021] ==================================================================
[   11.643632] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd72/0x11d0
[   11.644038] Write of size 1 at addr ffff8881003a14c9 by task kunit_try_catch/163
[   11.644354] 
[   11.645451] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   11.645557] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.645578] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.645612] Call Trace:
[   11.645637]  <TASK>
[   11.645677]  dump_stack_lvl+0x73/0xb0
[   11.645731]  print_report+0xd1/0x640
[   11.645766]  ? __virt_addr_valid+0x1db/0x2d0
[   11.645807]  ? krealloc_less_oob_helper+0xd72/0x11d0
[   11.645839]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.645882]  ? krealloc_less_oob_helper+0xd72/0x11d0
[   11.645932]  kasan_report+0x140/0x180
[   11.645981]  ? krealloc_less_oob_helper+0xd72/0x11d0
[   11.646034]  __asan_report_store1_noabort+0x1b/0x30
[   11.646073]  krealloc_less_oob_helper+0xd72/0x11d0
[   11.646111]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.646145]  ? finish_task_switch.isra.0+0x153/0x700
[   11.646180]  ? __switch_to+0x5d9/0xf60
[   11.646216]  ? __schedule+0xc49/0x27a0
[   11.646250]  ? __pfx_read_tsc+0x10/0x10
[   11.646290]  krealloc_less_oob+0x1c/0x30
[   11.646320]  kunit_try_run_case+0x1a6/0x480
[   11.646361]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.646396]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   11.646433]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.646473]  ? __kthread_parkme+0x82/0x160
[   11.646503]  ? preempt_count_sub+0x50/0x80
[   11.646538]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.646567]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.646603]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.646640]  kthread+0x257/0x310
[   11.647256]  ? __pfx_kthread+0x10/0x10
[   11.647300]  ret_from_fork+0x41/0x80
[   11.647336]  ? __pfx_kthread+0x10/0x10
[   11.647368]  ret_from_fork_asm+0x1a/0x30
[   11.647426]  </TASK>
[   11.647445] 
[   11.661754] Allocated by task 163:
[   11.662225]  kasan_save_stack+0x45/0x70
[   11.662519]  kasan_save_track+0x18/0x40
[   11.662718]  kasan_save_alloc_info+0x3b/0x50
[   11.663026]  __kasan_krealloc+0x190/0x1f0
[   11.663448]  krealloc_noprof+0xc1/0x140
[   11.663708]  krealloc_less_oob_helper+0x1ab/0x11d0
[   11.663993]  krealloc_less_oob+0x1c/0x30
[   11.664348]  kunit_try_run_case+0x1a6/0x480
[   11.664645]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.664917]  kthread+0x257/0x310
[   11.665143]  ret_from_fork+0x41/0x80
[   11.665833]  ret_from_fork_asm+0x1a/0x30
[   11.666173] 
[   11.666366] The buggy address belongs to the object at ffff8881003a1400
[   11.666366]  which belongs to the cache kmalloc-256 of size 256
[   11.667117] The buggy address is located 0 bytes to the right of
[   11.667117]  allocated 201-byte region [ffff8881003a1400, ffff8881003a14c9)
[   11.667764] 
[   11.668113] The buggy address belongs to the physical page:
[   11.668605] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1003a0
[   11.668943] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.669581] flags: 0x200000000000040(head|node=0|zone=2)
[   11.669941] page_type: f5(slab)
[   11.670479] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.671386] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   11.671783] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.672301] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   11.672759] head: 0200000000000001 ffffea000400e801 ffffffffffffffff 0000000000000000
[   11.673432] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   11.673856] page dumped because: kasan: bad access detected
[   11.674415] 
[   11.674525] Memory state around the buggy address:
[   11.674790]  ffff8881003a1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.675056]  ffff8881003a1400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.675589] >ffff8881003a1480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.675899]                                               ^
[   11.676366]  ffff8881003a1500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.676716]  ffff8881003a1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.677650] ==================================================================
[   11.879197] ==================================================================
[   11.879443] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe25/0x11d0
[   11.880008] Write of size 1 at addr ffff88810257e0d0 by task kunit_try_catch/167
[   11.880351] 
[   11.881082] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   11.881297] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.881321] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.881355] Call Trace:
[   11.881380]  <TASK>
[   11.881405]  dump_stack_lvl+0x73/0xb0
[   11.881867]  print_report+0xd1/0x640
[   11.881932]  ? __virt_addr_valid+0x1db/0x2d0
[   11.881975]  ? krealloc_less_oob_helper+0xe25/0x11d0
[   11.882012]  ? kasan_addr_to_slab+0x11/0xa0
[   11.882106]  ? krealloc_less_oob_helper+0xe25/0x11d0
[   11.882143]  kasan_report+0x140/0x180
[   11.882187]  ? krealloc_less_oob_helper+0xe25/0x11d0
[   11.882235]  __asan_report_store1_noabort+0x1b/0x30
[   11.882277]  krealloc_less_oob_helper+0xe25/0x11d0
[   11.882319]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.882480]  ? finish_task_switch.isra.0+0x153/0x700
[   11.882525]  ? __switch_to+0x5d9/0xf60
[   11.882558]  ? __schedule+0xc49/0x27a0
[   11.882578]  ? __pfx_read_tsc+0x10/0x10
[   11.882600]  krealloc_large_less_oob+0x1c/0x30
[   11.882621]  kunit_try_run_case+0x1a6/0x480
[   11.882642]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.882681]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   11.882703]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.882726]  ? __kthread_parkme+0x82/0x160
[   11.882745]  ? preempt_count_sub+0x50/0x80
[   11.882765]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.882783]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.882807]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.882830]  kthread+0x257/0x310
[   11.882847]  ? __pfx_kthread+0x10/0x10
[   11.882865]  ret_from_fork+0x41/0x80
[   11.882883]  ? __pfx_kthread+0x10/0x10
[   11.882900]  ret_from_fork_asm+0x1a/0x30
[   11.882928]  </TASK>
[   11.882940] 
[   11.891785] The buggy address belongs to the physical page:
[   11.892257] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10257c
[   11.892924] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.893345] flags: 0x200000000000040(head|node=0|zone=2)
[   11.893567] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.894088] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   11.894720] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.895167] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   11.895684] head: 0200000000000002 ffffea0004095f01 ffffffffffffffff 0000000000000000
[   11.896015] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   11.896628] page dumped because: kasan: bad access detected
[   11.896965] 
[   11.897237] Memory state around the buggy address:
[   11.897442]  ffff88810257df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.897869]  ffff88810257e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.898609] >ffff88810257e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   11.899165]                                                  ^
[   11.899810]  ffff88810257e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.900165]  ffff88810257e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.900729] ==================================================================
[   11.856298] ==================================================================
[   11.856806] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd72/0x11d0
[   11.857209] Write of size 1 at addr ffff88810257e0c9 by task kunit_try_catch/167
[   11.857648] 
[   11.857784] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   11.858122] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.858158] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.858204] Call Trace:
[   11.858234]  <TASK>
[   11.858280]  dump_stack_lvl+0x73/0xb0
[   11.858338]  print_report+0xd1/0x640
[   11.858375]  ? __virt_addr_valid+0x1db/0x2d0
[   11.858402]  ? krealloc_less_oob_helper+0xd72/0x11d0
[   11.858423]  ? kasan_addr_to_slab+0x11/0xa0
[   11.858444]  ? krealloc_less_oob_helper+0xd72/0x11d0
[   11.858465]  kasan_report+0x140/0x180
[   11.858489]  ? krealloc_less_oob_helper+0xd72/0x11d0
[   11.858514]  __asan_report_store1_noabort+0x1b/0x30
[   11.858536]  krealloc_less_oob_helper+0xd72/0x11d0
[   11.858559]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.858579]  ? finish_task_switch.isra.0+0x153/0x700
[   11.858602]  ? __switch_to+0x5d9/0xf60
[   11.858626]  ? __schedule+0xc49/0x27a0
[   11.858647]  ? __pfx_read_tsc+0x10/0x10
[   11.858701]  krealloc_large_less_oob+0x1c/0x30
[   11.858733]  kunit_try_run_case+0x1a6/0x480
[   11.858774]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.858810]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   11.858848]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.858896]  ? __kthread_parkme+0x82/0x160
[   11.858936]  ? preempt_count_sub+0x50/0x80
[   11.858973]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.859005]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.859042]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.859329]  kthread+0x257/0x310
[   11.859371]  ? __pfx_kthread+0x10/0x10
[   11.859407]  ret_from_fork+0x41/0x80
[   11.859442]  ? __pfx_kthread+0x10/0x10
[   11.859477]  ret_from_fork_asm+0x1a/0x30
[   11.859516]  </TASK>
[   11.859529] 
[   11.869824] The buggy address belongs to the physical page:
[   11.870456] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10257c
[   11.870891] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.871198] flags: 0x200000000000040(head|node=0|zone=2)
[   11.871550] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.872039] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   11.872618] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.873023] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   11.873823] head: 0200000000000002 ffffea0004095f01 ffffffffffffffff 0000000000000000
[   11.874515] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   11.874931] page dumped because: kasan: bad access detected
[   11.875283] 
[   11.875611] Memory state around the buggy address:
[   11.875890]  ffff88810257df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.876164]  ffff88810257e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.876870] >ffff88810257e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   11.877269]                                               ^
[   11.877677]  ffff88810257e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.878052]  ffff88810257e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.878584] ==================================================================
[   11.950364] ==================================================================
[   11.950858] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd49/0x11d0
[   11.951577] Write of size 1 at addr ffff88810257e0eb by task kunit_try_catch/167
[   11.952381] 
[   11.952573] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   11.952677] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.952710] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.952744] Call Trace:
[   11.952768]  <TASK>
[   11.952792]  dump_stack_lvl+0x73/0xb0
[   11.952844]  print_report+0xd1/0x640
[   11.952884]  ? __virt_addr_valid+0x1db/0x2d0
[   11.952928]  ? krealloc_less_oob_helper+0xd49/0x11d0
[   11.952966]  ? kasan_addr_to_slab+0x11/0xa0
[   11.953003]  ? krealloc_less_oob_helper+0xd49/0x11d0
[   11.953040]  kasan_report+0x140/0x180
[   11.953254]  ? krealloc_less_oob_helper+0xd49/0x11d0
[   11.953300]  __asan_report_store1_noabort+0x1b/0x30
[   11.953333]  krealloc_less_oob_helper+0xd49/0x11d0
[   11.953372]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.953409]  ? finish_task_switch.isra.0+0x153/0x700
[   11.953448]  ? __switch_to+0x5d9/0xf60
[   11.953493]  ? __schedule+0xc49/0x27a0
[   11.953535]  ? __pfx_read_tsc+0x10/0x10
[   11.953565]  krealloc_large_less_oob+0x1c/0x30
[   11.953584]  kunit_try_run_case+0x1a6/0x480
[   11.953606]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.953624]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   11.953644]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.953688]  ? __kthread_parkme+0x82/0x160
[   11.953708]  ? preempt_count_sub+0x50/0x80
[   11.953728]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.953747]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.953771]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.953795]  kthread+0x257/0x310
[   11.953812]  ? __pfx_kthread+0x10/0x10
[   11.953829]  ret_from_fork+0x41/0x80
[   11.953848]  ? __pfx_kthread+0x10/0x10
[   11.953865]  ret_from_fork_asm+0x1a/0x30
[   11.953906]  </TASK>
[   11.953921] 
[   11.965759] The buggy address belongs to the physical page:
[   11.966045] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10257c
[   11.966592] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.967123] flags: 0x200000000000040(head|node=0|zone=2)
[   11.967508] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.967901] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   11.968460] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.969067] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   11.969700] head: 0200000000000002 ffffea0004095f01 ffffffffffffffff 0000000000000000
[   11.970167] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   11.970728] page dumped because: kasan: bad access detected
[   11.971000] 
[   11.971321] Memory state around the buggy address:
[   11.971543]  ffff88810257df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.971787]  ffff88810257e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.972399] >ffff88810257e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   11.972885]                                                           ^
[   11.973433]  ffff88810257e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.973894]  ffff88810257e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.974400] ==================================================================
[   11.770817] ==================================================================
[   11.771834] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd49/0x11d0
[   11.772499] Write of size 1 at addr ffff8881003a14eb by task kunit_try_catch/163
[   11.772833] 
[   11.773034] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   11.773227] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.773258] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.773287] Call Trace:
[   11.773305]  <TASK>
[   11.773322]  dump_stack_lvl+0x73/0xb0
[   11.773356]  print_report+0xd1/0x640
[   11.773377]  ? __virt_addr_valid+0x1db/0x2d0
[   11.773399]  ? krealloc_less_oob_helper+0xd49/0x11d0
[   11.773418]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.773439]  ? krealloc_less_oob_helper+0xd49/0x11d0
[   11.773458]  kasan_report+0x140/0x180
[   11.773480]  ? krealloc_less_oob_helper+0xd49/0x11d0
[   11.773503]  __asan_report_store1_noabort+0x1b/0x30
[   11.773523]  krealloc_less_oob_helper+0xd49/0x11d0
[   11.773544]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.773563]  ? finish_task_switch.isra.0+0x153/0x700
[   11.773583]  ? __switch_to+0x5d9/0xf60
[   11.773604]  ? __schedule+0xc49/0x27a0
[   11.773624]  ? __pfx_read_tsc+0x10/0x10
[   11.773645]  krealloc_less_oob+0x1c/0x30
[   11.773687]  kunit_try_run_case+0x1a6/0x480
[   11.773725]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.773757]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   11.773791]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.773833]  ? __kthread_parkme+0x82/0x160
[   11.773871]  ? preempt_count_sub+0x50/0x80
[   11.773921]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.773958]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.773989]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.774016]  kthread+0x257/0x310
[   11.774034]  ? __pfx_kthread+0x10/0x10
[   11.774059]  ret_from_fork+0x41/0x80
[   11.774245]  ? __pfx_kthread+0x10/0x10
[   11.774306]  ret_from_fork_asm+0x1a/0x30
[   11.774372]  </TASK>
[   11.774396] 
[   11.785160] Allocated by task 163:
[   11.785329]  kasan_save_stack+0x45/0x70
[   11.785630]  kasan_save_track+0x18/0x40
[   11.785942]  kasan_save_alloc_info+0x3b/0x50
[   11.786243]  __kasan_krealloc+0x190/0x1f0
[   11.786708]  krealloc_noprof+0xc1/0x140
[   11.786896]  krealloc_less_oob_helper+0x1ab/0x11d0
[   11.787206]  krealloc_less_oob+0x1c/0x30
[   11.787518]  kunit_try_run_case+0x1a6/0x480
[   11.787873]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.788685]  kthread+0x257/0x310
[   11.788976]  ret_from_fork+0x41/0x80
[   11.789411]  ret_from_fork_asm+0x1a/0x30
[   11.789574] 
[   11.789797] The buggy address belongs to the object at ffff8881003a1400
[   11.789797]  which belongs to the cache kmalloc-256 of size 256
[   11.790455] The buggy address is located 34 bytes to the right of
[   11.790455]  allocated 201-byte region [ffff8881003a1400, ffff8881003a14c9)
[   11.791052] 
[   11.791554] The buggy address belongs to the physical page:
[   11.792253] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1003a0
[   11.792573] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.793018] flags: 0x200000000000040(head|node=0|zone=2)
[   11.793718] page_type: f5(slab)
[   11.793874] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.794385] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   11.794970] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.795425] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   11.796273] head: 0200000000000001 ffffea000400e801 ffffffffffffffff 0000000000000000
[   11.796564] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   11.796789] page dumped because: kasan: bad access detected
[   11.797078] 
[   11.797222] Memory state around the buggy address:
[   11.797448]  ffff8881003a1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.797798]  ffff8881003a1400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.798210] >ffff8881003a1480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.798623]                                                           ^
[   11.799021]  ffff8881003a1500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.799264]  ffff8881003a1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.799748] ==================================================================
[   11.709753] ==================================================================
[   11.710422] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec8/0x11d0
[   11.711627] Write of size 1 at addr ffff8881003a14da by task kunit_try_catch/163
[   11.711985] 
[   11.712313] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   11.712399] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.712421] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.712453] Call Trace:
[   11.712481]  <TASK>
[   11.712508]  dump_stack_lvl+0x73/0xb0
[   11.712564]  print_report+0xd1/0x640
[   11.712608]  ? __virt_addr_valid+0x1db/0x2d0
[   11.712654]  ? krealloc_less_oob_helper+0xec8/0x11d0
[   11.712705]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.712738]  ? krealloc_less_oob_helper+0xec8/0x11d0
[   11.712758]  kasan_report+0x140/0x180
[   11.712781]  ? krealloc_less_oob_helper+0xec8/0x11d0
[   11.712805]  __asan_report_store1_noabort+0x1b/0x30
[   11.712825]  krealloc_less_oob_helper+0xec8/0x11d0
[   11.712846]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.712865]  ? finish_task_switch.isra.0+0x153/0x700
[   11.712886]  ? __switch_to+0x5d9/0xf60
[   11.712908]  ? __schedule+0xc49/0x27a0
[   11.712928]  ? __pfx_read_tsc+0x10/0x10
[   11.712948]  krealloc_less_oob+0x1c/0x30
[   11.712966]  kunit_try_run_case+0x1a6/0x480
[   11.712986]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.713004]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   11.713024]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.713046]  ? __kthread_parkme+0x82/0x160
[   11.713065]  ? preempt_count_sub+0x50/0x80
[   11.713085]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.713103]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.713126]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.713189]  kthread+0x257/0x310
[   11.713235]  ? __pfx_kthread+0x10/0x10
[   11.713267]  ret_from_fork+0x41/0x80
[   11.713295]  ? __pfx_kthread+0x10/0x10
[   11.713313]  ret_from_fork_asm+0x1a/0x30
[   11.713342]  </TASK>
[   11.713354] 
[   11.724696] Allocated by task 163:
[   11.724885]  kasan_save_stack+0x45/0x70
[   11.725372]  kasan_save_track+0x18/0x40
[   11.725748]  kasan_save_alloc_info+0x3b/0x50
[   11.725950]  __kasan_krealloc+0x190/0x1f0
[   11.726272]  krealloc_noprof+0xc1/0x140
[   11.726585]  krealloc_less_oob_helper+0x1ab/0x11d0
[   11.726810]  krealloc_less_oob+0x1c/0x30
[   11.727102]  kunit_try_run_case+0x1a6/0x480
[   11.727378]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.727699]  kthread+0x257/0x310
[   11.727958]  ret_from_fork+0x41/0x80
[   11.728193]  ret_from_fork_asm+0x1a/0x30
[   11.728416] 
[   11.728505] The buggy address belongs to the object at ffff8881003a1400
[   11.728505]  which belongs to the cache kmalloc-256 of size 256
[   11.729652] The buggy address is located 17 bytes to the right of
[   11.729652]  allocated 201-byte region [ffff8881003a1400, ffff8881003a14c9)
[   11.730271] 
[   11.730443] The buggy address belongs to the physical page:
[   11.730834] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1003a0
[   11.731460] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.731709] flags: 0x200000000000040(head|node=0|zone=2)
[   11.732207] page_type: f5(slab)
[   11.732466] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.732962] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   11.733825] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.734456] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   11.734870] head: 0200000000000001 ffffea000400e801 ffffffffffffffff 0000000000000000
[   11.735417] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   11.735761] page dumped because: kasan: bad access detected
[   11.736221] 
[   11.736377] Memory state around the buggy address:
[   11.736570]  ffff8881003a1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.737007]  ffff8881003a1400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.737456] >ffff8881003a1480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.737924]                                                     ^
[   11.738250]  ffff8881003a1500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.739244]  ffff8881003a1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.739459] ==================================================================
[   11.901476] ==================================================================
[   11.901994] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec8/0x11d0
[   11.902506] Write of size 1 at addr ffff88810257e0da by task kunit_try_catch/167
[   11.902791] 
[   11.902964] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   11.903043] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.903066] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.903104] Call Trace:
[   11.903129]  <TASK>
[   11.903156]  dump_stack_lvl+0x73/0xb0
[   11.903316]  print_report+0xd1/0x640
[   11.903358]  ? __virt_addr_valid+0x1db/0x2d0
[   11.903398]  ? krealloc_less_oob_helper+0xec8/0x11d0
[   11.903434]  ? kasan_addr_to_slab+0x11/0xa0
[   11.903469]  ? krealloc_less_oob_helper+0xec8/0x11d0
[   11.903530]  kasan_report+0x140/0x180
[   11.903573]  ? krealloc_less_oob_helper+0xec8/0x11d0
[   11.903618]  __asan_report_store1_noabort+0x1b/0x30
[   11.903667]  krealloc_less_oob_helper+0xec8/0x11d0
[   11.903711]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.903766]  ? finish_task_switch.isra.0+0x153/0x700
[   11.903805]  ? __switch_to+0x5d9/0xf60
[   11.903848]  ? __schedule+0xc49/0x27a0
[   11.903887]  ? __pfx_read_tsc+0x10/0x10
[   11.903927]  krealloc_large_less_oob+0x1c/0x30
[   11.903980]  kunit_try_run_case+0x1a6/0x480
[   11.904023]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.904058]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   11.904194]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.904221]  ? __kthread_parkme+0x82/0x160
[   11.904242]  ? preempt_count_sub+0x50/0x80
[   11.904263]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.904297]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.904335]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.904376]  kthread+0x257/0x310
[   11.904409]  ? __pfx_kthread+0x10/0x10
[   11.904441]  ret_from_fork+0x41/0x80
[   11.904643]  ? __pfx_kthread+0x10/0x10
[   11.904703]  ret_from_fork_asm+0x1a/0x30
[   11.904764]  </TASK>
[   11.904781] 
[   11.917152] The buggy address belongs to the physical page:
[   11.917334] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10257c
[   11.917578] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.918754] flags: 0x200000000000040(head|node=0|zone=2)
[   11.919513] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.920757] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   11.922444] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.923105] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   11.923482] head: 0200000000000002 ffffea0004095f01 ffffffffffffffff 0000000000000000
[   11.923934] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   11.924242] page dumped because: kasan: bad access detected
[   11.924548] 
[   11.924916] Memory state around the buggy address:
[   11.925120]  ffff88810257df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.925708]  ffff88810257e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.926373] >ffff88810257e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   11.926740]                                                     ^
[   11.926936]  ffff88810257e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.927414]  ffff88810257e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.928242] ==================================================================
[   11.928672] ==================================================================
[   11.929161] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe92/0x11d0
[   11.929553] Write of size 1 at addr ffff88810257e0ea by task kunit_try_catch/167
[   11.929936] 
[   11.930099] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   11.930187] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.930211] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.930249] Call Trace:
[   11.930279]  <TASK>
[   11.930308]  dump_stack_lvl+0x73/0xb0
[   11.930365]  print_report+0xd1/0x640
[   11.930413]  ? __virt_addr_valid+0x1db/0x2d0
[   11.930456]  ? krealloc_less_oob_helper+0xe92/0x11d0
[   11.930687]  ? kasan_addr_to_slab+0x11/0xa0
[   11.930778]  ? krealloc_less_oob_helper+0xe92/0x11d0
[   11.930956]  kasan_report+0x140/0x180
[   11.931013]  ? krealloc_less_oob_helper+0xe92/0x11d0
[   11.931075]  __asan_report_store1_noabort+0x1b/0x30
[   11.931121]  krealloc_less_oob_helper+0xe92/0x11d0
[   11.931169]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.931207]  ? finish_task_switch.isra.0+0x153/0x700
[   11.931251]  ? __switch_to+0x5d9/0xf60
[   11.931301]  ? __schedule+0xc49/0x27a0
[   11.931340]  ? __pfx_read_tsc+0x10/0x10
[   11.931379]  krealloc_large_less_oob+0x1c/0x30
[   11.931509]  kunit_try_run_case+0x1a6/0x480
[   11.931533]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.931553]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   11.931572]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.931596]  ? __kthread_parkme+0x82/0x160
[   11.931615]  ? preempt_count_sub+0x50/0x80
[   11.931635]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.931669]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.931702]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.931727]  kthread+0x257/0x310
[   11.931745]  ? __pfx_kthread+0x10/0x10
[   11.931763]  ret_from_fork+0x41/0x80
[   11.931782]  ? __pfx_kthread+0x10/0x10
[   11.931800]  ret_from_fork_asm+0x1a/0x30
[   11.931829]  </TASK>
[   11.931840] 
[   11.941059] The buggy address belongs to the physical page:
[   11.941786] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10257c
[   11.942348] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.942766] flags: 0x200000000000040(head|node=0|zone=2)
[   11.943418] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.943857] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   11.944211] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   11.944763] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   11.945219] head: 0200000000000002 ffffea0004095f01 ffffffffffffffff 0000000000000000
[   11.945633] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   11.945984] page dumped because: kasan: bad access detected
[   11.946645] 
[   11.946842] Memory state around the buggy address:
[   11.947119]  ffff88810257df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.947629]  ffff88810257e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.947983] >ffff88810257e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   11.948546]                                                           ^
[   11.948781]  ffff88810257e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.949390]  ffff88810257e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.949722] ==================================================================
[   11.679200] ==================================================================
[   11.679838] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe25/0x11d0
[   11.680500] Write of size 1 at addr ffff8881003a14d0 by task kunit_try_catch/163
[   11.680787] 
[   11.680957] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   11.681039] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.681079] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.681114] Call Trace:
[   11.681185]  <TASK>
[   11.681228]  dump_stack_lvl+0x73/0xb0
[   11.681287]  print_report+0xd1/0x640
[   11.681333]  ? __virt_addr_valid+0x1db/0x2d0
[   11.681378]  ? krealloc_less_oob_helper+0xe25/0x11d0
[   11.681418]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.681464]  ? krealloc_less_oob_helper+0xe25/0x11d0
[   11.681518]  kasan_report+0x140/0x180
[   11.681556]  ? krealloc_less_oob_helper+0xe25/0x11d0
[   11.681613]  __asan_report_store1_noabort+0x1b/0x30
[   11.681652]  krealloc_less_oob_helper+0xe25/0x11d0
[   11.681734]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.681773]  ? finish_task_switch.isra.0+0x153/0x700
[   11.681829]  ? __switch_to+0x5d9/0xf60
[   11.681870]  ? __schedule+0xc49/0x27a0
[   11.681911]  ? __pfx_read_tsc+0x10/0x10
[   11.681947]  krealloc_less_oob+0x1c/0x30
[   11.681967]  kunit_try_run_case+0x1a6/0x480
[   11.681989]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.682009]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   11.682029]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.682073]  ? __kthread_parkme+0x82/0x160
[   11.682130]  ? preempt_count_sub+0x50/0x80
[   11.682162]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.682205]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.682232]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.682257]  kthread+0x257/0x310
[   11.682275]  ? __pfx_kthread+0x10/0x10
[   11.682293]  ret_from_fork+0x41/0x80
[   11.682313]  ? __pfx_kthread+0x10/0x10
[   11.682330]  ret_from_fork_asm+0x1a/0x30
[   11.682360]  </TASK>
[   11.682372] 
[   11.692935] Allocated by task 163:
[   11.693154]  kasan_save_stack+0x45/0x70
[   11.693341]  kasan_save_track+0x18/0x40
[   11.693806]  kasan_save_alloc_info+0x3b/0x50
[   11.694327]  __kasan_krealloc+0x190/0x1f0
[   11.694694]  krealloc_noprof+0xc1/0x140
[   11.695299]  krealloc_less_oob_helper+0x1ab/0x11d0
[   11.695792]  krealloc_less_oob+0x1c/0x30
[   11.696205]  kunit_try_run_case+0x1a6/0x480
[   11.696510]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.696837]  kthread+0x257/0x310
[   11.697260]  ret_from_fork+0x41/0x80
[   11.697483]  ret_from_fork_asm+0x1a/0x30
[   11.697830] 
[   11.698020] The buggy address belongs to the object at ffff8881003a1400
[   11.698020]  which belongs to the cache kmalloc-256 of size 256
[   11.698877] The buggy address is located 7 bytes to the right of
[   11.698877]  allocated 201-byte region [ffff8881003a1400, ffff8881003a14c9)
[   11.699759] 
[   11.700256] The buggy address belongs to the physical page:
[   11.700529] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1003a0
[   11.701048] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.701939] flags: 0x200000000000040(head|node=0|zone=2)
[   11.702397] page_type: f5(slab)
[   11.702713] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.703355] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   11.703897] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.704270] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   11.704858] head: 0200000000000001 ffffea000400e801 ffffffffffffffff 0000000000000000
[   11.705396] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   11.705883] page dumped because: kasan: bad access detected
[   11.706674] 
[   11.706786] Memory state around the buggy address:
[   11.707011]  ffff8881003a1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.707415]  ffff8881003a1400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.707816] >ffff8881003a1480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.708170]                                                  ^
[   11.708462]  ffff8881003a1500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.708810]  ffff8881003a1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.709050] ==================================================================
[   11.740482] ==================================================================
[   11.741116] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe92/0x11d0
[   11.741816] Write of size 1 at addr ffff8881003a14ea by task kunit_try_catch/163
[   11.742477] 
[   11.742691] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   11.742804] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.742826] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.742858] Call Trace:
[   11.742887]  <TASK>
[   11.742915]  dump_stack_lvl+0x73/0xb0
[   11.742969]  print_report+0xd1/0x640
[   11.743011]  ? __virt_addr_valid+0x1db/0x2d0
[   11.743063]  ? krealloc_less_oob_helper+0xe92/0x11d0
[   11.743099]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.743128]  ? krealloc_less_oob_helper+0xe92/0x11d0
[   11.743159]  kasan_report+0x140/0x180
[   11.743239]  ? krealloc_less_oob_helper+0xe92/0x11d0
[   11.743285]  __asan_report_store1_noabort+0x1b/0x30
[   11.743325]  krealloc_less_oob_helper+0xe92/0x11d0
[   11.743362]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.743392]  ? finish_task_switch.isra.0+0x153/0x700
[   11.743423]  ? __switch_to+0x5d9/0xf60
[   11.743453]  ? __schedule+0xc49/0x27a0
[   11.743473]  ? __pfx_read_tsc+0x10/0x10
[   11.743494]  krealloc_less_oob+0x1c/0x30
[   11.743512]  kunit_try_run_case+0x1a6/0x480
[   11.743532]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.743551]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   11.743570]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.743593]  ? __kthread_parkme+0x82/0x160
[   11.743612]  ? preempt_count_sub+0x50/0x80
[   11.743632]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.743650]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.743697]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.743721]  kthread+0x257/0x310
[   11.743738]  ? __pfx_kthread+0x10/0x10
[   11.743756]  ret_from_fork+0x41/0x80
[   11.743775]  ? __pfx_kthread+0x10/0x10
[   11.743792]  ret_from_fork_asm+0x1a/0x30
[   11.743819]  </TASK>
[   11.743831] 
[   11.753729] Allocated by task 163:
[   11.754179]  kasan_save_stack+0x45/0x70
[   11.754566]  kasan_save_track+0x18/0x40
[   11.754945]  kasan_save_alloc_info+0x3b/0x50
[   11.755367]  __kasan_krealloc+0x190/0x1f0
[   11.755527]  krealloc_noprof+0xc1/0x140
[   11.755957]  krealloc_less_oob_helper+0x1ab/0x11d0
[   11.756573]  krealloc_less_oob+0x1c/0x30
[   11.757053]  kunit_try_run_case+0x1a6/0x480
[   11.757310]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.757712]  kthread+0x257/0x310
[   11.757972]  ret_from_fork+0x41/0x80
[   11.758233]  ret_from_fork_asm+0x1a/0x30
[   11.758607] 
[   11.759274] The buggy address belongs to the object at ffff8881003a1400
[   11.759274]  which belongs to the cache kmalloc-256 of size 256
[   11.759836] The buggy address is located 33 bytes to the right of
[   11.759836]  allocated 201-byte region [ffff8881003a1400, ffff8881003a14c9)
[   11.760872] 
[   11.760995] The buggy address belongs to the physical page:
[   11.761435] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1003a0
[   11.761837] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   11.762185] flags: 0x200000000000040(head|node=0|zone=2)
[   11.762584] page_type: f5(slab)
[   11.762845] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.763441] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   11.763889] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   11.764308] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   11.765201] head: 0200000000000001 ffffea000400e801 ffffffffffffffff 0000000000000000
[   11.765538] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   11.765804] page dumped because: kasan: bad access detected
[   11.766199] 
[   11.766299] Memory state around the buggy address:
[   11.766628]  ffff8881003a1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.767160]  ffff8881003a1400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.767592] >ffff8881003a1480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.768200]                                                           ^
[   11.768569]  ffff8881003a1500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.769005]  ffff8881003a1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.769369] ==================================================================