Hay
Date
June 7, 2025, 10:40 a.m.

Environment
qemu-arm64
qemu-x86_64

[   20.778241] ==================================================================
[   20.779091] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa98/0xbc8
[   20.780100] Write of size 1 at addr fff00000c1e2d8ea by task kunit_try_catch/146
[   20.780874] 
[   20.781198] CPU: 1 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   20.781391] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.781455] Hardware name: linux,dummy-virt (DT)
[   20.781523] Call trace:
[   20.781573]  dump_backtrace+0x9c/0x128
[   20.781667]  show_stack+0x20/0x38
[   20.781762]  dump_stack_lvl+0x8c/0xd0
[   20.781922]  print_report+0x118/0x5f0
[   20.782057]  kasan_report+0xdc/0x128
[   20.782167]  __asan_report_store1_noabort+0x20/0x30
[   20.782289]  krealloc_less_oob_helper+0xa98/0xbc8
[   20.782412]  krealloc_less_oob+0x20/0x38
[   20.782577]  kunit_try_run_case+0x170/0x3f0
[   20.782691]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.782814]  kthread+0x24c/0x2d0
[   20.782886]  ret_from_fork+0x10/0x20
[   20.782936] 
[   20.793440] Allocated by task 146:
[   20.794181]  kasan_save_stack+0x3c/0x68
[   20.794846]  kasan_save_track+0x20/0x40
[   20.795416]  kasan_save_alloc_info+0x40/0x58
[   20.795950]  __kasan_krealloc+0x118/0x178
[   20.797258]  krealloc_noprof+0x10c/0x1a0
[   20.797804]  krealloc_less_oob_helper+0x170/0xbc8
[   20.798434]  krealloc_less_oob+0x20/0x38
[   20.798981]  kunit_try_run_case+0x170/0x3f0
[   20.799544]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.800213]  kthread+0x24c/0x2d0
[   20.800759]  ret_from_fork+0x10/0x20
[   20.801568] 
[   20.801864] The buggy address belongs to the object at fff00000c1e2d800
[   20.801864]  which belongs to the cache kmalloc-256 of size 256
[   20.803214] The buggy address is located 33 bytes to the right of
[   20.803214]  allocated 201-byte region [fff00000c1e2d800, fff00000c1e2d8c9)
[   20.805039] 
[   20.805358] The buggy address belongs to the physical page:
[   20.805877] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e2c
[   20.806731] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.807701] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.808632] page_type: f5(slab)
[   20.809166] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   20.809899] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   20.810742] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   20.811695] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   20.812598] head: 0bfffe0000000001 ffffc1ffc3078b01 ffffffffffffffff 0000000000000000
[   20.813398] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   20.814141] page dumped because: kasan: bad access detected
[   20.814725] 
[   20.815122] Memory state around the buggy address:
[   20.815607]  fff00000c1e2d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.816560]  fff00000c1e2d800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.817414] >fff00000c1e2d880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   20.818098]                                                           ^
[   20.818885]  fff00000c1e2d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.819707]  fff00000c1e2d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.820540] ==================================================================
[   20.972637] ==================================================================
[   20.973796] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb20/0xbc8
[   20.974534] Write of size 1 at addr fff00000c69660d0 by task kunit_try_catch/150
[   20.975249] 
[   20.975651] CPU: 0 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   20.975858] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.975935] Hardware name: linux,dummy-virt (DT)
[   20.976041] Call trace:
[   20.976110]  dump_backtrace+0x9c/0x128
[   20.976229]  show_stack+0x20/0x38
[   20.976334]  dump_stack_lvl+0x8c/0xd0
[   20.976436]  print_report+0x118/0x5f0
[   20.976576]  kasan_report+0xdc/0x128
[   20.976679]  __asan_report_store1_noabort+0x20/0x30
[   20.976736]  krealloc_less_oob_helper+0xb20/0xbc8
[   20.976802]  krealloc_large_less_oob+0x20/0x38
[   20.976855]  kunit_try_run_case+0x170/0x3f0
[   20.976904]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.976956]  kthread+0x24c/0x2d0
[   20.977035]  ret_from_fork+0x10/0x20
[   20.977082] 
[   20.983508] The buggy address belongs to the physical page:
[   20.984090] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106964
[   20.985833] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.986627] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.988231] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.989052] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.989853] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.990622] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.991471] head: 0bfffe0000000002 ffffc1ffc31a5901 ffffffffffffffff 0000000000000000
[   20.992256] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   20.993053] page dumped because: kasan: bad access detected
[   20.993683] 
[   20.994048] Memory state around the buggy address:
[   20.994580]  fff00000c6965f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.995320]  fff00000c6966000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.996206] >fff00000c6966080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   20.996982]                                                  ^
[   20.997711]  fff00000c6966100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.998550]  fff00000c6966180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.999266] ==================================================================
[   20.644651] ==================================================================
[   20.645693] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa2c/0xbc8
[   20.646478] Write of size 1 at addr fff00000c1e2d8c9 by task kunit_try_catch/146
[   20.647377] 
[   20.647703] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   20.647899] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.647987] Hardware name: linux,dummy-virt (DT)
[   20.648067] Call trace:
[   20.648126]  dump_backtrace+0x9c/0x128
[   20.648231]  show_stack+0x20/0x38
[   20.648319]  dump_stack_lvl+0x8c/0xd0
[   20.648412]  print_report+0x118/0x5f0
[   20.648513]  kasan_report+0xdc/0x128
[   20.648662]  __asan_report_store1_noabort+0x20/0x30
[   20.648801]  krealloc_less_oob_helper+0xa2c/0xbc8
[   20.648920]  krealloc_less_oob+0x20/0x38
[   20.649056]  kunit_try_run_case+0x170/0x3f0
[   20.649213]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.649342]  kthread+0x24c/0x2d0
[   20.649407]  ret_from_fork+0x10/0x20
[   20.649457] 
[   20.656685] Allocated by task 146:
[   20.657081]  kasan_save_stack+0x3c/0x68
[   20.657486]  kasan_save_track+0x20/0x40
[   20.657855]  kasan_save_alloc_info+0x40/0x58
[   20.661074]  __kasan_krealloc+0x118/0x178
[   20.662281]  krealloc_noprof+0x10c/0x1a0
[   20.664439]  krealloc_less_oob_helper+0x170/0xbc8
[   20.665568]  krealloc_less_oob+0x20/0x38
[   20.666583]  kunit_try_run_case+0x170/0x3f0
[   20.668348]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.670049]  kthread+0x24c/0x2d0
[   20.670618]  ret_from_fork+0x10/0x20
[   20.671251] 
[   20.671743] The buggy address belongs to the object at fff00000c1e2d800
[   20.671743]  which belongs to the cache kmalloc-256 of size 256
[   20.673434] The buggy address is located 0 bytes to the right of
[   20.673434]  allocated 201-byte region [fff00000c1e2d800, fff00000c1e2d8c9)
[   20.674752] 
[   20.675148] The buggy address belongs to the physical page:
[   20.676240] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e2c
[   20.677189] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.678065] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.678734] page_type: f5(slab)
[   20.679421] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   20.680387] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   20.681490] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   20.682447] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   20.683449] head: 0bfffe0000000001 ffffc1ffc3078b01 ffffffffffffffff 0000000000000000
[   20.684860] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   20.685587] page dumped because: kasan: bad access detected
[   20.686131] 
[   20.686403] Memory state around the buggy address:
[   20.687072]  fff00000c1e2d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.688593]  fff00000c1e2d800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.689422] >fff00000c1e2d880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   20.690215]                                               ^
[   20.690878]  fff00000c1e2d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.691727]  fff00000c1e2d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.692496] ==================================================================
[   21.000798] ==================================================================
[   21.002185] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa54/0xbc8
[   21.002947] Write of size 1 at addr fff00000c69660da by task kunit_try_catch/150
[   21.004502] 
[   21.004806] CPU: 0 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   21.005160] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.005254] Hardware name: linux,dummy-virt (DT)
[   21.005340] Call trace:
[   21.005405]  dump_backtrace+0x9c/0x128
[   21.005474]  show_stack+0x20/0x38
[   21.005516]  dump_stack_lvl+0x8c/0xd0
[   21.005560]  print_report+0x118/0x5f0
[   21.005603]  kasan_report+0xdc/0x128
[   21.005644]  __asan_report_store1_noabort+0x20/0x30
[   21.005693]  krealloc_less_oob_helper+0xa54/0xbc8
[   21.005744]  krealloc_large_less_oob+0x20/0x38
[   21.005793]  kunit_try_run_case+0x170/0x3f0
[   21.005838]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.005890]  kthread+0x24c/0x2d0
[   21.005933]  ret_from_fork+0x10/0x20
[   21.006009] 
[   21.014081] The buggy address belongs to the physical page:
[   21.014702] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106964
[   21.016032] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.016928] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.017747] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.018582] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   21.019751] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.020458] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   21.021321] head: 0bfffe0000000002 ffffc1ffc31a5901 ffffffffffffffff 0000000000000000
[   21.022087] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   21.022820] page dumped because: kasan: bad access detected
[   21.023506] 
[   21.023782] Memory state around the buggy address:
[   21.024439]  fff00000c6965f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.025145]  fff00000c6966000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.025891] >fff00000c6966080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   21.026595]                                                     ^
[   21.027257]  fff00000c6966100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.027939]  fff00000c6966180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.029735] ==================================================================
[   21.061080] ==================================================================
[   21.061695] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa3c/0xbc8
[   21.062372] Write of size 1 at addr fff00000c69660eb by task kunit_try_catch/150
[   21.063045] 
[   21.063392] CPU: 0 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   21.063596] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.063672] Hardware name: linux,dummy-virt (DT)
[   21.063755] Call trace:
[   21.063819]  dump_backtrace+0x9c/0x128
[   21.063931]  show_stack+0x20/0x38
[   21.064056]  dump_stack_lvl+0x8c/0xd0
[   21.064163]  print_report+0x118/0x5f0
[   21.064267]  kasan_report+0xdc/0x128
[   21.064372]  __asan_report_store1_noabort+0x20/0x30
[   21.064489]  krealloc_less_oob_helper+0xa3c/0xbc8
[   21.064608]  krealloc_large_less_oob+0x20/0x38
[   21.064777]  kunit_try_run_case+0x170/0x3f0
[   21.064885]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.065016]  kthread+0x24c/0x2d0
[   21.065069]  ret_from_fork+0x10/0x20
[   21.065116] 
[   21.074138] The buggy address belongs to the physical page:
[   21.074837] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106964
[   21.075750] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.077294] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.078072] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.078914] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   21.079757] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.080590] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   21.081411] head: 0bfffe0000000002 ffffc1ffc31a5901 ffffffffffffffff 0000000000000000
[   21.082192] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   21.082922] page dumped because: kasan: bad access detected
[   21.083524] 
[   21.083839] Memory state around the buggy address:
[   21.084471]  fff00000c6965f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.085319]  fff00000c6966000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.086151] >fff00000c6966080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   21.086867]                                                           ^
[   21.087608]  fff00000c6966100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.088344]  fff00000c6966180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.089091] ==================================================================
[   20.694264] ==================================================================
[   20.695054] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb20/0xbc8
[   20.696039] Write of size 1 at addr fff00000c1e2d8d0 by task kunit_try_catch/146
[   20.697124] 
[   20.697522] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   20.697817] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.697892] Hardware name: linux,dummy-virt (DT)
[   20.697996] Call trace:
[   20.698054]  dump_backtrace+0x9c/0x128
[   20.698157]  show_stack+0x20/0x38
[   20.698246]  dump_stack_lvl+0x8c/0xd0
[   20.698332]  print_report+0x118/0x5f0
[   20.698415]  kasan_report+0xdc/0x128
[   20.698507]  __asan_report_store1_noabort+0x20/0x30
[   20.698618]  krealloc_less_oob_helper+0xb20/0xbc8
[   20.698740]  krealloc_less_oob+0x20/0x38
[   20.698938]  kunit_try_run_case+0x170/0x3f0
[   20.699066]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.699271]  kthread+0x24c/0x2d0
[   20.699405]  ret_from_fork+0x10/0x20
[   20.699628] 
[   20.707357] Allocated by task 146:
[   20.707941]  kasan_save_stack+0x3c/0x68
[   20.708562]  kasan_save_track+0x20/0x40
[   20.709080]  kasan_save_alloc_info+0x40/0x58
[   20.709808]  __kasan_krealloc+0x118/0x178
[   20.710477]  krealloc_noprof+0x10c/0x1a0
[   20.710908]  krealloc_less_oob_helper+0x170/0xbc8
[   20.711904]  krealloc_less_oob+0x20/0x38
[   20.712654]  kunit_try_run_case+0x170/0x3f0
[   20.713405]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.714149]  kthread+0x24c/0x2d0
[   20.714707]  ret_from_fork+0x10/0x20
[   20.715349] 
[   20.715609] The buggy address belongs to the object at fff00000c1e2d800
[   20.715609]  which belongs to the cache kmalloc-256 of size 256
[   20.717136] The buggy address is located 7 bytes to the right of
[   20.717136]  allocated 201-byte region [fff00000c1e2d800, fff00000c1e2d8c9)
[   20.718542] 
[   20.718917] The buggy address belongs to the physical page:
[   20.719518] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e2c
[   20.720200] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.721095] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.721842] page_type: f5(slab)
[   20.722422] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   20.723199] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   20.724038] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   20.724857] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   20.725669] head: 0bfffe0000000001 ffffc1ffc3078b01 ffffffffffffffff 0000000000000000
[   20.726529] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   20.727305] page dumped because: kasan: bad access detected
[   20.727935] 
[   20.728279] Memory state around the buggy address:
[   20.728901]  fff00000c1e2d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.729656]  fff00000c1e2d800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.730450] >fff00000c1e2d880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   20.731194]                                                  ^
[   20.731852]  fff00000c1e2d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.732630]  fff00000c1e2d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.733407] ==================================================================
[   20.942075] ==================================================================
[   20.943130] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa2c/0xbc8
[   20.944909] Write of size 1 at addr fff00000c69660c9 by task kunit_try_catch/150
[   20.945640] 
[   20.945979] CPU: 0 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   20.946167] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.946231] Hardware name: linux,dummy-virt (DT)
[   20.946319] Call trace:
[   20.946387]  dump_backtrace+0x9c/0x128
[   20.946504]  show_stack+0x20/0x38
[   20.946611]  dump_stack_lvl+0x8c/0xd0
[   20.946773]  print_report+0x118/0x5f0
[   20.946887]  kasan_report+0xdc/0x128
[   20.947012]  __asan_report_store1_noabort+0x20/0x30
[   20.947132]  krealloc_less_oob_helper+0xa2c/0xbc8
[   20.947205]  krealloc_large_less_oob+0x20/0x38
[   20.947256]  kunit_try_run_case+0x170/0x3f0
[   20.947302]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.947354]  kthread+0x24c/0x2d0
[   20.947453]  ret_from_fork+0x10/0x20
[   20.947560] 
[   20.955224] The buggy address belongs to the physical page:
[   20.956270] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106964
[   20.957511] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.958225] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.959035] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.959993] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.960907] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.961726] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.962565] head: 0bfffe0000000002 ffffc1ffc31a5901 ffffffffffffffff 0000000000000000
[   20.963431] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   20.964250] page dumped because: kasan: bad access detected
[   20.964705] 
[   20.964951] Memory state around the buggy address:
[   20.965482]  fff00000c6965f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.966343]  fff00000c6966000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.967056] >fff00000c6966080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   20.968077]                                               ^
[   20.968951]  fff00000c6966100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.969804]  fff00000c6966180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.970926] ==================================================================
[   20.736205] ==================================================================
[   20.736871] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa54/0xbc8
[   20.737733] Write of size 1 at addr fff00000c1e2d8da by task kunit_try_catch/146
[   20.738473] 
[   20.738808] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   20.739059] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.739154] Hardware name: linux,dummy-virt (DT)
[   20.739270] Call trace:
[   20.739325]  dump_backtrace+0x9c/0x128
[   20.739468]  show_stack+0x20/0x38
[   20.739578]  dump_stack_lvl+0x8c/0xd0
[   20.739682]  print_report+0x118/0x5f0
[   20.739782]  kasan_report+0xdc/0x128
[   20.739889]  __asan_report_store1_noabort+0x20/0x30
[   20.740063]  krealloc_less_oob_helper+0xa54/0xbc8
[   20.740187]  krealloc_less_oob+0x20/0x38
[   20.740324]  kunit_try_run_case+0x170/0x3f0
[   20.740465]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.740541]  kthread+0x24c/0x2d0
[   20.740589]  ret_from_fork+0x10/0x20
[   20.740637] 
[   20.748185] Allocated by task 146:
[   20.748687]  kasan_save_stack+0x3c/0x68
[   20.749296]  kasan_save_track+0x20/0x40
[   20.749843]  kasan_save_alloc_info+0x40/0x58
[   20.750472]  __kasan_krealloc+0x118/0x178
[   20.751072]  krealloc_noprof+0x10c/0x1a0
[   20.751901]  krealloc_less_oob_helper+0x170/0xbc8
[   20.752613]  krealloc_less_oob+0x20/0x38
[   20.753233]  kunit_try_run_case+0x170/0x3f0
[   20.753785]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.754494]  kthread+0x24c/0x2d0
[   20.755077]  ret_from_fork+0x10/0x20
[   20.755991] 
[   20.756364] The buggy address belongs to the object at fff00000c1e2d800
[   20.756364]  which belongs to the cache kmalloc-256 of size 256
[   20.758465] The buggy address is located 17 bytes to the right of
[   20.758465]  allocated 201-byte region [fff00000c1e2d800, fff00000c1e2d8c9)
[   20.760048] 
[   20.760389] The buggy address belongs to the physical page:
[   20.761058] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e2c
[   20.761925] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.762815] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.763581] page_type: f5(slab)
[   20.764081] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   20.764932] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   20.765778] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   20.766633] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   20.767473] head: 0bfffe0000000001 ffffc1ffc3078b01 ffffffffffffffff 0000000000000000
[   20.768319] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   20.769123] page dumped because: kasan: bad access detected
[   20.769743] 
[   20.770107] Memory state around the buggy address:
[   20.770729]  fff00000c1e2d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.771488]  fff00000c1e2d800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.772290] >fff00000c1e2d880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   20.773073]                                                     ^
[   20.773749]  fff00000c1e2d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.774523]  fff00000c1e2d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.775337] ==================================================================
[   20.822259] ==================================================================
[   20.823015] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa3c/0xbc8
[   20.824281] Write of size 1 at addr fff00000c1e2d8eb by task kunit_try_catch/146
[   20.825088] 
[   20.825430] CPU: 1 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   20.825637] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.825714] Hardware name: linux,dummy-virt (DT)
[   20.825799] Call trace:
[   20.825849]  dump_backtrace+0x9c/0x128
[   20.825902]  show_stack+0x20/0x38
[   20.825944]  dump_stack_lvl+0x8c/0xd0
[   20.826063]  print_report+0x118/0x5f0
[   20.826172]  kasan_report+0xdc/0x128
[   20.826284]  __asan_report_store1_noabort+0x20/0x30
[   20.826411]  krealloc_less_oob_helper+0xa3c/0xbc8
[   20.826534]  krealloc_less_oob+0x20/0x38
[   20.826653]  kunit_try_run_case+0x170/0x3f0
[   20.826769]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.826833]  kthread+0x24c/0x2d0
[   20.826876]  ret_from_fork+0x10/0x20
[   20.826923] 
[   20.834765] Allocated by task 146:
[   20.835273]  kasan_save_stack+0x3c/0x68
[   20.835709]  kasan_save_track+0x20/0x40
[   20.836403]  kasan_save_alloc_info+0x40/0x58
[   20.836990]  __kasan_krealloc+0x118/0x178
[   20.837528]  krealloc_noprof+0x10c/0x1a0
[   20.838626]  krealloc_less_oob_helper+0x170/0xbc8
[   20.839392]  krealloc_less_oob+0x20/0x38
[   20.840304]  kunit_try_run_case+0x170/0x3f0
[   20.840717]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.841460]  kthread+0x24c/0x2d0
[   20.841941]  ret_from_fork+0x10/0x20
[   20.842480] 
[   20.842787] The buggy address belongs to the object at fff00000c1e2d800
[   20.842787]  which belongs to the cache kmalloc-256 of size 256
[   20.844212] The buggy address is located 34 bytes to the right of
[   20.844212]  allocated 201-byte region [fff00000c1e2d800, fff00000c1e2d8c9)
[   20.845851] 
[   20.846186] The buggy address belongs to the physical page:
[   20.846739] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e2c
[   20.847905] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.848672] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.849387] page_type: f5(slab)
[   20.849868] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   20.850723] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   20.851566] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   20.852547] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   20.853366] head: 0bfffe0000000001 ffffc1ffc3078b01 ffffffffffffffff 0000000000000000
[   20.854147] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   20.854850] page dumped because: kasan: bad access detected
[   20.855489] 
[   20.855793] Memory state around the buggy address:
[   20.856427]  fff00000c1e2d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.857800]  fff00000c1e2d800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.858694] >fff00000c1e2d880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   20.859340]                                                           ^
[   20.860107]  fff00000c1e2d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.860912]  fff00000c1e2d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.861783] ==================================================================
[   21.030657] ==================================================================
[   21.031742] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa98/0xbc8
[   21.032907] Write of size 1 at addr fff00000c69660ea by task kunit_try_catch/150
[   21.033682] 
[   21.034012] CPU: 0 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   21.034178] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.034214] Hardware name: linux,dummy-virt (DT)
[   21.034251] Call trace:
[   21.034291]  dump_backtrace+0x9c/0x128
[   21.034453]  show_stack+0x20/0x38
[   21.034562]  dump_stack_lvl+0x8c/0xd0
[   21.034670]  print_report+0x118/0x5f0
[   21.034776]  kasan_report+0xdc/0x128
[   21.034881]  __asan_report_store1_noabort+0x20/0x30
[   21.035016]  krealloc_less_oob_helper+0xa98/0xbc8
[   21.035076]  krealloc_large_less_oob+0x20/0x38
[   21.035129]  kunit_try_run_case+0x170/0x3f0
[   21.035176]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.035228]  kthread+0x24c/0x2d0
[   21.035275]  ret_from_fork+0x10/0x20
[   21.035322] 
[   21.043067] The buggy address belongs to the physical page:
[   21.043592] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106964
[   21.044754] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.046245] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.047714] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.048760] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   21.049625] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.050317] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   21.051084] head: 0bfffe0000000002 ffffc1ffc31a5901 ffffffffffffffff 0000000000000000
[   21.052048] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   21.053198] page dumped because: kasan: bad access detected
[   21.053741] 
[   21.053950] Memory state around the buggy address:
[   21.054647]  fff00000c6965f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.055467]  fff00000c6966000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.056271] >fff00000c6966080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   21.057486]                                                           ^
[   21.058325]  fff00000c6966100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.059176]  fff00000c6966180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.060103] ==================================================================

[   17.136909] ==================================================================
[   17.138685] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd72/0x11d0
[   17.140036] Write of size 1 at addr ffff888102be20c9 by task kunit_try_catch/167
[   17.140479] 
[   17.141420] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   17.141705] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.141740] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.141798] Call Trace:
[   17.141877]  <TASK>
[   17.141930]  dump_stack_lvl+0x73/0xb0
[   17.142016]  print_report+0xd1/0x640
[   17.142090]  ? __virt_addr_valid+0x1db/0x2d0
[   17.142168]  ? krealloc_less_oob_helper+0xd72/0x11d0
[   17.142249]  ? kasan_addr_to_slab+0x11/0xa0
[   17.142285]  ? krealloc_less_oob_helper+0xd72/0x11d0
[   17.142314]  kasan_report+0x140/0x180
[   17.142351]  ? krealloc_less_oob_helper+0xd72/0x11d0
[   17.142388]  __asan_report_store1_noabort+0x1b/0x30
[   17.142422]  krealloc_less_oob_helper+0xd72/0x11d0
[   17.142553]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   17.142594]  ? finish_task_switch.isra.0+0x153/0x700
[   17.142627]  ? __switch_to+0x5d9/0xf60
[   17.142661]  ? __schedule+0xc49/0x27a0
[   17.142690]  ? __pfx_read_tsc+0x10/0x10
[   17.142723]  krealloc_large_less_oob+0x1c/0x30
[   17.142751]  kunit_try_run_case+0x1a6/0x480
[   17.142785]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.142827]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   17.142885]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.142921]  ? __kthread_parkme+0x82/0x160
[   17.142951]  ? preempt_count_sub+0x50/0x80
[   17.142980]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.143008]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.143045]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.143082]  kthread+0x257/0x310
[   17.143109]  ? __pfx_kthread+0x10/0x10
[   17.143135]  ret_from_fork+0x41/0x80
[   17.143165]  ? __pfx_kthread+0x10/0x10
[   17.143190]  ret_from_fork_asm+0x1a/0x30
[   17.143266]  </TASK>
[   17.143284] 
[   17.156301] The buggy address belongs to the physical page:
[   17.157010] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102be0
[   17.158749] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.159374] flags: 0x200000000000040(head|node=0|zone=2)
[   17.161091] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   17.162753] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   17.163385] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   17.164448] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   17.165250] head: 0200000000000002 ffffea00040af801 ffffffffffffffff 0000000000000000
[   17.166329] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   17.167157] page dumped because: kasan: bad access detected
[   17.168151] 
[   17.168327] Memory state around the buggy address:
[   17.169313]  ffff888102be1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.170104]  ffff888102be2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.171130] >ffff888102be2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.172033]                                               ^
[   17.172428]  ffff888102be2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.173370]  ffff888102be2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.174190] ==================================================================
[   16.844481] ==================================================================
[   16.845844] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe25/0x11d0
[   16.847945] Write of size 1 at addr ffff88810099d4d0 by task kunit_try_catch/163
[   16.849030] 
[   16.849415] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   16.849644] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.849720] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.849781] Call Trace:
[   16.849858]  <TASK>
[   16.849910]  dump_stack_lvl+0x73/0xb0
[   16.850001]  print_report+0xd1/0x640
[   16.850077]  ? __virt_addr_valid+0x1db/0x2d0
[   16.850198]  ? krealloc_less_oob_helper+0xe25/0x11d0
[   16.850329]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.850411]  ? krealloc_less_oob_helper+0xe25/0x11d0
[   16.850896]  kasan_report+0x140/0x180
[   16.850978]  ? krealloc_less_oob_helper+0xe25/0x11d0
[   16.851060]  __asan_report_store1_noabort+0x1b/0x30
[   16.851128]  krealloc_less_oob_helper+0xe25/0x11d0
[   16.851204]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   16.851308]  ? finish_task_switch.isra.0+0x153/0x700
[   16.851378]  ? __switch_to+0x5d9/0xf60
[   16.851497]  ? __schedule+0xc49/0x27a0
[   16.851572]  ? __pfx_read_tsc+0x10/0x10
[   16.851645]  krealloc_less_oob+0x1c/0x30
[   16.851739]  kunit_try_run_case+0x1a6/0x480
[   16.851785]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.851846]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.851883]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.851919]  ? __kthread_parkme+0x82/0x160
[   16.851946]  ? preempt_count_sub+0x50/0x80
[   16.851975]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.852002]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.852038]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.852073]  kthread+0x257/0x310
[   16.852097]  ? __pfx_kthread+0x10/0x10
[   16.852121]  ret_from_fork+0x41/0x80
[   16.852149]  ? __pfx_kthread+0x10/0x10
[   16.852172]  ret_from_fork_asm+0x1a/0x30
[   16.852238]  </TASK>
[   16.852261] 
[   16.868953] Allocated by task 163:
[   16.869361]  kasan_save_stack+0x45/0x70
[   16.869708]  kasan_save_track+0x18/0x40
[   16.870113]  kasan_save_alloc_info+0x3b/0x50
[   16.870707]  __kasan_krealloc+0x190/0x1f0
[   16.871158]  krealloc_noprof+0xc1/0x140
[   16.871730]  krealloc_less_oob_helper+0x1ab/0x11d0
[   16.872183]  krealloc_less_oob+0x1c/0x30
[   16.872951]  kunit_try_run_case+0x1a6/0x480
[   16.873341]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.874001]  kthread+0x257/0x310
[   16.874385]  ret_from_fork+0x41/0x80
[   16.874944]  ret_from_fork_asm+0x1a/0x30
[   16.875375] 
[   16.875747] The buggy address belongs to the object at ffff88810099d400
[   16.875747]  which belongs to the cache kmalloc-256 of size 256
[   16.876589] The buggy address is located 7 bytes to the right of
[   16.876589]  allocated 201-byte region [ffff88810099d400, ffff88810099d4c9)
[   16.877455] 
[   16.877666] The buggy address belongs to the physical page:
[   16.878141] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10099c
[   16.879415] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.880118] flags: 0x200000000000040(head|node=0|zone=2)
[   16.880721] page_type: f5(slab)
[   16.881119] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   16.881937] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   16.882621] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   16.884010] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   16.885001] head: 0200000000000001 ffffea0004026701 ffffffffffffffff 0000000000000000
[   16.886076] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   16.886848] page dumped because: kasan: bad access detected
[   16.887372] 
[   16.887692] Memory state around the buggy address:
[   16.888246]  ffff88810099d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.888869]  ffff88810099d400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.889993] >ffff88810099d480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.890625]                                                  ^
[   16.891176]  ffff88810099d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.891766]  ffff88810099d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.892425] ==================================================================
[   16.793286] ==================================================================
[   16.794228] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd72/0x11d0
[   16.795538] Write of size 1 at addr ffff88810099d4c9 by task kunit_try_catch/163
[   16.796712] 
[   16.797085] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   16.797408] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.797444] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.797520] Call Trace:
[   16.797562]  <TASK>
[   16.797643]  dump_stack_lvl+0x73/0xb0
[   16.797688]  print_report+0xd1/0x640
[   16.797724]  ? __virt_addr_valid+0x1db/0x2d0
[   16.797760]  ? krealloc_less_oob_helper+0xd72/0x11d0
[   16.797788]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.797840]  ? krealloc_less_oob_helper+0xd72/0x11d0
[   16.797884]  kasan_report+0x140/0x180
[   16.797920]  ? krealloc_less_oob_helper+0xd72/0x11d0
[   16.797956]  __asan_report_store1_noabort+0x1b/0x30
[   16.797987]  krealloc_less_oob_helper+0xd72/0x11d0
[   16.798020]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   16.798050]  ? finish_task_switch.isra.0+0x153/0x700
[   16.798079]  ? __switch_to+0x5d9/0xf60
[   16.798112]  ? __schedule+0xc49/0x27a0
[   16.798141]  ? __pfx_read_tsc+0x10/0x10
[   16.798173]  krealloc_less_oob+0x1c/0x30
[   16.798203]  kunit_try_run_case+0x1a6/0x480
[   16.798296]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.798391]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.798425]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.798481]  ? __kthread_parkme+0x82/0x160
[   16.798559]  ? preempt_count_sub+0x50/0x80
[   16.798621]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.798675]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.798723]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.798761]  kthread+0x257/0x310
[   16.798787]  ? __pfx_kthread+0x10/0x10
[   16.798830]  ret_from_fork+0x41/0x80
[   16.798872]  ? __pfx_kthread+0x10/0x10
[   16.798898]  ret_from_fork_asm+0x1a/0x30
[   16.798940]  </TASK>
[   16.798954] 
[   16.815050] Allocated by task 163:
[   16.815761]  kasan_save_stack+0x45/0x70
[   16.816282]  kasan_save_track+0x18/0x40
[   16.816860]  kasan_save_alloc_info+0x3b/0x50
[   16.817307]  __kasan_krealloc+0x190/0x1f0
[   16.817723]  krealloc_noprof+0xc1/0x140
[   16.818137]  krealloc_less_oob_helper+0x1ab/0x11d0
[   16.818954]  krealloc_less_oob+0x1c/0x30
[   16.819375]  kunit_try_run_case+0x1a6/0x480
[   16.819995]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.820692]  kthread+0x257/0x310
[   16.821111]  ret_from_fork+0x41/0x80
[   16.821701]  ret_from_fork_asm+0x1a/0x30
[   16.822182] 
[   16.822560] The buggy address belongs to the object at ffff88810099d400
[   16.822560]  which belongs to the cache kmalloc-256 of size 256
[   16.823725] The buggy address is located 0 bytes to the right of
[   16.823725]  allocated 201-byte region [ffff88810099d400, ffff88810099d4c9)
[   16.824939] 
[   16.825176] The buggy address belongs to the physical page:
[   16.825837] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10099c
[   16.826758] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.827610] flags: 0x200000000000040(head|node=0|zone=2)
[   16.828121] page_type: f5(slab)
[   16.828656] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   16.829357] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   16.830208] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   16.831632] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   16.832882] head: 0200000000000001 ffffea0004026701 ffffffffffffffff 0000000000000000
[   16.833736] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   16.834629] page dumped because: kasan: bad access detected
[   16.835265] 
[   16.835420] Memory state around the buggy address:
[   16.836348]  ffff88810099d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.837245]  ffff88810099d400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.838021] >ffff88810099d480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.839406]                                               ^
[   16.840394]  ffff88810099d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.841848]  ffff88810099d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.842735] ==================================================================
[   16.997537] ==================================================================
[   16.997794] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd49/0x11d0
[   16.998057] Write of size 1 at addr ffff88810099d4eb by task kunit_try_catch/163
[   16.998676] 
[   16.999094] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   16.999232] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.999279] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.999336] Call Trace:
[   16.999386]  <TASK>
[   16.999435]  dump_stack_lvl+0x73/0xb0
[   16.999515]  print_report+0xd1/0x640
[   16.999588]  ? __virt_addr_valid+0x1db/0x2d0
[   16.999661]  ? krealloc_less_oob_helper+0xd49/0x11d0
[   16.999727]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.999799]  ? krealloc_less_oob_helper+0xd49/0x11d0
[   16.999888]  kasan_report+0x140/0x180
[   16.999962]  ? krealloc_less_oob_helper+0xd49/0x11d0
[   17.000043]  __asan_report_store1_noabort+0x1b/0x30
[   17.000103]  krealloc_less_oob_helper+0xd49/0x11d0
[   17.000157]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   17.000270]  ? finish_task_switch.isra.0+0x153/0x700
[   17.000344]  ? __switch_to+0x5d9/0xf60
[   17.000426]  ? __schedule+0xc49/0x27a0
[   17.000500]  ? __pfx_read_tsc+0x10/0x10
[   17.000575]  krealloc_less_oob+0x1c/0x30
[   17.000640]  kunit_try_run_case+0x1a6/0x480
[   17.000713]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.000772]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   17.000889]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.000967]  ? __kthread_parkme+0x82/0x160
[   17.001139]  ? preempt_count_sub+0x50/0x80
[   17.001233]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.001304]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.001386]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.001509]  kthread+0x257/0x310
[   17.001586]  ? __pfx_kthread+0x10/0x10
[   17.001653]  ret_from_fork+0x41/0x80
[   17.001719]  ? __pfx_kthread+0x10/0x10
[   17.001781]  ret_from_fork_asm+0x1a/0x30
[   17.001914]  </TASK>
[   17.001943] 
[   17.019468] Allocated by task 163:
[   17.019794]  kasan_save_stack+0x45/0x70
[   17.020331]  kasan_save_track+0x18/0x40
[   17.020759]  kasan_save_alloc_info+0x3b/0x50
[   17.021318]  __kasan_krealloc+0x190/0x1f0
[   17.021674]  krealloc_noprof+0xc1/0x140
[   17.021997]  krealloc_less_oob_helper+0x1ab/0x11d0
[   17.022637]  krealloc_less_oob+0x1c/0x30
[   17.023164]  kunit_try_run_case+0x1a6/0x480
[   17.023520]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.024026]  kthread+0x257/0x310
[   17.024402]  ret_from_fork+0x41/0x80
[   17.024824]  ret_from_fork_asm+0x1a/0x30
[   17.025354] 
[   17.025972] The buggy address belongs to the object at ffff88810099d400
[   17.025972]  which belongs to the cache kmalloc-256 of size 256
[   17.026971] The buggy address is located 34 bytes to the right of
[   17.026971]  allocated 201-byte region [ffff88810099d400, ffff88810099d4c9)
[   17.028256] 
[   17.028442] The buggy address belongs to the physical page:
[   17.028966] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10099c
[   17.029831] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.030447] flags: 0x200000000000040(head|node=0|zone=2)
[   17.030866] page_type: f5(slab)
[   17.031236] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   17.032562] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   17.033060] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   17.033945] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   17.034623] head: 0200000000000001 ffffea0004026701 ffffffffffffffff 0000000000000000
[   17.035375] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   17.036126] page dumped because: kasan: bad access detected
[   17.036696] 
[   17.037048] Memory state around the buggy address:
[   17.037404]  ffff88810099d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.038044]  ffff88810099d400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.038736] >ffff88810099d480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   17.040087]                                                           ^
[   17.040823]  ffff88810099d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.041439]  ffff88810099d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.042039] ==================================================================
[   17.264065] ==================================================================
[   17.265191] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe92/0x11d0
[   17.266186] Write of size 1 at addr ffff888102be20ea by task kunit_try_catch/167
[   17.266676] 
[   17.267178] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   17.267326] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.267363] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.267418] Call Trace:
[   17.267469]  <TASK>
[   17.267686]  dump_stack_lvl+0x73/0xb0
[   17.267768]  print_report+0xd1/0x640
[   17.267847]  ? __virt_addr_valid+0x1db/0x2d0
[   17.267915]  ? krealloc_less_oob_helper+0xe92/0x11d0
[   17.267980]  ? kasan_addr_to_slab+0x11/0xa0
[   17.268049]  ? krealloc_less_oob_helper+0xe92/0x11d0
[   17.268116]  kasan_report+0x140/0x180
[   17.268193]  ? krealloc_less_oob_helper+0xe92/0x11d0
[   17.268297]  __asan_report_store1_noabort+0x1b/0x30
[   17.268371]  krealloc_less_oob_helper+0xe92/0x11d0
[   17.268447]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   17.268516]  ? finish_task_switch.isra.0+0x153/0x700
[   17.268583]  ? __switch_to+0x5d9/0xf60
[   17.268888]  ? __schedule+0xc49/0x27a0
[   17.268920]  ? __pfx_read_tsc+0x10/0x10
[   17.268952]  krealloc_large_less_oob+0x1c/0x30
[   17.268981]  kunit_try_run_case+0x1a6/0x480
[   17.269013]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.269041]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   17.269070]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.269106]  ? __kthread_parkme+0x82/0x160
[   17.269133]  ? preempt_count_sub+0x50/0x80
[   17.269165]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.269193]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.269257]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.269297]  kthread+0x257/0x310
[   17.269324]  ? __pfx_kthread+0x10/0x10
[   17.269350]  ret_from_fork+0x41/0x80
[   17.269379]  ? __pfx_kthread+0x10/0x10
[   17.269406]  ret_from_fork_asm+0x1a/0x30
[   17.269462]  </TASK>
[   17.269508] 
[   17.284883] The buggy address belongs to the physical page:
[   17.285766] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102be0
[   17.286468] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.287135] flags: 0x200000000000040(head|node=0|zone=2)
[   17.287576] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   17.289165] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   17.290099] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   17.290719] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   17.292617] head: 0200000000000002 ffffea00040af801 ffffffffffffffff 0000000000000000
[   17.293454] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   17.294322] page dumped because: kasan: bad access detected
[   17.295288] 
[   17.295455] Memory state around the buggy address:
[   17.296347]  ffff888102be1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.297199]  ffff888102be2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.298284] >ffff888102be2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.299032]                                                           ^
[   17.299618]  ffff888102be2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.300912]  ffff888102be2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.301387] ==================================================================
[   17.302750] ==================================================================
[   17.304181] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd49/0x11d0
[   17.305410] Write of size 1 at addr ffff888102be20eb by task kunit_try_catch/167
[   17.306822] 
[   17.307035] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   17.307123] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.307160] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.307232] Call Trace:
[   17.307300]  <TASK>
[   17.307334]  dump_stack_lvl+0x73/0xb0
[   17.307379]  print_report+0xd1/0x640
[   17.307415]  ? __virt_addr_valid+0x1db/0x2d0
[   17.307466]  ? krealloc_less_oob_helper+0xd49/0x11d0
[   17.307635]  ? kasan_addr_to_slab+0x11/0xa0
[   17.307685]  ? krealloc_less_oob_helper+0xd49/0x11d0
[   17.307718]  kasan_report+0x140/0x180
[   17.307753]  ? krealloc_less_oob_helper+0xd49/0x11d0
[   17.307791]  __asan_report_store1_noabort+0x1b/0x30
[   17.307842]  krealloc_less_oob_helper+0xd49/0x11d0
[   17.307882]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   17.307912]  ? finish_task_switch.isra.0+0x153/0x700
[   17.307941]  ? __switch_to+0x5d9/0xf60
[   17.307973]  ? __schedule+0xc49/0x27a0
[   17.308002]  ? __pfx_read_tsc+0x10/0x10
[   17.308033]  krealloc_large_less_oob+0x1c/0x30
[   17.308060]  kunit_try_run_case+0x1a6/0x480
[   17.308092]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.308120]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   17.308149]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.308185]  ? __kthread_parkme+0x82/0x160
[   17.308232]  ? preempt_count_sub+0x50/0x80
[   17.308306]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.308373]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.308432]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.308732]  kthread+0x257/0x310
[   17.308766]  ? __pfx_kthread+0x10/0x10
[   17.308795]  ret_from_fork+0x41/0x80
[   17.308847]  ? __pfx_kthread+0x10/0x10
[   17.308883]  ret_from_fork_asm+0x1a/0x30
[   17.308925]  </TASK>
[   17.308939] 
[   17.327391] The buggy address belongs to the physical page:
[   17.327965] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102be0
[   17.328743] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.330012] flags: 0x200000000000040(head|node=0|zone=2)
[   17.330520] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   17.331208] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   17.332271] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   17.333100] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   17.333735] head: 0200000000000002 ffffea00040af801 ffffffffffffffff 0000000000000000
[   17.334395] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   17.335427] page dumped because: kasan: bad access detected
[   17.336085] 
[   17.336306] Memory state around the buggy address:
[   17.336776]  ffff888102be1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.337755]  ffff888102be2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.338311] >ffff888102be2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.339578]                                                           ^
[   17.340517]  ffff888102be2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.341199]  ffff888102be2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.342364] ==================================================================
[   16.944994] ==================================================================
[   16.946473] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe92/0x11d0
[   16.947346] Write of size 1 at addr ffff88810099d4ea by task kunit_try_catch/163
[   16.947958] 
[   16.948794] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   16.948929] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.948964] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.949197] Call Trace:
[   16.949246]  <TASK>
[   16.949272]  dump_stack_lvl+0x73/0xb0
[   16.949316]  print_report+0xd1/0x640
[   16.949351]  ? __virt_addr_valid+0x1db/0x2d0
[   16.949386]  ? krealloc_less_oob_helper+0xe92/0x11d0
[   16.949413]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.949452]  ? krealloc_less_oob_helper+0xe92/0x11d0
[   16.949566]  kasan_report+0x140/0x180
[   16.949610]  ? krealloc_less_oob_helper+0xe92/0x11d0
[   16.949645]  __asan_report_store1_noabort+0x1b/0x30
[   16.949675]  krealloc_less_oob_helper+0xe92/0x11d0
[   16.949705]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   16.949734]  ? finish_task_switch.isra.0+0x153/0x700
[   16.949763]  ? __switch_to+0x5d9/0xf60
[   16.949794]  ? __schedule+0xc49/0x27a0
[   16.949864]  ? __pfx_read_tsc+0x10/0x10
[   16.949897]  krealloc_less_oob+0x1c/0x30
[   16.949922]  kunit_try_run_case+0x1a6/0x480
[   16.949953]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.949980]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.950007]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.950040]  ? __kthread_parkme+0x82/0x160
[   16.950066]  ? preempt_count_sub+0x50/0x80
[   16.950094]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.950120]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.950156]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.950192]  kthread+0x257/0x310
[   16.950240]  ? __pfx_kthread+0x10/0x10
[   16.950268]  ret_from_fork+0x41/0x80
[   16.950296]  ? __pfx_kthread+0x10/0x10
[   16.950321]  ret_from_fork_asm+0x1a/0x30
[   16.950363]  </TASK>
[   16.950377] 
[   16.970408] Allocated by task 163:
[   16.971586]  kasan_save_stack+0x45/0x70
[   16.972012]  kasan_save_track+0x18/0x40
[   16.972179]  kasan_save_alloc_info+0x3b/0x50
[   16.972504]  __kasan_krealloc+0x190/0x1f0
[   16.973162]  krealloc_noprof+0xc1/0x140
[   16.973919]  krealloc_less_oob_helper+0x1ab/0x11d0
[   16.974710]  krealloc_less_oob+0x1c/0x30
[   16.975310]  kunit_try_run_case+0x1a6/0x480
[   16.976062]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.976686]  kthread+0x257/0x310
[   16.977106]  ret_from_fork+0x41/0x80
[   16.977812]  ret_from_fork_asm+0x1a/0x30
[   16.978350] 
[   16.979079] The buggy address belongs to the object at ffff88810099d400
[   16.979079]  which belongs to the cache kmalloc-256 of size 256
[   16.980381] The buggy address is located 33 bytes to the right of
[   16.980381]  allocated 201-byte region [ffff88810099d400, ffff88810099d4c9)
[   16.982176] 
[   16.982758] The buggy address belongs to the physical page:
[   16.983376] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10099c
[   16.984409] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.985366] flags: 0x200000000000040(head|node=0|zone=2)
[   16.986093] page_type: f5(slab)
[   16.986478] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   16.987312] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   16.988415] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   16.989288] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   16.989914] head: 0200000000000001 ffffea0004026701 ffffffffffffffff 0000000000000000
[   16.990500] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   16.991016] page dumped because: kasan: bad access detected
[   16.991852] 
[   16.992132] Memory state around the buggy address:
[   16.992654]  ffff88810099d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.993795]  ffff88810099d400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.994055] >ffff88810099d480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.994379]                                                           ^
[   16.995440]  ffff88810099d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.996624]  ffff88810099d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.996972] ==================================================================
[   16.894558] ==================================================================
[   16.895649] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec8/0x11d0
[   16.896410] Write of size 1 at addr ffff88810099d4da by task kunit_try_catch/163
[   16.897037] 
[   16.897284] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   16.897401] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.897437] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.897493] Call Trace:
[   16.897543]  <TASK>
[   16.897592]  dump_stack_lvl+0x73/0xb0
[   16.897670]  print_report+0xd1/0x640
[   16.897743]  ? __virt_addr_valid+0x1db/0x2d0
[   16.897818]  ? krealloc_less_oob_helper+0xec8/0x11d0
[   16.897982]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.898057]  ? krealloc_less_oob_helper+0xec8/0x11d0
[   16.898126]  kasan_report+0x140/0x180
[   16.898200]  ? krealloc_less_oob_helper+0xec8/0x11d0
[   16.898305]  __asan_report_store1_noabort+0x1b/0x30
[   16.898377]  krealloc_less_oob_helper+0xec8/0x11d0
[   16.898455]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   16.898619]  ? finish_task_switch.isra.0+0x153/0x700
[   16.898686]  ? __switch_to+0x5d9/0xf60
[   16.898747]  ? __schedule+0xc49/0x27a0
[   16.898778]  ? __pfx_read_tsc+0x10/0x10
[   16.898815]  krealloc_less_oob+0x1c/0x30
[   16.898876]  kunit_try_run_case+0x1a6/0x480
[   16.898910]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.898938]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   16.898966]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.899001]  ? __kthread_parkme+0x82/0x160
[   16.899028]  ? preempt_count_sub+0x50/0x80
[   16.899056]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.899083]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.899118]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.899154]  kthread+0x257/0x310
[   16.899179]  ? __pfx_kthread+0x10/0x10
[   16.899205]  ret_from_fork+0x41/0x80
[   16.899269]  ? __pfx_kthread+0x10/0x10
[   16.899297]  ret_from_fork_asm+0x1a/0x30
[   16.899337]  </TASK>
[   16.899351] 
[   16.916454] Allocated by task 163:
[   16.916868]  kasan_save_stack+0x45/0x70
[   16.917755]  kasan_save_track+0x18/0x40
[   16.918342]  kasan_save_alloc_info+0x3b/0x50
[   16.918973]  __kasan_krealloc+0x190/0x1f0
[   16.919461]  krealloc_noprof+0xc1/0x140
[   16.919809]  krealloc_less_oob_helper+0x1ab/0x11d0
[   16.920413]  krealloc_less_oob+0x1c/0x30
[   16.920847]  kunit_try_run_case+0x1a6/0x480
[   16.921371]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.922199]  kthread+0x257/0x310
[   16.923010]  ret_from_fork+0x41/0x80
[   16.923401]  ret_from_fork_asm+0x1a/0x30
[   16.923769] 
[   16.924067] The buggy address belongs to the object at ffff88810099d400
[   16.924067]  which belongs to the cache kmalloc-256 of size 256
[   16.924935] The buggy address is located 17 bytes to the right of
[   16.924935]  allocated 201-byte region [ffff88810099d400, ffff88810099d4c9)
[   16.926131] 
[   16.926336] The buggy address belongs to the physical page:
[   16.927110] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10099c
[   16.928010] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.929648] flags: 0x200000000000040(head|node=0|zone=2)
[   16.930127] page_type: f5(slab)
[   16.930678] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   16.931744] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   16.932465] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   16.933272] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   16.934256] head: 0200000000000001 ffffea0004026701 ffffffffffffffff 0000000000000000
[   16.935296] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   16.936161] page dumped because: kasan: bad access detected
[   16.937043] 
[   16.937235] Memory state around the buggy address:
[   16.938426]  ffff88810099d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.939365]  ffff88810099d400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.940330] >ffff88810099d480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.941091]                                                     ^
[   16.941470]  ffff88810099d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.942693]  ffff88810099d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.944169] ==================================================================
[   17.175701] ==================================================================
[   17.176782] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe25/0x11d0
[   17.177892] Write of size 1 at addr ffff888102be20d0 by task kunit_try_catch/167
[   17.179119] 
[   17.179804] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   17.179907] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.179924] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.179954] Call Trace:
[   17.179978]  <TASK>
[   17.180001]  dump_stack_lvl+0x73/0xb0
[   17.180044]  print_report+0xd1/0x640
[   17.180080]  ? __virt_addr_valid+0x1db/0x2d0
[   17.180115]  ? krealloc_less_oob_helper+0xe25/0x11d0
[   17.180144]  ? kasan_addr_to_slab+0x11/0xa0
[   17.180177]  ? krealloc_less_oob_helper+0xe25/0x11d0
[   17.180207]  kasan_report+0x140/0x180
[   17.180271]  ? krealloc_less_oob_helper+0xe25/0x11d0
[   17.180309]  __asan_report_store1_noabort+0x1b/0x30
[   17.180340]  krealloc_less_oob_helper+0xe25/0x11d0
[   17.180373]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   17.180403]  ? finish_task_switch.isra.0+0x153/0x700
[   17.180433]  ? __switch_to+0x5d9/0xf60
[   17.180547]  ? __schedule+0xc49/0x27a0
[   17.180598]  ? __pfx_read_tsc+0x10/0x10
[   17.180631]  krealloc_large_less_oob+0x1c/0x30
[   17.180659]  kunit_try_run_case+0x1a6/0x480
[   17.180693]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.180722]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   17.180749]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.180783]  ? __kthread_parkme+0x82/0x160
[   17.180837]  ? preempt_count_sub+0x50/0x80
[   17.180894]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.180923]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.180959]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.180995]  kthread+0x257/0x310
[   17.181019]  ? __pfx_kthread+0x10/0x10
[   17.181044]  ret_from_fork+0x41/0x80
[   17.181072]  ? __pfx_kthread+0x10/0x10
[   17.181097]  ret_from_fork_asm+0x1a/0x30
[   17.181137]  </TASK>
[   17.181150] 
[   17.202325] The buggy address belongs to the physical page:
[   17.202841] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102be0
[   17.203758] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.205252] flags: 0x200000000000040(head|node=0|zone=2)
[   17.205769] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   17.206588] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   17.208199] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   17.209170] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   17.209780] head: 0200000000000002 ffffea00040af801 ffffffffffffffff 0000000000000000
[   17.210693] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   17.211691] page dumped because: kasan: bad access detected
[   17.212928] 
[   17.213607] Memory state around the buggy address:
[   17.214025]  ffff888102be1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.214778]  ffff888102be2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.215599] >ffff888102be2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.216281]                                                  ^
[   17.217002]  ffff888102be2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.218005]  ffff888102be2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.219380] ==================================================================
[   17.220901] ==================================================================
[   17.222022] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec8/0x11d0
[   17.223123] Write of size 1 at addr ffff888102be20da by task kunit_try_catch/167
[   17.224316] 
[   17.224607] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   17.224745] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.224771] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.224845] Call Trace:
[   17.224961]  <TASK>
[   17.225043]  dump_stack_lvl+0x73/0xb0
[   17.225142]  print_report+0xd1/0x640
[   17.225209]  ? __virt_addr_valid+0x1db/0x2d0
[   17.225301]  ? krealloc_less_oob_helper+0xec8/0x11d0
[   17.225365]  ? kasan_addr_to_slab+0x11/0xa0
[   17.225426]  ? krealloc_less_oob_helper+0xec8/0x11d0
[   17.225489]  kasan_report+0x140/0x180
[   17.225555]  ? krealloc_less_oob_helper+0xec8/0x11d0
[   17.225629]  __asan_report_store1_noabort+0x1b/0x30
[   17.225703]  krealloc_less_oob_helper+0xec8/0x11d0
[   17.225785]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   17.225865]  ? finish_task_switch.isra.0+0x153/0x700
[   17.225941]  ? __switch_to+0x5d9/0xf60
[   17.226031]  ? __schedule+0xc49/0x27a0
[   17.226066]  ? __pfx_read_tsc+0x10/0x10
[   17.226100]  krealloc_large_less_oob+0x1c/0x30
[   17.226134]  kunit_try_run_case+0x1a6/0x480
[   17.226172]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.226204]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   17.226312]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.226402]  ? __kthread_parkme+0x82/0x160
[   17.226439]  ? preempt_count_sub+0x50/0x80
[   17.226550]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.226602]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.226646]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.226688]  kthread+0x257/0x310
[   17.226716]  ? __pfx_kthread+0x10/0x10
[   17.226746]  ret_from_fork+0x41/0x80
[   17.226776]  ? __pfx_kthread+0x10/0x10
[   17.226804]  ret_from_fork_asm+0x1a/0x30
[   17.226889]  </TASK>
[   17.226906] 
[   17.248075] The buggy address belongs to the physical page:
[   17.248788] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102be0
[   17.249775] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.250402] flags: 0x200000000000040(head|node=0|zone=2)
[   17.251427] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   17.252340] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   17.253173] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   17.253824] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   17.254936] head: 0200000000000002 ffffea00040af801 ffffffffffffffff 0000000000000000
[   17.255534] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   17.256338] page dumped because: kasan: bad access detected
[   17.257083] 
[   17.257337] Memory state around the buggy address:
[   17.257816]  ffff888102be1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.258631]  ffff888102be2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.259882] >ffff888102be2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.260960]                                                     ^
[   17.261426]  ffff888102be2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.262425]  ffff888102be2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.263131] ==================================================================