Hay
Date
Feb. 5, 2025, 2:09 p.m.

Environment
qemu-armv7
qemu-x86_64

[  144.763762] ==================================================================
[  144.764509] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1a8/0x5f0
[  144.765301] Write of size 1 at addr c4c17cda by task kunit_try_catch/131
[  144.767137] 
[  144.767447] CPU: 0 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  144.768434] Hardware name: Generic DT based system
[  144.768993]  unwind_backtrace from show_stack+0x18/0x1c
[  144.769730]  show_stack from dump_stack_lvl+0x58/0x70
[  144.770435]  dump_stack_lvl from print_report+0x164/0x51c
[  144.771213]  print_report from kasan_report+0xc8/0x104
[  144.771867]  kasan_report from krealloc_less_oob_helper+0x1a8/0x5f0
[  144.772810]  krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[  144.773717]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  144.774678]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  144.775619]  kthread from ret_from_fork+0x14/0x30
[  144.776375] Exception stack(0xf9f23fb0 to 0xf9f23ff8)
[  144.776930] 3fa0:                                     00000000 00000000 00000000 00000000
[  144.777883] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  144.778761] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  144.779509] 
[  144.779817] Allocated by task 131:
[  144.780202]  kasan_set_track+0x3c/0x5c
[  144.780703]  __kasan_krealloc+0xe0/0x104
[  144.781385]  krealloc+0xd4/0x134
[  144.781841]  krealloc_less_oob_helper+0xd4/0x5f0
[  144.782489]  kunit_try_run_case+0x11c/0x2e4
[  144.782997]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  144.783804]  kthread+0x184/0x1a8
[  144.784276]  ret_from_fork+0x14/0x30
[  144.784705] 
[  144.785086] The buggy address belongs to the object at c4c17c00
[  144.785086]  which belongs to the cache kmalloc-256 of size 256
[  144.786810] The buggy address is located 17 bytes to the right of
[  144.786810]  allocated 201-byte region [c4c17c00, c4c17cc9)
[  144.788088] 
[  144.788431] The buggy address belongs to the physical page:
[  144.789084] page:17c33a57 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44c16
[  144.790127] head:17c33a57 order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  144.790870] flags: 0x840(slab|head|zone=0)
[  144.791395] page_type: 0xffffffff()
[  144.791803] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[  144.792906] raw: 00000000
[  144.793257] page dumped because: kasan: bad access detected
[  144.793936] 
[  144.794318] Memory state around the buggy address:
[  144.794886]  c4c17b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  144.795675]  c4c17c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  144.796386] >c4c17c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[  144.797129]                                             ^
[  144.797689]  c4c17d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  144.798671]  c4c17d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  144.799462] ==================================================================
[  144.687805] ==================================================================
[  144.688897] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x114/0x5f0
[  144.689687] Write of size 1 at addr c4c17cc9 by task kunit_try_catch/131
[  144.690352] 
[  144.690690] CPU: 0 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  144.691566] Hardware name: Generic DT based system
[  144.692140]  unwind_backtrace from show_stack+0x18/0x1c
[  144.692738]  show_stack from dump_stack_lvl+0x58/0x70
[  144.693505]  dump_stack_lvl from print_report+0x164/0x51c
[  144.694123]  print_report from kasan_report+0xc8/0x104
[  144.694967]  kasan_report from krealloc_less_oob_helper+0x114/0x5f0
[  144.695829]  krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[  144.696844]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  144.697816]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  144.698688]  kthread from ret_from_fork+0x14/0x30
[  144.699267] Exception stack(0xf9f23fb0 to 0xf9f23ff8)
[  144.699914] 3fa0:                                     00000000 00000000 00000000 00000000
[  144.700796] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  144.701751] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  144.702452] 
[  144.702738] Allocated by task 131:
[  144.703196]  kasan_set_track+0x3c/0x5c
[  144.703758]  __kasan_krealloc+0xe0/0x104
[  144.704297]  krealloc+0xd4/0x134
[  144.704692]  krealloc_less_oob_helper+0xd4/0x5f0
[  144.705408]  kunit_try_run_case+0x11c/0x2e4
[  144.706328]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  144.707287]  kthread+0x184/0x1a8
[  144.707669]  ret_from_fork+0x14/0x30
[  144.708430] 
[  144.708997] The buggy address belongs to the object at c4c17c00
[  144.708997]  which belongs to the cache kmalloc-256 of size 256
[  144.710241] The buggy address is located 0 bytes to the right of
[  144.710241]  allocated 201-byte region [c4c17c00, c4c17cc9)
[  144.711407] 
[  144.711754] The buggy address belongs to the physical page:
[  144.712475] page:17c33a57 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44c16
[  144.713487] head:17c33a57 order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  144.714485] flags: 0x840(slab|head|zone=0)
[  144.715095] page_type: 0xffffffff()
[  144.715585] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[  144.716549] raw: 00000000
[  144.717071] page dumped because: kasan: bad access detected
[  144.717742] 
[  144.718073] Memory state around the buggy address:
[  144.718694]  c4c17b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  144.719451]  c4c17c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  144.720294] >c4c17c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[  144.721020]                                       ^
[  144.721609]  c4c17d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  144.722466]  c4c17d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  144.723240] ==================================================================
[  145.042680] ==================================================================
[  145.043264] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1e0/0x5f0
[  145.044619] Write of size 1 at addr c4ffe0ea by task kunit_try_catch/135
[  145.045580] 
[  145.045840] CPU: 0 PID: 135 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  145.047146] Hardware name: Generic DT based system
[  145.048152]  unwind_backtrace from show_stack+0x18/0x1c
[  145.048838]  show_stack from dump_stack_lvl+0x58/0x70
[  145.049532]  dump_stack_lvl from print_report+0x164/0x51c
[  145.051189]  print_report from kasan_report+0xc8/0x104
[  145.051968]  kasan_report from krealloc_less_oob_helper+0x1e0/0x5f0
[  145.052932]  krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[  145.053896]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  145.054908]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  145.055826]  kthread from ret_from_fork+0x14/0x30
[  145.056482] Exception stack(0xf9f43fb0 to 0xf9f43ff8)
[  145.057192] 3fa0:                                     00000000 00000000 00000000 00000000
[  145.058185] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  145.059169] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  145.059918] 
[  145.060284] The buggy address belongs to the physical page:
[  145.060994] page:a8595845 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ffc
[  145.062098] head:a8595845 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  145.063103] flags: 0x40(head|zone=0)
[  145.063739] page_type: 0xffffffff()
[  145.064244] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  145.065311] raw: 00000000
[  145.065847] page dumped because: kasan: bad access detected
[  145.066522] 
[  145.066767] Memory state around the buggy address:
[  145.067554]  c4ffdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  145.068378]  c4ffe000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  145.069339] >c4ffe080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  145.070066]                                                   ^
[  145.070928]  c4ffe100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  145.072161]  c4ffe180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  145.073157] ==================================================================
[  144.801098] ==================================================================
[  144.801830] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1e0/0x5f0
[  144.802834] Write of size 1 at addr c4c17cea by task kunit_try_catch/131
[  144.803509] 
[  144.803796] CPU: 0 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  144.804685] Hardware name: Generic DT based system
[  144.805262]  unwind_backtrace from show_stack+0x18/0x1c
[  144.806676]  show_stack from dump_stack_lvl+0x58/0x70
[  144.807818]  dump_stack_lvl from print_report+0x164/0x51c
[  144.809087]  print_report from kasan_report+0xc8/0x104
[  144.810034]  kasan_report from krealloc_less_oob_helper+0x1e0/0x5f0
[  144.810910]  krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[  144.811844]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  144.812879]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  144.813806]  kthread from ret_from_fork+0x14/0x30
[  144.814489] Exception stack(0xf9f23fb0 to 0xf9f23ff8)
[  144.815261] 3fa0:                                     00000000 00000000 00000000 00000000
[  144.816280] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  144.817203] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  144.817982] 
[  144.818350] Allocated by task 131:
[  144.818936]  kasan_set_track+0x3c/0x5c
[  144.819722]  __kasan_krealloc+0xe0/0x104
[  144.820281]  krealloc+0xd4/0x134
[  144.820736]  krealloc_less_oob_helper+0xd4/0x5f0
[  144.821358]  kunit_try_run_case+0x11c/0x2e4
[  144.822199]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  144.822944]  kthread+0x184/0x1a8
[  144.823603]  ret_from_fork+0x14/0x30
[  144.824138] 
[  144.824523] The buggy address belongs to the object at c4c17c00
[  144.824523]  which belongs to the cache kmalloc-256 of size 256
[  144.825925] The buggy address is located 33 bytes to the right of
[  144.825925]  allocated 201-byte region [c4c17c00, c4c17cc9)
[  144.828343] 
[  144.828928] The buggy address belongs to the physical page:
[  144.829834] page:17c33a57 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44c16
[  144.830953] head:17c33a57 order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  144.831670] flags: 0x840(slab|head|zone=0)
[  144.832348] page_type: 0xffffffff()
[  144.832869] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[  144.833806] raw: 00000000
[  144.834173] page dumped because: kasan: bad access detected
[  144.834813] 
[  144.835168] Memory state around the buggy address:
[  144.835747]  c4c17b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  144.836560]  c4c17c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  144.837454] >c4c17c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[  144.838399]                                                   ^
[  144.838984]  c4c17d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  144.839765]  c4c17d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  144.840490] ==================================================================
[  145.074565] ==================================================================
[  145.075236] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x214/0x5f0
[  145.075990] Write of size 1 at addr c4ffe0eb by task kunit_try_catch/135
[  145.076985] 
[  145.077331] CPU: 0 PID: 135 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  145.078316] Hardware name: Generic DT based system
[  145.079141]  unwind_backtrace from show_stack+0x18/0x1c
[  145.079843]  show_stack from dump_stack_lvl+0x58/0x70
[  145.080489]  dump_stack_lvl from print_report+0x164/0x51c
[  145.081321]  print_report from kasan_report+0xc8/0x104
[  145.082045]  kasan_report from krealloc_less_oob_helper+0x214/0x5f0
[  145.082918]  krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[  145.083905]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  145.085003]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  145.086291]  kthread from ret_from_fork+0x14/0x30
[  145.087617] Exception stack(0xf9f43fb0 to 0xf9f43ff8)
[  145.088258] 3fa0:                                     00000000 00000000 00000000 00000000
[  145.089234] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  145.090154] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  145.090825] 
[  145.091151] The buggy address belongs to the physical page:
[  145.091742] page:a8595845 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ffc
[  145.092658] head:a8595845 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  145.093458] flags: 0x40(head|zone=0)
[  145.093935] page_type: 0xffffffff()
[  145.094365] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  145.095260] raw: 00000000
[  145.095681] page dumped because: kasan: bad access detected
[  145.096236] 
[  145.096583] Memory state around the buggy address:
[  145.097219]  c4ffdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  145.097989]  c4ffe000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  145.098620] >c4ffe080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  145.099361]                                                   ^
[  145.099923]  c4ffe100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  145.100834]  c4ffe180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  145.101546] ==================================================================
[  144.953598] ==================================================================
[  144.954801] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x114/0x5f0
[  144.955531] Write of size 1 at addr c4ffe0c9 by task kunit_try_catch/135
[  144.956258] 
[  144.956574] CPU: 0 PID: 135 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  144.957542] Hardware name: Generic DT based system
[  144.958232]  unwind_backtrace from show_stack+0x18/0x1c
[  144.958981]  show_stack from dump_stack_lvl+0x58/0x70
[  144.959675]  dump_stack_lvl from print_report+0x164/0x51c
[  144.960356]  print_report from kasan_report+0xc8/0x104
[  144.961108]  kasan_report from krealloc_less_oob_helper+0x114/0x5f0
[  144.962019]  krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[  144.962949]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  144.963988]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  144.964842]  kthread from ret_from_fork+0x14/0x30
[  144.965425] Exception stack(0xf9f43fb0 to 0xf9f43ff8)
[  144.966088] 3fa0:                                     00000000 00000000 00000000 00000000
[  144.967712] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  144.968832] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  144.969567] 
[  144.969815] The buggy address belongs to the physical page:
[  144.970484] page:a8595845 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ffc
[  144.971333] head:a8595845 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  144.972098] flags: 0x40(head|zone=0)
[  144.972663] page_type: 0xffffffff()
[  144.973222] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  144.973977] raw: 00000000
[  144.974431] page dumped because: kasan: bad access detected
[  144.974963] 
[  144.975327] Memory state around the buggy address:
[  144.975924]  c4ffdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  144.976644]  c4ffe000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  144.977465] >c4ffe080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  144.978168]                                       ^
[  144.978647]  c4ffe100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  144.979465]  c4ffe180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  144.980163] ==================================================================
[  144.841597] ==================================================================
[  144.843233] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x214/0x5f0
[  144.843982] Write of size 1 at addr c4c17ceb by task kunit_try_catch/131
[  144.844743] 
[  144.844980] CPU: 0 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  144.846382] Hardware name: Generic DT based system
[  144.847004]  unwind_backtrace from show_stack+0x18/0x1c
[  144.847792]  show_stack from dump_stack_lvl+0x58/0x70
[  144.848434]  dump_stack_lvl from print_report+0x164/0x51c
[  144.849279]  print_report from kasan_report+0xc8/0x104
[  144.849962]  kasan_report from krealloc_less_oob_helper+0x214/0x5f0
[  144.850807]  krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[  144.851567]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  144.852506]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  144.853475]  kthread from ret_from_fork+0x14/0x30
[  144.854086] Exception stack(0xf9f23fb0 to 0xf9f23ff8)
[  144.854649] 3fa0:                                     00000000 00000000 00000000 00000000
[  144.855667] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  144.856522] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  144.857289] 
[  144.857579] Allocated by task 131:
[  144.857933]  kasan_set_track+0x3c/0x5c
[  144.858750]  __kasan_krealloc+0xe0/0x104
[  144.859378]  krealloc+0xd4/0x134
[  144.859784]  krealloc_less_oob_helper+0xd4/0x5f0
[  144.860492]  kunit_try_run_case+0x11c/0x2e4
[  144.861072]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  144.861745]  kthread+0x184/0x1a8
[  144.862185]  ret_from_fork+0x14/0x30
[  144.862762] 
[  144.863088] The buggy address belongs to the object at c4c17c00
[  144.863088]  which belongs to the cache kmalloc-256 of size 256
[  144.864118] The buggy address is located 34 bytes to the right of
[  144.864118]  allocated 201-byte region [c4c17c00, c4c17cc9)
[  144.865334] 
[  144.865632] The buggy address belongs to the physical page:
[  144.866975] page:17c33a57 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44c16
[  144.867794] head:17c33a57 order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  144.868763] flags: 0x840(slab|head|zone=0)
[  144.869269] page_type: 0xffffffff()
[  144.869712] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[  144.870737] raw: 00000000
[  144.871147] page dumped because: kasan: bad access detected
[  144.871741] 
[  144.872034] Memory state around the buggy address:
[  144.872609]  c4c17b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  144.873487]  c4c17c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  144.874173] >c4c17c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[  144.874906]                                                   ^
[  144.875854]  c4c17d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  144.876645]  c4c17d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  144.877426] ==================================================================
[  144.983174] ==================================================================
[  144.983881] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x150/0x5f0
[  144.984674] Write of size 1 at addr c4ffe0d0 by task kunit_try_catch/135
[  144.985385] 
[  144.985642] CPU: 0 PID: 135 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  144.986502] Hardware name: Generic DT based system
[  144.987542]  unwind_backtrace from show_stack+0x18/0x1c
[  144.988438]  show_stack from dump_stack_lvl+0x58/0x70
[  144.989403]  dump_stack_lvl from print_report+0x164/0x51c
[  144.989761]  print_report from kasan_report+0xc8/0x104
[  144.990171]  kasan_report from krealloc_less_oob_helper+0x150/0x5f0
[  144.991501]  krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[  144.992667]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  144.993685]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  144.994604]  kthread from ret_from_fork+0x14/0x30
[  144.995299] Exception stack(0xf9f43fb0 to 0xf9f43ff8)
[  144.996025] 3fa0:                                     00000000 00000000 00000000 00000000
[  144.997002] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  144.997919] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  144.998761] 
[  144.999040] The buggy address belongs to the physical page:
[  144.999677] page:a8595845 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ffc
[  145.000659] head:a8595845 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  145.001552] flags: 0x40(head|zone=0)
[  145.002101] page_type: 0xffffffff()
[  145.002569] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  145.003585] raw: 00000000
[  145.003989] page dumped because: kasan: bad access detected
[  145.004724] 
[  145.005097] Memory state around the buggy address:
[  145.005853]  c4ffdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  145.007281]  c4ffe000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  145.008118] >c4ffe080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  145.008889]                                          ^
[  145.009534]  c4ffe100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  145.010338]  c4ffe180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  145.011125] ==================================================================
[  145.012395] ==================================================================
[  145.012932] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1a8/0x5f0
[  145.014002] Write of size 1 at addr c4ffe0da by task kunit_try_catch/135
[  145.015235] 
[  145.015492] CPU: 0 PID: 135 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  145.016621] Hardware name: Generic DT based system
[  145.017240]  unwind_backtrace from show_stack+0x18/0x1c
[  145.018096]  show_stack from dump_stack_lvl+0x58/0x70
[  145.018800]  dump_stack_lvl from print_report+0x164/0x51c
[  145.019577]  print_report from kasan_report+0xc8/0x104
[  145.020360]  kasan_report from krealloc_less_oob_helper+0x1a8/0x5f0
[  145.021271]  krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[  145.022217]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  145.023281]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  145.024208]  kthread from ret_from_fork+0x14/0x30
[  145.024871] Exception stack(0xf9f43fb0 to 0xf9f43ff8)
[  145.025555] 3fa0:                                     00000000 00000000 00000000 00000000
[  145.027031] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  145.028510] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  145.029942] 
[  145.030417] The buggy address belongs to the physical page:
[  145.031437] page:a8595845 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ffc
[  145.032588] head:a8595845 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  145.033396] flags: 0x40(head|zone=0)
[  145.033681] page_type: 0xffffffff()
[  145.033936] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  145.035091] raw: 00000000
[  145.035494] page dumped because: kasan: bad access detected
[  145.036126] 
[  145.036467] Memory state around the buggy address:
[  145.037105]  c4ffdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  145.038010]  c4ffe000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  145.038725] >c4ffe080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[  145.039458]                                             ^
[  145.040107]  c4ffe100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  145.040832]  c4ffe180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  145.041436] ==================================================================
[  144.726254] ==================================================================
[  144.727124] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x150/0x5f0
[  144.727933] Write of size 1 at addr c4c17cd0 by task kunit_try_catch/131
[  144.728673] 
[  144.729117] CPU: 0 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  144.730072] Hardware name: Generic DT based system
[  144.730715]  unwind_backtrace from show_stack+0x18/0x1c
[  144.731593]  show_stack from dump_stack_lvl+0x58/0x70
[  144.732301]  dump_stack_lvl from print_report+0x164/0x51c
[  144.733003]  print_report from kasan_report+0xc8/0x104
[  144.733718]  kasan_report from krealloc_less_oob_helper+0x150/0x5f0
[  144.734561]  krealloc_less_oob_helper from kunit_try_run_case+0x11c/0x2e4
[  144.735459]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  144.736642]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  144.737633]  kthread from ret_from_fork+0x14/0x30
[  144.738332] Exception stack(0xf9f23fb0 to 0xf9f23ff8)
[  144.738953] 3fa0:                                     00000000 00000000 00000000 00000000
[  144.739872] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  144.740846] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  144.741538] 
[  144.741783] Allocated by task 131:
[  144.742178]  kasan_set_track+0x3c/0x5c
[  144.742734]  __kasan_krealloc+0xe0/0x104
[  144.743387]  krealloc+0xd4/0x134
[  144.743855]  krealloc_less_oob_helper+0xd4/0x5f0
[  144.744437]  kunit_try_run_case+0x11c/0x2e4
[  144.745014]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  144.745738]  kthread+0x184/0x1a8
[  144.746227]  ret_from_fork+0x14/0x30
[  144.746753] 
[  144.747104] The buggy address belongs to the object at c4c17c00
[  144.747104]  which belongs to the cache kmalloc-256 of size 256
[  144.749628] The buggy address is located 7 bytes to the right of
[  144.749628]  allocated 201-byte region [c4c17c00, c4c17cc9)
[  144.751095] 
[  144.751739] The buggy address belongs to the physical page:
[  144.752577] page:17c33a57 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44c16
[  144.753436] head:17c33a57 order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  144.754232] flags: 0x840(slab|head|zone=0)
[  144.754714] page_type: 0xffffffff()
[  144.755220] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[  144.756127] raw: 00000000
[  144.756543] page dumped because: kasan: bad access detected
[  144.757147] 
[  144.757353] Memory state around the buggy address:
[  144.758046]  c4c17b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  144.758786]  c4c17c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  144.759464] >c4c17c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[  144.760162]                                          ^
[  144.760949]  c4c17d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  144.761675]  c4c17d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  144.762406] ==================================================================


[   47.723210] ==================================================================
[   47.724607] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x258/0x660
[   47.725451] Write of size 1 at addr ffff88810256a0ea by task kunit_try_catch/158
[   47.726633] 
[   47.727072] CPU: 1 PID: 158 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[   47.728495] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.729473] Call Trace:
[   47.729913]  <TASK>
[   47.730148]  dump_stack_lvl+0x4e/0x90
[   47.730949]  print_report+0xd2/0x660
[   47.731603]  ? __virt_addr_valid+0x156/0x1e0
[   47.732060]  ? kasan_addr_to_slab+0x11/0xb0
[   47.732824]  kasan_report+0xff/0x140
[   47.733475]  ? krealloc_less_oob_helper+0x258/0x660
[   47.734149]  ? krealloc_less_oob_helper+0x258/0x660
[   47.734970]  __asan_store1+0x69/0x70
[   47.735777]  krealloc_less_oob_helper+0x258/0x660
[   47.736340]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   47.737175]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   47.738082]  ? __schedule+0x70b/0x1190
[   47.738602]  ? ktime_get_ts64+0x118/0x140
[   47.739203]  krealloc_pagealloc_less_oob+0x1c/0x30
[   47.740098]  kunit_try_run_case+0x126/0x290
[   47.741199]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.741729]  ? __kasan_check_write+0x18/0x20
[   47.742249]  ? trace_preempt_on+0x20/0xa0
[   47.742704]  ? __kthread_parkme+0x4f/0xd0
[   47.743966]  ? preempt_count_sub+0x50/0x80
[   47.744568]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.745434]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   47.746262]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.746868]  kthread+0x19e/0x1e0
[   47.747413]  ? __pfx_kthread+0x10/0x10
[   47.748463]  ret_from_fork+0x41/0x70
[   47.749291]  ? __pfx_kthread+0x10/0x10
[   47.749848]  ret_from_fork_asm+0x1b/0x30
[   47.750591]  </TASK>
[   47.751130] 
[   47.751417] The buggy address belongs to the physical page:
[   47.752351] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102568
[   47.753312] head:(____ptrval____) order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.753906] flags: 0x200000000000040(head|node=0|zone=2)
[   47.754769] page_type: 0xffffffff()
[   47.755337] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   47.756478] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   47.757543] page dumped because: kasan: bad access detected
[   47.758439] 
[   47.758653] Memory state around the buggy address:
[   47.759192]  ffff888102569f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.759991]  ffff88810256a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.760518] >ffff88810256a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   47.761110]                                                           ^
[   47.761932]  ffff88810256a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   47.762510]  ffff88810256a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   47.763987] ==================================================================
[   47.324390] ==================================================================
[   47.325336] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x21a/0x660
[   47.326400] Write of size 1 at addr ffff8881028578da by task kunit_try_catch/154
[   47.327169] 
[   47.327691] CPU: 1 PID: 154 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[   47.329292] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.330158] Call Trace:
[   47.330712]  <TASK>
[   47.331099]  dump_stack_lvl+0x4e/0x90
[   47.331886]  print_report+0xd2/0x660
[   47.332919]  ? __virt_addr_valid+0x156/0x1e0
[   47.333585]  ? kasan_complete_mode_report_info+0x2a/0x200
[   47.334242]  kasan_report+0xff/0x140
[   47.334813]  ? krealloc_less_oob_helper+0x21a/0x660
[   47.335649]  ? krealloc_less_oob_helper+0x21a/0x660
[   47.336480]  __asan_store1+0x69/0x70
[   47.337361]  krealloc_less_oob_helper+0x21a/0x660
[   47.338353]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   47.339039]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   47.339645]  ? __schedule+0x70b/0x1190
[   47.340603]  ? ktime_get_ts64+0x118/0x140
[   47.341278]  krealloc_less_oob+0x1c/0x30
[   47.341874]  kunit_try_run_case+0x126/0x290
[   47.342651]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.343456]  ? __kasan_check_write+0x18/0x20
[   47.344440]  ? trace_preempt_on+0x20/0xa0
[   47.344963]  ? __kthread_parkme+0x4f/0xd0
[   47.345678]  ? preempt_count_sub+0x50/0x80
[   47.346477]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.347092]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   47.347715]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.348727]  kthread+0x19e/0x1e0
[   47.349232]  ? __pfx_kthread+0x10/0x10
[   47.349964]  ret_from_fork+0x41/0x70
[   47.350804]  ? __pfx_kthread+0x10/0x10
[   47.351356]  ret_from_fork_asm+0x1b/0x30
[   47.351999]  </TASK>
[   47.352344] 
[   47.352584] Allocated by task 154:
[   47.353553]  kasan_save_stack+0x3c/0x60
[   47.354396]  kasan_set_track+0x29/0x40
[   47.354923]  kasan_save_alloc_info+0x22/0x30
[   47.355645]  __kasan_krealloc+0x12f/0x180
[   47.356675]  krealloc+0xc1/0x140
[   47.357348]  krealloc_less_oob_helper+0xe5/0x660
[   47.358233]  krealloc_less_oob+0x1c/0x30
[   47.358750]  kunit_try_run_case+0x126/0x290
[   47.359252]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.360403]  kthread+0x19e/0x1e0
[   47.360820]  ret_from_fork+0x41/0x70
[   47.361531]  ret_from_fork_asm+0x1b/0x30
[   47.362382] 
[   47.362626] The buggy address belongs to the object at ffff888102857800
[   47.362626]  which belongs to the cache kmalloc-256 of size 256
[   47.363883] The buggy address is located 17 bytes to the right of
[   47.363883]  allocated 201-byte region [ffff888102857800, ffff8881028578c9)
[   47.365452] 
[   47.365731] The buggy address belongs to the physical page:
[   47.366589] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102856
[   47.367601] head:(____ptrval____) order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.368793] flags: 0x200000000000840(slab|head|node=0|zone=2)
[   47.369411] page_type: 0xffffffff()
[   47.370324] raw: 0200000000000840 ffff888100041b40 dead000000000122 0000000000000000
[   47.371100] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   47.371753] page dumped because: kasan: bad access detected
[   47.372340] 
[   47.372587] Memory state around the buggy address:
[   47.373053]  ffff888102857780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.374522]  ffff888102857800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.375324] >ffff888102857880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   47.376367]                                                     ^
[   47.377078]  ffff888102857900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.378339]  ffff888102857980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.378979] ==================================================================
[   47.268633] ==================================================================
[   47.269384] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1a6/0x660
[   47.270899] Write of size 1 at addr ffff8881028578d0 by task kunit_try_catch/154
[   47.272077] 
[   47.272291] CPU: 1 PID: 154 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[   47.273187] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.274228] Call Trace:
[   47.274733]  <TASK>
[   47.275083]  dump_stack_lvl+0x4e/0x90
[   47.275561]  print_report+0xd2/0x660
[   47.276091]  ? __virt_addr_valid+0x156/0x1e0
[   47.276717]  ? kasan_complete_mode_report_info+0x2a/0x200
[   47.277963]  kasan_report+0xff/0x140
[   47.278670]  ? krealloc_less_oob_helper+0x1a6/0x660
[   47.279441]  ? krealloc_less_oob_helper+0x1a6/0x660
[   47.280125]  __asan_store1+0x69/0x70
[   47.281105]  krealloc_less_oob_helper+0x1a6/0x660
[   47.281654]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   47.282280]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   47.283203]  ? __schedule+0x70b/0x1190
[   47.283765]  ? ktime_get_ts64+0x118/0x140
[   47.284462]  krealloc_less_oob+0x1c/0x30
[   47.284981]  kunit_try_run_case+0x126/0x290
[   47.285935]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.286830]  ? __kasan_check_write+0x18/0x20
[   47.287552]  ? trace_preempt_on+0x20/0xa0
[   47.288447]  ? __kthread_parkme+0x4f/0xd0
[   47.289253]  ? preempt_count_sub+0x50/0x80
[   47.289769]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.290698]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   47.291534]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.292042]  kthread+0x19e/0x1e0
[   47.292577]  ? __pfx_kthread+0x10/0x10
[   47.293148]  ret_from_fork+0x41/0x70
[   47.293608]  ? __pfx_kthread+0x10/0x10
[   47.294551]  ret_from_fork_asm+0x1b/0x30
[   47.295475]  </TASK>
[   47.295902] 
[   47.296196] Allocated by task 154:
[   47.296843]  kasan_save_stack+0x3c/0x60
[   47.297443]  kasan_set_track+0x29/0x40
[   47.298515]  kasan_save_alloc_info+0x22/0x30
[   47.299266]  __kasan_krealloc+0x12f/0x180
[   47.300097]  krealloc+0xc1/0x140
[   47.300794]  krealloc_less_oob_helper+0xe5/0x660
[   47.301693]  krealloc_less_oob+0x1c/0x30
[   47.302458]  kunit_try_run_case+0x126/0x290
[   47.303079]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.304006]  kthread+0x19e/0x1e0
[   47.304654]  ret_from_fork+0x41/0x70
[   47.305497]  ret_from_fork_asm+0x1b/0x30
[   47.306258] 
[   47.306591] The buggy address belongs to the object at ffff888102857800
[   47.306591]  which belongs to the cache kmalloc-256 of size 256
[   47.307885] The buggy address is located 7 bytes to the right of
[   47.307885]  allocated 201-byte region [ffff888102857800, ffff8881028578c9)
[   47.310079] 
[   47.310402] The buggy address belongs to the physical page:
[   47.310982] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102856
[   47.312069] head:(____ptrval____) order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.312799] flags: 0x200000000000840(slab|head|node=0|zone=2)
[   47.313469] page_type: 0xffffffff()
[   47.314076] raw: 0200000000000840 ffff888100041b40 dead000000000122 0000000000000000
[   47.314915] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   47.315686] page dumped because: kasan: bad access detected
[   47.316362] 
[   47.316599] Memory state around the buggy address:
[   47.317247]  ffff888102857780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.317923]  ffff888102857800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.318791] >ffff888102857880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   47.319479]                                                  ^
[   47.320207]  ffff888102857900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.321705]  ffff888102857980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.322550] ==================================================================
[   47.591721] ==================================================================
[   47.592856] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x146/0x660
[   47.594149] Write of size 1 at addr ffff88810256a0c9 by task kunit_try_catch/158
[   47.594919] 
[   47.595462] CPU: 1 PID: 158 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[   47.596604] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.597439] Call Trace:
[   47.597696]  <TASK>
[   47.598513]  dump_stack_lvl+0x4e/0x90
[   47.599441]  print_report+0xd2/0x660
[   47.600131]  ? __virt_addr_valid+0x156/0x1e0
[   47.600884]  ? kasan_addr_to_slab+0x11/0xb0
[   47.601562]  kasan_report+0xff/0x140
[   47.602250]  ? krealloc_less_oob_helper+0x146/0x660
[   47.603298]  ? krealloc_less_oob_helper+0x146/0x660
[   47.603917]  __asan_store1+0x69/0x70
[   47.604760]  krealloc_less_oob_helper+0x146/0x660
[   47.605267]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   47.606088]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   47.606698]  ? __schedule+0x70b/0x1190
[   47.607459]  ? ktime_get_ts64+0x118/0x140
[   47.608058]  krealloc_pagealloc_less_oob+0x1c/0x30
[   47.608646]  kunit_try_run_case+0x126/0x290
[   47.609513]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.609899]  ? __kasan_check_write+0x18/0x20
[   47.610624]  ? trace_preempt_on+0x20/0xa0
[   47.611539]  ? __kthread_parkme+0x4f/0xd0
[   47.612207]  ? preempt_count_sub+0x50/0x80
[   47.612820]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.613452]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   47.614344]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.615134]  kthread+0x19e/0x1e0
[   47.615748]  ? __pfx_kthread+0x10/0x10
[   47.616522]  ret_from_fork+0x41/0x70
[   47.617064]  ? __pfx_kthread+0x10/0x10
[   47.617585]  ret_from_fork_asm+0x1b/0x30
[   47.618120]  </TASK>
[   47.618464] 
[   47.619623] The buggy address belongs to the physical page:
[   47.620424] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102568
[   47.621248] head:(____ptrval____) order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.621869] flags: 0x200000000000040(head|node=0|zone=2)
[   47.622498] page_type: 0xffffffff()
[   47.623325] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   47.624246] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   47.625244] page dumped because: kasan: bad access detected
[   47.625806] 
[   47.626248] Memory state around the buggy address:
[   47.626694]  ffff888102569f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.627674]  ffff88810256a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.628554] >ffff88810256a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   47.629431]                                               ^
[   47.630247]  ffff88810256a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   47.631091]  ffff88810256a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   47.631830] ==================================================================
[   47.434921] ==================================================================
[   47.435752] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x294/0x660
[   47.436601] Write of size 1 at addr ffff8881028578eb by task kunit_try_catch/154
[   47.437274] 
[   47.437575] CPU: 1 PID: 154 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[   47.439390] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.440597] Call Trace:
[   47.440960]  <TASK>
[   47.441313]  dump_stack_lvl+0x4e/0x90
[   47.441849]  print_report+0xd2/0x660
[   47.442286]  ? __virt_addr_valid+0x156/0x1e0
[   47.443259]  ? kasan_complete_mode_report_info+0x2a/0x200
[   47.444132]  kasan_report+0xff/0x140
[   47.444593]  ? krealloc_less_oob_helper+0x294/0x660
[   47.445962]  ? krealloc_less_oob_helper+0x294/0x660
[   47.446533]  __asan_store1+0x69/0x70
[   47.447072]  krealloc_less_oob_helper+0x294/0x660
[   47.447726]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   47.448859]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   47.450019]  ? __schedule+0x70b/0x1190
[   47.450815]  ? ktime_get_ts64+0x118/0x140
[   47.451488]  krealloc_less_oob+0x1c/0x30
[   47.452095]  kunit_try_run_case+0x126/0x290
[   47.452990]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.453541]  ? __kasan_check_write+0x18/0x20
[   47.454772]  ? trace_preempt_on+0x20/0xa0
[   47.455598]  ? __kthread_parkme+0x4f/0xd0
[   47.456126]  ? preempt_count_sub+0x50/0x80
[   47.456770]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.457390]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   47.459279]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.459860]  kthread+0x19e/0x1e0
[   47.460472]  ? __pfx_kthread+0x10/0x10
[   47.460978]  ret_from_fork+0x41/0x70
[   47.461685]  ? __pfx_kthread+0x10/0x10
[   47.462434]  ret_from_fork_asm+0x1b/0x30
[   47.462988]  </TASK>
[   47.463917] 
[   47.464192] Allocated by task 154:
[   47.464861]  kasan_save_stack+0x3c/0x60
[   47.465703]  kasan_set_track+0x29/0x40
[   47.466492]  kasan_save_alloc_info+0x22/0x30
[   47.467070]  __kasan_krealloc+0x12f/0x180
[   47.468091]  krealloc+0xc1/0x140
[   47.468791]  krealloc_less_oob_helper+0xe5/0x660
[   47.469594]  krealloc_less_oob+0x1c/0x30
[   47.470291]  kunit_try_run_case+0x126/0x290
[   47.471026]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.471733]  kthread+0x19e/0x1e0
[   47.472176]  ret_from_fork+0x41/0x70
[   47.472758]  ret_from_fork_asm+0x1b/0x30
[   47.473654] 
[   47.473912] The buggy address belongs to the object at ffff888102857800
[   47.473912]  which belongs to the cache kmalloc-256 of size 256
[   47.475848] The buggy address is located 34 bytes to the right of
[   47.475848]  allocated 201-byte region [ffff888102857800, ffff8881028578c9)
[   47.477426] 
[   47.477659] The buggy address belongs to the physical page:
[   47.479119] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102856
[   47.479801] head:(____ptrval____) order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.480560] flags: 0x200000000000840(slab|head|node=0|zone=2)
[   47.481306] page_type: 0xffffffff()
[   47.481893] raw: 0200000000000840 ffff888100041b40 dead000000000122 0000000000000000
[   47.482530] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   47.483411] page dumped because: kasan: bad access detected
[   47.484138] 
[   47.484451] Memory state around the buggy address:
[   47.485031]  ffff888102857780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.485856]  ffff888102857800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.486668] >ffff888102857880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   47.487522]                                                           ^
[   47.489310]  ffff888102857900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.490113]  ffff888102857980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.490758] ==================================================================
[   47.765452] ==================================================================
[   47.766711] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x294/0x660
[   47.768158] Write of size 1 at addr ffff88810256a0eb by task kunit_try_catch/158
[   47.768630] 
[   47.769414] CPU: 1 PID: 158 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[   47.770447] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.771353] Call Trace:
[   47.771863]  <TASK>
[   47.772321]  dump_stack_lvl+0x4e/0x90
[   47.772829]  print_report+0xd2/0x660
[   47.773399]  ? __virt_addr_valid+0x156/0x1e0
[   47.773996]  ? kasan_addr_to_slab+0x11/0xb0
[   47.774664]  kasan_report+0xff/0x140
[   47.775405]  ? krealloc_less_oob_helper+0x294/0x660
[   47.776172]  ? krealloc_less_oob_helper+0x294/0x660
[   47.776639]  __asan_store1+0x69/0x70
[   47.777303]  krealloc_less_oob_helper+0x294/0x660
[   47.778055]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   47.778760]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   47.779638]  ? __schedule+0x70b/0x1190
[   47.780267]  ? ktime_get_ts64+0x118/0x140
[   47.780731]  krealloc_pagealloc_less_oob+0x1c/0x30
[   47.781391]  kunit_try_run_case+0x126/0x290
[   47.782278]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.782751]  ? __kasan_check_write+0x18/0x20
[   47.783383]  ? trace_preempt_on+0x20/0xa0
[   47.784035]  ? __kthread_parkme+0x4f/0xd0
[   47.784668]  ? preempt_count_sub+0x50/0x80
[   47.785436]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.786226]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   47.787048]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.787701]  kthread+0x19e/0x1e0
[   47.788357]  ? __pfx_kthread+0x10/0x10
[   47.788834]  ret_from_fork+0x41/0x70
[   47.789975]  ? __pfx_kthread+0x10/0x10
[   47.790607]  ret_from_fork_asm+0x1b/0x30
[   47.791410]  </TASK>
[   47.792222] 
[   47.792468] The buggy address belongs to the physical page:
[   47.793124] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102568
[   47.794343] head:(____ptrval____) order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.795563] flags: 0x200000000000040(head|node=0|zone=2)
[   47.796401] page_type: 0xffffffff()
[   47.796837] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   47.797592] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   47.798618] page dumped because: kasan: bad access detected
[   47.799254] 
[   47.799516] Memory state around the buggy address:
[   47.800098]  ffff888102569f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.801499]  ffff88810256a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.802254] >ffff88810256a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   47.803321]                                                           ^
[   47.804336]  ffff88810256a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   47.804783]  ffff88810256a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   47.805988] ==================================================================
[   47.210271] ==================================================================
[   47.211869] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x146/0x660
[   47.213013] Write of size 1 at addr ffff8881028578c9 by task kunit_try_catch/154
[   47.214256] 
[   47.215208] CPU: 1 PID: 154 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[   47.215870] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.217479] Call Trace:
[   47.217795]  <TASK>
[   47.218368]  dump_stack_lvl+0x4e/0x90
[   47.219220]  print_report+0xd2/0x660
[   47.219826]  ? __virt_addr_valid+0x156/0x1e0
[   47.220631]  ? kasan_complete_mode_report_info+0x2a/0x200
[   47.221769]  kasan_report+0xff/0x140
[   47.222257]  ? krealloc_less_oob_helper+0x146/0x660
[   47.223266]  ? krealloc_less_oob_helper+0x146/0x660
[   47.223773]  __asan_store1+0x69/0x70
[   47.224651]  krealloc_less_oob_helper+0x146/0x660
[   47.225400]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   47.226178]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   47.226802]  ? __schedule+0x70b/0x1190
[   47.227315]  ? ktime_get_ts64+0x118/0x140
[   47.228092]  krealloc_less_oob+0x1c/0x30
[   47.228819]  kunit_try_run_case+0x126/0x290
[   47.229733]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.230778]  ? __kasan_check_write+0x18/0x20
[   47.231357]  ? trace_preempt_on+0x20/0xa0
[   47.232040]  ? __kthread_parkme+0x4f/0xd0
[   47.232840]  ? preempt_count_sub+0x50/0x80
[   47.233366]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.234067]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   47.234792]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.235779]  kthread+0x19e/0x1e0
[   47.236249]  ? __pfx_kthread+0x10/0x10
[   47.236828]  ret_from_fork+0x41/0x70
[   47.237383]  ? __pfx_kthread+0x10/0x10
[   47.238487]  ret_from_fork_asm+0x1b/0x30
[   47.239359]  </TASK>
[   47.239581] 
[   47.239850] Allocated by task 154:
[   47.240573]  kasan_save_stack+0x3c/0x60
[   47.241331]  kasan_set_track+0x29/0x40
[   47.241888]  kasan_save_alloc_info+0x22/0x30
[   47.242321]  __kasan_krealloc+0x12f/0x180
[   47.242902]  krealloc+0xc1/0x140
[   47.243621]  krealloc_less_oob_helper+0xe5/0x660
[   47.244385]  krealloc_less_oob+0x1c/0x30
[   47.245005]  kunit_try_run_case+0x126/0x290
[   47.245825]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.246753]  kthread+0x19e/0x1e0
[   47.247275]  ret_from_fork+0x41/0x70
[   47.248402]  ret_from_fork_asm+0x1b/0x30
[   47.248803] 
[   47.249084] The buggy address belongs to the object at ffff888102857800
[   47.249084]  which belongs to the cache kmalloc-256 of size 256
[   47.250789] The buggy address is located 0 bytes to the right of
[   47.250789]  allocated 201-byte region [ffff888102857800, ffff8881028578c9)
[   47.252114] 
[   47.252401] The buggy address belongs to the physical page:
[   47.252950] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102856
[   47.254516] head:(____ptrval____) order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.255505] flags: 0x200000000000840(slab|head|node=0|zone=2)
[   47.256285] page_type: 0xffffffff()
[   47.256822] raw: 0200000000000840 ffff888100041b40 dead000000000122 0000000000000000
[   47.257610] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   47.259110] page dumped because: kasan: bad access detected
[   47.259949] 
[   47.260527] Memory state around the buggy address:
[   47.261248]  ffff888102857780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.261968]  ffff888102857800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.263216] >ffff888102857880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   47.264136]                                               ^
[   47.264693]  ffff888102857900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.265731]  ffff888102857980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.266715] ==================================================================
[   47.635609] ==================================================================
[   47.636163] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1a6/0x660
[   47.636729] Write of size 1 at addr ffff88810256a0d0 by task kunit_try_catch/158
[   47.637526] 
[   47.637841] CPU: 1 PID: 158 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[   47.638801] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.640939] Call Trace:
[   47.641468]  <TASK>
[   47.641801]  dump_stack_lvl+0x4e/0x90
[   47.642757]  print_report+0xd2/0x660
[   47.643563]  ? __virt_addr_valid+0x156/0x1e0
[   47.644493]  ? kasan_addr_to_slab+0x11/0xb0
[   47.645350]  kasan_report+0xff/0x140
[   47.646216]  ? krealloc_less_oob_helper+0x1a6/0x660
[   47.646755]  ? krealloc_less_oob_helper+0x1a6/0x660
[   47.647489]  __asan_store1+0x69/0x70
[   47.648507]  krealloc_less_oob_helper+0x1a6/0x660
[   47.649222]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   47.649965]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   47.650844]  ? __schedule+0x70b/0x1190
[   47.651587]  ? ktime_get_ts64+0x118/0x140
[   47.652288]  krealloc_pagealloc_less_oob+0x1c/0x30
[   47.652784]  kunit_try_run_case+0x126/0x290
[   47.653466]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.654198]  ? __kasan_check_write+0x18/0x20
[   47.655052]  ? trace_preempt_on+0x20/0xa0
[   47.655804]  ? __kthread_parkme+0x4f/0xd0
[   47.656488]  ? preempt_count_sub+0x50/0x80
[   47.657238]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.658214]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   47.659092]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.660091]  kthread+0x19e/0x1e0
[   47.660615]  ? __pfx_kthread+0x10/0x10
[   47.661312]  ret_from_fork+0x41/0x70
[   47.662284]  ? __pfx_kthread+0x10/0x10
[   47.662664]  ret_from_fork_asm+0x1b/0x30
[   47.663519]  </TASK>
[   47.663975] 
[   47.664347] The buggy address belongs to the physical page:
[   47.664881] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102568
[   47.666125] head:(____ptrval____) order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.666983] flags: 0x200000000000040(head|node=0|zone=2)
[   47.667699] page_type: 0xffffffff()
[   47.668293] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   47.669668] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   47.670439] page dumped because: kasan: bad access detected
[   47.670886] 
[   47.671148] Memory state around the buggy address:
[   47.671597]  ffff888102569f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.672781]  ffff88810256a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.673838] >ffff88810256a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   47.674773]                                                  ^
[   47.675681]  ffff88810256a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   47.676510]  ffff88810256a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   47.677347] ==================================================================
[   47.380301] ==================================================================
[   47.381038] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x258/0x660
[   47.382810] Write of size 1 at addr ffff8881028578ea by task kunit_try_catch/154
[   47.383493] 
[   47.384315] CPU: 1 PID: 154 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[   47.385279] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.386493] Call Trace:
[   47.386873]  <TASK>
[   47.387370]  dump_stack_lvl+0x4e/0x90
[   47.387863]  print_report+0xd2/0x660
[   47.388435]  ? __virt_addr_valid+0x156/0x1e0
[   47.389364]  ? kasan_complete_mode_report_info+0x2a/0x200
[   47.390112]  kasan_report+0xff/0x140
[   47.390537]  ? krealloc_less_oob_helper+0x258/0x660
[   47.391277]  ? krealloc_less_oob_helper+0x258/0x660
[   47.391951]  __asan_store1+0x69/0x70
[   47.392415]  krealloc_less_oob_helper+0x258/0x660
[   47.393143]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   47.393730]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   47.394417]  ? __schedule+0x70b/0x1190
[   47.394982]  ? ktime_get_ts64+0x118/0x140
[   47.395548]  krealloc_less_oob+0x1c/0x30
[   47.396041]  kunit_try_run_case+0x126/0x290
[   47.396611]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.397298]  ? __kasan_check_write+0x18/0x20
[   47.397879]  ? trace_preempt_on+0x20/0xa0
[   47.398620]  ? __kthread_parkme+0x4f/0xd0
[   47.399509]  ? preempt_count_sub+0x50/0x80
[   47.400339]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.401424]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   47.402373]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.403385]  kthread+0x19e/0x1e0
[   47.403881]  ? __pfx_kthread+0x10/0x10
[   47.404611]  ret_from_fork+0x41/0x70
[   47.405333]  ? __pfx_kthread+0x10/0x10
[   47.405908]  ret_from_fork_asm+0x1b/0x30
[   47.406638]  </TASK>
[   47.406995] 
[   47.407750] Allocated by task 154:
[   47.408173]  kasan_save_stack+0x3c/0x60
[   47.408758]  kasan_set_track+0x29/0x40
[   47.409225]  kasan_save_alloc_info+0x22/0x30
[   47.410087]  __kasan_krealloc+0x12f/0x180
[   47.410689]  krealloc+0xc1/0x140
[   47.411943]  krealloc_less_oob_helper+0xe5/0x660
[   47.412404]  krealloc_less_oob+0x1c/0x30
[   47.412983]  kunit_try_run_case+0x126/0x290
[   47.413485]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.414264]  kthread+0x19e/0x1e0
[   47.414811]  ret_from_fork+0x41/0x70
[   47.415293]  ret_from_fork_asm+0x1b/0x30
[   47.415673] 
[   47.415885] The buggy address belongs to the object at ffff888102857800
[   47.415885]  which belongs to the cache kmalloc-256 of size 256
[   47.417399] The buggy address is located 33 bytes to the right of
[   47.417399]  allocated 201-byte region [ffff888102857800, ffff8881028578c9)
[   47.418716] 
[   47.419006] The buggy address belongs to the physical page:
[   47.420181] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102856
[   47.421455] head:(____ptrval____) order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.422295] flags: 0x200000000000840(slab|head|node=0|zone=2)
[   47.423520] page_type: 0xffffffff()
[   47.424169] raw: 0200000000000840 ffff888100041b40 dead000000000122 0000000000000000
[   47.424849] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   47.425630] page dumped because: kasan: bad access detected
[   47.426502] 
[   47.426807] Memory state around the buggy address:
[   47.427896]  ffff888102857780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.428568]  ffff888102857800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.429649] >ffff888102857880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   47.430447]                                                           ^
[   47.431125]  ffff888102857900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.432040]  ffff888102857980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.432631] ==================================================================
[   47.679844] ==================================================================
[   47.680605] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x21a/0x660
[   47.681461] Write of size 1 at addr ffff88810256a0da by task kunit_try_catch/158
[   47.682331] 
[   47.682634] CPU: 1 PID: 158 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[   47.683799] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.685300] Call Trace:
[   47.685924]  <TASK>
[   47.686546]  dump_stack_lvl+0x4e/0x90
[   47.687270]  print_report+0xd2/0x660
[   47.687781]  ? __virt_addr_valid+0x156/0x1e0
[   47.688313]  ? kasan_addr_to_slab+0x11/0xb0
[   47.688964]  kasan_report+0xff/0x140
[   47.689575]  ? krealloc_less_oob_helper+0x21a/0x660
[   47.690106]  ? krealloc_less_oob_helper+0x21a/0x660
[   47.690867]  __asan_store1+0x69/0x70
[   47.691374]  krealloc_less_oob_helper+0x21a/0x660
[   47.692041]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   47.692759]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   47.693531]  ? __schedule+0x70b/0x1190
[   47.694115]  ? ktime_get_ts64+0x118/0x140
[   47.695176]  krealloc_pagealloc_less_oob+0x1c/0x30
[   47.696460]  kunit_try_run_case+0x126/0x290
[   47.697021]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.697689]  ? __kasan_check_write+0x18/0x20
[   47.698404]  ? trace_preempt_on+0x20/0xa0
[   47.698953]  ? __kthread_parkme+0x4f/0xd0
[   47.699701]  ? preempt_count_sub+0x50/0x80
[   47.700394]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.701302]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   47.702645]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.703577]  kthread+0x19e/0x1e0
[   47.704218]  ? __pfx_kthread+0x10/0x10
[   47.705203]  ret_from_fork+0x41/0x70
[   47.705776]  ? __pfx_kthread+0x10/0x10
[   47.706455]  ret_from_fork_asm+0x1b/0x30
[   47.707231]  </TASK>
[   47.707652] 
[   47.708172] The buggy address belongs to the physical page:
[   47.708965] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102568
[   47.709685] head:(____ptrval____) order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.710691] flags: 0x200000000000040(head|node=0|zone=2)
[   47.711599] page_type: 0xffffffff()
[   47.711957] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   47.713274] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   47.714238] page dumped because: kasan: bad access detected
[   47.714845] 
[   47.715122] Memory state around the buggy address:
[   47.715857]  ffff888102569f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.717257]  ffff88810256a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.718024] >ffff88810256a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   47.718867]                                                     ^
[   47.719818]  ffff88810256a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   47.720530]  ffff88810256a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   47.721732] ==================================================================