Hay
Date
Feb. 5, 2025, 2:09 p.m.

Environment
qemu-armv7
qemu-x86_64

[  144.884932] ==================================================================
[  144.886026] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x144/0x384
[  144.886871] Write of size 1 at addr c4ffe0eb by task kunit_try_catch/133
[  144.887652] 
[  144.887907] CPU: 0 PID: 133 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  144.888545] Hardware name: Generic DT based system
[  144.889048]  unwind_backtrace from show_stack+0x18/0x1c
[  144.889929]  show_stack from dump_stack_lvl+0x58/0x70
[  144.890795]  dump_stack_lvl from print_report+0x164/0x51c
[  144.891626]  print_report from kasan_report+0xc8/0x104
[  144.892415]  kasan_report from krealloc_more_oob_helper+0x144/0x384
[  144.893313]  krealloc_more_oob_helper from kunit_try_run_case+0x11c/0x2e4
[  144.894265]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  144.895311]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  144.896233]  kthread from ret_from_fork+0x14/0x30
[  144.896907] Exception stack(0xf9f33fb0 to 0xf9f33ff8)
[  144.897607] 3fa0:                                     00000000 00000000 00000000 00000000
[  144.898688] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  144.899671] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  144.900426] 
[  144.900732] The buggy address belongs to the physical page:
[  144.901449] page:a8595845 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ffc
[  144.902431] head:a8595845 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  144.903343] flags: 0x40(head|zone=0)
[  144.903925] page_type: 0xffffffff()
[  144.904485] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  144.905486] raw: 00000000
[  144.905947] page dumped because: kasan: bad access detected
[  144.906690] 
[  144.907081] Memory state around the buggy address:
[  144.907676]  c4ffdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  144.908492]  c4ffe000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  144.909445] >c4ffe080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[  144.910324]                                                   ^
[  144.911022]  c4ffe100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  144.911859]  c4ffe180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  144.912611] ==================================================================
[  144.643293] ==================================================================
[  144.644020] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x180/0x384
[  144.644806] Write of size 1 at addr c4c17af0 by task kunit_try_catch/129
[  144.645484] 
[  144.645747] CPU: 0 PID: 129 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  144.646682] Hardware name: Generic DT based system
[  144.647416]  unwind_backtrace from show_stack+0x18/0x1c
[  144.648147]  show_stack from dump_stack_lvl+0x58/0x70
[  144.648987]  dump_stack_lvl from print_report+0x164/0x51c
[  144.649793]  print_report from kasan_report+0xc8/0x104
[  144.650534]  kasan_report from krealloc_more_oob_helper+0x180/0x384
[  144.651570]  krealloc_more_oob_helper from kunit_try_run_case+0x11c/0x2e4
[  144.652471]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  144.653487]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  144.654463]  kthread from ret_from_fork+0x14/0x30
[  144.655105] Exception stack(0xf9f13fb0 to 0xf9f13ff8)
[  144.655876] 3fa0:                                     00000000 00000000 00000000 00000000
[  144.657314] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  144.658363] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  144.659172] 
[  144.659440] Allocated by task 129:
[  144.659835]  kasan_set_track+0x3c/0x5c
[  144.660518]  __kasan_krealloc+0xe0/0x104
[  144.661041]  krealloc+0xd4/0x134
[  144.661487]  krealloc_more_oob_helper+0xd4/0x384
[  144.662195]  kunit_try_run_case+0x11c/0x2e4
[  144.662916]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  144.663639]  kthread+0x184/0x1a8
[  144.664295]  ret_from_fork+0x14/0x30
[  144.664721] 
[  144.664966] The buggy address belongs to the object at c4c17a00
[  144.664966]  which belongs to the cache kmalloc-256 of size 256
[  144.666322] The buggy address is located 5 bytes to the right of
[  144.666322]  allocated 235-byte region [c4c17a00, c4c17aeb)
[  144.667489] 
[  144.667784] The buggy address belongs to the physical page:
[  144.668440] page:17c33a57 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44c16
[  144.669333] head:17c33a57 order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  144.670189] flags: 0x840(slab|head|zone=0)
[  144.670865] page_type: 0xffffffff()
[  144.671392] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[  144.672132] raw: 00000000
[  144.672562] page dumped because: kasan: bad access detected
[  144.673162] 
[  144.673476] Memory state around the buggy address:
[  144.674176]  c4c17980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  144.674866]  c4c17a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  144.676385] >c4c17a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[  144.677472]                                                      ^
[  144.678189]  c4c17b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  144.678899]  c4c17b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  144.679636] ==================================================================
[  144.916432] ==================================================================
[  144.917160] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x180/0x384
[  144.918192] Write of size 1 at addr c4ffe0f0 by task kunit_try_catch/133
[  144.918950] 
[  144.919323] CPU: 0 PID: 133 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  144.920328] Hardware name: Generic DT based system
[  144.921069]  unwind_backtrace from show_stack+0x18/0x1c
[  144.921915]  show_stack from dump_stack_lvl+0x58/0x70
[  144.922644]  dump_stack_lvl from print_report+0x164/0x51c
[  144.923401]  print_report from kasan_report+0xc8/0x104
[  144.924206]  kasan_report from krealloc_more_oob_helper+0x180/0x384
[  144.925038]  krealloc_more_oob_helper from kunit_try_run_case+0x11c/0x2e4
[  144.925936]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  144.927537]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  144.928661]  kthread from ret_from_fork+0x14/0x30
[  144.929514] Exception stack(0xf9f33fb0 to 0xf9f33ff8)
[  144.930319] 3fa0:                                     00000000 00000000 00000000 00000000
[  144.931416] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  144.932329] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  144.932968] 
[  144.933291] The buggy address belongs to the physical page:
[  144.933946] page:a8595845 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44ffc
[  144.935000] head:a8595845 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  144.935756] flags: 0x40(head|zone=0)
[  144.936234] page_type: 0xffffffff()
[  144.936701] raw: 00000040 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  144.937710] raw: 00000000
[  144.938041] page dumped because: kasan: bad access detected
[  144.938596] 
[  144.938949] Memory state around the buggy address:
[  144.939515]  c4ffdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  144.940409]  c4ffe000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  144.941154] >c4ffe080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[  144.941973]                                                      ^
[  144.942658]  c4ffe100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  144.943556]  c4ffe180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[  144.944250] ==================================================================
[  144.603642] ==================================================================
[  144.604720] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x144/0x384
[  144.605523] Write of size 1 at addr c4c17aeb by task kunit_try_catch/129
[  144.607211] 
[  144.607428] CPU: 0 PID: 129 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  144.608850] Hardware name: Generic DT based system
[  144.609360]  unwind_backtrace from show_stack+0x18/0x1c
[  144.610132]  show_stack from dump_stack_lvl+0x58/0x70
[  144.610810]  dump_stack_lvl from print_report+0x164/0x51c
[  144.611621]  print_report from kasan_report+0xc8/0x104
[  144.612342]  kasan_report from krealloc_more_oob_helper+0x144/0x384
[  144.613155]  krealloc_more_oob_helper from kunit_try_run_case+0x11c/0x2e4
[  144.613993]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  144.615039]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  144.616211]  kthread from ret_from_fork+0x14/0x30
[  144.616950] Exception stack(0xf9f13fb0 to 0xf9f13ff8)
[  144.617709] 3fa0:                                     00000000 00000000 00000000 00000000
[  144.619004] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  144.619923] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  144.620633] 
[  144.620888] Allocated by task 129:
[  144.621361]  kasan_set_track+0x3c/0x5c
[  144.621894]  __kasan_krealloc+0xe0/0x104
[  144.622493]  krealloc+0xd4/0x134
[  144.622982]  krealloc_more_oob_helper+0xd4/0x384
[  144.623606]  kunit_try_run_case+0x11c/0x2e4
[  144.624232]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  144.624890]  kthread+0x184/0x1a8
[  144.625326]  ret_from_fork+0x14/0x30
[  144.625994] 
[  144.626227] The buggy address belongs to the object at c4c17a00
[  144.626227]  which belongs to the cache kmalloc-256 of size 256
[  144.627347] The buggy address is located 0 bytes to the right of
[  144.627347]  allocated 235-byte region [c4c17a00, c4c17aeb)
[  144.628604] 
[  144.628832] The buggy address belongs to the physical page:
[  144.629511] page:17c33a57 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44c16
[  144.630447] head:17c33a57 order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[  144.631330] flags: 0x840(slab|head|zone=0)
[  144.631910] page_type: 0xffffffff()
[  144.632369] raw: 00000840 c4801500 00000122 00000000 00000000 80100010 ffffffff 00000001
[  144.633321] raw: 00000000
[  144.633645] page dumped because: kasan: bad access detected
[  144.634222] 
[  144.634514] Memory state around the buggy address:
[  144.634997]  c4c17980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  144.635820]  c4c17a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  144.636952] >c4c17a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[  144.637884]                                                   ^
[  144.638494]  c4c17b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  144.639340]  c4c17b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  144.640118] ==================================================================


[   47.144519] ==================================================================
[   47.145166] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x1bb/0x3b0
[   47.146850] Write of size 1 at addr ffff8881028576f0 by task kunit_try_catch/152
[   47.147830] 
[   47.148169] CPU: 1 PID: 152 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[   47.149541] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.150813] Call Trace:
[   47.151105]  <TASK>
[   47.151471]  dump_stack_lvl+0x4e/0x90
[   47.152436]  print_report+0xd2/0x660
[   47.153079]  ? __virt_addr_valid+0x156/0x1e0
[   47.153691]  ? kasan_complete_mode_report_info+0x2a/0x200
[   47.154472]  kasan_report+0xff/0x140
[   47.155128]  ? krealloc_more_oob_helper+0x1bb/0x3b0
[   47.155675]  ? krealloc_more_oob_helper+0x1bb/0x3b0
[   47.156818]  __asan_store1+0x69/0x70
[   47.157386]  krealloc_more_oob_helper+0x1bb/0x3b0
[   47.158068]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   47.158771]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   47.159454]  ? __schedule+0x70b/0x1190
[   47.159881]  ? ktime_get_ts64+0x118/0x140
[   47.160622]  krealloc_more_oob+0x1c/0x30
[   47.161237]  kunit_try_run_case+0x126/0x290
[   47.161850]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.162453]  ? __kasan_check_write+0x18/0x20
[   47.163632]  ? trace_preempt_on+0x20/0xa0
[   47.164439]  ? __kthread_parkme+0x4f/0xd0
[   47.165222]  ? preempt_count_sub+0x50/0x80
[   47.165793]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.166654]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   47.167484]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.168333]  kthread+0x19e/0x1e0
[   47.168920]  ? __pfx_kthread+0x10/0x10
[   47.169664]  ret_from_fork+0x41/0x70
[   47.170426]  ? __pfx_kthread+0x10/0x10
[   47.170911]  ret_from_fork_asm+0x1b/0x30
[   47.171609]  </TASK>
[   47.172363] 
[   47.172583] Allocated by task 152:
[   47.173411]  kasan_save_stack+0x3c/0x60
[   47.173945]  kasan_set_track+0x29/0x40
[   47.174788]  kasan_save_alloc_info+0x22/0x30
[   47.175820]  __kasan_krealloc+0x12f/0x180
[   47.176344]  krealloc+0xc1/0x140
[   47.176717]  krealloc_more_oob_helper+0xe2/0x3b0
[   47.177223]  krealloc_more_oob+0x1c/0x30
[   47.177645]  kunit_try_run_case+0x126/0x290
[   47.178639]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.179857]  kthread+0x19e/0x1e0
[   47.180376]  ret_from_fork+0x41/0x70
[   47.180882]  ret_from_fork_asm+0x1b/0x30
[   47.181409] 
[   47.181678] The buggy address belongs to the object at ffff888102857600
[   47.181678]  which belongs to the cache kmalloc-256 of size 256
[   47.183858] The buggy address is located 5 bytes to the right of
[   47.183858]  allocated 235-byte region [ffff888102857600, ffff8881028576eb)
[   47.185235] 
[   47.185515] The buggy address belongs to the physical page:
[   47.186399] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102856
[   47.187653] head:(____ptrval____) order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.188688] flags: 0x200000000000840(slab|head|node=0|zone=2)
[   47.189571] page_type: 0xffffffff()
[   47.190330] raw: 0200000000000840 ffff888100041b40 dead000000000122 0000000000000000
[   47.191604] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   47.192420] page dumped because: kasan: bad access detected
[   47.193006] 
[   47.193270] Memory state around the buggy address:
[   47.193671]  ffff888102857580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.195099]  ffff888102857600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.195864] >ffff888102857680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   47.196472]                                                              ^
[   47.197133]  ffff888102857700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.197788]  ffff888102857780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.198463] ==================================================================
[   47.093606] ==================================================================
[   47.094309] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x179/0x3b0
[   47.094668] Write of size 1 at addr ffff8881028576eb by task kunit_try_catch/152
[   47.095002] 
[   47.095137] CPU: 1 PID: 152 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[   47.095498] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.096164] Call Trace:
[   47.096545]  <TASK>
[   47.096887]  dump_stack_lvl+0x4e/0x90
[   47.097428]  print_report+0xd2/0x660
[   47.098639]  ? __virt_addr_valid+0x156/0x1e0
[   47.099551]  ? kasan_complete_mode_report_info+0x2a/0x200
[   47.100414]  kasan_report+0xff/0x140
[   47.100857]  ? krealloc_more_oob_helper+0x179/0x3b0
[   47.101770]  ? krealloc_more_oob_helper+0x179/0x3b0
[   47.102801]  __asan_store1+0x69/0x70
[   47.103466]  krealloc_more_oob_helper+0x179/0x3b0
[   47.104399]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   47.105087]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   47.105800]  ? __schedule+0x70b/0x1190
[   47.106610]  ? ktime_get_ts64+0x118/0x140
[   47.107428]  krealloc_more_oob+0x1c/0x30
[   47.108001]  kunit_try_run_case+0x126/0x290
[   47.108566]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.109485]  ? __kasan_check_write+0x18/0x20
[   47.110230]  ? trace_preempt_on+0x20/0xa0
[   47.110839]  ? __kthread_parkme+0x4f/0xd0
[   47.111453]  ? preempt_count_sub+0x50/0x80
[   47.111991]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.112588]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   47.113448]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.114372]  kthread+0x19e/0x1e0
[   47.114971]  ? __pfx_kthread+0x10/0x10
[   47.115692]  ret_from_fork+0x41/0x70
[   47.116352]  ? __pfx_kthread+0x10/0x10
[   47.116879]  ret_from_fork_asm+0x1b/0x30
[   47.117509]  </TASK>
[   47.117856] 
[   47.118145] Allocated by task 152:
[   47.118478]  kasan_save_stack+0x3c/0x60
[   47.119081]  kasan_set_track+0x29/0x40
[   47.119872]  kasan_save_alloc_info+0x22/0x30
[   47.120652]  __kasan_krealloc+0x12f/0x180
[   47.121176]  krealloc+0xc1/0x140
[   47.121635]  krealloc_more_oob_helper+0xe2/0x3b0
[   47.122315]  krealloc_more_oob+0x1c/0x30
[   47.123422]  kunit_try_run_case+0x126/0x290
[   47.124173]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.124805]  kthread+0x19e/0x1e0
[   47.125515]  ret_from_fork+0x41/0x70
[   47.126202]  ret_from_fork_asm+0x1b/0x30
[   47.126798] 
[   47.127026] The buggy address belongs to the object at ffff888102857600
[   47.127026]  which belongs to the cache kmalloc-256 of size 256
[   47.128668] The buggy address is located 0 bytes to the right of
[   47.128668]  allocated 235-byte region [ffff888102857600, ffff8881028576eb)
[   47.130251] 
[   47.130625] The buggy address belongs to the physical page:
[   47.131139] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102856
[   47.132647] head:(____ptrval____) order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.133546] flags: 0x200000000000840(slab|head|node=0|zone=2)
[   47.134018] page_type: 0xffffffff()
[   47.134696] raw: 0200000000000840 ffff888100041b40 dead000000000122 0000000000000000
[   47.135777] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   47.136514] page dumped because: kasan: bad access detected
[   47.137421] 
[   47.137796] Memory state around the buggy address:
[   47.138657]  ffff888102857580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.139610]  ffff888102857600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.140531] >ffff888102857680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   47.140998]                                                           ^
[   47.141666]  ffff888102857700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.142722]  ffff888102857780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.143355] ==================================================================
[   47.502423] ==================================================================
[   47.503542] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x179/0x3b0
[   47.504288] Write of size 1 at addr ffff88810256a0eb by task kunit_try_catch/156
[   47.505132] 
[   47.505449] CPU: 1 PID: 156 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[   47.506582] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.507970] Call Trace:
[   47.508390]  <TASK>
[   47.508761]  dump_stack_lvl+0x4e/0x90
[   47.509373]  print_report+0xd2/0x660
[   47.510090]  ? __virt_addr_valid+0x156/0x1e0
[   47.510815]  ? kasan_addr_to_slab+0x11/0xb0
[   47.511699]  kasan_report+0xff/0x140
[   47.512525]  ? krealloc_more_oob_helper+0x179/0x3b0
[   47.513270]  ? krealloc_more_oob_helper+0x179/0x3b0
[   47.513937]  __asan_store1+0x69/0x70
[   47.514476]  krealloc_more_oob_helper+0x179/0x3b0
[   47.515383]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   47.515878]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   47.516379]  ? __schedule+0x70b/0x1190
[   47.517299]  ? ktime_get_ts64+0x118/0x140
[   47.517885]  krealloc_pagealloc_more_oob+0x1c/0x30
[   47.518445]  kunit_try_run_case+0x126/0x290
[   47.519155]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.519624]  ? __kasan_check_write+0x18/0x20
[   47.520451]  ? trace_preempt_on+0x20/0xa0
[   47.521164]  ? __kthread_parkme+0x4f/0xd0
[   47.521790]  ? preempt_count_sub+0x50/0x80
[   47.522387]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.523242]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   47.524424]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.525278]  kthread+0x19e/0x1e0
[   47.525940]  ? __pfx_kthread+0x10/0x10
[   47.526291]  ret_from_fork+0x41/0x70
[   47.526849]  ? __pfx_kthread+0x10/0x10
[   47.528059]  ret_from_fork_asm+0x1b/0x30
[   47.528785]  </TASK>
[   47.529146] 
[   47.529526] The buggy address belongs to the physical page:
[   47.529973] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102568
[   47.531144] head:(____ptrval____) order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.532262] flags: 0x200000000000040(head|node=0|zone=2)
[   47.532694] page_type: 0xffffffff()
[   47.533354] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   47.534264] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   47.535083] page dumped because: kasan: bad access detected
[   47.535698] 
[   47.536680] Memory state around the buggy address:
[   47.537130]  ffff888102569f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.538053]  ffff88810256a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.538776] >ffff88810256a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   47.539544]                                                           ^
[   47.540289]  ffff88810256a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   47.541583]  ffff88810256a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   47.542413] ==================================================================
[   47.543884] ==================================================================
[   47.545186] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x1bb/0x3b0
[   47.546287] Write of size 1 at addr ffff88810256a0f0 by task kunit_try_catch/156
[   47.547014] 
[   47.547327] CPU: 1 PID: 156 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[   47.548257] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   47.549321] Call Trace:
[   47.549667]  <TASK>
[   47.550145]  dump_stack_lvl+0x4e/0x90
[   47.550819]  print_report+0xd2/0x660
[   47.551428]  ? __virt_addr_valid+0x156/0x1e0
[   47.552065]  ? kasan_addr_to_slab+0x11/0xb0
[   47.552758]  kasan_report+0xff/0x140
[   47.553457]  ? krealloc_more_oob_helper+0x1bb/0x3b0
[   47.554121]  ? krealloc_more_oob_helper+0x1bb/0x3b0
[   47.554549]  __asan_store1+0x69/0x70
[   47.555356]  krealloc_more_oob_helper+0x1bb/0x3b0
[   47.556135]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   47.556828]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   47.557763]  ? __schedule+0x70b/0x1190
[   47.558534]  ? ktime_get_ts64+0x118/0x140
[   47.559171]  krealloc_pagealloc_more_oob+0x1c/0x30
[   47.559898]  kunit_try_run_case+0x126/0x290
[   47.560569]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.561278]  ? __kasan_check_write+0x18/0x20
[   47.561778]  ? trace_preempt_on+0x20/0xa0
[   47.562314]  ? __kthread_parkme+0x4f/0xd0
[   47.562954]  ? preempt_count_sub+0x50/0x80
[   47.563790]  ? __pfx_kunit_try_run_case+0x10/0x10
[   47.564294]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   47.565079]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   47.565887]  kthread+0x19e/0x1e0
[   47.566289]  ? __pfx_kthread+0x10/0x10
[   47.566968]  ret_from_fork+0x41/0x70
[   47.567665]  ? __pfx_kthread+0x10/0x10
[   47.568571]  ret_from_fork_asm+0x1b/0x30
[   47.569080]  </TASK>
[   47.569441] 
[   47.569769] The buggy address belongs to the physical page:
[   47.570430] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102568
[   47.571812] head:(____ptrval____) order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.572490] flags: 0x200000000000040(head|node=0|zone=2)
[   47.573208] page_type: 0xffffffff()
[   47.573785] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   47.574649] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   47.575320] page dumped because: kasan: bad access detected
[   47.576171] 
[   47.576618] Memory state around the buggy address:
[   47.577203]  ffff888102569f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.578103]  ffff88810256a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.578767] >ffff88810256a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   47.579563]                                                              ^
[   47.580676]  ffff88810256a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   47.581387]  ffff88810256a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   47.582150] ==================================================================