Hay
Date
July 13, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   15.699890] ==================================================================
[   15.699950] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   15.700000] Write of size 1 at addr fff00000c171deeb by task kunit_try_catch/157
[   15.700365] 
[   15.700644] CPU: 0 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.700953] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.701120] Hardware name: linux,dummy-virt (DT)
[   15.701168] Call trace:
[   15.701237]  show_stack+0x20/0x38 (C)
[   15.701571]  dump_stack_lvl+0x8c/0xd0
[   15.701651]  print_report+0x118/0x5d0
[   15.701806]  kasan_report+0xdc/0x128
[   15.701884]  __asan_report_store1_noabort+0x20/0x30
[   15.702181]  krealloc_more_oob_helper+0x60c/0x678
[   15.702310]  krealloc_more_oob+0x20/0x38
[   15.702409]  kunit_try_run_case+0x170/0x3f0
[   15.702537]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.702601]  kthread+0x328/0x630
[   15.702651]  ret_from_fork+0x10/0x20
[   15.702942] 
[   15.703084] Allocated by task 157:
[   15.703141]  kasan_save_stack+0x3c/0x68
[   15.703337]  kasan_save_track+0x20/0x40
[   15.703476]  kasan_save_alloc_info+0x40/0x58
[   15.703625]  __kasan_krealloc+0x118/0x178
[   15.703700]  krealloc_noprof+0x128/0x360
[   15.703758]  krealloc_more_oob_helper+0x168/0x678
[   15.703890]  krealloc_more_oob+0x20/0x38
[   15.703957]  kunit_try_run_case+0x170/0x3f0
[   15.704011]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.704238]  kthread+0x328/0x630
[   15.704410]  ret_from_fork+0x10/0x20
[   15.704531] 
[   15.704553] The buggy address belongs to the object at fff00000c171de00
[   15.704553]  which belongs to the cache kmalloc-256 of size 256
[   15.704613] The buggy address is located 0 bytes to the right of
[   15.704613]  allocated 235-byte region [fff00000c171de00, fff00000c171deeb)
[   15.704683] 
[   15.704847] The buggy address belongs to the physical page:
[   15.704952] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10171c
[   15.705148] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.705209] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.705308] page_type: f5(slab)
[   15.705366] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.705815] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.705938] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.705988] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.706277] head: 0bfffe0000000001 ffffc1ffc305c701 00000000ffffffff 00000000ffffffff
[   15.706364] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.706455] page dumped because: kasan: bad access detected
[   15.706523] 
[   15.706541] Memory state around the buggy address:
[   15.706578]  fff00000c171dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.706856]  fff00000c171de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.706939] >fff00000c171de80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   15.707012]                                                           ^
[   15.707369]  fff00000c171df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.707455]  fff00000c171df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.707536] ==================================================================
[   15.773952] ==================================================================
[   15.774008] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   15.774063] Write of size 1 at addr fff00000c66b60eb by task kunit_try_catch/161
[   15.774305] 
[   15.774352] CPU: 0 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.774433] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.774817] Hardware name: linux,dummy-virt (DT)
[   15.774875] Call trace:
[   15.774924]  show_stack+0x20/0x38 (C)
[   15.774987]  dump_stack_lvl+0x8c/0xd0
[   15.775161]  print_report+0x118/0x5d0
[   15.775303]  kasan_report+0xdc/0x128
[   15.775355]  __asan_report_store1_noabort+0x20/0x30
[   15.775409]  krealloc_more_oob_helper+0x60c/0x678
[   15.775752]  krealloc_large_more_oob+0x20/0x38
[   15.775831]  kunit_try_run_case+0x170/0x3f0
[   15.775997]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.776082]  kthread+0x328/0x630
[   15.776138]  ret_from_fork+0x10/0x20
[   15.776268] 
[   15.776289] The buggy address belongs to the physical page:
[   15.776320] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066b4
[   15.776614] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.776714] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.776823] page_type: f8(unknown)
[   15.776889] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.777008] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.777114] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.777183] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.777570] head: 0bfffe0000000002 ffffc1ffc319ad01 00000000ffffffff 00000000ffffffff
[   15.777654] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.777730] page dumped because: kasan: bad access detected
[   15.777830] 
[   15.777849] Memory state around the buggy address:
[   15.777899]  fff00000c66b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.778219]  fff00000c66b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.778291] >fff00000c66b6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   15.778399]                                                           ^
[   15.778447]  fff00000c66b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.778526]  fff00000c66b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.778814] ==================================================================
[   15.781047] ==================================================================
[   15.781124] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   15.781187] Write of size 1 at addr fff00000c66b60f0 by task kunit_try_catch/161
[   15.781252] 
[   15.781568] CPU: 0 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.781702] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.781731] Hardware name: linux,dummy-virt (DT)
[   15.781776] Call trace:
[   15.781797]  show_stack+0x20/0x38 (C)
[   15.781967]  dump_stack_lvl+0x8c/0xd0
[   15.782150]  print_report+0x118/0x5d0
[   15.782216]  kasan_report+0xdc/0x128
[   15.782335]  __asan_report_store1_noabort+0x20/0x30
[   15.782391]  krealloc_more_oob_helper+0x5c0/0x678
[   15.782459]  krealloc_large_more_oob+0x20/0x38
[   15.782775]  kunit_try_run_case+0x170/0x3f0
[   15.782850]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.783083]  kthread+0x328/0x630
[   15.783293]  ret_from_fork+0x10/0x20
[   15.783368] 
[   15.783397] The buggy address belongs to the physical page:
[   15.783434] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066b4
[   15.783545] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.783600] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.783660] page_type: f8(unknown)
[   15.783698] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.783904] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.783984] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   15.784187] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   15.784289] head: 0bfffe0000000002 ffffc1ffc319ad01 00000000ffffffff 00000000ffffffff
[   15.784439] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   15.784492] page dumped because: kasan: bad access detected
[   15.784523] 
[   15.784541] Memory state around the buggy address:
[   15.784577]  fff00000c66b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.784619]  fff00000c66b6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.784905] >fff00000c66b6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   15.785025]                                                              ^
[   15.785110]  fff00000c66b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.785161]  fff00000c66b6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   15.785209] ==================================================================
[   15.710039] ==================================================================
[   15.710128] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   15.710186] Write of size 1 at addr fff00000c171def0 by task kunit_try_catch/157
[   15.710315] 
[   15.710373] CPU: 0 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   15.710731] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.710785] Hardware name: linux,dummy-virt (DT)
[   15.710902] Call trace:
[   15.710942]  show_stack+0x20/0x38 (C)
[   15.710994]  dump_stack_lvl+0x8c/0xd0
[   15.711095]  print_report+0x118/0x5d0
[   15.711145]  kasan_report+0xdc/0x128
[   15.711369]  __asan_report_store1_noabort+0x20/0x30
[   15.711451]  krealloc_more_oob_helper+0x5c0/0x678
[   15.711736]  krealloc_more_oob+0x20/0x38
[   15.711908]  kunit_try_run_case+0x170/0x3f0
[   15.712040]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.712117]  kthread+0x328/0x630
[   15.712159]  ret_from_fork+0x10/0x20
[   15.712502] 
[   15.712523] Allocated by task 157:
[   15.712676]  kasan_save_stack+0x3c/0x68
[   15.712723]  kasan_save_track+0x20/0x40
[   15.712759]  kasan_save_alloc_info+0x40/0x58
[   15.712806]  __kasan_krealloc+0x118/0x178
[   15.713022]  krealloc_noprof+0x128/0x360
[   15.713173]  krealloc_more_oob_helper+0x168/0x678
[   15.713241]  krealloc_more_oob+0x20/0x38
[   15.713278]  kunit_try_run_case+0x170/0x3f0
[   15.713352]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   15.713411]  kthread+0x328/0x630
[   15.713443]  ret_from_fork+0x10/0x20
[   15.713487] 
[   15.713505] The buggy address belongs to the object at fff00000c171de00
[   15.713505]  which belongs to the cache kmalloc-256 of size 256
[   15.713572] The buggy address is located 5 bytes to the right of
[   15.713572]  allocated 235-byte region [fff00000c171de00, fff00000c171deeb)
[   15.713658] 
[   15.713691] The buggy address belongs to the physical page:
[   15.713722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10171c
[   15.713775] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   15.713844] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   15.713902] page_type: f5(slab)
[   15.713946] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.714005] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.714062] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   15.714119] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.714179] head: 0bfffe0000000001 ffffc1ffc305c701 00000000ffffffff 00000000ffffffff
[   15.714250] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   15.714305] page dumped because: kasan: bad access detected
[   15.714344] 
[   15.714367] Memory state around the buggy address:
[   15.714422]  fff00000c171dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.714490]  fff00000c171de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.714543] >fff00000c171de80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   15.714580]                                                              ^
[   15.714618]  fff00000c171df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.714665]  fff00000c171df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.714708] ==================================================================

[   16.550090] ==================================================================
[   16.550164] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   16.550245] Write of size 1 at addr fff00000c4518ceb by task kunit_try_catch/157
[   16.550295] 
[   16.550347] CPU: 1 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.550652] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.550691] Hardware name: linux,dummy-virt (DT)
[   16.550721] Call trace:
[   16.550770]  show_stack+0x20/0x38 (C)
[   16.550996]  dump_stack_lvl+0x8c/0xd0
[   16.551054]  print_report+0x118/0x5d0
[   16.551100]  kasan_report+0xdc/0x128
[   16.551145]  __asan_report_store1_noabort+0x20/0x30
[   16.551207]  krealloc_more_oob_helper+0x60c/0x678
[   16.551254]  krealloc_more_oob+0x20/0x38
[   16.551299]  kunit_try_run_case+0x170/0x3f0
[   16.551372]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.551562]  kthread+0x328/0x630
[   16.551639]  ret_from_fork+0x10/0x20
[   16.551719] 
[   16.551770] Allocated by task 157:
[   16.551826]  kasan_save_stack+0x3c/0x68
[   16.551906]  kasan_save_track+0x20/0x40
[   16.552058]  kasan_save_alloc_info+0x40/0x58
[   16.552163]  __kasan_krealloc+0x118/0x178
[   16.552211]  krealloc_noprof+0x128/0x360
[   16.552455]  krealloc_more_oob_helper+0x168/0x678
[   16.552579]  krealloc_more_oob+0x20/0x38
[   16.552695]  kunit_try_run_case+0x170/0x3f0
[   16.552787]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.552942]  kthread+0x328/0x630
[   16.553015]  ret_from_fork+0x10/0x20
[   16.553071] 
[   16.553091] The buggy address belongs to the object at fff00000c4518c00
[   16.553091]  which belongs to the cache kmalloc-256 of size 256
[   16.553159] The buggy address is located 0 bytes to the right of
[   16.553159]  allocated 235-byte region [fff00000c4518c00, fff00000c4518ceb)
[   16.553235] 
[   16.553254] The buggy address belongs to the physical page:
[   16.553285] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104518
[   16.553339] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.553395] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.553449] page_type: f5(slab)
[   16.553495] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.553553] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.553621] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.553669] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.553723] head: 0bfffe0000000001 ffffc1ffc3114601 00000000ffffffff 00000000ffffffff
[   16.553780] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.553830] page dumped because: kasan: bad access detected
[   16.553866] 
[   16.553883] Memory state around the buggy address:
[   16.553921]  fff00000c4518b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.553964]  fff00000c4518c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.554011] >fff00000c4518c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   16.554048]                                                           ^
[   16.554096]  fff00000c4518d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.554138]  fff00000c4518d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.554175] ==================================================================
[   16.556485] ==================================================================
[   16.556540] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   16.556614] Write of size 1 at addr fff00000c4518cf0 by task kunit_try_catch/157
[   16.556669] 
[   16.556698] CPU: 1 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.556776] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.556802] Hardware name: linux,dummy-virt (DT)
[   16.556831] Call trace:
[   16.556852]  show_stack+0x20/0x38 (C)
[   16.556897]  dump_stack_lvl+0x8c/0xd0
[   16.556941]  print_report+0x118/0x5d0
[   16.557142]  kasan_report+0xdc/0x128
[   16.557226]  __asan_report_store1_noabort+0x20/0x30
[   16.557311]  krealloc_more_oob_helper+0x5c0/0x678
[   16.557376]  krealloc_more_oob+0x20/0x38
[   16.557451]  kunit_try_run_case+0x170/0x3f0
[   16.557515]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.557566]  kthread+0x328/0x630
[   16.557608]  ret_from_fork+0x10/0x20
[   16.557818] 
[   16.557923] Allocated by task 157:
[   16.557961]  kasan_save_stack+0x3c/0x68
[   16.558010]  kasan_save_track+0x20/0x40
[   16.558058]  kasan_save_alloc_info+0x40/0x58
[   16.558133]  __kasan_krealloc+0x118/0x178
[   16.558191]  krealloc_noprof+0x128/0x360
[   16.558228]  krealloc_more_oob_helper+0x168/0x678
[   16.558275]  krealloc_more_oob+0x20/0x38
[   16.558310]  kunit_try_run_case+0x170/0x3f0
[   16.558478]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.558610]  kthread+0x328/0x630
[   16.558649]  ret_from_fork+0x10/0x20
[   16.558683] 
[   16.558702] The buggy address belongs to the object at fff00000c4518c00
[   16.558702]  which belongs to the cache kmalloc-256 of size 256
[   16.558769] The buggy address is located 5 bytes to the right of
[   16.558769]  allocated 235-byte region [fff00000c4518c00, fff00000c4518ceb)
[   16.558833] 
[   16.558851] The buggy address belongs to the physical page:
[   16.558933] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104518
[   16.558985] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.559047] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.559103] page_type: f5(slab)
[   16.559168] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.559231] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.559280] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.559446] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.559712] head: 0bfffe0000000001 ffffc1ffc3114601 00000000ffffffff 00000000ffffffff
[   16.559802] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.559893] page dumped because: kasan: bad access detected
[   16.559923] 
[   16.559941] Memory state around the buggy address:
[   16.559979]  fff00000c4518b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.560026]  fff00000c4518c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.560213] >fff00000c4518c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   16.560409]                                                              ^
[   16.560475]  fff00000c4518d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.560672]  fff00000c4518d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.560749] ==================================================================
[   16.608396] ==================================================================
[   16.608756] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   16.608840] Write of size 1 at addr fff00000c78320f0 by task kunit_try_catch/161
[   16.608895] 
[   16.608924] CPU: 1 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.609015] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.609041] Hardware name: linux,dummy-virt (DT)
[   16.609070] Call trace:
[   16.609090]  show_stack+0x20/0x38 (C)
[   16.609317]  dump_stack_lvl+0x8c/0xd0
[   16.609408]  print_report+0x118/0x5d0
[   16.609484]  kasan_report+0xdc/0x128
[   16.609530]  __asan_report_store1_noabort+0x20/0x30
[   16.609597]  krealloc_more_oob_helper+0x5c0/0x678
[   16.609671]  krealloc_large_more_oob+0x20/0x38
[   16.609718]  kunit_try_run_case+0x170/0x3f0
[   16.609794]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.609846]  kthread+0x328/0x630
[   16.609894]  ret_from_fork+0x10/0x20
[   16.609941] 
[   16.609977] The buggy address belongs to the physical page:
[   16.610013] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107830
[   16.610275] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.610388] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.610462] page_type: f8(unknown)
[   16.610499] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.610566] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.610618] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.610667] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.610715] head: 0bfffe0000000002 ffffc1ffc31e0c01 00000000ffffffff 00000000ffffffff
[   16.610763] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.610803] page dumped because: kasan: bad access detected
[   16.610832] 
[   16.610849] Memory state around the buggy address:
[   16.610991]  fff00000c7831f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.611070]  fff00000c7832000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.611132] >fff00000c7832080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   16.611219]                                                              ^
[   16.611281]  fff00000c7832100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.611466]  fff00000c7832180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.611513] ==================================================================
[   16.604329] ==================================================================
[   16.604390] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   16.604441] Write of size 1 at addr fff00000c78320eb by task kunit_try_catch/161
[   16.604645] 
[   16.604748] CPU: 1 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.604832] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.605147] Hardware name: linux,dummy-virt (DT)
[   16.605235] Call trace:
[   16.605265]  show_stack+0x20/0x38 (C)
[   16.605314]  dump_stack_lvl+0x8c/0xd0
[   16.605359]  print_report+0x118/0x5d0
[   16.605414]  kasan_report+0xdc/0x128
[   16.605461]  __asan_report_store1_noabort+0x20/0x30
[   16.605512]  krealloc_more_oob_helper+0x60c/0x678
[   16.605575]  krealloc_large_more_oob+0x20/0x38
[   16.605621]  kunit_try_run_case+0x170/0x3f0
[   16.605667]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.605718]  kthread+0x328/0x630
[   16.605758]  ret_from_fork+0x10/0x20
[   16.605804] 
[   16.605848] The buggy address belongs to the physical page:
[   16.605880] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107830
[   16.605940] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.606006] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.606082] page_type: f8(unknown)
[   16.606129] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.606190] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.606239] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.606287] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.606335] head: 0bfffe0000000002 ffffc1ffc31e0c01 00000000ffffffff 00000000ffffffff
[   16.606383] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.606667] page dumped because: kasan: bad access detected
[   16.606711] 
[   16.606728] Memory state around the buggy address:
[   16.606802]  fff00000c7831f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.606891]  fff00000c7832000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.607008] >fff00000c7832080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   16.607108]                                                           ^
[   16.607148]  fff00000c7832100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.607214]  fff00000c7832180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.607706] ==================================================================

[   12.343348] ==================================================================
[   12.343930] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   12.344508] Write of size 1 at addr ffff888103a0e0f0 by task kunit_try_catch/177
[   12.344804] 
[   12.344918] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.344962] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.344973] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.344994] Call Trace:
[   12.345007]  <TASK>
[   12.345023]  dump_stack_lvl+0x73/0xb0
[   12.345055]  print_report+0xd1/0x610
[   12.345079]  ? __virt_addr_valid+0x1db/0x2d0
[   12.345104]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.345128]  ? kasan_addr_to_slab+0x11/0xa0
[   12.345151]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.345175]  kasan_report+0x141/0x180
[   12.345197]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.345226]  __asan_report_store1_noabort+0x1b/0x30
[   12.345251]  krealloc_more_oob_helper+0x7eb/0x930
[   12.345274]  ? __schedule+0x10cc/0x2b60
[   12.345297]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   12.345322]  ? finish_task_switch.isra.0+0x153/0x700
[   12.345347]  ? __switch_to+0x47/0xf50
[   12.345373]  ? __schedule+0x10cc/0x2b60
[   12.345394]  ? __pfx_read_tsc+0x10/0x10
[   12.345822]  krealloc_large_more_oob+0x1c/0x30
[   12.345848]  kunit_try_run_case+0x1a5/0x480
[   12.345876]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.345899]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.345925]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.345949]  ? __kthread_parkme+0x82/0x180
[   12.345971]  ? preempt_count_sub+0x50/0x80
[   12.345994]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.346018]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.346043]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.346068]  kthread+0x337/0x6f0
[   12.346086]  ? trace_preempt_on+0x20/0xc0
[   12.346110]  ? __pfx_kthread+0x10/0x10
[   12.346130]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.346152]  ? calculate_sigpending+0x7b/0xa0
[   12.346178]  ? __pfx_kthread+0x10/0x10
[   12.346199]  ret_from_fork+0x116/0x1d0
[   12.346217]  ? __pfx_kthread+0x10/0x10
[   12.346238]  ret_from_fork_asm+0x1a/0x30
[   12.346268]  </TASK>
[   12.346278] 
[   12.357340] The buggy address belongs to the physical page:
[   12.357589] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a0c
[   12.357892] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.358260] flags: 0x200000000000040(head|node=0|zone=2)
[   12.359306] page_type: f8(unknown)
[   12.359513] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.360711] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.360955] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.361190] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.361421] head: 0200000000000002 ffffea00040e8301 00000000ffffffff 00000000ffffffff
[   12.362225] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.362728] page dumped because: kasan: bad access detected
[   12.363050] 
[   12.363173] Memory state around the buggy address:
[   12.363439]  ffff888103a0df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.364021]  ffff888103a0e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.364234] >ffff888103a0e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   12.364471]                                                              ^
[   12.365258]  ffff888103a0e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.365825]  ffff888103a0e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.366246] ==================================================================
[   12.155939] ==================================================================
[   12.156486] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   12.156945] Write of size 1 at addr ffff8881003472f0 by task kunit_try_catch/173
[   12.157332] 
[   12.157606] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.157653] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.157664] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.157684] Call Trace:
[   12.157695]  <TASK>
[   12.157832]  dump_stack_lvl+0x73/0xb0
[   12.157866]  print_report+0xd1/0x610
[   12.157888]  ? __virt_addr_valid+0x1db/0x2d0
[   12.157910]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.157934]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.157958]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.157983]  kasan_report+0x141/0x180
[   12.158005]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.158033]  __asan_report_store1_noabort+0x1b/0x30
[   12.158059]  krealloc_more_oob_helper+0x7eb/0x930
[   12.158082]  ? trace_hardirqs_on+0x37/0xe0
[   12.158107]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   12.158131]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   12.158160]  ? __pfx_krealloc_more_oob+0x10/0x10
[   12.158187]  krealloc_more_oob+0x1c/0x30
[   12.158209]  kunit_try_run_case+0x1a5/0x480
[   12.158233]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.158255]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.158278]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.158301]  ? __kthread_parkme+0x82/0x180
[   12.158321]  ? preempt_count_sub+0x50/0x80
[   12.158345]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.158370]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.158395]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.158432]  kthread+0x337/0x6f0
[   12.158464]  ? trace_preempt_on+0x20/0xc0
[   12.158486]  ? __pfx_kthread+0x10/0x10
[   12.158506]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.158528]  ? calculate_sigpending+0x7b/0xa0
[   12.158551]  ? __pfx_kthread+0x10/0x10
[   12.158574]  ret_from_fork+0x116/0x1d0
[   12.158592]  ? __pfx_kthread+0x10/0x10
[   12.158613]  ret_from_fork_asm+0x1a/0x30
[   12.158643]  </TASK>
[   12.158653] 
[   12.169091] Allocated by task 173:
[   12.169232]  kasan_save_stack+0x45/0x70
[   12.169475]  kasan_save_track+0x18/0x40
[   12.169870]  kasan_save_alloc_info+0x3b/0x50
[   12.170218]  __kasan_krealloc+0x190/0x1f0
[   12.170403]  krealloc_noprof+0xf3/0x340
[   12.170639]  krealloc_more_oob_helper+0x1a9/0x930
[   12.170990]  krealloc_more_oob+0x1c/0x30
[   12.171163]  kunit_try_run_case+0x1a5/0x480
[   12.171440]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.171878]  kthread+0x337/0x6f0
[   12.172124]  ret_from_fork+0x116/0x1d0
[   12.172290]  ret_from_fork_asm+0x1a/0x30
[   12.172657] 
[   12.172760] The buggy address belongs to the object at ffff888100347200
[   12.172760]  which belongs to the cache kmalloc-256 of size 256
[   12.173266] The buggy address is located 5 bytes to the right of
[   12.173266]  allocated 235-byte region [ffff888100347200, ffff8881003472eb)
[   12.174013] 
[   12.174105] The buggy address belongs to the physical page:
[   12.174472] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100346
[   12.174941] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.175318] flags: 0x200000000000040(head|node=0|zone=2)
[   12.175731] page_type: f5(slab)
[   12.175898] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.176191] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.176731] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.177032] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.177630] head: 0200000000000001 ffffea000400d181 00000000ffffffff 00000000ffffffff
[   12.177994] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.178360] page dumped because: kasan: bad access detected
[   12.178698] 
[   12.178800] Memory state around the buggy address:
[   12.179274]  ffff888100347180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.179593]  ffff888100347200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.180073] >ffff888100347280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   12.180597]                                                              ^
[   12.180967]  ffff888100347300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.181235]  ffff888100347380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.181484] ==================================================================
[   12.126891] ==================================================================
[   12.127361] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   12.127970] Write of size 1 at addr ffff8881003472eb by task kunit_try_catch/173
[   12.128602] 
[   12.128728] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.128862] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.128875] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.128896] Call Trace:
[   12.128908]  <TASK>
[   12.128922]  dump_stack_lvl+0x73/0xb0
[   12.128952]  print_report+0xd1/0x610
[   12.128974]  ? __virt_addr_valid+0x1db/0x2d0
[   12.128996]  ? krealloc_more_oob_helper+0x821/0x930
[   12.129021]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.129044]  ? krealloc_more_oob_helper+0x821/0x930
[   12.129069]  kasan_report+0x141/0x180
[   12.129090]  ? krealloc_more_oob_helper+0x821/0x930
[   12.129119]  __asan_report_store1_noabort+0x1b/0x30
[   12.129144]  krealloc_more_oob_helper+0x821/0x930
[   12.129167]  ? trace_hardirqs_on+0x37/0xe0
[   12.129191]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   12.129216]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   12.129247]  ? __pfx_krealloc_more_oob+0x10/0x10
[   12.129275]  krealloc_more_oob+0x1c/0x30
[   12.129296]  kunit_try_run_case+0x1a5/0x480
[   12.129321]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.129344]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.129369]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.129393]  ? __kthread_parkme+0x82/0x180
[   12.129512]  ? preempt_count_sub+0x50/0x80
[   12.129538]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.129563]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.129588]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.129613]  kthread+0x337/0x6f0
[   12.129632]  ? trace_preempt_on+0x20/0xc0
[   12.129654]  ? __pfx_kthread+0x10/0x10
[   12.129674]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.129696]  ? calculate_sigpending+0x7b/0xa0
[   12.129720]  ? __pfx_kthread+0x10/0x10
[   12.129741]  ret_from_fork+0x116/0x1d0
[   12.129762]  ? __pfx_kthread+0x10/0x10
[   12.129783]  ret_from_fork_asm+0x1a/0x30
[   12.129813]  </TASK>
[   12.129823] 
[   12.140359] Allocated by task 173:
[   12.140655]  kasan_save_stack+0x45/0x70
[   12.140919]  kasan_save_track+0x18/0x40
[   12.141254]  kasan_save_alloc_info+0x3b/0x50
[   12.141495]  __kasan_krealloc+0x190/0x1f0
[   12.141813]  krealloc_noprof+0xf3/0x340
[   12.141963]  krealloc_more_oob_helper+0x1a9/0x930
[   12.142275]  krealloc_more_oob+0x1c/0x30
[   12.142495]  kunit_try_run_case+0x1a5/0x480
[   12.142710]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.143250]  kthread+0x337/0x6f0
[   12.143381]  ret_from_fork+0x116/0x1d0
[   12.143811]  ret_from_fork_asm+0x1a/0x30
[   12.144120] 
[   12.144208] The buggy address belongs to the object at ffff888100347200
[   12.144208]  which belongs to the cache kmalloc-256 of size 256
[   12.145062] The buggy address is located 0 bytes to the right of
[   12.145062]  allocated 235-byte region [ffff888100347200, ffff8881003472eb)
[   12.145784] 
[   12.145874] The buggy address belongs to the physical page:
[   12.146137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100346
[   12.146701] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.147024] flags: 0x200000000000040(head|node=0|zone=2)
[   12.147692] page_type: f5(slab)
[   12.147873] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.148490] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.148983] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.149712] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.150076] head: 0200000000000001 ffffea000400d181 00000000ffffffff 00000000ffffffff
[   12.150405] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.151178] page dumped because: kasan: bad access detected
[   12.151403] 
[   12.151518] Memory state around the buggy address:
[   12.152347]  ffff888100347180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.153137]  ffff888100347200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.153556] >ffff888100347280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   12.153860]                                                           ^
[   12.154341]  ffff888100347300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.154816]  ffff888100347380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.155113] ==================================================================
[   12.322229] ==================================================================
[   12.323221] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   12.324186] Write of size 1 at addr ffff888103a0e0eb by task kunit_try_catch/177
[   12.324626] 
[   12.325119] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.325171] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.325183] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.325205] Call Trace:
[   12.325227]  <TASK>
[   12.325244]  dump_stack_lvl+0x73/0xb0
[   12.325277]  print_report+0xd1/0x610
[   12.325301]  ? __virt_addr_valid+0x1db/0x2d0
[   12.325324]  ? krealloc_more_oob_helper+0x821/0x930
[   12.325348]  ? kasan_addr_to_slab+0x11/0xa0
[   12.325369]  ? krealloc_more_oob_helper+0x821/0x930
[   12.325393]  kasan_report+0x141/0x180
[   12.325425]  ? krealloc_more_oob_helper+0x821/0x930
[   12.325463]  __asan_report_store1_noabort+0x1b/0x30
[   12.325489]  krealloc_more_oob_helper+0x821/0x930
[   12.325512]  ? __schedule+0x10cc/0x2b60
[   12.325534]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   12.325560]  ? finish_task_switch.isra.0+0x153/0x700
[   12.325583]  ? __switch_to+0x47/0xf50
[   12.325610]  ? __schedule+0x10cc/0x2b60
[   12.325633]  ? __pfx_read_tsc+0x10/0x10
[   12.325657]  krealloc_large_more_oob+0x1c/0x30
[   12.325680]  kunit_try_run_case+0x1a5/0x480
[   12.325707]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.325730]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.325754]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.325778]  ? __kthread_parkme+0x82/0x180
[   12.325799]  ? preempt_count_sub+0x50/0x80
[   12.325822]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.325847]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.325871]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.325897]  kthread+0x337/0x6f0
[   12.325916]  ? trace_preempt_on+0x20/0xc0
[   12.325940]  ? __pfx_kthread+0x10/0x10
[   12.325960]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.325981]  ? calculate_sigpending+0x7b/0xa0
[   12.326006]  ? __pfx_kthread+0x10/0x10
[   12.326027]  ret_from_fork+0x116/0x1d0
[   12.326046]  ? __pfx_kthread+0x10/0x10
[   12.326066]  ret_from_fork_asm+0x1a/0x30
[   12.326096]  </TASK>
[   12.326107] 
[   12.334051] The buggy address belongs to the physical page:
[   12.334504] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a0c
[   12.334949] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.335247] flags: 0x200000000000040(head|node=0|zone=2)
[   12.335555] page_type: f8(unknown)
[   12.335741] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.335978] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.336317] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.337312] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.338021] head: 0200000000000002 ffffea00040e8301 00000000ffffffff 00000000ffffffff
[   12.338315] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.339136] page dumped because: kasan: bad access detected
[   12.339505] 
[   12.339600] Memory state around the buggy address:
[   12.340051]  ffff888103a0df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.340348]  ffff888103a0e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.340861] >ffff888103a0e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   12.341153]                                                           ^
[   12.341520]  ffff888103a0e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.341999]  ffff888103a0e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.342242] ==================================================================

[   12.417928] ==================================================================
[   12.418366] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   12.419030] Write of size 1 at addr ffff888100a308f0 by task kunit_try_catch/174
[   12.419490] 
[   12.419583] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.419626] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.419637] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.419657] Call Trace:
[   12.419668]  <TASK>
[   12.419682]  dump_stack_lvl+0x73/0xb0
[   12.419712]  print_report+0xd1/0x610
[   12.419734]  ? __virt_addr_valid+0x1db/0x2d0
[   12.419757]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.420091]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.420124]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.420150]  kasan_report+0x141/0x180
[   12.420191]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.420221]  __asan_report_store1_noabort+0x1b/0x30
[   12.420246]  krealloc_more_oob_helper+0x7eb/0x930
[   12.420270]  ? __schedule+0x10cc/0x2b60
[   12.420292]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   12.420317]  ? finish_task_switch.isra.0+0x153/0x700
[   12.420341]  ? __switch_to+0x47/0xf50
[   12.420366]  ? __schedule+0x10cc/0x2b60
[   12.420388]  ? __pfx_read_tsc+0x10/0x10
[   12.420413]  krealloc_more_oob+0x1c/0x30
[   12.420435]  kunit_try_run_case+0x1a5/0x480
[   12.420460]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.420483]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.420507]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.420531]  ? __kthread_parkme+0x82/0x180
[   12.420551]  ? preempt_count_sub+0x50/0x80
[   12.420574]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.420599]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.420623]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.420692]  kthread+0x337/0x6f0
[   12.420713]  ? trace_preempt_on+0x20/0xc0
[   12.420737]  ? __pfx_kthread+0x10/0x10
[   12.420758]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.420780]  ? calculate_sigpending+0x7b/0xa0
[   12.420804]  ? __pfx_kthread+0x10/0x10
[   12.420825]  ret_from_fork+0x116/0x1d0
[   12.420844]  ? __pfx_kthread+0x10/0x10
[   12.420865]  ret_from_fork_asm+0x1a/0x30
[   12.420897]  </TASK>
[   12.420907] 
[   12.434588] Allocated by task 174:
[   12.435003]  kasan_save_stack+0x45/0x70
[   12.435249]  kasan_save_track+0x18/0x40
[   12.435628]  kasan_save_alloc_info+0x3b/0x50
[   12.436146]  __kasan_krealloc+0x190/0x1f0
[   12.436333]  krealloc_noprof+0xf3/0x340
[   12.436471]  krealloc_more_oob_helper+0x1a9/0x930
[   12.436633]  krealloc_more_oob+0x1c/0x30
[   12.437087]  kunit_try_run_case+0x1a5/0x480
[   12.437553]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.438120]  kthread+0x337/0x6f0
[   12.438607]  ret_from_fork+0x116/0x1d0
[   12.439095]  ret_from_fork_asm+0x1a/0x30
[   12.439456] 
[   12.439531] The buggy address belongs to the object at ffff888100a30800
[   12.439531]  which belongs to the cache kmalloc-256 of size 256
[   12.440489] The buggy address is located 5 bytes to the right of
[   12.440489]  allocated 235-byte region [ffff888100a30800, ffff888100a308eb)
[   12.441521] 
[   12.441800] The buggy address belongs to the physical page:
[   12.442207] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a30
[   12.442458] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.442867] flags: 0x200000000000040(head|node=0|zone=2)
[   12.443442] page_type: f5(slab)
[   12.443817] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.444550] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.445459] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.446282] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.446574] head: 0200000000000001 ffffea0004028c01 00000000ffffffff 00000000ffffffff
[   12.447016] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.447926] page dumped because: kasan: bad access detected
[   12.448453] 
[   12.448629] Memory state around the buggy address:
[   12.449124]  ffff888100a30780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.449512]  ffff888100a30800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.449801] >ffff888100a30880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   12.450465]                                                              ^
[   12.451283]  ffff888100a30900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.451932]  ffff888100a30980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.452185] ==================================================================
[   12.384502] ==================================================================
[   12.385522] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   12.386141] Write of size 1 at addr ffff888100a308eb by task kunit_try_catch/174
[   12.387224] 
[   12.387518] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.387568] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.387580] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.387601] Call Trace:
[   12.387614]  <TASK>
[   12.387629]  dump_stack_lvl+0x73/0xb0
[   12.387781]  print_report+0xd1/0x610
[   12.387806]  ? __virt_addr_valid+0x1db/0x2d0
[   12.387831]  ? krealloc_more_oob_helper+0x821/0x930
[   12.387855]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.387911]  ? krealloc_more_oob_helper+0x821/0x930
[   12.387938]  kasan_report+0x141/0x180
[   12.387960]  ? krealloc_more_oob_helper+0x821/0x930
[   12.387989]  __asan_report_store1_noabort+0x1b/0x30
[   12.388014]  krealloc_more_oob_helper+0x821/0x930
[   12.388037]  ? __schedule+0x10cc/0x2b60
[   12.388071]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   12.388096]  ? finish_task_switch.isra.0+0x153/0x700
[   12.388129]  ? __switch_to+0x47/0xf50
[   12.388155]  ? __schedule+0x10cc/0x2b60
[   12.388176]  ? __pfx_read_tsc+0x10/0x10
[   12.388201]  krealloc_more_oob+0x1c/0x30
[   12.388223]  kunit_try_run_case+0x1a5/0x480
[   12.388249]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.388272]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.388296]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.388320]  ? __kthread_parkme+0x82/0x180
[   12.388342]  ? preempt_count_sub+0x50/0x80
[   12.388365]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.388389]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.388414]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.388439]  kthread+0x337/0x6f0
[   12.388458]  ? trace_preempt_on+0x20/0xc0
[   12.388481]  ? __pfx_kthread+0x10/0x10
[   12.388502]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.388523]  ? calculate_sigpending+0x7b/0xa0
[   12.388548]  ? __pfx_kthread+0x10/0x10
[   12.388569]  ret_from_fork+0x116/0x1d0
[   12.388588]  ? __pfx_kthread+0x10/0x10
[   12.388608]  ret_from_fork_asm+0x1a/0x30
[   12.388640]  </TASK>
[   12.388650] 
[   12.399882] Allocated by task 174:
[   12.400149]  kasan_save_stack+0x45/0x70
[   12.400577]  kasan_save_track+0x18/0x40
[   12.401041]  kasan_save_alloc_info+0x3b/0x50
[   12.401973]  __kasan_krealloc+0x190/0x1f0
[   12.402168]  krealloc_noprof+0xf3/0x340
[   12.402523]  krealloc_more_oob_helper+0x1a9/0x930
[   12.402994]  krealloc_more_oob+0x1c/0x30
[   12.403254]  kunit_try_run_case+0x1a5/0x480
[   12.403483]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.404093]  kthread+0x337/0x6f0
[   12.404360]  ret_from_fork+0x116/0x1d0
[   12.404667]  ret_from_fork_asm+0x1a/0x30
[   12.404876] 
[   12.405049] The buggy address belongs to the object at ffff888100a30800
[   12.405049]  which belongs to the cache kmalloc-256 of size 256
[   12.406420] The buggy address is located 0 bytes to the right of
[   12.406420]  allocated 235-byte region [ffff888100a30800, ffff888100a308eb)
[   12.407587] 
[   12.407738] The buggy address belongs to the physical page:
[   12.407920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a30
[   12.408768] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.409536] flags: 0x200000000000040(head|node=0|zone=2)
[   12.409966] page_type: f5(slab)
[   12.410119] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.410794] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.411567] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.412092] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.412761] head: 0200000000000001 ffffea0004028c01 00000000ffffffff 00000000ffffffff
[   12.412996] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.413522] page dumped because: kasan: bad access detected
[   12.414144] 
[   12.414330] Memory state around the buggy address:
[   12.414758]  ffff888100a30780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.415487]  ffff888100a30800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.416204] >ffff888100a30880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   12.416419]                                                           ^
[   12.416620]  ffff888100a30900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.416832]  ffff888100a30980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.417044] ==================================================================
[   12.621487] ==================================================================
[   12.622667] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   12.623492] Write of size 1 at addr ffff8881027ee0eb by task kunit_try_catch/178
[   12.624771] 
[   12.624959] CPU: 1 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.625006] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.625018] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.625039] Call Trace:
[   12.625064]  <TASK>
[   12.625080]  dump_stack_lvl+0x73/0xb0
[   12.625314]  print_report+0xd1/0x610
[   12.625344]  ? __virt_addr_valid+0x1db/0x2d0
[   12.625368]  ? krealloc_more_oob_helper+0x821/0x930
[   12.625393]  ? kasan_addr_to_slab+0x11/0xa0
[   12.625422]  ? krealloc_more_oob_helper+0x821/0x930
[   12.625449]  kasan_report+0x141/0x180
[   12.625471]  ? krealloc_more_oob_helper+0x821/0x930
[   12.625501]  __asan_report_store1_noabort+0x1b/0x30
[   12.625526]  krealloc_more_oob_helper+0x821/0x930
[   12.625549]  ? __schedule+0x10cc/0x2b60
[   12.625572]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   12.625598]  ? finish_task_switch.isra.0+0x153/0x700
[   12.625621]  ? __switch_to+0x47/0xf50
[   12.625770]  ? __schedule+0x10cc/0x2b60
[   12.625793]  ? __pfx_read_tsc+0x10/0x10
[   12.625820]  krealloc_large_more_oob+0x1c/0x30
[   12.625844]  kunit_try_run_case+0x1a5/0x480
[   12.625869]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.625894]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.625919]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.625943]  ? __kthread_parkme+0x82/0x180
[   12.625965]  ? preempt_count_sub+0x50/0x80
[   12.625988]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.626012]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.626036]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.626071]  kthread+0x337/0x6f0
[   12.626091]  ? trace_preempt_on+0x20/0xc0
[   12.626134]  ? __pfx_kthread+0x10/0x10
[   12.626154]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.626175]  ? calculate_sigpending+0x7b/0xa0
[   12.626201]  ? __pfx_kthread+0x10/0x10
[   12.626222]  ret_from_fork+0x116/0x1d0
[   12.626241]  ? __pfx_kthread+0x10/0x10
[   12.626261]  ret_from_fork_asm+0x1a/0x30
[   12.626292]  </TASK>
[   12.626302] 
[   12.641129] The buggy address belongs to the physical page:
[   12.641391] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027ec
[   12.641960] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.642556] flags: 0x200000000000040(head|node=0|zone=2)
[   12.643063] page_type: f8(unknown)
[   12.643259] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.643552] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.643863] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.644691] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.645353] head: 0200000000000002 ffffea000409fb01 00000000ffffffff 00000000ffffffff
[   12.645887] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.646409] page dumped because: kasan: bad access detected
[   12.646827] 
[   12.647310] Memory state around the buggy address:
[   12.647789]  ffff8881027edf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.648273]  ffff8881027ee000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.648845] >ffff8881027ee080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   12.649532]                                                           ^
[   12.649959]  ffff8881027ee100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.650749]  ffff8881027ee180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.651245] ==================================================================
[   12.652208] ==================================================================
[   12.652521] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   12.652843] Write of size 1 at addr ffff8881027ee0f0 by task kunit_try_catch/178
[   12.653763] 
[   12.654254] CPU: 1 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.654308] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.654357] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.654377] Call Trace:
[   12.654389]  <TASK>
[   12.654404]  dump_stack_lvl+0x73/0xb0
[   12.654435]  print_report+0xd1/0x610
[   12.654459]  ? __virt_addr_valid+0x1db/0x2d0
[   12.654481]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.654505]  ? kasan_addr_to_slab+0x11/0xa0
[   12.654526]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.654551]  kasan_report+0x141/0x180
[   12.654573]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.654602]  __asan_report_store1_noabort+0x1b/0x30
[   12.654627]  krealloc_more_oob_helper+0x7eb/0x930
[   12.654651]  ? __schedule+0x10cc/0x2b60
[   12.654674]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   12.654701]  ? finish_task_switch.isra.0+0x153/0x700
[   12.654729]  ? __switch_to+0x47/0xf50
[   12.654755]  ? __schedule+0x10cc/0x2b60
[   12.654776]  ? __pfx_read_tsc+0x10/0x10
[   12.654800]  krealloc_large_more_oob+0x1c/0x30
[   12.654824]  kunit_try_run_case+0x1a5/0x480
[   12.654849]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.654895]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.654920]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.654944]  ? __kthread_parkme+0x82/0x180
[   12.654964]  ? preempt_count_sub+0x50/0x80
[   12.654986]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.655011]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.655036]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.655072]  kthread+0x337/0x6f0
[   12.655091]  ? trace_preempt_on+0x20/0xc0
[   12.655131]  ? __pfx_kthread+0x10/0x10
[   12.655151]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.655173]  ? calculate_sigpending+0x7b/0xa0
[   12.655197]  ? __pfx_kthread+0x10/0x10
[   12.655218]  ret_from_fork+0x116/0x1d0
[   12.655237]  ? __pfx_kthread+0x10/0x10
[   12.655257]  ret_from_fork_asm+0x1a/0x30
[   12.655287]  </TASK>
[   12.655297] 
[   12.668816] The buggy address belongs to the physical page:
[   12.669001] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027ec
[   12.669347] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.670229] flags: 0x200000000000040(head|node=0|zone=2)
[   12.670788] page_type: f8(unknown)
[   12.671187] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.671747] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.672248] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.672759] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.673293] head: 0200000000000002 ffffea000409fb01 00000000ffffffff 00000000ffffffff
[   12.673527] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.674166] page dumped because: kasan: bad access detected
[   12.674651] 
[   12.674875] Memory state around the buggy address:
[   12.675358]  ffff8881027edf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.676185]  ffff8881027ee000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.676499] >ffff8881027ee080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   12.676863]                                                              ^
[   12.677591]  ffff8881027ee100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.678304]  ffff8881027ee180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.678953] ==================================================================