Hay
Date
July 20, 2025, 11:12 p.m.

Environment
qemu-arm64
qemu-x86_64

[   16.483811] ==================================================================
[   16.484412] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   16.484528] Write of size 1 at addr fff00000c78c20f0 by task kunit_try_catch/160
[   16.484584] 
[   16.484718] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   16.484836] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.484868] Hardware name: linux,dummy-virt (DT)
[   16.484930] Call trace:
[   16.484951]  show_stack+0x20/0x38 (C)
[   16.485294]  dump_stack_lvl+0x8c/0xd0
[   16.485359]  print_report+0x118/0x5d0
[   16.485406]  kasan_report+0xdc/0x128
[   16.485829]  __asan_report_store1_noabort+0x20/0x30
[   16.485906]  krealloc_more_oob_helper+0x5c0/0x678
[   16.485955]  krealloc_large_more_oob+0x20/0x38
[   16.486230]  kunit_try_run_case+0x170/0x3f0
[   16.486381]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.486473]  kthread+0x328/0x630
[   16.486582]  ret_from_fork+0x10/0x20
[   16.486634] 
[   16.486654] The buggy address belongs to the physical page:
[   16.486684] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078c0
[   16.486748] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.486796] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.487154] page_type: f8(unknown)
[   16.487447] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.487764] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.487819] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.487870] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.488026] head: 0bfffe0000000002 ffffc1ffc31e3001 00000000ffffffff 00000000ffffffff
[   16.488304] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.488400] page dumped because: kasan: bad access detected
[   16.488431] 
[   16.488448] Memory state around the buggy address:
[   16.488481]  fff00000c78c1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.488523]  fff00000c78c2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.488565] >fff00000c78c2080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   16.488640]                                                              ^
[   16.488680]  fff00000c78c2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.488758]  fff00000c78c2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.488833] ==================================================================
[   16.384787] ==================================================================
[   16.384848] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   16.384945] Write of size 1 at addr fff00000c653c2f0 by task kunit_try_catch/156
[   16.385008] 
[   16.385039] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   16.385119] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.385144] Hardware name: linux,dummy-virt (DT)
[   16.385174] Call trace:
[   16.385196]  show_stack+0x20/0x38 (C)
[   16.385245]  dump_stack_lvl+0x8c/0xd0
[   16.385431]  print_report+0x118/0x5d0
[   16.385517]  kasan_report+0xdc/0x128
[   16.385562]  __asan_report_store1_noabort+0x20/0x30
[   16.385615]  krealloc_more_oob_helper+0x5c0/0x678
[   16.385663]  krealloc_more_oob+0x20/0x38
[   16.385708]  kunit_try_run_case+0x170/0x3f0
[   16.385755]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.385822]  kthread+0x328/0x630
[   16.385863]  ret_from_fork+0x10/0x20
[   16.385919] 
[   16.385938] Allocated by task 156:
[   16.385965]  kasan_save_stack+0x3c/0x68
[   16.386085]  kasan_save_track+0x20/0x40
[   16.386177]  kasan_save_alloc_info+0x40/0x58
[   16.386285]  __kasan_krealloc+0x118/0x178
[   16.386396]  krealloc_noprof+0x128/0x360
[   16.386433]  krealloc_more_oob_helper+0x168/0x678
[   16.386519]  krealloc_more_oob+0x20/0x38
[   16.386589]  kunit_try_run_case+0x170/0x3f0
[   16.386626]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.386694]  kthread+0x328/0x630
[   16.386945]  ret_from_fork+0x10/0x20
[   16.387003] 
[   16.387021] The buggy address belongs to the object at fff00000c653c200
[   16.387021]  which belongs to the cache kmalloc-256 of size 256
[   16.387112] The buggy address is located 5 bytes to the right of
[   16.387112]  allocated 235-byte region [fff00000c653c200, fff00000c653c2eb)
[   16.387202] 
[   16.387311] The buggy address belongs to the physical page:
[   16.387414] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653c
[   16.387574] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.387654] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.387707] page_type: f5(slab)
[   16.387748] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.387800] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.387850] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.387919] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.387967] head: 0bfffe0000000001 ffffc1ffc3194f01 00000000ffffffff 00000000ffffffff
[   16.388158] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.388215] page dumped because: kasan: bad access detected
[   16.388247] 
[   16.388264] Memory state around the buggy address:
[   16.388313]  fff00000c653c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.388355]  fff00000c653c200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.388397] >fff00000c653c280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   16.388435]                                                              ^
[   16.388473]  fff00000c653c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.388514]  fff00000c653c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.388551] ==================================================================
[   16.475783] ==================================================================
[   16.475842] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   16.475912] Write of size 1 at addr fff00000c78c20eb by task kunit_try_catch/160
[   16.475963] 
[   16.475996] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   16.476076] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.476102] Hardware name: linux,dummy-virt (DT)
[   16.476131] Call trace:
[   16.476154]  show_stack+0x20/0x38 (C)
[   16.476201]  dump_stack_lvl+0x8c/0xd0
[   16.476247]  print_report+0x118/0x5d0
[   16.476630]  kasan_report+0xdc/0x128
[   16.476809]  __asan_report_store1_noabort+0x20/0x30
[   16.477196]  krealloc_more_oob_helper+0x60c/0x678
[   16.477252]  krealloc_large_more_oob+0x20/0x38
[   16.477300]  kunit_try_run_case+0x170/0x3f0
[   16.478091]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.478235]  kthread+0x328/0x630
[   16.478278]  ret_from_fork+0x10/0x20
[   16.478328] 
[   16.478349] The buggy address belongs to the physical page:
[   16.478428] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078c0
[   16.478915] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.479127] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.479210] page_type: f8(unknown)
[   16.479269] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.479321] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.479691] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.479744] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.479793] head: 0bfffe0000000002 ffffc1ffc31e3001 00000000ffffffff 00000000ffffffff
[   16.479843] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.480154] page dumped because: kasan: bad access detected
[   16.480313] 
[   16.480334] Memory state around the buggy address:
[   16.480439]  fff00000c78c1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.480569]  fff00000c78c2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.480635] >fff00000c78c2080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   16.480672]                                                           ^
[   16.480712]  fff00000c78c2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.480791]  fff00000c78c2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.480910] ==================================================================
[   16.370368] ==================================================================
[   16.370509] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   16.370565] Write of size 1 at addr fff00000c653c2eb by task kunit_try_catch/156
[   16.370616] 
[   16.370653] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   16.370966] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.371064] Hardware name: linux,dummy-virt (DT)
[   16.371161] Call trace:
[   16.371239]  show_stack+0x20/0x38 (C)
[   16.371292]  dump_stack_lvl+0x8c/0xd0
[   16.371575]  print_report+0x118/0x5d0
[   16.371804]  kasan_report+0xdc/0x128
[   16.371994]  __asan_report_store1_noabort+0x20/0x30
[   16.372079]  krealloc_more_oob_helper+0x60c/0x678
[   16.372236]  krealloc_more_oob+0x20/0x38
[   16.372507]  kunit_try_run_case+0x170/0x3f0
[   16.372589]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.372876]  kthread+0x328/0x630
[   16.373078]  ret_from_fork+0x10/0x20
[   16.373213] 
[   16.373232] Allocated by task 156:
[   16.373262]  kasan_save_stack+0x3c/0x68
[   16.373608]  kasan_save_track+0x20/0x40
[   16.373715]  kasan_save_alloc_info+0x40/0x58
[   16.373891]  __kasan_krealloc+0x118/0x178
[   16.373940]  krealloc_noprof+0x128/0x360
[   16.373977]  krealloc_more_oob_helper+0x168/0x678
[   16.374016]  krealloc_more_oob+0x20/0x38
[   16.374051]  kunit_try_run_case+0x170/0x3f0
[   16.374228]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.374307]  kthread+0x328/0x630
[   16.374510]  ret_from_fork+0x10/0x20
[   16.374639] 
[   16.374719] The buggy address belongs to the object at fff00000c653c200
[   16.374719]  which belongs to the cache kmalloc-256 of size 256
[   16.374795] The buggy address is located 0 bytes to the right of
[   16.374795]  allocated 235-byte region [fff00000c653c200, fff00000c653c2eb)
[   16.375092] 
[   16.375165] The buggy address belongs to the physical page:
[   16.375266] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653c
[   16.375362] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.375409] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.375777] page_type: f5(slab)
[   16.375953] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.376069] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.376201] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.376250] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.376321] head: 0bfffe0000000001 ffffc1ffc3194f01 00000000ffffffff 00000000ffffffff
[   16.376612] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.376677] page dumped because: kasan: bad access detected
[   16.376707] 
[   16.376725] Memory state around the buggy address:
[   16.376758]  fff00000c653c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.376803]  fff00000c653c200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.376844] >fff00000c653c280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   16.376881]                                                           ^
[   16.376929]  fff00000c653c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.376970]  fff00000c653c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.377007] ==================================================================

[   16.418790] ==================================================================
[   16.418837] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   16.418885] Write of size 1 at addr fff00000c5b4faf0 by task kunit_try_catch/156
[   16.418934] 
[   16.418962] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   16.419040] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.419066] Hardware name: linux,dummy-virt (DT)
[   16.419096] Call trace:
[   16.419117]  show_stack+0x20/0x38 (C)
[   16.419190]  dump_stack_lvl+0x8c/0xd0
[   16.419238]  print_report+0x118/0x5d0
[   16.419284]  kasan_report+0xdc/0x128
[   16.419329]  __asan_report_store1_noabort+0x20/0x30
[   16.419379]  krealloc_more_oob_helper+0x5c0/0x678
[   16.419437]  krealloc_more_oob+0x20/0x38
[   16.419482]  kunit_try_run_case+0x170/0x3f0
[   16.419529]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.419580]  kthread+0x328/0x630
[   16.419634]  ret_from_fork+0x10/0x20
[   16.419681] 
[   16.419698] Allocated by task 156:
[   16.419741]  kasan_save_stack+0x3c/0x68
[   16.419782]  kasan_save_track+0x20/0x40
[   16.419818]  kasan_save_alloc_info+0x40/0x58
[   16.419857]  __kasan_krealloc+0x118/0x178
[   16.419894]  krealloc_noprof+0x128/0x360
[   16.419930]  krealloc_more_oob_helper+0x168/0x678
[   16.419969]  krealloc_more_oob+0x20/0x38
[   16.420004]  kunit_try_run_case+0x170/0x3f0
[   16.420041]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.420083]  kthread+0x328/0x630
[   16.420115]  ret_from_fork+0x10/0x20
[   16.420159] 
[   16.420178] The buggy address belongs to the object at fff00000c5b4fa00
[   16.420178]  which belongs to the cache kmalloc-256 of size 256
[   16.420233] The buggy address is located 5 bytes to the right of
[   16.420233]  allocated 235-byte region [fff00000c5b4fa00, fff00000c5b4faeb)
[   16.420295] 
[   16.420313] The buggy address belongs to the physical page:
[   16.420352] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b4e
[   16.420405] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.420465] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.420523] page_type: f5(slab)
[   16.420560] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.420614] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.421499] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.421589] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.421673] head: 0bfffe0000000001 ffffc1ffc316d381 00000000ffffffff 00000000ffffffff
[   16.421721] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.421848] page dumped because: kasan: bad access detected
[   16.421889] 
[   16.421944] Memory state around the buggy address:
[   16.422041]  fff00000c5b4f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.422144]  fff00000c5b4fa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.422204] >fff00000c5b4fa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   16.422241]                                                              ^
[   16.422280]  fff00000c5b4fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.422321]  fff00000c5b4fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.422358] ==================================================================
[   16.414447] ==================================================================
[   16.414511] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   16.414599] Write of size 1 at addr fff00000c5b4faeb by task kunit_try_catch/156
[   16.414904] 
[   16.414943] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   16.415024] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.415050] Hardware name: linux,dummy-virt (DT)
[   16.415082] Call trace:
[   16.415104]  show_stack+0x20/0x38 (C)
[   16.415154]  dump_stack_lvl+0x8c/0xd0
[   16.415200]  print_report+0x118/0x5d0
[   16.415246]  kasan_report+0xdc/0x128
[   16.415356]  __asan_report_store1_noabort+0x20/0x30
[   16.415440]  krealloc_more_oob_helper+0x60c/0x678
[   16.415490]  krealloc_more_oob+0x20/0x38
[   16.415535]  kunit_try_run_case+0x170/0x3f0
[   16.415599]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.415693]  kthread+0x328/0x630
[   16.415739]  ret_from_fork+0x10/0x20
[   16.415788] 
[   16.415823] Allocated by task 156:
[   16.415880]  kasan_save_stack+0x3c/0x68
[   16.415923]  kasan_save_track+0x20/0x40
[   16.415959]  kasan_save_alloc_info+0x40/0x58
[   16.415999]  __kasan_krealloc+0x118/0x178
[   16.416066]  krealloc_noprof+0x128/0x360
[   16.416121]  krealloc_more_oob_helper+0x168/0x678
[   16.416161]  krealloc_more_oob+0x20/0x38
[   16.416196]  kunit_try_run_case+0x170/0x3f0
[   16.416282]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.416343]  kthread+0x328/0x630
[   16.416381]  ret_from_fork+0x10/0x20
[   16.416417] 
[   16.416437] The buggy address belongs to the object at fff00000c5b4fa00
[   16.416437]  which belongs to the cache kmalloc-256 of size 256
[   16.416494] The buggy address is located 0 bytes to the right of
[   16.416494]  allocated 235-byte region [fff00000c5b4fa00, fff00000c5b4faeb)
[   16.416556] 
[   16.416576] The buggy address belongs to the physical page:
[   16.416607] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b4e
[   16.416764] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.416818] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.416869] page_type: f5(slab)
[   16.416942] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.417064] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.417179] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.417246] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.417294] head: 0bfffe0000000001 ffffc1ffc316d381 00000000ffffffff 00000000ffffffff
[   16.417342] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.417381] page dumped because: kasan: bad access detected
[   16.417411] 
[   16.417428] Memory state around the buggy address:
[   16.417529]  fff00000c5b4f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.417574]  fff00000c5b4fa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.417615] >fff00000c5b4fa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   16.417715]                                                           ^
[   16.417794]  fff00000c5b4fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.417835]  fff00000c5b4fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.417883] ==================================================================
[   16.459422] ==================================================================
[   16.459476] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   16.459528] Write of size 1 at addr fff00000c790a0eb by task kunit_try_catch/160
[   16.459577] 
[   16.459608] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   16.459704] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.459730] Hardware name: linux,dummy-virt (DT)
[   16.459760] Call trace:
[   16.459783]  show_stack+0x20/0x38 (C)
[   16.459830]  dump_stack_lvl+0x8c/0xd0
[   16.459877]  print_report+0x118/0x5d0
[   16.460313]  kasan_report+0xdc/0x128
[   16.460373]  __asan_report_store1_noabort+0x20/0x30
[   16.460427]  krealloc_more_oob_helper+0x60c/0x678
[   16.460476]  krealloc_large_more_oob+0x20/0x38
[   16.460561]  kunit_try_run_case+0x170/0x3f0
[   16.460628]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.460682]  kthread+0x328/0x630
[   16.460740]  ret_from_fork+0x10/0x20
[   16.460806] 
[   16.460886] The buggy address belongs to the physical page:
[   16.460924] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107908
[   16.460997] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.461043] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.461093] page_type: f8(unknown)
[   16.461131] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.461302] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.461436] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.461597] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.461713] head: 0bfffe0000000002 ffffc1ffc31e4201 00000000ffffffff 00000000ffffffff
[   16.461773] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.461844] page dumped because: kasan: bad access detected
[   16.462254] 
[   16.462416] Memory state around the buggy address:
[   16.462485]  fff00000c7909f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.462578]  fff00000c790a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.462676] >fff00000c790a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   16.462815]                                                           ^
[   16.462853]  fff00000c790a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.463105]  fff00000c790a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.463194] ==================================================================
[   16.463809] ==================================================================
[   16.463869] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   16.463917] Write of size 1 at addr fff00000c790a0f0 by task kunit_try_catch/160
[   16.463971] 
[   16.464113] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   16.464200] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.464226] Hardware name: linux,dummy-virt (DT)
[   16.464256] Call trace:
[   16.464277]  show_stack+0x20/0x38 (C)
[   16.464395]  dump_stack_lvl+0x8c/0xd0
[   16.464579]  print_report+0x118/0x5d0
[   16.464648]  kasan_report+0xdc/0x128
[   16.464693]  __asan_report_store1_noabort+0x20/0x30
[   16.464854]  krealloc_more_oob_helper+0x5c0/0x678
[   16.464912]  krealloc_large_more_oob+0x20/0x38
[   16.464958]  kunit_try_run_case+0x170/0x3f0
[   16.465064]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.465165]  kthread+0x328/0x630
[   16.465251]  ret_from_fork+0x10/0x20
[   16.465370] 
[   16.465471] The buggy address belongs to the physical page:
[   16.465568] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107908
[   16.465642] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.465720] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.465788] page_type: f8(unknown)
[   16.465825] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.465874] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.465927] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.465995] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.466044] head: 0bfffe0000000002 ffffc1ffc31e4201 00000000ffffffff 00000000ffffffff
[   16.466358] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.466462] page dumped because: kasan: bad access detected
[   16.466531] 
[   16.466592] Memory state around the buggy address:
[   16.466708]  fff00000c7909f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.466752]  fff00000c790a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.466947] >fff00000c790a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   16.467144]                                                              ^
[   16.467347]  fff00000c790a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.467401]  fff00000c790a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.467473] ==================================================================

[   12.303871] ==================================================================
[   12.304350] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   12.304742] Write of size 1 at addr ffff888100341cf0 by task kunit_try_catch/174
[   12.305128] 
[   12.305231] CPU: 0 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   12.305273] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.305284] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.305304] Call Trace:
[   12.305317]  <TASK>
[   12.305333]  dump_stack_lvl+0x73/0xb0
[   12.305362]  print_report+0xd1/0x610
[   12.305384]  ? __virt_addr_valid+0x1db/0x2d0
[   12.305417]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.305441]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.305462]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.305486]  kasan_report+0x141/0x180
[   12.305507]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.305536]  __asan_report_store1_noabort+0x1b/0x30
[   12.305560]  krealloc_more_oob_helper+0x7eb/0x930
[   12.305582]  ? __schedule+0x10c6/0x2b60
[   12.305604]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   12.305628]  ? finish_task_switch.isra.0+0x153/0x700
[   12.305650]  ? __switch_to+0x47/0xf50
[   12.305676]  ? __schedule+0x10c6/0x2b60
[   12.305698]  ? __pfx_read_tsc+0x10/0x10
[   12.305722]  krealloc_more_oob+0x1c/0x30
[   12.305743]  kunit_try_run_case+0x1a5/0x480
[   12.305767]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.305789]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.305813]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.305836]  ? __kthread_parkme+0x82/0x180
[   12.305857]  ? preempt_count_sub+0x50/0x80
[   12.305881]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.305904]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.305927]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.305950]  kthread+0x337/0x6f0
[   12.305969]  ? trace_preempt_on+0x20/0xc0
[   12.305992]  ? __pfx_kthread+0x10/0x10
[   12.306013]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.306084]  ? calculate_sigpending+0x7b/0xa0
[   12.306109]  ? __pfx_kthread+0x10/0x10
[   12.306130]  ret_from_fork+0x116/0x1d0
[   12.306149]  ? __pfx_kthread+0x10/0x10
[   12.306169]  ret_from_fork_asm+0x1a/0x30
[   12.306201]  </TASK>
[   12.306211] 
[   12.313954] Allocated by task 174:
[   12.314085]  kasan_save_stack+0x45/0x70
[   12.314484]  kasan_save_track+0x18/0x40
[   12.314678]  kasan_save_alloc_info+0x3b/0x50
[   12.314898]  __kasan_krealloc+0x190/0x1f0
[   12.315153]  krealloc_noprof+0xf3/0x340
[   12.315340]  krealloc_more_oob_helper+0x1a9/0x930
[   12.315529]  krealloc_more_oob+0x1c/0x30
[   12.315686]  kunit_try_run_case+0x1a5/0x480
[   12.315900]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.316155]  kthread+0x337/0x6f0
[   12.316497]  ret_from_fork+0x116/0x1d0
[   12.316702]  ret_from_fork_asm+0x1a/0x30
[   12.316864] 
[   12.316939] The buggy address belongs to the object at ffff888100341c00
[   12.316939]  which belongs to the cache kmalloc-256 of size 256
[   12.317718] The buggy address is located 5 bytes to the right of
[   12.317718]  allocated 235-byte region [ffff888100341c00, ffff888100341ceb)
[   12.318224] 
[   12.318322] The buggy address belongs to the physical page:
[   12.318581] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100340
[   12.318827] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.319054] flags: 0x200000000000040(head|node=0|zone=2)
[   12.319230] page_type: f5(slab)
[   12.319351] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.319656] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.320065] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.320417] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.320762] head: 0200000000000001 ffffea000400d001 00000000ffffffff 00000000ffffffff
[   12.321231] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.321923] page dumped because: kasan: bad access detected
[   12.322372] 
[   12.322485] Memory state around the buggy address:
[   12.322706]  ffff888100341b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.322940]  ffff888100341c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.323546] >ffff888100341c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   12.323866]                                                              ^
[   12.324175]  ffff888100341d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.324471]  ffff888100341d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.324757] ==================================================================
[   12.273938] ==================================================================
[   12.274589] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   12.275291] Write of size 1 at addr ffff888100341ceb by task kunit_try_catch/174
[   12.275950] 
[   12.276113] CPU: 0 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   12.276193] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.276208] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.276229] Call Trace:
[   12.276256]  <TASK>
[   12.276276]  dump_stack_lvl+0x73/0xb0
[   12.276309]  print_report+0xd1/0x610
[   12.276334]  ? __virt_addr_valid+0x1db/0x2d0
[   12.276359]  ? krealloc_more_oob_helper+0x821/0x930
[   12.276384]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.276417]  ? krealloc_more_oob_helper+0x821/0x930
[   12.276441]  kasan_report+0x141/0x180
[   12.276464]  ? krealloc_more_oob_helper+0x821/0x930
[   12.276493]  __asan_report_store1_noabort+0x1b/0x30
[   12.276517]  krealloc_more_oob_helper+0x821/0x930
[   12.276539]  ? __schedule+0x10c6/0x2b60
[   12.276562]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   12.276586]  ? finish_task_switch.isra.0+0x153/0x700
[   12.276610]  ? __switch_to+0x47/0xf50
[   12.276638]  ? __schedule+0x10c6/0x2b60
[   12.276659]  ? __pfx_read_tsc+0x10/0x10
[   12.276688]  krealloc_more_oob+0x1c/0x30
[   12.276709]  kunit_try_run_case+0x1a5/0x480
[   12.276734]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.276756]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.276781]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.276804]  ? __kthread_parkme+0x82/0x180
[   12.276825]  ? preempt_count_sub+0x50/0x80
[   12.276848]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.276872]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.276895]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.276918]  kthread+0x337/0x6f0
[   12.276937]  ? trace_preempt_on+0x20/0xc0
[   12.276961]  ? __pfx_kthread+0x10/0x10
[   12.276982]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.277003]  ? calculate_sigpending+0x7b/0xa0
[   12.277082]  ? __pfx_kthread+0x10/0x10
[   12.277106]  ret_from_fork+0x116/0x1d0
[   12.277125]  ? __pfx_kthread+0x10/0x10
[   12.277146]  ret_from_fork_asm+0x1a/0x30
[   12.277178]  </TASK>
[   12.277190] 
[   12.289478] Allocated by task 174:
[   12.289811]  kasan_save_stack+0x45/0x70
[   12.290226]  kasan_save_track+0x18/0x40
[   12.290840]  kasan_save_alloc_info+0x3b/0x50
[   12.291278]  __kasan_krealloc+0x190/0x1f0
[   12.291659]  krealloc_noprof+0xf3/0x340
[   12.291839]  krealloc_more_oob_helper+0x1a9/0x930
[   12.292002]  krealloc_more_oob+0x1c/0x30
[   12.292420]  kunit_try_run_case+0x1a5/0x480
[   12.292842]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.293357]  kthread+0x337/0x6f0
[   12.293718]  ret_from_fork+0x116/0x1d0
[   12.293889]  ret_from_fork_asm+0x1a/0x30
[   12.294030] 
[   12.294254] The buggy address belongs to the object at ffff888100341c00
[   12.294254]  which belongs to the cache kmalloc-256 of size 256
[   12.295575] The buggy address is located 0 bytes to the right of
[   12.295575]  allocated 235-byte region [ffff888100341c00, ffff888100341ceb)
[   12.296448] 
[   12.296529] The buggy address belongs to the physical page:
[   12.296932] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100340
[   12.297699] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.298217] flags: 0x200000000000040(head|node=0|zone=2)
[   12.298880] page_type: f5(slab)
[   12.299196] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.299447] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.299736] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.300031] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.300340] head: 0200000000000001 ffffea000400d001 00000000ffffffff 00000000ffffffff
[   12.300681] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.301086] page dumped because: kasan: bad access detected
[   12.301261] 
[   12.301336] Memory state around the buggy address:
[   12.301574]  ffff888100341b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.301854]  ffff888100341c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.302146] >ffff888100341c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   12.302464]                                                           ^
[   12.302709]  ffff888100341d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.303012]  ffff888100341d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.303270] ==================================================================
[   12.449370] ==================================================================
[   12.449847] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   12.450156] Write of size 1 at addr ffff88810389e0eb by task kunit_try_catch/178
[   12.450631] 
[   12.450756] CPU: 0 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   12.450802] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.450814] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.450835] Call Trace:
[   12.450848]  <TASK>
[   12.450865]  dump_stack_lvl+0x73/0xb0
[   12.450898]  print_report+0xd1/0x610
[   12.450921]  ? __virt_addr_valid+0x1db/0x2d0
[   12.450946]  ? krealloc_more_oob_helper+0x821/0x930
[   12.450970]  ? kasan_addr_to_slab+0x11/0xa0
[   12.450990]  ? krealloc_more_oob_helper+0x821/0x930
[   12.451013]  kasan_report+0x141/0x180
[   12.451274]  ? krealloc_more_oob_helper+0x821/0x930
[   12.451308]  __asan_report_store1_noabort+0x1b/0x30
[   12.451332]  krealloc_more_oob_helper+0x821/0x930
[   12.451355]  ? pick_task_fair+0xc9/0x340
[   12.451381]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   12.451419]  ? __schedule+0x2079/0x2b60
[   12.451440]  ? schedule+0x7c/0x2e0
[   12.451460]  ? trace_hardirqs_on+0x37/0xe0
[   12.451484]  ? __schedule+0x2079/0x2b60
[   12.451506]  ? __pfx_read_tsc+0x10/0x10
[   12.451531]  krealloc_large_more_oob+0x1c/0x30
[   12.451554]  kunit_try_run_case+0x1a5/0x480
[   12.451578]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.451608]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.451631]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.451654]  ? __kthread_parkme+0x82/0x180
[   12.451675]  ? preempt_count_sub+0x50/0x80
[   12.451699]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.451722]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.451745]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.451768]  kthread+0x337/0x6f0
[   12.451787]  ? trace_preempt_on+0x20/0xc0
[   12.451809]  ? __pfx_kthread+0x10/0x10
[   12.451829]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.451850]  ? calculate_sigpending+0x7b/0xa0
[   12.451873]  ? __pfx_kthread+0x10/0x10
[   12.451895]  ret_from_fork+0x116/0x1d0
[   12.451913]  ? __pfx_kthread+0x10/0x10
[   12.451933]  ret_from_fork_asm+0x1a/0x30
[   12.451965]  </TASK>
[   12.451976] 
[   12.460686] The buggy address belongs to the physical page:
[   12.460924] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10389c
[   12.461882] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.462741] flags: 0x200000000000040(head|node=0|zone=2)
[   12.462995] page_type: f8(unknown)
[   12.463533] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.463845] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.464422] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.464848] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.465285] head: 0200000000000002 ffffea00040e2701 00000000ffffffff 00000000ffffffff
[   12.465591] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.466202] page dumped because: kasan: bad access detected
[   12.466406] 
[   12.466635] Memory state around the buggy address:
[   12.466983]  ffff88810389df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.467510]  ffff88810389e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.467970] >ffff88810389e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   12.468485]                                                           ^
[   12.468908]  ffff88810389e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.469305]  ffff88810389e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.469640] ==================================================================
[   12.470294] ==================================================================
[   12.470707] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   12.471117] Write of size 1 at addr ffff88810389e0f0 by task kunit_try_catch/178
[   12.471954] 
[   12.472142] CPU: 0 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   12.472186] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.472198] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.472218] Call Trace:
[   12.472232]  <TASK>
[   12.472248]  dump_stack_lvl+0x73/0xb0
[   12.472278]  print_report+0xd1/0x610
[   12.472299]  ? __virt_addr_valid+0x1db/0x2d0
[   12.472321]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.472344]  ? kasan_addr_to_slab+0x11/0xa0
[   12.472364]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.472389]  kasan_report+0x141/0x180
[   12.472425]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.472454]  __asan_report_store1_noabort+0x1b/0x30
[   12.472478]  krealloc_more_oob_helper+0x7eb/0x930
[   12.472500]  ? pick_task_fair+0xc9/0x340
[   12.472525]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   12.472549]  ? __schedule+0x2079/0x2b60
[   12.472569]  ? schedule+0x7c/0x2e0
[   12.472589]  ? trace_hardirqs_on+0x37/0xe0
[   12.472611]  ? __schedule+0x2079/0x2b60
[   12.472633]  ? __pfx_read_tsc+0x10/0x10
[   12.472658]  krealloc_large_more_oob+0x1c/0x30
[   12.472684]  kunit_try_run_case+0x1a5/0x480
[   12.472707]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.472729]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.472752]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.472775]  ? __kthread_parkme+0x82/0x180
[   12.472795]  ? preempt_count_sub+0x50/0x80
[   12.472819]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.472842]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.472865]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.472887]  kthread+0x337/0x6f0
[   12.472906]  ? trace_preempt_on+0x20/0xc0
[   12.472928]  ? __pfx_kthread+0x10/0x10
[   12.472948]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.472969]  ? calculate_sigpending+0x7b/0xa0
[   12.472992]  ? __pfx_kthread+0x10/0x10
[   12.473014]  ret_from_fork+0x116/0x1d0
[   12.473031]  ? __pfx_kthread+0x10/0x10
[   12.473052]  ret_from_fork_asm+0x1a/0x30
[   12.473084]  </TASK>
[   12.473094] 
[   12.481132] The buggy address belongs to the physical page:
[   12.481391] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10389c
[   12.481904] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.482140] flags: 0x200000000000040(head|node=0|zone=2)
[   12.482318] page_type: f8(unknown)
[   12.482563] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.483355] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.483742] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.484087] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.484449] head: 0200000000000002 ffffea00040e2701 00000000ffffffff 00000000ffffffff
[   12.484752] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.485079] page dumped because: kasan: bad access detected
[   12.485256] 
[   12.485329] Memory state around the buggy address:
[   12.485498]  ffff88810389df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.485807]  ffff88810389e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.486307] >ffff88810389e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   12.486720]                                                              ^
[   12.487228]  ffff88810389e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.487482]  ffff88810389e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.488089] ==================================================================

[   12.394230] ==================================================================
[   12.394589] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   12.394883] Write of size 1 at addr ffff88810034c2f0 by task kunit_try_catch/173
[   12.395523] 
[   12.395646] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   12.395691] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.395704] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.395725] Call Trace:
[   12.395743]  <TASK>
[   12.395758]  dump_stack_lvl+0x73/0xb0
[   12.395786]  print_report+0xd1/0x610
[   12.395808]  ? __virt_addr_valid+0x1db/0x2d0
[   12.395830]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.395852]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.396132]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.396170]  kasan_report+0x141/0x180
[   12.396192]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.396220]  __asan_report_store1_noabort+0x1b/0x30
[   12.396244]  krealloc_more_oob_helper+0x7eb/0x930
[   12.396266]  ? __schedule+0x10c6/0x2b60
[   12.396287]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   12.396311]  ? finish_task_switch.isra.0+0x153/0x700
[   12.396338]  ? __switch_to+0x47/0xf50
[   12.396364]  ? __schedule+0x10c6/0x2b60
[   12.396385]  ? __pfx_read_tsc+0x10/0x10
[   12.396408]  krealloc_more_oob+0x1c/0x30
[   12.396429]  kunit_try_run_case+0x1a5/0x480
[   12.396453]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.396475]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.396497]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.396519]  ? __kthread_parkme+0x82/0x180
[   12.396539]  ? preempt_count_sub+0x50/0x80
[   12.396561]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.396584]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.396606]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.396629]  kthread+0x337/0x6f0
[   12.396648]  ? trace_preempt_on+0x20/0xc0
[   12.396671]  ? __pfx_kthread+0x10/0x10
[   12.396691]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.396711]  ? calculate_sigpending+0x7b/0xa0
[   12.396734]  ? __pfx_kthread+0x10/0x10
[   12.396755]  ret_from_fork+0x116/0x1d0
[   12.396773]  ? __pfx_kthread+0x10/0x10
[   12.396793]  ret_from_fork_asm+0x1a/0x30
[   12.396822]  </TASK>
[   12.396832] 
[   12.405111] Allocated by task 173:
[   12.405556]  kasan_save_stack+0x45/0x70
[   12.405766]  kasan_save_track+0x18/0x40
[   12.406074]  kasan_save_alloc_info+0x3b/0x50
[   12.406269]  __kasan_krealloc+0x190/0x1f0
[   12.406614]  krealloc_noprof+0xf3/0x340
[   12.406773]  krealloc_more_oob_helper+0x1a9/0x930
[   12.407069]  krealloc_more_oob+0x1c/0x30
[   12.407232]  kunit_try_run_case+0x1a5/0x480
[   12.407385]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.407655]  kthread+0x337/0x6f0
[   12.407833]  ret_from_fork+0x116/0x1d0
[   12.408024]  ret_from_fork_asm+0x1a/0x30
[   12.408231] 
[   12.408305] The buggy address belongs to the object at ffff88810034c200
[   12.408305]  which belongs to the cache kmalloc-256 of size 256
[   12.409187] The buggy address is located 5 bytes to the right of
[   12.409187]  allocated 235-byte region [ffff88810034c200, ffff88810034c2eb)
[   12.409646] 
[   12.409769] The buggy address belongs to the physical page:
[   12.410030] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10034c
[   12.410355] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.410586] flags: 0x200000000000040(head|node=0|zone=2)
[   12.410763] page_type: f5(slab)
[   12.410885] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.411220] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.411651] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.411993] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.412391] head: 0200000000000001 ffffea000400d301 00000000ffffffff 00000000ffffffff
[   12.412752] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.413397] page dumped because: kasan: bad access detected
[   12.413635] 
[   12.413718] Memory state around the buggy address:
[   12.413985]  ffff88810034c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.414254]  ffff88810034c200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.414598] >ffff88810034c280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   12.415069]                                                              ^
[   12.415397]  ffff88810034c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.415623]  ffff88810034c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.415843] ==================================================================
[   12.567550] ==================================================================
[   12.568497] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   12.569443] Write of size 1 at addr ffff8881038a60f0 by task kunit_try_catch/177
[   12.570192] 
[   12.570401] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   12.570449] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.570461] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.570484] Call Trace:
[   12.570498]  <TASK>
[   12.570517]  dump_stack_lvl+0x73/0xb0
[   12.570549]  print_report+0xd1/0x610
[   12.570571]  ? __virt_addr_valid+0x1db/0x2d0
[   12.570595]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.570618]  ? kasan_addr_to_slab+0x11/0xa0
[   12.570638]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.570660]  kasan_report+0x141/0x180
[   12.570681]  ? krealloc_more_oob_helper+0x7eb/0x930
[   12.570709]  __asan_report_store1_noabort+0x1b/0x30
[   12.570732]  krealloc_more_oob_helper+0x7eb/0x930
[   12.570754]  ? __schedule+0x10c6/0x2b60
[   12.570776]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   12.570799]  ? finish_task_switch.isra.0+0x153/0x700
[   12.570822]  ? __switch_to+0x47/0xf50
[   12.570848]  ? __schedule+0x10c6/0x2b60
[   12.570868]  ? __pfx_read_tsc+0x10/0x10
[   12.570892]  krealloc_large_more_oob+0x1c/0x30
[   12.570914]  kunit_try_run_case+0x1a5/0x480
[   12.570940]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.570961]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.570984]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.571006]  ? __kthread_parkme+0x82/0x180
[   12.571027]  ? preempt_count_sub+0x50/0x80
[   12.571049]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.571071]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.571094]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.571117]  kthread+0x337/0x6f0
[   12.571136]  ? trace_preempt_on+0x20/0xc0
[   12.571171]  ? __pfx_kthread+0x10/0x10
[   12.571190]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.571211]  ? calculate_sigpending+0x7b/0xa0
[   12.571235]  ? __pfx_kthread+0x10/0x10
[   12.571256]  ret_from_fork+0x116/0x1d0
[   12.571274]  ? __pfx_kthread+0x10/0x10
[   12.571293]  ret_from_fork_asm+0x1a/0x30
[   12.571365]  </TASK>
[   12.571376] 
[   12.584122] The buggy address belongs to the physical page:
[   12.584626] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038a4
[   12.585485] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.586192] flags: 0x200000000000040(head|node=0|zone=2)
[   12.586705] page_type: f8(unknown)
[   12.587061] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.587660] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.588051] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.588827] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.589537] head: 0200000000000002 ffffea00040e2901 00000000ffffffff 00000000ffffffff
[   12.589776] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.590419] page dumped because: kasan: bad access detected
[   12.591018] 
[   12.591191] Memory state around the buggy address:
[   12.591629]  ffff8881038a5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.592440]  ffff8881038a6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.592826] >ffff8881038a6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   12.593045]                                                              ^
[   12.593626]  ffff8881038a6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.594282]  ffff8881038a6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.595013] ==================================================================
[   12.372719] ==================================================================
[   12.373279] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   12.373656] Write of size 1 at addr ffff88810034c2eb by task kunit_try_catch/173
[   12.373965] 
[   12.374082] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   12.374129] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.374141] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.374173] Call Trace:
[   12.374186]  <TASK>
[   12.374202]  dump_stack_lvl+0x73/0xb0
[   12.374231]  print_report+0xd1/0x610
[   12.374253]  ? __virt_addr_valid+0x1db/0x2d0
[   12.374276]  ? krealloc_more_oob_helper+0x821/0x930
[   12.374298]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.374320]  ? krealloc_more_oob_helper+0x821/0x930
[   12.374343]  kasan_report+0x141/0x180
[   12.374364]  ? krealloc_more_oob_helper+0x821/0x930
[   12.374392]  __asan_report_store1_noabort+0x1b/0x30
[   12.374415]  krealloc_more_oob_helper+0x821/0x930
[   12.374437]  ? __schedule+0x10c6/0x2b60
[   12.374459]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   12.374555]  ? finish_task_switch.isra.0+0x153/0x700
[   12.374578]  ? __switch_to+0x47/0xf50
[   12.374605]  ? __schedule+0x10c6/0x2b60
[   12.374626]  ? __pfx_read_tsc+0x10/0x10
[   12.374650]  krealloc_more_oob+0x1c/0x30
[   12.374671]  kunit_try_run_case+0x1a5/0x480
[   12.374696]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.374717]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.374740]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.374763]  ? __kthread_parkme+0x82/0x180
[   12.374784]  ? preempt_count_sub+0x50/0x80
[   12.374806]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.374829]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.374852]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.374912]  kthread+0x337/0x6f0
[   12.374931]  ? trace_preempt_on+0x20/0xc0
[   12.374955]  ? __pfx_kthread+0x10/0x10
[   12.374975]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.374996]  ? calculate_sigpending+0x7b/0xa0
[   12.375019]  ? __pfx_kthread+0x10/0x10
[   12.375040]  ret_from_fork+0x116/0x1d0
[   12.375058]  ? __pfx_kthread+0x10/0x10
[   12.375078]  ret_from_fork_asm+0x1a/0x30
[   12.375108]  </TASK>
[   12.375120] 
[   12.383326] Allocated by task 173:
[   12.383470]  kasan_save_stack+0x45/0x70
[   12.383627]  kasan_save_track+0x18/0x40
[   12.383824]  kasan_save_alloc_info+0x3b/0x50
[   12.384041]  __kasan_krealloc+0x190/0x1f0
[   12.384434]  krealloc_noprof+0xf3/0x340
[   12.384630]  krealloc_more_oob_helper+0x1a9/0x930
[   12.384798]  krealloc_more_oob+0x1c/0x30
[   12.384942]  kunit_try_run_case+0x1a5/0x480
[   12.385127]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.385515]  kthread+0x337/0x6f0
[   12.385699]  ret_from_fork+0x116/0x1d0
[   12.386084]  ret_from_fork_asm+0x1a/0x30
[   12.386329] 
[   12.386432] The buggy address belongs to the object at ffff88810034c200
[   12.386432]  which belongs to the cache kmalloc-256 of size 256
[   12.387026] The buggy address is located 0 bytes to the right of
[   12.387026]  allocated 235-byte region [ffff88810034c200, ffff88810034c2eb)
[   12.387564] 
[   12.387662] The buggy address belongs to the physical page:
[   12.387954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10034c
[   12.388282] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.388638] flags: 0x200000000000040(head|node=0|zone=2)
[   12.388823] page_type: f5(slab)
[   12.388947] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.389204] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.389606] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   12.389948] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   12.390297] head: 0200000000000001 ffffea000400d301 00000000ffffffff 00000000ffffffff
[   12.390612] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   12.390843] page dumped because: kasan: bad access detected
[   12.391102] 
[   12.391257] Memory state around the buggy address:
[   12.391679]  ffff88810034c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.392058]  ffff88810034c200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.392403] >ffff88810034c280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   12.392679]                                                           ^
[   12.393174]  ffff88810034c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.393480]  ffff88810034c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.393702] ==================================================================
[   12.537065] ==================================================================
[   12.538416] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   12.539124] Write of size 1 at addr ffff8881038a60eb by task kunit_try_catch/177
[   12.539767] 
[   12.539976] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   12.540023] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.540034] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.540055] Call Trace:
[   12.540068]  <TASK>
[   12.540085]  dump_stack_lvl+0x73/0xb0
[   12.540114]  print_report+0xd1/0x610
[   12.540137]  ? __virt_addr_valid+0x1db/0x2d0
[   12.540171]  ? krealloc_more_oob_helper+0x821/0x930
[   12.540195]  ? kasan_addr_to_slab+0x11/0xa0
[   12.540215]  ? krealloc_more_oob_helper+0x821/0x930
[   12.540238]  kasan_report+0x141/0x180
[   12.540259]  ? krealloc_more_oob_helper+0x821/0x930
[   12.540286]  __asan_report_store1_noabort+0x1b/0x30
[   12.540311]  krealloc_more_oob_helper+0x821/0x930
[   12.540338]  ? __schedule+0x10c6/0x2b60
[   12.540371]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   12.540394]  ? finish_task_switch.isra.0+0x153/0x700
[   12.540461]  ? __switch_to+0x47/0xf50
[   12.540486]  ? __schedule+0x10c6/0x2b60
[   12.540507]  ? __pfx_read_tsc+0x10/0x10
[   12.540531]  krealloc_large_more_oob+0x1c/0x30
[   12.540553]  kunit_try_run_case+0x1a5/0x480
[   12.540577]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.540599]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.540623]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.540645]  ? __kthread_parkme+0x82/0x180
[   12.540665]  ? preempt_count_sub+0x50/0x80
[   12.540687]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.540709]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.540732]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.540754]  kthread+0x337/0x6f0
[   12.540773]  ? trace_preempt_on+0x20/0xc0
[   12.540796]  ? __pfx_kthread+0x10/0x10
[   12.540815]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.540836]  ? calculate_sigpending+0x7b/0xa0
[   12.540868]  ? __pfx_kthread+0x10/0x10
[   12.540888]  ret_from_fork+0x116/0x1d0
[   12.540906]  ? __pfx_kthread+0x10/0x10
[   12.540926]  ret_from_fork_asm+0x1a/0x30
[   12.540956]  </TASK>
[   12.540967] 
[   12.555951] The buggy address belongs to the physical page:
[   12.556519] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038a4
[   12.556787] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   12.557485] flags: 0x200000000000040(head|node=0|zone=2)
[   12.558240] page_type: f8(unknown)
[   12.558607] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.559230] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.559775] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   12.560571] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   12.561082] head: 0200000000000002 ffffea00040e2901 00000000ffffffff 00000000ffffffff
[   12.561563] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   12.561796] page dumped because: kasan: bad access detected
[   12.562284] 
[   12.562566] Memory state around the buggy address:
[   12.563063]  ffff8881038a5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.563994]  ffff8881038a6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.564682] >ffff8881038a6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   12.565202]                                                           ^
[   12.565845]  ffff8881038a6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.566460]  ffff8881038a6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   12.566752] ==================================================================