Hay
Date
July 2, 2025, 11:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   30.651207] ==================================================================
[   30.651265] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   30.651317] Write of size 1 at addr fff00000c8f6f8eb by task kunit_try_catch/189
[   30.651736] 
[   30.651845] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   30.652327] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.652382] Hardware name: linux,dummy-virt (DT)
[   30.652437] Call trace:
[   30.652553]  show_stack+0x20/0x38 (C)
[   30.652635]  dump_stack_lvl+0x8c/0xd0
[   30.652684]  print_report+0x118/0x608
[   30.653025]  kasan_report+0xdc/0x128
[   30.653127]  __asan_report_store1_noabort+0x20/0x30
[   30.653194]  krealloc_more_oob_helper+0x60c/0x678
[   30.653506]  krealloc_more_oob+0x20/0x38
[   30.653608]  kunit_try_run_case+0x170/0x3f0
[   30.653766]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.653836]  kthread+0x328/0x630
[   30.653970]  ret_from_fork+0x10/0x20
[   30.654039] 
[   30.654103] Allocated by task 189:
[   30.654400]  kasan_save_stack+0x3c/0x68
[   30.654593]  kasan_save_track+0x20/0x40
[   30.654759]  kasan_save_alloc_info+0x40/0x58
[   30.654868]  __kasan_krealloc+0x118/0x178
[   30.654921]  krealloc_noprof+0x128/0x360
[   30.654971]  krealloc_more_oob_helper+0x168/0x678
[   30.655012]  krealloc_more_oob+0x20/0x38
[   30.655048]  kunit_try_run_case+0x170/0x3f0
[   30.655086]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.655129]  kthread+0x328/0x630
[   30.655169]  ret_from_fork+0x10/0x20
[   30.655204] 
[   30.655234] The buggy address belongs to the object at fff00000c8f6f800
[   30.655234]  which belongs to the cache kmalloc-256 of size 256
[   30.655302] The buggy address is located 0 bytes to the right of
[   30.655302]  allocated 235-byte region [fff00000c8f6f800, fff00000c8f6f8eb)
[   30.655365] 
[   30.655393] The buggy address belongs to the physical page:
[   30.655430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108f6e
[   30.655499] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.655804] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.655864] page_type: f5(slab)
[   30.656272] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.656387] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.656577] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.656673] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.656941] head: 0bfffe0000000001 ffffc1ffc323db81 00000000ffffffff 00000000ffffffff
[   30.657181] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.657272] page dumped because: kasan: bad access detected
[   30.657361] 
[   30.657401] Memory state around the buggy address:
[   30.657461]  fff00000c8f6f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.657558]  fff00000c8f6f800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.657620] >fff00000c8f6f880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   30.657895]                                                           ^
[   30.658139]  fff00000c8f6f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.658212]  fff00000c8f6f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.658269] ==================================================================
[   30.659437] ==================================================================
[   30.659806] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   30.659955] Write of size 1 at addr fff00000c8f6f8f0 by task kunit_try_catch/189
[   30.660022] 
[   30.660158] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   30.660243] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.660572] Hardware name: linux,dummy-virt (DT)
[   30.660624] Call trace:
[   30.660674]  show_stack+0x20/0x38 (C)
[   30.660809]  dump_stack_lvl+0x8c/0xd0
[   30.660889]  print_report+0x118/0x608
[   30.661084]  kasan_report+0xdc/0x128
[   30.661172]  __asan_report_store1_noabort+0x20/0x30
[   30.661488]  krealloc_more_oob_helper+0x5c0/0x678
[   30.661637]  krealloc_more_oob+0x20/0x38
[   30.661703]  kunit_try_run_case+0x170/0x3f0
[   30.661878]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.662146]  kthread+0x328/0x630
[   30.662307]  ret_from_fork+0x10/0x20
[   30.662390] 
[   30.662499] Allocated by task 189:
[   30.662558]  kasan_save_stack+0x3c/0x68
[   30.662653]  kasan_save_track+0x20/0x40
[   30.662984]  kasan_save_alloc_info+0x40/0x58
[   30.663068]  __kasan_krealloc+0x118/0x178
[   30.663184]  krealloc_noprof+0x128/0x360
[   30.663244]  krealloc_more_oob_helper+0x168/0x678
[   30.663386]  krealloc_more_oob+0x20/0x38
[   30.663432]  kunit_try_run_case+0x170/0x3f0
[   30.663469]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.663512]  kthread+0x328/0x630
[   30.663916]  ret_from_fork+0x10/0x20
[   30.664003] 
[   30.664107] The buggy address belongs to the object at fff00000c8f6f800
[   30.664107]  which belongs to the cache kmalloc-256 of size 256
[   30.664183] The buggy address is located 5 bytes to the right of
[   30.664183]  allocated 235-byte region [fff00000c8f6f800, fff00000c8f6f8eb)
[   30.664336] 
[   30.664432] The buggy address belongs to the physical page:
[   30.664491] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108f6e
[   30.664617] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.664665] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.664757] page_type: f5(slab)
[   30.665149] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.665305] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.665393] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.665495] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.665591] head: 0bfffe0000000001 ffffc1ffc323db81 00000000ffffffff 00000000ffffffff
[   30.665663] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.665972] page dumped because: kasan: bad access detected
[   30.666116] 
[   30.666145] Memory state around the buggy address:
[   30.666203]  fff00000c8f6f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.666247]  fff00000c8f6f800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.666288] >fff00000c8f6f880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   30.666335]                                                              ^
[   30.666387]  fff00000c8f6f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.666429]  fff00000c8f6f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.666465] ==================================================================
[   30.724349] ==================================================================
[   30.724397] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   30.724445] Write of size 1 at addr fff00000c99d60f0 by task kunit_try_catch/193
[   30.724493] 
[   30.724523] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   30.724830] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.724875] Hardware name: linux,dummy-virt (DT)
[   30.725097] Call trace:
[   30.725133]  show_stack+0x20/0x38 (C)
[   30.725185]  dump_stack_lvl+0x8c/0xd0
[   30.725242]  print_report+0x118/0x608
[   30.725419]  kasan_report+0xdc/0x128
[   30.725480]  __asan_report_store1_noabort+0x20/0x30
[   30.725538]  krealloc_more_oob_helper+0x5c0/0x678
[   30.725587]  krealloc_large_more_oob+0x20/0x38
[   30.725636]  kunit_try_run_case+0x170/0x3f0
[   30.725684]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.725748]  kthread+0x328/0x630
[   30.725791]  ret_from_fork+0x10/0x20
[   30.725839] 
[   30.725861] The buggy address belongs to the physical page:
[   30.725898] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099d4
[   30.725967] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.726015] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.726066] page_type: f8(unknown)
[   30.726104] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.726152] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.726200] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.726247] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.726295] head: 0bfffe0000000002 ffffc1ffc3267501 00000000ffffffff 00000000ffffffff
[   30.726342] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.726380] page dumped because: kasan: bad access detected
[   30.726415] 
[   30.726434] Memory state around the buggy address:
[   30.726463]  fff00000c99d5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.726503]  fff00000c99d6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.726543] >fff00000c99d6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   30.726580]                                                              ^
[   30.726619]  fff00000c99d6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.726659]  fff00000c99d6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.726694] ==================================================================
[   30.717336] ==================================================================
[   30.717392] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   30.717442] Write of size 1 at addr fff00000c99d60eb by task kunit_try_catch/193
[   30.717696] 
[   30.717841] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   30.717980] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.718048] Hardware name: linux,dummy-virt (DT)
[   30.718081] Call trace:
[   30.718109]  show_stack+0x20/0x38 (C)
[   30.718292]  dump_stack_lvl+0x8c/0xd0
[   30.718513]  print_report+0x118/0x608
[   30.718615]  kasan_report+0xdc/0x128
[   30.718827]  __asan_report_store1_noabort+0x20/0x30
[   30.718899]  krealloc_more_oob_helper+0x60c/0x678
[   30.718963]  krealloc_large_more_oob+0x20/0x38
[   30.719329]  kunit_try_run_case+0x170/0x3f0
[   30.719470]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.719577]  kthread+0x328/0x630
[   30.719779]  ret_from_fork+0x10/0x20
[   30.719989] 
[   30.720033] The buggy address belongs to the physical page:
[   30.720075] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099d4
[   30.720198] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.720256] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.720440] page_type: f8(unknown)
[   30.720652] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.720720] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.720873] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.721131] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.721220] head: 0bfffe0000000002 ffffc1ffc3267501 00000000ffffffff 00000000ffffffff
[   30.721403] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.721463] page dumped because: kasan: bad access detected
[   30.721494] 
[   30.721710] Memory state around the buggy address:
[   30.721945]  fff00000c99d5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.722013]  fff00000c99d6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.722121] >fff00000c99d6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   30.722202]                                                           ^
[   30.722260]  fff00000c99d6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.722436]  fff00000c99d6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.722620] ==================================================================

[   32.460203] ==================================================================
[   32.460259] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   32.460365] Write of size 1 at addr fff00000c893f2f0 by task kunit_try_catch/187
[   32.460415] 
[   32.460444] CPU: 1 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   32.460635] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.460714] Hardware name: linux,dummy-virt (DT)
[   32.460751] Call trace:
[   32.460773]  show_stack+0x20/0x38 (C)
[   32.460821]  dump_stack_lvl+0x8c/0xd0
[   32.460875]  print_report+0x118/0x608
[   32.461062]  kasan_report+0xdc/0x128
[   32.461128]  __asan_report_store1_noabort+0x20/0x30
[   32.461738]  krealloc_more_oob_helper+0x5c0/0x678
[   32.461797]  krealloc_more_oob+0x20/0x38
[   32.461843]  kunit_try_run_case+0x170/0x3f0
[   32.461891]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.461944]  kthread+0x328/0x630
[   32.461989]  ret_from_fork+0x10/0x20
[   32.462038] 
[   32.462056] Allocated by task 187:
[   32.462090]  kasan_save_stack+0x3c/0x68
[   32.462191]  kasan_save_track+0x20/0x40
[   32.462228]  kasan_save_alloc_info+0x40/0x58
[   32.462263]  __kasan_krealloc+0x118/0x178
[   32.462300]  krealloc_noprof+0x128/0x360
[   32.462336]  krealloc_more_oob_helper+0x168/0x678
[   32.462374]  krealloc_more_oob+0x20/0x38
[   32.462409]  kunit_try_run_case+0x170/0x3f0
[   32.462446]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.462625]  kthread+0x328/0x630
[   32.462739]  ret_from_fork+0x10/0x20
[   32.462775] 
[   32.462793] The buggy address belongs to the object at fff00000c893f200
[   32.462793]  which belongs to the cache kmalloc-256 of size 256
[   32.462848] The buggy address is located 5 bytes to the right of
[   32.462848]  allocated 235-byte region [fff00000c893f200, fff00000c893f2eb)
[   32.462909] 
[   32.462928] The buggy address belongs to the physical page:
[   32.463352] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10893e
[   32.463406] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.463451] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.463584] page_type: f5(slab)
[   32.463643] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   32.463699] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.463762] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   32.463909] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.464012] head: 0bfffe0000000001 ffffc1ffc3224f81 00000000ffffffff 00000000ffffffff
[   32.464166] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.464233] page dumped because: kasan: bad access detected
[   32.464285] 
[   32.464389] Memory state around the buggy address:
[   32.464459]  fff00000c893f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.464500]  fff00000c893f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.464541] >fff00000c893f280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   32.464577]                                                              ^
[   32.464615]  fff00000c893f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.464733]  fff00000c893f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.464773] ==================================================================
[   32.499497] ==================================================================
[   32.499551] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   32.499602] Write of size 1 at addr fff00000c99ee0eb by task kunit_try_catch/191
[   32.499666] 
[   32.499699] CPU: 1 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   32.499827] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.499958] Hardware name: linux,dummy-virt (DT)
[   32.500122] Call trace:
[   32.500148]  show_stack+0x20/0x38 (C)
[   32.500211]  dump_stack_lvl+0x8c/0xd0
[   32.500260]  print_report+0x118/0x608
[   32.500306]  kasan_report+0xdc/0x128
[   32.500352]  __asan_report_store1_noabort+0x20/0x30
[   32.500400]  krealloc_more_oob_helper+0x60c/0x678
[   32.500450]  krealloc_large_more_oob+0x20/0x38
[   32.500497]  kunit_try_run_case+0x170/0x3f0
[   32.500545]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.500720]  kthread+0x328/0x630
[   32.500806]  ret_from_fork+0x10/0x20
[   32.500906] 
[   32.500960] The buggy address belongs to the physical page:
[   32.501036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099ec
[   32.501112] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.501207] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.501293] page_type: f8(unknown)
[   32.501349] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.501432] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.501523] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.501607] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.501862] head: 0bfffe0000000002 ffffc1ffc3267b01 00000000ffffffff 00000000ffffffff
[   32.501932] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.502009] page dumped because: kasan: bad access detected
[   32.502103] 
[   32.502121] Memory state around the buggy address:
[   32.502177]  fff00000c99edf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.502301]  fff00000c99ee000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.502342] >fff00000c99ee080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   32.502379]                                                           ^
[   32.502474]  fff00000c99ee100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.502654]  fff00000c99ee180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.502812] ==================================================================
[   32.452544] ==================================================================
[   32.452754] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   32.453217] Write of size 1 at addr fff00000c893f2eb by task kunit_try_catch/187
[   32.453274] 
[   32.453307] CPU: 1 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   32.453440] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.453564] Hardware name: linux,dummy-virt (DT)
[   32.453635] Call trace:
[   32.453768]  show_stack+0x20/0x38 (C)
[   32.453841]  dump_stack_lvl+0x8c/0xd0
[   32.453929]  print_report+0x118/0x608
[   32.453976]  kasan_report+0xdc/0x128
[   32.454023]  __asan_report_store1_noabort+0x20/0x30
[   32.454256]  krealloc_more_oob_helper+0x60c/0x678
[   32.454398]  krealloc_more_oob+0x20/0x38
[   32.454456]  kunit_try_run_case+0x170/0x3f0
[   32.454533]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.454594]  kthread+0x328/0x630
[   32.454639]  ret_from_fork+0x10/0x20
[   32.454795] 
[   32.454853] Allocated by task 187:
[   32.454883]  kasan_save_stack+0x3c/0x68
[   32.454943]  kasan_save_track+0x20/0x40
[   32.454980]  kasan_save_alloc_info+0x40/0x58
[   32.455096]  __kasan_krealloc+0x118/0x178
[   32.455151]  krealloc_noprof+0x128/0x360
[   32.455199]  krealloc_more_oob_helper+0x168/0x678
[   32.455469]  krealloc_more_oob+0x20/0x38
[   32.455512]  kunit_try_run_case+0x170/0x3f0
[   32.455625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.455791]  kthread+0x328/0x630
[   32.455823]  ret_from_fork+0x10/0x20
[   32.455858] 
[   32.456097] The buggy address belongs to the object at fff00000c893f200
[   32.456097]  which belongs to the cache kmalloc-256 of size 256
[   32.456278] The buggy address is located 0 bytes to the right of
[   32.456278]  allocated 235-byte region [fff00000c893f200, fff00000c893f2eb)
[   32.456363] 
[   32.456439] The buggy address belongs to the physical page:
[   32.456479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10893e
[   32.456549] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.456639] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.456713] page_type: f5(slab)
[   32.456752] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   32.456801] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.456902] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   32.456994] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.457422] head: 0bfffe0000000001 ffffc1ffc3224f81 00000000ffffffff 00000000ffffffff
[   32.457674] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   32.457902] page dumped because: kasan: bad access detected
[   32.457963] 
[   32.457983] Memory state around the buggy address:
[   32.458015]  fff00000c893f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.458056]  fff00000c893f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.458097] >fff00000c893f280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   32.458134]                                                           ^
[   32.458183]  fff00000c893f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.458233]  fff00000c893f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.458502] ==================================================================
[   32.504604] ==================================================================
[   32.504653] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   32.504778] Write of size 1 at addr fff00000c99ee0f0 by task kunit_try_catch/191
[   32.504997] 
[   32.505105] CPU: 1 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   32.505224] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.505250] Hardware name: linux,dummy-virt (DT)
[   32.505287] Call trace:
[   32.505387]  show_stack+0x20/0x38 (C)
[   32.505435]  dump_stack_lvl+0x8c/0xd0
[   32.505488]  print_report+0x118/0x608
[   32.505535]  kasan_report+0xdc/0x128
[   32.505581]  __asan_report_store1_noabort+0x20/0x30
[   32.505628]  krealloc_more_oob_helper+0x5c0/0x678
[   32.505683]  krealloc_large_more_oob+0x20/0x38
[   32.505775]  kunit_try_run_case+0x170/0x3f0
[   32.505944]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.506168]  kthread+0x328/0x630
[   32.506304]  ret_from_fork+0x10/0x20
[   32.506352] 
[   32.506463] The buggy address belongs to the physical page:
[   32.506495] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099ec
[   32.506694] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.507017] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.507214] page_type: f8(unknown)
[   32.507254] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.507303] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.507351] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.507398] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.507529] head: 0bfffe0000000002 ffffc1ffc3267b01 00000000ffffffff 00000000ffffffff
[   32.507578] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.507616] page dumped because: kasan: bad access detected
[   32.507646] 
[   32.507664] Memory state around the buggy address:
[   32.507715]  fff00000c99edf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.507756]  fff00000c99ee000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.507797] >fff00000c99ee080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   32.507833]                                                              ^
[   32.507871]  fff00000c99ee100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.507911]  fff00000c99ee180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.508194] ==================================================================

[   22.720239] ==================================================================
[   22.721168] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   22.721619] Write of size 1 at addr ffff888100a038f0 by task kunit_try_catch/204
[   22.722111] 
[   22.722220] CPU: 1 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   22.722269] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.722283] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.722303] Call Trace:
[   22.722330]  <TASK>
[   22.722346]  dump_stack_lvl+0x73/0xb0
[   22.722375]  print_report+0xd1/0x650
[   22.722397]  ? __virt_addr_valid+0x1db/0x2d0
[   22.722419]  ? krealloc_more_oob_helper+0x7eb/0x930
[   22.722442]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.722466]  ? krealloc_more_oob_helper+0x7eb/0x930
[   22.722633]  kasan_report+0x141/0x180
[   22.722662]  ? krealloc_more_oob_helper+0x7eb/0x930
[   22.722690]  __asan_report_store1_noabort+0x1b/0x30
[   22.722714]  krealloc_more_oob_helper+0x7eb/0x930
[   22.722736]  ? __schedule+0x10cc/0x2b60
[   22.722757]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   22.722815]  ? finish_task_switch.isra.0+0x153/0x700
[   22.722837]  ? __switch_to+0x47/0xf50
[   22.722863]  ? __schedule+0x10cc/0x2b60
[   22.722883]  ? __pfx_read_tsc+0x10/0x10
[   22.722908]  krealloc_more_oob+0x1c/0x30
[   22.722928]  kunit_try_run_case+0x1a5/0x480
[   22.722953]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.722977]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.722998]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.723018]  ? __kthread_parkme+0x82/0x180
[   22.723039]  ? preempt_count_sub+0x50/0x80
[   22.723061]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.723085]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.723109]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.723135]  kthread+0x337/0x6f0
[   22.723155]  ? trace_preempt_on+0x20/0xc0
[   22.723177]  ? __pfx_kthread+0x10/0x10
[   22.723197]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.723221]  ? calculate_sigpending+0x7b/0xa0
[   22.723244]  ? __pfx_kthread+0x10/0x10
[   22.723265]  ret_from_fork+0x116/0x1d0
[   22.723283]  ? __pfx_kthread+0x10/0x10
[   22.723304]  ret_from_fork_asm+0x1a/0x30
[   22.723344]  </TASK>
[   22.723355] 
[   22.733795] Allocated by task 204:
[   22.734074]  kasan_save_stack+0x45/0x70
[   22.734327]  kasan_save_track+0x18/0x40
[   22.734640]  kasan_save_alloc_info+0x3b/0x50
[   22.734846]  __kasan_krealloc+0x190/0x1f0
[   22.735018]  krealloc_noprof+0xf3/0x340
[   22.735190]  krealloc_more_oob_helper+0x1a9/0x930
[   22.735398]  krealloc_more_oob+0x1c/0x30
[   22.735817]  kunit_try_run_case+0x1a5/0x480
[   22.736241]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.736678]  kthread+0x337/0x6f0
[   22.736960]  ret_from_fork+0x116/0x1d0
[   22.737249]  ret_from_fork_asm+0x1a/0x30
[   22.737603] 
[   22.737702] The buggy address belongs to the object at ffff888100a03800
[   22.737702]  which belongs to the cache kmalloc-256 of size 256
[   22.738194] The buggy address is located 5 bytes to the right of
[   22.738194]  allocated 235-byte region [ffff888100a03800, ffff888100a038eb)
[   22.739003] 
[   22.739220] The buggy address belongs to the physical page:
[   22.739657] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a02
[   22.740145] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.740684] flags: 0x200000000000040(head|node=0|zone=2)
[   22.741031] page_type: f5(slab)
[   22.741198] raw: 0200000000000040 ffff888100041b40 ffffea0004028480 dead000000000002
[   22.741721] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.742145] head: 0200000000000040 ffff888100041b40 ffffea0004028480 dead000000000002
[   22.742625] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.742934] head: 0200000000000001 ffffea0004028081 00000000ffffffff 00000000ffffffff
[   22.743242] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   22.743624] page dumped because: kasan: bad access detected
[   22.743853] 
[   22.743938] Memory state around the buggy address:
[   22.744141]  ffff888100a03780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.744772]  ffff888100a03800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.745295] >ffff888100a03880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   22.745785]                                                              ^
[   22.746260]  ffff888100a03900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.746794]  ffff888100a03980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.747273] ==================================================================
[   22.884411] ==================================================================
[   22.884842] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   22.885148] Write of size 1 at addr ffff8881060c60f0 by task kunit_try_catch/208
[   22.885525] 
[   22.885621] CPU: 0 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   22.885664] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.885708] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.885727] Call Trace:
[   22.885743]  <TASK>
[   22.885758]  dump_stack_lvl+0x73/0xb0
[   22.885796]  print_report+0xd1/0x650
[   22.885817]  ? __virt_addr_valid+0x1db/0x2d0
[   22.885838]  ? krealloc_more_oob_helper+0x7eb/0x930
[   22.885860]  ? kasan_addr_to_slab+0x11/0xa0
[   22.885879]  ? krealloc_more_oob_helper+0x7eb/0x930
[   22.885901]  kasan_report+0x141/0x180
[   22.885922]  ? krealloc_more_oob_helper+0x7eb/0x930
[   22.885949]  __asan_report_store1_noabort+0x1b/0x30
[   22.885972]  krealloc_more_oob_helper+0x7eb/0x930
[   22.885993]  ? __schedule+0x10cc/0x2b60
[   22.886013]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   22.886059]  ? finish_task_switch.isra.0+0x153/0x700
[   22.886079]  ? __switch_to+0x47/0xf50
[   22.886104]  ? __schedule+0x10cc/0x2b60
[   22.886124]  ? __pfx_read_tsc+0x10/0x10
[   22.886147]  krealloc_large_more_oob+0x1c/0x30
[   22.886169]  kunit_try_run_case+0x1a5/0x480
[   22.886208]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.886230]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.886251]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.886272]  ? __kthread_parkme+0x82/0x180
[   22.886291]  ? preempt_count_sub+0x50/0x80
[   22.886322]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.886346]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.886369]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.886392]  kthread+0x337/0x6f0
[   22.886411]  ? trace_preempt_on+0x20/0xc0
[   22.886433]  ? __pfx_kthread+0x10/0x10
[   22.886453]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.886476]  ? calculate_sigpending+0x7b/0xa0
[   22.886510]  ? __pfx_kthread+0x10/0x10
[   22.886531]  ret_from_fork+0x116/0x1d0
[   22.886549]  ? __pfx_kthread+0x10/0x10
[   22.886580]  ret_from_fork_asm+0x1a/0x30
[   22.886610]  </TASK>
[   22.886622] 
[   22.894954] The buggy address belongs to the physical page:
[   22.895249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060c4
[   22.895600] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.895821] flags: 0x200000000000040(head|node=0|zone=2)
[   22.896052] page_type: f8(unknown)
[   22.896253] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   22.896981] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   22.897406] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   22.897923] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   22.898161] head: 0200000000000002 ffffea0004183101 00000000ffffffff 00000000ffffffff
[   22.898400] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.899071] page dumped because: kasan: bad access detected
[   22.899381] 
[   22.899448] Memory state around the buggy address:
[   22.899598]  ffff8881060c5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.900079]  ffff8881060c6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.900383] >ffff8881060c6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   22.900811]                                                              ^
[   22.901184]  ffff8881060c6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.901475]  ffff8881060c6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.901681] ==================================================================
[   22.693278] ==================================================================
[   22.694327] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   22.695545] Write of size 1 at addr ffff888100a038eb by task kunit_try_catch/204
[   22.696367] 
[   22.696647] CPU: 1 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   22.696711] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.696725] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.696747] Call Trace:
[   22.696761]  <TASK>
[   22.696781]  dump_stack_lvl+0x73/0xb0
[   22.696825]  print_report+0xd1/0x650
[   22.696848]  ? __virt_addr_valid+0x1db/0x2d0
[   22.696872]  ? krealloc_more_oob_helper+0x821/0x930
[   22.696896]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.696922]  ? krealloc_more_oob_helper+0x821/0x930
[   22.696944]  kasan_report+0x141/0x180
[   22.696966]  ? krealloc_more_oob_helper+0x821/0x930
[   22.696993]  __asan_report_store1_noabort+0x1b/0x30
[   22.697017]  krealloc_more_oob_helper+0x821/0x930
[   22.697038]  ? __schedule+0x10cc/0x2b60
[   22.697059]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   22.697082]  ? finish_task_switch.isra.0+0x153/0x700
[   22.697104]  ? __switch_to+0x47/0xf50
[   22.697130]  ? __schedule+0x10cc/0x2b60
[   22.697150]  ? __pfx_read_tsc+0x10/0x10
[   22.697175]  krealloc_more_oob+0x1c/0x30
[   22.697196]  kunit_try_run_case+0x1a5/0x480
[   22.697222]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.697244]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.697265]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.697287]  ? __kthread_parkme+0x82/0x180
[   22.697316]  ? preempt_count_sub+0x50/0x80
[   22.697338]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.697362]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.697385]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.697409]  kthread+0x337/0x6f0
[   22.697428]  ? trace_preempt_on+0x20/0xc0
[   22.697452]  ? __pfx_kthread+0x10/0x10
[   22.697472]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.697502]  ? calculate_sigpending+0x7b/0xa0
[   22.697526]  ? __pfx_kthread+0x10/0x10
[   22.697547]  ret_from_fork+0x116/0x1d0
[   22.697566]  ? __pfx_kthread+0x10/0x10
[   22.697598]  ret_from_fork_asm+0x1a/0x30
[   22.697629]  </TASK>
[   22.697642] 
[   22.705702] Allocated by task 204:
[   22.705905]  kasan_save_stack+0x45/0x70
[   22.706105]  kasan_save_track+0x18/0x40
[   22.706289]  kasan_save_alloc_info+0x3b/0x50
[   22.706494]  __kasan_krealloc+0x190/0x1f0
[   22.706699]  krealloc_noprof+0xf3/0x340
[   22.707289]  krealloc_more_oob_helper+0x1a9/0x930
[   22.707727]  krealloc_more_oob+0x1c/0x30
[   22.708062]  kunit_try_run_case+0x1a5/0x480
[   22.708454]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.708828]  kthread+0x337/0x6f0
[   22.708991]  ret_from_fork+0x116/0x1d0
[   22.709163]  ret_from_fork_asm+0x1a/0x30
[   22.709353] 
[   22.709441] The buggy address belongs to the object at ffff888100a03800
[   22.709441]  which belongs to the cache kmalloc-256 of size 256
[   22.710340] The buggy address is located 0 bytes to the right of
[   22.710340]  allocated 235-byte region [ffff888100a03800, ffff888100a038eb)
[   22.711151] 
[   22.711384] The buggy address belongs to the physical page:
[   22.711779] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a02
[   22.712119] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.712433] flags: 0x200000000000040(head|node=0|zone=2)
[   22.712917] page_type: f5(slab)
[   22.713261] raw: 0200000000000040 ffff888100041b40 ffffea0004028480 dead000000000002
[   22.713802] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.714292] head: 0200000000000040 ffff888100041b40 ffffea0004028480 dead000000000002
[   22.714722] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.715153] head: 0200000000000001 ffffea0004028081 00000000ffffffff 00000000ffffffff
[   22.715476] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   22.715781] page dumped because: kasan: bad access detected
[   22.716004] 
[   22.716086] Memory state around the buggy address:
[   22.716287]  ffff888100a03780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.716917]  ffff888100a03800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.717410] >ffff888100a03880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   22.718120]                                                           ^
[   22.718625]  ffff888100a03900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.719110]  ffff888100a03980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.719560] ==================================================================
[   22.864683] ==================================================================
[   22.865364] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   22.866443] Write of size 1 at addr ffff8881060c60eb by task kunit_try_catch/208
[   22.866991] 
[   22.867087] CPU: 0 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   22.867166] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.867178] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.867210] Call Trace:
[   22.867223]  <TASK>
[   22.867239]  dump_stack_lvl+0x73/0xb0
[   22.867288]  print_report+0xd1/0x650
[   22.867326]  ? __virt_addr_valid+0x1db/0x2d0
[   22.867348]  ? krealloc_more_oob_helper+0x821/0x930
[   22.867370]  ? kasan_addr_to_slab+0x11/0xa0
[   22.867389]  ? krealloc_more_oob_helper+0x821/0x930
[   22.867411]  kasan_report+0x141/0x180
[   22.867432]  ? krealloc_more_oob_helper+0x821/0x930
[   22.867459]  __asan_report_store1_noabort+0x1b/0x30
[   22.867482]  krealloc_more_oob_helper+0x821/0x930
[   22.867519]  ? __schedule+0x10cc/0x2b60
[   22.867540]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   22.867563]  ? finish_task_switch.isra.0+0x153/0x700
[   22.867584]  ? __switch_to+0x47/0xf50
[   22.867609]  ? __schedule+0x10cc/0x2b60
[   22.867628]  ? __pfx_read_tsc+0x10/0x10
[   22.867652]  krealloc_large_more_oob+0x1c/0x30
[   22.867725]  kunit_try_run_case+0x1a5/0x480
[   22.867753]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.867776]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.867797]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.867818]  ? __kthread_parkme+0x82/0x180
[   22.867837]  ? preempt_count_sub+0x50/0x80
[   22.867859]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.867883]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.867906]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.867929]  kthread+0x337/0x6f0
[   22.867948]  ? trace_preempt_on+0x20/0xc0
[   22.867971]  ? __pfx_kthread+0x10/0x10
[   22.867991]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.868013]  ? calculate_sigpending+0x7b/0xa0
[   22.868036]  ? __pfx_kthread+0x10/0x10
[   22.868056]  ret_from_fork+0x116/0x1d0
[   22.868074]  ? __pfx_kthread+0x10/0x10
[   22.868094]  ret_from_fork_asm+0x1a/0x30
[   22.868124]  </TASK>
[   22.868135] 
[   22.877222] The buggy address belongs to the physical page:
[   22.877422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060c4
[   22.877724] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.878111] flags: 0x200000000000040(head|node=0|zone=2)
[   22.878377] page_type: f8(unknown)
[   22.878576] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   22.879021] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   22.879391] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   22.879851] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   22.880084] head: 0200000000000002 ffffea0004183101 00000000ffffffff 00000000ffffffff
[   22.880450] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   22.880826] page dumped because: kasan: bad access detected
[   22.881362] 
[   22.881515] Memory state around the buggy address:
[   22.881672]  ffff8881060c5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.882123]  ffff8881060c6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.882406] >ffff8881060c6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   22.882950]                                                           ^
[   22.883264]  ffff8881060c6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.883579]  ffff8881060c6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   22.883914] ==================================================================

[   23.084104] ==================================================================
[   23.084870] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   23.085266] Write of size 1 at addr ffff8881057a20eb by task kunit_try_catch/209
[   23.085600] 
[   23.085692] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   23.085747] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.085760] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.085805] Call Trace:
[   23.085828]  <TASK>
[   23.085850]  dump_stack_lvl+0x73/0xb0
[   23.085883]  print_report+0xd1/0x650
[   23.085926]  ? __virt_addr_valid+0x1db/0x2d0
[   23.085968]  ? krealloc_more_oob_helper+0x821/0x930
[   23.085991]  ? kasan_addr_to_slab+0x11/0xa0
[   23.086011]  ? krealloc_more_oob_helper+0x821/0x930
[   23.086034]  kasan_report+0x141/0x180
[   23.086055]  ? krealloc_more_oob_helper+0x821/0x930
[   23.086093]  __asan_report_store1_noabort+0x1b/0x30
[   23.086133]  krealloc_more_oob_helper+0x821/0x930
[   23.086155]  ? __schedule+0x10cc/0x2b60
[   23.086191]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   23.086214]  ? finish_task_switch.isra.0+0x153/0x700
[   23.086237]  ? __switch_to+0x47/0xf50
[   23.086264]  ? __schedule+0x10cc/0x2b60
[   23.086284]  ? __pfx_read_tsc+0x10/0x10
[   23.086309]  krealloc_large_more_oob+0x1c/0x30
[   23.086332]  kunit_try_run_case+0x1a5/0x480
[   23.086359]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.086382]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.086403]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.086425]  ? __kthread_parkme+0x82/0x180
[   23.086446]  ? preempt_count_sub+0x50/0x80
[   23.086468]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.086492]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.086534]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.086558]  kthread+0x337/0x6f0
[   23.086591]  ? trace_preempt_on+0x20/0xc0
[   23.086616]  ? __pfx_kthread+0x10/0x10
[   23.086636]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.086660]  ? calculate_sigpending+0x7b/0xa0
[   23.086685]  ? __pfx_kthread+0x10/0x10
[   23.086706]  ret_from_fork+0x116/0x1d0
[   23.086725]  ? __pfx_kthread+0x10/0x10
[   23.086745]  ret_from_fork_asm+0x1a/0x30
[   23.086777]  </TASK>
[   23.086790] 
[   23.096374] The buggy address belongs to the physical page:
[   23.096677] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057a0
[   23.097266] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.097732] flags: 0x200000000000040(head|node=0|zone=2)
[   23.098145] page_type: f8(unknown)
[   23.098327] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   23.098631] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   23.098935] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   23.099250] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   23.099556] head: 0200000000000002 ffffea000415e801 00000000ffffffff 00000000ffffffff
[   23.099858] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   23.100615] page dumped because: kasan: bad access detected
[   23.101129] 
[   23.101235] Memory state around the buggy address:
[   23.101652]  ffff8881057a1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.102107]  ffff8881057a2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.102571] >ffff8881057a2080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   23.103057]                                                           ^
[   23.103517]  ffff8881057a2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.103992]  ffff8881057a2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.104458] ==================================================================
[   22.905857] ==================================================================
[   22.906889] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   22.907424] Write of size 1 at addr ffff8881055726eb by task kunit_try_catch/205
[   22.907717] 
[   22.907808] CPU: 0 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   22.907861] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.907874] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.907896] Call Trace:
[   22.907910]  <TASK>
[   22.907940]  dump_stack_lvl+0x73/0xb0
[   22.907973]  print_report+0xd1/0x650
[   22.907997]  ? __virt_addr_valid+0x1db/0x2d0
[   22.908022]  ? krealloc_more_oob_helper+0x821/0x930
[   22.908045]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.908084]  ? krealloc_more_oob_helper+0x821/0x930
[   22.908108]  kasan_report+0x141/0x180
[   22.908129]  ? krealloc_more_oob_helper+0x821/0x930
[   22.908156]  __asan_report_store1_noabort+0x1b/0x30
[   22.908179]  krealloc_more_oob_helper+0x821/0x930
[   22.908252]  ? __schedule+0x10cc/0x2b60
[   22.908274]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   22.908298]  ? finish_task_switch.isra.0+0x153/0x700
[   22.908319]  ? __switch_to+0x47/0xf50
[   22.908347]  ? __schedule+0x10cc/0x2b60
[   22.908367]  ? __pfx_read_tsc+0x10/0x10
[   22.908391]  krealloc_more_oob+0x1c/0x30
[   22.908412]  kunit_try_run_case+0x1a5/0x480
[   22.908439]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.908462]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.908484]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.908505]  ? __kthread_parkme+0x82/0x180
[   22.908525]  ? preempt_count_sub+0x50/0x80
[   22.908547]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.908572]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.908595]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.908619]  kthread+0x337/0x6f0
[   22.908638]  ? trace_preempt_on+0x20/0xc0
[   22.908661]  ? __pfx_kthread+0x10/0x10
[   22.908681]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.908705]  ? calculate_sigpending+0x7b/0xa0
[   22.908728]  ? __pfx_kthread+0x10/0x10
[   22.908749]  ret_from_fork+0x116/0x1d0
[   22.908768]  ? __pfx_kthread+0x10/0x10
[   22.908788]  ret_from_fork_asm+0x1a/0x30
[   22.908818]  </TASK>
[   22.908831] 
[   22.922758] Allocated by task 205:
[   22.923172]  kasan_save_stack+0x45/0x70
[   22.923505]  kasan_save_track+0x18/0x40
[   22.923642]  kasan_save_alloc_info+0x3b/0x50
[   22.923784]  __kasan_krealloc+0x190/0x1f0
[   22.923915]  krealloc_noprof+0xf3/0x340
[   22.924295]  krealloc_more_oob_helper+0x1a9/0x930
[   22.924778]  krealloc_more_oob+0x1c/0x30
[   22.925223]  kunit_try_run_case+0x1a5/0x480
[   22.925984]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.926529]  kthread+0x337/0x6f0
[   22.926827]  ret_from_fork+0x116/0x1d0
[   22.927224]  ret_from_fork_asm+0x1a/0x30
[   22.927407] 
[   22.927475] The buggy address belongs to the object at ffff888105572600
[   22.927475]  which belongs to the cache kmalloc-256 of size 256
[   22.927828] The buggy address is located 0 bytes to the right of
[   22.927828]  allocated 235-byte region [ffff888105572600, ffff8881055726eb)
[   22.928299] 
[   22.928408] The buggy address belongs to the physical page:
[   22.928609] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105572
[   22.928978] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.929364] flags: 0x200000000000040(head|node=0|zone=2)
[   22.929562] page_type: f5(slab)
[   22.929699] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   22.930073] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.930650] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   22.930963] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.931343] head: 0200000000000001 ffffea0004155c81 00000000ffffffff 00000000ffffffff
[   22.931696] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   22.932024] page dumped because: kasan: bad access detected
[   22.932230] 
[   22.932295] Memory state around the buggy address:
[   22.932514]  ffff888105572580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.932919]  ffff888105572600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.933191] >ffff888105572680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   22.933480]                                                           ^
[   22.933733]  ffff888105572700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.933992]  ffff888105572780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.934319] ==================================================================
[   23.105297] ==================================================================
[   23.106170] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   23.106498] Write of size 1 at addr ffff8881057a20f0 by task kunit_try_catch/209
[   23.106790] 
[   23.106891] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   23.107172] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.107190] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.107214] Call Trace:
[   23.107236]  <TASK>
[   23.107257]  dump_stack_lvl+0x73/0xb0
[   23.107289]  print_report+0xd1/0x650
[   23.107492]  ? __virt_addr_valid+0x1db/0x2d0
[   23.107519]  ? krealloc_more_oob_helper+0x7eb/0x930
[   23.107542]  ? kasan_addr_to_slab+0x11/0xa0
[   23.107562]  ? krealloc_more_oob_helper+0x7eb/0x930
[   23.107585]  kasan_report+0x141/0x180
[   23.107607]  ? krealloc_more_oob_helper+0x7eb/0x930
[   23.107635]  __asan_report_store1_noabort+0x1b/0x30
[   23.107658]  krealloc_more_oob_helper+0x7eb/0x930
[   23.107680]  ? __schedule+0x10cc/0x2b60
[   23.107702]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   23.107725]  ? finish_task_switch.isra.0+0x153/0x700
[   23.107747]  ? __switch_to+0x47/0xf50
[   23.107772]  ? __schedule+0x10cc/0x2b60
[   23.107792]  ? __pfx_read_tsc+0x10/0x10
[   23.107817]  krealloc_large_more_oob+0x1c/0x30
[   23.107838]  kunit_try_run_case+0x1a5/0x480
[   23.107864]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.107887]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.107909]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.107940]  ? __kthread_parkme+0x82/0x180
[   23.107960]  ? preempt_count_sub+0x50/0x80
[   23.107982]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.108006]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.108031]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.108055]  kthread+0x337/0x6f0
[   23.108087]  ? trace_preempt_on+0x20/0xc0
[   23.108110]  ? __pfx_kthread+0x10/0x10
[   23.108130]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.108154]  ? calculate_sigpending+0x7b/0xa0
[   23.108178]  ? __pfx_kthread+0x10/0x10
[   23.108199]  ret_from_fork+0x116/0x1d0
[   23.108218]  ? __pfx_kthread+0x10/0x10
[   23.108238]  ret_from_fork_asm+0x1a/0x30
[   23.108269]  </TASK>
[   23.108281] 
[   23.118633] The buggy address belongs to the physical page:
[   23.119207] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057a0
[   23.119670] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.120169] flags: 0x200000000000040(head|node=0|zone=2)
[   23.120407] page_type: f8(unknown)
[   23.120571] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   23.120874] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   23.121665] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   23.122376] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   23.122961] head: 0200000000000002 ffffea000415e801 00000000ffffffff 00000000ffffffff
[   23.123391] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   23.123855] page dumped because: kasan: bad access detected
[   23.124317] 
[   23.124532] Memory state around the buggy address:
[   23.124862]  ffff8881057a1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.125459]  ffff8881057a2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.125685] >ffff8881057a2080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   23.126018]                                                              ^
[   23.126305]  ffff8881057a2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.126553]  ffff8881057a2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.126840] ==================================================================
[   22.934916] ==================================================================
[   22.935442] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   22.935787] Write of size 1 at addr ffff8881055726f0 by task kunit_try_catch/205
[   22.936089] 
[   22.936234] CPU: 0 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   22.936286] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.936298] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.936321] Call Trace:
[   22.936335]  <TASK>
[   22.936355]  dump_stack_lvl+0x73/0xb0
[   22.936383]  print_report+0xd1/0x650
[   22.936405]  ? __virt_addr_valid+0x1db/0x2d0
[   22.936429]  ? krealloc_more_oob_helper+0x7eb/0x930
[   22.936451]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.936477]  ? krealloc_more_oob_helper+0x7eb/0x930
[   22.936500]  kasan_report+0x141/0x180
[   22.936521]  ? krealloc_more_oob_helper+0x7eb/0x930
[   22.936549]  __asan_report_store1_noabort+0x1b/0x30
[   22.936573]  krealloc_more_oob_helper+0x7eb/0x930
[   22.936594]  ? __schedule+0x10cc/0x2b60
[   22.936616]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   22.936639]  ? finish_task_switch.isra.0+0x153/0x700
[   22.936661]  ? __switch_to+0x47/0xf50
[   22.936686]  ? __schedule+0x10cc/0x2b60
[   22.936706]  ? __pfx_read_tsc+0x10/0x10
[   22.936731]  krealloc_more_oob+0x1c/0x30
[   22.936751]  kunit_try_run_case+0x1a5/0x480
[   22.936778]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.936801]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.936822]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.936843]  ? __kthread_parkme+0x82/0x180
[   22.936863]  ? preempt_count_sub+0x50/0x80
[   22.936885]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.936909]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.936945]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.936969]  kthread+0x337/0x6f0
[   22.936988]  ? trace_preempt_on+0x20/0xc0
[   22.937011]  ? __pfx_kthread+0x10/0x10
[   22.937031]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.937055]  ? calculate_sigpending+0x7b/0xa0
[   22.937089]  ? __pfx_kthread+0x10/0x10
[   22.937110]  ret_from_fork+0x116/0x1d0
[   22.937129]  ? __pfx_kthread+0x10/0x10
[   22.937149]  ret_from_fork_asm+0x1a/0x30
[   22.937179]  </TASK>
[   22.937192] 
[   22.944231] Allocated by task 205:
[   22.944414]  kasan_save_stack+0x45/0x70
[   22.944621]  kasan_save_track+0x18/0x40
[   22.944813]  kasan_save_alloc_info+0x3b/0x50
[   22.945154]  __kasan_krealloc+0x190/0x1f0
[   22.945341]  krealloc_noprof+0xf3/0x340
[   22.945517]  krealloc_more_oob_helper+0x1a9/0x930
[   22.945688]  krealloc_more_oob+0x1c/0x30
[   22.945878]  kunit_try_run_case+0x1a5/0x480
[   22.946123]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.946342]  kthread+0x337/0x6f0
[   22.946471]  ret_from_fork+0x116/0x1d0
[   22.946656]  ret_from_fork_asm+0x1a/0x30
[   22.946813] 
[   22.946901] The buggy address belongs to the object at ffff888105572600
[   22.946901]  which belongs to the cache kmalloc-256 of size 256
[   22.947887] The buggy address is located 5 bytes to the right of
[   22.947887]  allocated 235-byte region [ffff888105572600, ffff8881055726eb)
[   22.948556] 
[   22.948658] The buggy address belongs to the physical page:
[   22.948862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105572
[   22.949212] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.949574] flags: 0x200000000000040(head|node=0|zone=2)
[   22.949768] page_type: f5(slab)
[   22.949947] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   22.950348] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.950614] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   22.950837] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.951149] head: 0200000000000001 ffffea0004155c81 00000000ffffffff 00000000ffffffff
[   22.951482] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   22.951957] page dumped because: kasan: bad access detected
[   22.952149] 
[   22.952354] Memory state around the buggy address:
[   22.952591]  ffff888105572580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.952907]  ffff888105572600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.953401] >ffff888105572680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   22.953649]                                                              ^
[   22.953923]  ffff888105572700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.954209]  ffff888105572780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.954412] ==================================================================