Hay
Date
July 11, 2025, 10:11 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   39.135661] ==================================================================
[   39.144778] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   39.152325] Write of size 1 at addr ffff0008030fd0eb by task kunit_try_catch/240
[   39.159701] 
[   39.161189] CPU: 3 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   39.161249] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.161267] Hardware name: WinLink E850-96 board (DT)
[   39.161288] Call trace:
[   39.161300]  show_stack+0x20/0x38 (C)
[   39.161339]  dump_stack_lvl+0x8c/0xd0
[   39.161372]  print_report+0x118/0x5d0
[   39.161401]  kasan_report+0xdc/0x128
[   39.161429]  __asan_report_store1_noabort+0x20/0x30
[   39.161464]  krealloc_more_oob_helper+0x60c/0x678
[   39.161499]  krealloc_more_oob+0x20/0x38
[   39.161531]  kunit_try_run_case+0x170/0x3f0
[   39.161570]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.161602]  kthread+0x328/0x630
[   39.161633]  ret_from_fork+0x10/0x20
[   39.161668] 
[   39.229754] Allocated by task 240:
[   39.233141]  kasan_save_stack+0x3c/0x68
[   39.236957]  kasan_save_track+0x20/0x40
[   39.240776]  kasan_save_alloc_info+0x40/0x58
[   39.245030]  __kasan_krealloc+0x118/0x178
[   39.249022]  krealloc_noprof+0x128/0x360
[   39.252929]  krealloc_more_oob_helper+0x168/0x678
[   39.257616]  krealloc_more_oob+0x20/0x38
[   39.261522]  kunit_try_run_case+0x170/0x3f0
[   39.265689]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.271158]  kthread+0x328/0x630
[   39.274370]  ret_from_fork+0x10/0x20
[   39.277928] 
[   39.279406] The buggy address belongs to the object at ffff0008030fd000
[   39.279406]  which belongs to the cache kmalloc-256 of size 256
[   39.291908] The buggy address is located 0 bytes to the right of
[   39.291908]  allocated 235-byte region [ffff0008030fd000, ffff0008030fd0eb)
[   39.304838] 
[   39.306316] The buggy address belongs to the physical page:
[   39.311873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8830fc
[   39.319857] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   39.327496] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   39.334441] page_type: f5(slab)
[   39.337576] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   39.345295] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.353024] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   39.360833] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.368646] head: 0bfffe0000000002 fffffdffe00c3f01 00000000ffffffff 00000000ffffffff
[   39.376458] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   39.384264] page dumped because: kasan: bad access detected
[   39.389819] 
[   39.391295] Memory state around the buggy address:
[   39.396074]  ffff0008030fcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.403280]  ffff0008030fd000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.410485] >ffff0008030fd080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   39.417683]                                                           ^
[   39.424284]  ffff0008030fd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.431489]  ffff0008030fd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.438691] ==================================================================
[   41.299455] ==================================================================
[   41.308891] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   41.316440] Write of size 1 at addr ffff0008057ce0eb by task kunit_try_catch/244
[   41.323821] 
[   41.325304] CPU: 2 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   41.325362] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.325378] Hardware name: WinLink E850-96 board (DT)
[   41.325401] Call trace:
[   41.325415]  show_stack+0x20/0x38 (C)
[   41.325449]  dump_stack_lvl+0x8c/0xd0
[   41.325482]  print_report+0x118/0x5d0
[   41.325511]  kasan_report+0xdc/0x128
[   41.325536]  __asan_report_store1_noabort+0x20/0x30
[   41.325570]  krealloc_more_oob_helper+0x60c/0x678
[   41.325605]  krealloc_large_more_oob+0x20/0x38
[   41.325637]  kunit_try_run_case+0x170/0x3f0
[   41.325674]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.325706]  kthread+0x328/0x630
[   41.325737]  ret_from_fork+0x10/0x20
[   41.325774] 
[   41.394393] The buggy address belongs to the physical page:
[   41.399949] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8857cc
[   41.407933] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   41.415572] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   41.422515] page_type: f8(unknown)
[   41.425912] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   41.433632] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   41.441358] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   41.449170] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   41.456983] head: 0bfffe0000000002 fffffdffe015f301 00000000ffffffff 00000000ffffffff
[   41.464794] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   41.472600] page dumped because: kasan: bad access detected
[   41.478156] 
[   41.479631] Memory state around the buggy address:
[   41.484413]  ffff0008057cdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   41.491614]  ffff0008057ce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   41.498822] >ffff0008057ce080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   41.506020]                                                           ^
[   41.512621]  ffff0008057ce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   41.519825]  ffff0008057ce180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   41.527026] ==================================================================
[   39.446147] ==================================================================
[   39.453105] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   39.460652] Write of size 1 at addr ffff0008030fd0f0 by task kunit_try_catch/240
[   39.468030] 
[   39.469514] CPU: 3 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   39.469569] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.469584] Hardware name: WinLink E850-96 board (DT)
[   39.469606] Call trace:
[   39.469618]  show_stack+0x20/0x38 (C)
[   39.469653]  dump_stack_lvl+0x8c/0xd0
[   39.469685]  print_report+0x118/0x5d0
[   39.469715]  kasan_report+0xdc/0x128
[   39.469740]  __asan_report_store1_noabort+0x20/0x30
[   39.469774]  krealloc_more_oob_helper+0x5c0/0x678
[   39.469810]  krealloc_more_oob+0x20/0x38
[   39.469840]  kunit_try_run_case+0x170/0x3f0
[   39.469878]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.469909]  kthread+0x328/0x630
[   39.469937]  ret_from_fork+0x10/0x20
[   39.469973] 
[   39.538081] Allocated by task 240:
[   39.541468]  kasan_save_stack+0x3c/0x68
[   39.545285]  kasan_save_track+0x20/0x40
[   39.549105]  kasan_save_alloc_info+0x40/0x58
[   39.553358]  __kasan_krealloc+0x118/0x178
[   39.557351]  krealloc_noprof+0x128/0x360
[   39.561257]  krealloc_more_oob_helper+0x168/0x678
[   39.565945]  krealloc_more_oob+0x20/0x38
[   39.569851]  kunit_try_run_case+0x170/0x3f0
[   39.574018]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.579486]  kthread+0x328/0x630
[   39.582698]  ret_from_fork+0x10/0x20
[   39.586257] 
[   39.587734] The buggy address belongs to the object at ffff0008030fd000
[   39.587734]  which belongs to the cache kmalloc-256 of size 256
[   39.600234] The buggy address is located 5 bytes to the right of
[   39.600234]  allocated 235-byte region [ffff0008030fd000, ffff0008030fd0eb)
[   39.613168] 
[   39.614644] The buggy address belongs to the physical page:
[   39.620202] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8830fc
[   39.628185] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   39.635825] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   39.642768] page_type: f5(slab)
[   39.645902] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   39.653624] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.661350] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   39.669161] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.676975] head: 0bfffe0000000002 fffffdffe00c3f01 00000000ffffffff 00000000ffffffff
[   39.684786] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   39.692592] page dumped because: kasan: bad access detected
[   39.698148] 
[   39.699624] Memory state around the buggy address:
[   39.704404]  ffff0008030fcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.711606]  ffff0008030fd000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.718812] >ffff0008030fd080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   39.726012]                                                              ^
[   39.732873]  ffff0008030fd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.740078]  ffff0008030fd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.747279] ==================================================================
[   41.534367] ==================================================================
[   41.541442] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   41.548988] Write of size 1 at addr ffff0008057ce0f0 by task kunit_try_catch/244
[   41.556366] 
[   41.557849] CPU: 2 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   41.557900] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.557914] Hardware name: WinLink E850-96 board (DT)
[   41.557934] Call trace:
[   41.557948]  show_stack+0x20/0x38 (C)
[   41.557979]  dump_stack_lvl+0x8c/0xd0
[   41.558011]  print_report+0x118/0x5d0
[   41.558037]  kasan_report+0xdc/0x128
[   41.558063]  __asan_report_store1_noabort+0x20/0x30
[   41.558095]  krealloc_more_oob_helper+0x5c0/0x678
[   41.558128]  krealloc_large_more_oob+0x20/0x38
[   41.558162]  kunit_try_run_case+0x170/0x3f0
[   41.558198]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.558230]  kthread+0x328/0x630
[   41.558260]  ret_from_fork+0x10/0x20
[   41.558294] 
[   41.626940] The buggy address belongs to the physical page:
[   41.632498] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8857cc
[   41.640481] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   41.648121] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   41.655063] page_type: f8(unknown)
[   41.658460] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   41.666180] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   41.673906] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   41.681718] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   41.689531] head: 0bfffe0000000002 fffffdffe015f301 00000000ffffffff 00000000ffffffff
[   41.697343] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   41.705149] page dumped because: kasan: bad access detected
[   41.710704] 
[   41.712180] Memory state around the buggy address:
[   41.716961]  ffff0008057cdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   41.724163]  ffff0008057ce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   41.731369] >ffff0008057ce080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   41.738568]                                                              ^
[   41.745430]  ffff0008057ce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   41.752634]  ffff0008057ce180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   41.759836] ==================================================================

[   30.239735] ==================================================================
[   30.240069] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   30.240268] Write of size 1 at addr fff00000c9a660eb by task kunit_try_catch/191
[   30.240409] 
[   30.240448] CPU: 1 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.240531] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.240557] Hardware name: linux,dummy-virt (DT)
[   30.240816] Call trace:
[   30.240851]  show_stack+0x20/0x38 (C)
[   30.240906]  dump_stack_lvl+0x8c/0xd0
[   30.240953]  print_report+0x118/0x5d0
[   30.241332]  kasan_report+0xdc/0x128
[   30.241836]  __asan_report_store1_noabort+0x20/0x30
[   30.242287]  krealloc_more_oob_helper+0x60c/0x678
[   30.242352]  krealloc_large_more_oob+0x20/0x38
[   30.242401]  kunit_try_run_case+0x170/0x3f0
[   30.242448]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.242496]  kthread+0x328/0x630
[   30.243254]  ret_from_fork+0x10/0x20
[   30.243452] 
[   30.243486] The buggy address belongs to the physical page:
[   30.243519] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a64
[   30.243604] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.243652] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.243865] page_type: f8(unknown)
[   30.243912] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.243961] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.244008] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.244055] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.244634] head: 0bfffe0000000002 ffffc1ffc3269901 00000000ffffffff 00000000ffffffff
[   30.244887] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.244954] page dumped because: kasan: bad access detected
[   30.245060] 
[   30.245078] Memory state around the buggy address:
[   30.245111]  fff00000c9a65f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.245152]  fff00000c9a66000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.245248] >fff00000c9a66080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   30.245821]                                                           ^
[   30.245868]  fff00000c9a66100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.245909]  fff00000c9a66180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.246015] ==================================================================
[   30.174536] ==================================================================
[   30.174583] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   30.174745] Write of size 1 at addr fff00000c95548f0 by task kunit_try_catch/187
[   30.174796] 
[   30.174824] CPU: 1 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.174926] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.174961] Hardware name: linux,dummy-virt (DT)
[   30.174990] Call trace:
[   30.175012]  show_stack+0x20/0x38 (C)
[   30.175066]  dump_stack_lvl+0x8c/0xd0
[   30.175112]  print_report+0x118/0x5d0
[   30.175179]  kasan_report+0xdc/0x128
[   30.175244]  __asan_report_store1_noabort+0x20/0x30
[   30.175310]  krealloc_more_oob_helper+0x5c0/0x678
[   30.175399]  krealloc_more_oob+0x20/0x38
[   30.175445]  kunit_try_run_case+0x170/0x3f0
[   30.175493]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.175803]  kthread+0x328/0x630
[   30.175846]  ret_from_fork+0x10/0x20
[   30.175892] 
[   30.175910] Allocated by task 187:
[   30.175937]  kasan_save_stack+0x3c/0x68
[   30.176038]  kasan_save_track+0x20/0x40
[   30.176077]  kasan_save_alloc_info+0x40/0x58
[   30.176113]  __kasan_krealloc+0x118/0x178
[   30.176152]  krealloc_noprof+0x128/0x360
[   30.176207]  krealloc_more_oob_helper+0x168/0x678
[   30.176267]  krealloc_more_oob+0x20/0x38
[   30.176304]  kunit_try_run_case+0x170/0x3f0
[   30.176369]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.176416]  kthread+0x328/0x630
[   30.176451]  ret_from_fork+0x10/0x20
[   30.176504] 
[   30.176551] The buggy address belongs to the object at fff00000c9554800
[   30.176551]  which belongs to the cache kmalloc-256 of size 256
[   30.176607] The buggy address is located 5 bytes to the right of
[   30.176607]  allocated 235-byte region [fff00000c9554800, fff00000c95548eb)
[   30.176669] 
[   30.176688] The buggy address belongs to the physical page:
[   30.176717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109554
[   30.176785] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.176849] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.177193] page_type: f5(slab)
[   30.177251] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.177316] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.177407] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.177503] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.177565] head: 0bfffe0000000001 ffffc1ffc3255501 00000000ffffffff 00000000ffffffff
[   30.177629] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.177667] page dumped because: kasan: bad access detected
[   30.177770] 
[   30.177811] Memory state around the buggy address:
[   30.177888]  fff00000c9554780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.177948]  fff00000c9554800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.178012] >fff00000c9554880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   30.178047]                                                              ^
[   30.178084]  fff00000c9554900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.178124]  fff00000c9554980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.178159] ==================================================================
[   30.247686] ==================================================================
[   30.247734] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   30.247786] Write of size 1 at addr fff00000c9a660f0 by task kunit_try_catch/191
[   30.247834] 
[   30.247867] CPU: 1 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.247948] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.247974] Hardware name: linux,dummy-virt (DT)
[   30.248005] Call trace:
[   30.248027]  show_stack+0x20/0x38 (C)
[   30.248074]  dump_stack_lvl+0x8c/0xd0
[   30.248120]  print_report+0x118/0x5d0
[   30.248162]  kasan_report+0xdc/0x128
[   30.248204]  __asan_report_store1_noabort+0x20/0x30
[   30.248253]  krealloc_more_oob_helper+0x5c0/0x678
[   30.248312]  krealloc_large_more_oob+0x20/0x38
[   30.248384]  kunit_try_run_case+0x170/0x3f0
[   30.248562]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.248621]  kthread+0x328/0x630
[   30.248934]  ret_from_fork+0x10/0x20
[   30.249221] 
[   30.249247] The buggy address belongs to the physical page:
[   30.249500] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a64
[   30.249708] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.249892] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.250270] page_type: f8(unknown)
[   30.250339] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.250390] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.250438] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.250681] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   30.250734] head: 0bfffe0000000002 ffffc1ffc3269901 00000000ffffffff 00000000ffffffff
[   30.250781] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   30.250818] page dumped because: kasan: bad access detected
[   30.250925] 
[   30.250945] Memory state around the buggy address:
[   30.251035]  fff00000c9a65f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.251077]  fff00000c9a66000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.251673] >fff00000c9a66080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   30.251789]                                                              ^
[   30.251874]  fff00000c9a66100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.251916]  fff00000c9a66180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.251952] ==================================================================
[   30.168845] ==================================================================
[   30.168911] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   30.168973] Write of size 1 at addr fff00000c95548eb by task kunit_try_catch/187
[   30.169104] 
[   30.169173] CPU: 1 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   30.169352] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.169581] Hardware name: linux,dummy-virt (DT)
[   30.169628] Call trace:
[   30.169652]  show_stack+0x20/0x38 (C)
[   30.169707]  dump_stack_lvl+0x8c/0xd0
[   30.169763]  print_report+0x118/0x5d0
[   30.169806]  kasan_report+0xdc/0x128
[   30.169850]  __asan_report_store1_noabort+0x20/0x30
[   30.169900]  krealloc_more_oob_helper+0x60c/0x678
[   30.170066]  krealloc_more_oob+0x20/0x38
[   30.170144]  kunit_try_run_case+0x170/0x3f0
[   30.170306]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.170411]  kthread+0x328/0x630
[   30.170565]  ret_from_fork+0x10/0x20
[   30.170921] 
[   30.170966] Allocated by task 187:
[   30.171018]  kasan_save_stack+0x3c/0x68
[   30.171142]  kasan_save_track+0x20/0x40
[   30.171207]  kasan_save_alloc_info+0x40/0x58
[   30.171245]  __kasan_krealloc+0x118/0x178
[   30.171595]  krealloc_noprof+0x128/0x360
[   30.171697]  krealloc_more_oob_helper+0x168/0x678
[   30.171821]  krealloc_more_oob+0x20/0x38
[   30.171910]  kunit_try_run_case+0x170/0x3f0
[   30.171948]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.172240]  kthread+0x328/0x630
[   30.172314]  ret_from_fork+0x10/0x20
[   30.172361] 
[   30.172381] The buggy address belongs to the object at fff00000c9554800
[   30.172381]  which belongs to the cache kmalloc-256 of size 256
[   30.172594] The buggy address is located 0 bytes to the right of
[   30.172594]  allocated 235-byte region [fff00000c9554800, fff00000c95548eb)
[   30.172691] 
[   30.172773] The buggy address belongs to the physical page:
[   30.172830] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109554
[   30.172940] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.172997] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.173065] page_type: f5(slab)
[   30.173218] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.173313] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.173460] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122
[   30.173509] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.173556] head: 0bfffe0000000001 ffffc1ffc3255501 00000000ffffffff 00000000ffffffff
[   30.173602] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   30.173640] page dumped because: kasan: bad access detected
[   30.173670] 
[   30.173687] Memory state around the buggy address:
[   30.173719]  fff00000c9554780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.173760]  fff00000c9554800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.173800] >fff00000c9554880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   30.173835]                                                           ^
[   30.173872]  fff00000c9554900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.173912]  fff00000c9554980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.173948] ==================================================================

[   23.512161] ==================================================================
[   23.512646] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   23.512906] Write of size 1 at addr ffff888102b960eb by task kunit_try_catch/210
[   23.513123] 
[   23.513212] CPU: 1 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   23.513264] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.513275] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.513297] Call Trace:
[   23.513312]  <TASK>
[   23.513331]  dump_stack_lvl+0x73/0xb0
[   23.513361]  print_report+0xd1/0x610
[   23.513383]  ? __virt_addr_valid+0x1db/0x2d0
[   23.513406]  ? krealloc_more_oob_helper+0x821/0x930
[   23.513429]  ? kasan_addr_to_slab+0x11/0xa0
[   23.513448]  ? krealloc_more_oob_helper+0x821/0x930
[   23.513471]  kasan_report+0x141/0x180
[   23.513492]  ? krealloc_more_oob_helper+0x821/0x930
[   23.513519]  __asan_report_store1_noabort+0x1b/0x30
[   23.513542]  krealloc_more_oob_helper+0x821/0x930
[   23.513564]  ? __schedule+0x10cc/0x2b60
[   23.513587]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   23.513610]  ? finish_task_switch.isra.0+0x153/0x700
[   23.513632]  ? __switch_to+0x47/0xf80
[   23.513659]  ? __schedule+0x10cc/0x2b60
[   23.513680]  ? __pfx_read_tsc+0x10/0x10
[   23.513704]  krealloc_large_more_oob+0x1c/0x30
[   23.513727]  kunit_try_run_case+0x1a5/0x480
[   23.513762]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.513782]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.513804]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.513827]  ? __kthread_parkme+0x82/0x180
[   23.513847]  ? preempt_count_sub+0x50/0x80
[   23.513870]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.513891]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.513916]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.513940]  kthread+0x337/0x6f0
[   23.513959]  ? trace_preempt_on+0x20/0xc0
[   23.513983]  ? __pfx_kthread+0x10/0x10
[   23.514005]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.514026]  ? calculate_sigpending+0x7b/0xa0
[   23.514050]  ? __pfx_kthread+0x10/0x10
[   23.514071]  ret_from_fork+0x116/0x1d0
[   23.514089]  ? __pfx_kthread+0x10/0x10
[   23.514110]  ret_from_fork_asm+0x1a/0x30
[   23.514140]  </TASK>
[   23.514152] 
[   23.521337] The buggy address belongs to the physical page:
[   23.521532] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b94
[   23.521967] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.522360] flags: 0x200000000000040(head|node=0|zone=2)
[   23.522657] page_type: f8(unknown)
[   23.522851] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   23.523111] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   23.523334] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   23.523651] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   23.523999] head: 0200000000000002 ffffea00040ae501 00000000ffffffff 00000000ffffffff
[   23.524361] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   23.524667] page dumped because: kasan: bad access detected
[   23.524848] 
[   23.524912] Memory state around the buggy address:
[   23.525117]  ffff888102b95f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.525421]  ffff888102b96000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.525744] >ffff888102b96080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   23.526179]                                                           ^
[   23.526704]  ffff888102b96100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.527029]  ffff888102b96180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.527344] ==================================================================
[   23.338725] ==================================================================
[   23.339262] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   23.339634] Write of size 1 at addr ffff88810579d8eb by task kunit_try_catch/206
[   23.340177] 
[   23.340279] CPU: 0 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   23.340340] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.340352] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.340386] Call Trace:
[   23.340399]  <TASK>
[   23.340418]  dump_stack_lvl+0x73/0xb0
[   23.340464]  print_report+0xd1/0x610
[   23.340488]  ? __virt_addr_valid+0x1db/0x2d0
[   23.340513]  ? krealloc_more_oob_helper+0x821/0x930
[   23.340536]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.340561]  ? krealloc_more_oob_helper+0x821/0x930
[   23.340607]  kasan_report+0x141/0x180
[   23.340628]  ? krealloc_more_oob_helper+0x821/0x930
[   23.340655]  __asan_report_store1_noabort+0x1b/0x30
[   23.340689]  krealloc_more_oob_helper+0x821/0x930
[   23.340711]  ? __schedule+0x10cc/0x2b60
[   23.340745]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   23.340768]  ? finish_task_switch.isra.0+0x153/0x700
[   23.340791]  ? __switch_to+0x47/0xf80
[   23.340818]  ? __schedule+0x10cc/0x2b60
[   23.340848]  ? __pfx_read_tsc+0x10/0x10
[   23.340873]  krealloc_more_oob+0x1c/0x30
[   23.340894]  kunit_try_run_case+0x1a5/0x480
[   23.340928]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.340948]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.340970]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.340993]  ? __kthread_parkme+0x82/0x180
[   23.341013]  ? preempt_count_sub+0x50/0x80
[   23.341036]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.341065]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.341089]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.341114]  kthread+0x337/0x6f0
[   23.341144]  ? trace_preempt_on+0x20/0xc0
[   23.341167]  ? __pfx_kthread+0x10/0x10
[   23.341188]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.341209]  ? calculate_sigpending+0x7b/0xa0
[   23.341233]  ? __pfx_kthread+0x10/0x10
[   23.341254]  ret_from_fork+0x116/0x1d0
[   23.341273]  ? __pfx_kthread+0x10/0x10
[   23.341294]  ret_from_fork_asm+0x1a/0x30
[   23.341324]  </TASK>
[   23.341336] 
[   23.348723] Allocated by task 206:
[   23.348861]  kasan_save_stack+0x45/0x70
[   23.349000]  kasan_save_track+0x18/0x40
[   23.349184]  kasan_save_alloc_info+0x3b/0x50
[   23.349415]  __kasan_krealloc+0x190/0x1f0
[   23.349695]  krealloc_noprof+0xf3/0x340
[   23.349898]  krealloc_more_oob_helper+0x1a9/0x930
[   23.350131]  krealloc_more_oob+0x1c/0x30
[   23.350331]  kunit_try_run_case+0x1a5/0x480
[   23.350480]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.350800]  kthread+0x337/0x6f0
[   23.350987]  ret_from_fork+0x116/0x1d0
[   23.351161]  ret_from_fork_asm+0x1a/0x30
[   23.351356] 
[   23.351469] The buggy address belongs to the object at ffff88810579d800
[   23.351469]  which belongs to the cache kmalloc-256 of size 256
[   23.351950] The buggy address is located 0 bytes to the right of
[   23.351950]  allocated 235-byte region [ffff88810579d800, ffff88810579d8eb)
[   23.352489] 
[   23.352576] The buggy address belongs to the physical page:
[   23.352818] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10579c
[   23.353165] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.353423] flags: 0x200000000000040(head|node=0|zone=2)
[   23.353597] page_type: f5(slab)
[   23.353715] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   23.353949] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.354303] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   23.354706] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.355048] head: 0200000000000001 ffffea000415e701 00000000ffffffff 00000000ffffffff
[   23.355407] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   23.355741] page dumped because: kasan: bad access detected
[   23.355949] 
[   23.356013] Memory state around the buggy address:
[   23.356163]  ffff88810579d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.356379]  ffff88810579d800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.357274] >ffff88810579d880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   23.358288]                                                           ^
[   23.358926]  ffff88810579d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.359247]  ffff88810579d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.359952] ==================================================================
[   23.361382] ==================================================================
[   23.361993] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   23.362424] Write of size 1 at addr ffff88810579d8f0 by task kunit_try_catch/206
[   23.362779] 
[   23.362910] CPU: 0 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   23.362958] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.362969] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.363002] Call Trace:
[   23.363029]  <TASK>
[   23.363046]  dump_stack_lvl+0x73/0xb0
[   23.363079]  print_report+0xd1/0x610
[   23.363112]  ? __virt_addr_valid+0x1db/0x2d0
[   23.363138]  ? krealloc_more_oob_helper+0x7eb/0x930
[   23.363161]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.363186]  ? krealloc_more_oob_helper+0x7eb/0x930
[   23.363209]  kasan_report+0x141/0x180
[   23.363230]  ? krealloc_more_oob_helper+0x7eb/0x930
[   23.363257]  __asan_report_store1_noabort+0x1b/0x30
[   23.363281]  krealloc_more_oob_helper+0x7eb/0x930
[   23.363302]  ? __schedule+0x10cc/0x2b60
[   23.363335]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   23.363358]  ? finish_task_switch.isra.0+0x153/0x700
[   23.363391]  ? __switch_to+0x47/0xf80
[   23.363426]  ? __schedule+0x10cc/0x2b60
[   23.363447]  ? __pfx_read_tsc+0x10/0x10
[   23.363472]  krealloc_more_oob+0x1c/0x30
[   23.363492]  kunit_try_run_case+0x1a5/0x480
[   23.363516]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.363536]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.363560]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.363582]  ? __kthread_parkme+0x82/0x180
[   23.363612]  ? preempt_count_sub+0x50/0x80
[   23.363634]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.363655]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.363690]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.363714]  kthread+0x337/0x6f0
[   23.363744]  ? trace_preempt_on+0x20/0xc0
[   23.363769]  ? __pfx_kthread+0x10/0x10
[   23.363798]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.363819]  ? calculate_sigpending+0x7b/0xa0
[   23.363844]  ? __pfx_kthread+0x10/0x10
[   23.363875]  ret_from_fork+0x116/0x1d0
[   23.363894]  ? __pfx_kthread+0x10/0x10
[   23.363914]  ret_from_fork_asm+0x1a/0x30
[   23.363945]  </TASK>
[   23.363956] 
[   23.371678] Allocated by task 206:
[   23.371861]  kasan_save_stack+0x45/0x70
[   23.372044]  kasan_save_track+0x18/0x40
[   23.372237]  kasan_save_alloc_info+0x3b/0x50
[   23.372443]  __kasan_krealloc+0x190/0x1f0
[   23.372640]  krealloc_noprof+0xf3/0x340
[   23.372825]  krealloc_more_oob_helper+0x1a9/0x930
[   23.373054]  krealloc_more_oob+0x1c/0x30
[   23.373223]  kunit_try_run_case+0x1a5/0x480
[   23.373443]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.373677]  kthread+0x337/0x6f0
[   23.373857]  ret_from_fork+0x116/0x1d0
[   23.373999]  ret_from_fork_asm+0x1a/0x30
[   23.374205] 
[   23.374276] The buggy address belongs to the object at ffff88810579d800
[   23.374276]  which belongs to the cache kmalloc-256 of size 256
[   23.374826] The buggy address is located 5 bytes to the right of
[   23.374826]  allocated 235-byte region [ffff88810579d800, ffff88810579d8eb)
[   23.375275] 
[   23.375341] The buggy address belongs to the physical page:
[   23.375511] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10579c
[   23.375753] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.376082] flags: 0x200000000000040(head|node=0|zone=2)
[   23.376368] page_type: f5(slab)
[   23.376564] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   23.376917] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.377245] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   23.377621] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.377855] head: 0200000000000001 ffffea000415e701 00000000ffffffff 00000000ffffffff
[   23.378078] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   23.378404] page dumped because: kasan: bad access detected
[   23.378661] 
[   23.378779] Memory state around the buggy address:
[   23.378999]  ffff88810579d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.379332]  ffff88810579d800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.379781] >ffff88810579d880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   23.380040]                                                              ^
[   23.380344]  ffff88810579d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.380600]  ffff88810579d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.380885] ==================================================================
[   23.527853] ==================================================================
[   23.528075] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   23.528695] Write of size 1 at addr ffff888102b960f0 by task kunit_try_catch/210
[   23.529462] 
[   23.529590] CPU: 1 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) 
[   23.529638] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.529650] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.529670] Call Trace:
[   23.529687]  <TASK>
[   23.529703]  dump_stack_lvl+0x73/0xb0
[   23.529749]  print_report+0xd1/0x610
[   23.529771]  ? __virt_addr_valid+0x1db/0x2d0
[   23.529794]  ? krealloc_more_oob_helper+0x7eb/0x930
[   23.529816]  ? kasan_addr_to_slab+0x11/0xa0
[   23.529836]  ? krealloc_more_oob_helper+0x7eb/0x930
[   23.529859]  kasan_report+0x141/0x180
[   23.529880]  ? krealloc_more_oob_helper+0x7eb/0x930
[   23.529907]  __asan_report_store1_noabort+0x1b/0x30
[   23.529931]  krealloc_more_oob_helper+0x7eb/0x930
[   23.529952]  ? __schedule+0x10cc/0x2b60
[   23.529975]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   23.529999]  ? finish_task_switch.isra.0+0x153/0x700
[   23.530020]  ? __switch_to+0x47/0xf80
[   23.530046]  ? __schedule+0x10cc/0x2b60
[   23.530067]  ? __pfx_read_tsc+0x10/0x10
[   23.530092]  krealloc_large_more_oob+0x1c/0x30
[   23.530113]  kunit_try_run_case+0x1a5/0x480
[   23.530136]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.530155]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.530177]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.530200]  ? __kthread_parkme+0x82/0x180
[   23.530220]  ? preempt_count_sub+0x50/0x80
[   23.530243]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.530264]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.530608]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.530635]  kthread+0x337/0x6f0
[   23.530655]  ? trace_preempt_on+0x20/0xc0
[   23.530678]  ? __pfx_kthread+0x10/0x10
[   23.530699]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.530720]  ? calculate_sigpending+0x7b/0xa0
[   23.530758]  ? __pfx_kthread+0x10/0x10
[   23.530779]  ret_from_fork+0x116/0x1d0
[   23.530798]  ? __pfx_kthread+0x10/0x10
[   23.530819]  ret_from_fork_asm+0x1a/0x30
[   23.530850]  </TASK>
[   23.530860] 
[   23.538627] The buggy address belongs to the physical page:
[   23.538817] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b94
[   23.539172] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.539821] flags: 0x200000000000040(head|node=0|zone=2)
[   23.540010] page_type: f8(unknown)
[   23.540131] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   23.540435] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   23.540795] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   23.541133] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   23.541378] head: 0200000000000002 ffffea00040ae501 00000000ffffffff 00000000ffffffff
[   23.541802] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   23.542141] page dumped because: kasan: bad access detected
[   23.542356] 
[   23.542446] Memory state around the buggy address:
[   23.542634]  ffff888102b95f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.542925]  ffff888102b96000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.543511] >ffff888102b96080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   23.543801]                                                              ^
[   23.544001]  ffff888102b96100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.544205]  ffff888102b96180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.544577] ==================================================================