Hay
Date
July 14, 2025, 10:38 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   39.403911] ==================================================================
[   39.410780] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   39.418326] Write of size 1 at addr ffff000804a77ef0 by task kunit_try_catch/240
[   39.425704] 
[   39.427189] CPU: 3 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   39.427241] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.427257] Hardware name: WinLink E850-96 board (DT)
[   39.427276] Call trace:
[   39.427289]  show_stack+0x20/0x38 (C)
[   39.427323]  dump_stack_lvl+0x8c/0xd0
[   39.427355]  print_report+0x118/0x5d0
[   39.427386]  kasan_report+0xdc/0x128
[   39.427413]  __asan_report_store1_noabort+0x20/0x30
[   39.427447]  krealloc_more_oob_helper+0x5c0/0x678
[   39.427483]  krealloc_more_oob+0x20/0x38
[   39.427514]  kunit_try_run_case+0x170/0x3f0
[   39.427549]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.427581]  kthread+0x328/0x630
[   39.427611]  ret_from_fork+0x10/0x20
[   39.427645] 
[   39.495755] Allocated by task 240:
[   39.499143]  kasan_save_stack+0x3c/0x68
[   39.502959]  kasan_save_track+0x20/0x40
[   39.506779]  kasan_save_alloc_info+0x40/0x58
[   39.511033]  __kasan_krealloc+0x118/0x178
[   39.515025]  krealloc_noprof+0x128/0x360
[   39.518932]  krealloc_more_oob_helper+0x168/0x678
[   39.523619]  krealloc_more_oob+0x20/0x38
[   39.527525]  kunit_try_run_case+0x170/0x3f0
[   39.531691]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.537160]  kthread+0x328/0x630
[   39.540372]  ret_from_fork+0x10/0x20
[   39.543931] 
[   39.545408] The buggy address belongs to the object at ffff000804a77e00
[   39.545408]  which belongs to the cache kmalloc-256 of size 256
[   39.557910] The buggy address is located 5 bytes to the right of
[   39.557910]  allocated 235-byte region [ffff000804a77e00, ffff000804a77eeb)
[   39.570841] 
[   39.572319] The buggy address belongs to the physical page:
[   39.577876] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884a74
[   39.585858] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   39.593500] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   39.600441] page_type: f5(slab)
[   39.603577] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   39.611298] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.619024] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   39.626836] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.634649] head: 0bfffe0000000002 fffffdffe0129d01 00000000ffffffff 00000000ffffffff
[   39.642461] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   39.650266] page dumped because: kasan: bad access detected
[   39.655822] 
[   39.657297] Memory state around the buggy address:
[   39.662077]  ffff000804a77d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.669282]  ffff000804a77e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.676485] >ffff000804a77e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   39.683686]                                                              ^
[   39.690547]  ffff000804a77f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.697752]  ffff000804a77f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.704953] ==================================================================
[   39.952469] ==================================================================
[   39.962247] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   39.969793] Write of size 1 at addr ffff000804a7a0eb by task kunit_try_catch/244
[   39.977173] 
[   39.978657] CPU: 3 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   39.978713] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.978730] Hardware name: WinLink E850-96 board (DT)
[   39.978752] Call trace:
[   39.978764]  show_stack+0x20/0x38 (C)
[   39.978800]  dump_stack_lvl+0x8c/0xd0
[   39.978834]  print_report+0x118/0x5d0
[   39.978865]  kasan_report+0xdc/0x128
[   39.978893]  __asan_report_store1_noabort+0x20/0x30
[   39.978929]  krealloc_more_oob_helper+0x60c/0x678
[   39.978962]  krealloc_large_more_oob+0x20/0x38
[   39.978994]  kunit_try_run_case+0x170/0x3f0
[   39.979034]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.979064]  kthread+0x328/0x630
[   39.979093]  ret_from_fork+0x10/0x20
[   39.979126] 
[   40.047746] The buggy address belongs to the physical page:
[   40.053304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884a78
[   40.061286] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   40.068926] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   40.075869] page_type: f8(unknown)
[   40.079266] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   40.086985] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   40.094711] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   40.102523] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   40.110336] head: 0bfffe0000000002 fffffdffe0129e01 00000000ffffffff 00000000ffffffff
[   40.118148] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   40.125955] page dumped because: kasan: bad access detected
[   40.131509] 
[   40.132986] Memory state around the buggy address:
[   40.137765]  ffff000804a79f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   40.144967]  ffff000804a7a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   40.152174] >ffff000804a7a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   40.159373]                                                           ^
[   40.165974]  ffff000804a7a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   40.173179]  ffff000804a7a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   40.180381] ==================================================================
[   40.187900] ==================================================================
[   40.194795] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   40.202342] Write of size 1 at addr ffff000804a7a0f0 by task kunit_try_catch/244
[   40.209720] 
[   40.211205] CPU: 3 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   40.211257] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.211275] Hardware name: WinLink E850-96 board (DT)
[   40.211292] Call trace:
[   40.211305]  show_stack+0x20/0x38 (C)
[   40.211340]  dump_stack_lvl+0x8c/0xd0
[   40.211373]  print_report+0x118/0x5d0
[   40.211401]  kasan_report+0xdc/0x128
[   40.211432]  __asan_report_store1_noabort+0x20/0x30
[   40.211465]  krealloc_more_oob_helper+0x5c0/0x678
[   40.211498]  krealloc_large_more_oob+0x20/0x38
[   40.211530]  kunit_try_run_case+0x170/0x3f0
[   40.211568]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.211599]  kthread+0x328/0x630
[   40.211628]  ret_from_fork+0x10/0x20
[   40.211661] 
[   40.280294] The buggy address belongs to the physical page:
[   40.285851] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884a78
[   40.293835] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   40.301473] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   40.308416] page_type: f8(unknown)
[   40.311814] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   40.319533] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   40.327260] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   40.335072] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   40.342885] head: 0bfffe0000000002 fffffdffe0129e01 00000000ffffffff 00000000ffffffff
[   40.350697] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   40.358502] page dumped because: kasan: bad access detected
[   40.364058] 
[   40.365533] Memory state around the buggy address:
[   40.370312]  ffff000804a79f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   40.377516]  ffff000804a7a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   40.384722] >ffff000804a7a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   40.391922]                                                              ^
[   40.398783]  ffff000804a7a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   40.405988]  ffff000804a7a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   40.413189] ==================================================================
[   39.093302] ==================================================================
[   39.102453] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   39.109997] Write of size 1 at addr ffff000804a77eeb by task kunit_try_catch/240
[   39.117375] 
[   39.118861] CPU: 3 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   39.118918] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.118935] Hardware name: WinLink E850-96 board (DT)
[   39.118958] Call trace:
[   39.118973]  show_stack+0x20/0x38 (C)
[   39.119008]  dump_stack_lvl+0x8c/0xd0
[   39.119044]  print_report+0x118/0x5d0
[   39.119075]  kasan_report+0xdc/0x128
[   39.119102]  __asan_report_store1_noabort+0x20/0x30
[   39.119137]  krealloc_more_oob_helper+0x60c/0x678
[   39.119171]  krealloc_more_oob+0x20/0x38
[   39.119200]  kunit_try_run_case+0x170/0x3f0
[   39.119236]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.119267]  kthread+0x328/0x630
[   39.119294]  ret_from_fork+0x10/0x20
[   39.119329] 
[   39.187428] Allocated by task 240:
[   39.190815]  kasan_save_stack+0x3c/0x68
[   39.194631]  kasan_save_track+0x20/0x40
[   39.198452]  kasan_save_alloc_info+0x40/0x58
[   39.202704]  __kasan_krealloc+0x118/0x178
[   39.206696]  krealloc_noprof+0x128/0x360
[   39.210603]  krealloc_more_oob_helper+0x168/0x678
[   39.215290]  krealloc_more_oob+0x20/0x38
[   39.219197]  kunit_try_run_case+0x170/0x3f0
[   39.223363]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.228832]  kthread+0x328/0x630
[   39.232043]  ret_from_fork+0x10/0x20
[   39.235602] 
[   39.237080] The buggy address belongs to the object at ffff000804a77e00
[   39.237080]  which belongs to the cache kmalloc-256 of size 256
[   39.249581] The buggy address is located 0 bytes to the right of
[   39.249581]  allocated 235-byte region [ffff000804a77e00, ffff000804a77eeb)
[   39.262512] 
[   39.263990] The buggy address belongs to the physical page:
[   39.269548] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884a74
[   39.277531] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   39.285171] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   39.292114] page_type: f5(slab)
[   39.295249] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   39.302969] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.310696] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000
[   39.318507] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.326320] head: 0bfffe0000000002 fffffdffe0129d01 00000000ffffffff 00000000ffffffff
[   39.334132] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   39.341939] page dumped because: kasan: bad access detected
[   39.347493] 
[   39.348970] Memory state around the buggy address:
[   39.353749]  ffff000804a77d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.360953]  ffff000804a77e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.368156] >ffff000804a77e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   39.375357]                                                           ^
[   39.381958]  ffff000804a77f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.389163]  ffff000804a77f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.396364] ==================================================================

[   29.497207] ==================================================================
[   29.497262] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   29.497317] Write of size 1 at addr fff00000c9b060f0 by task kunit_try_catch/191
[   29.497364] 
[   29.497399] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.497515] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.497543] Hardware name: linux,dummy-virt (DT)
[   29.497574] Call trace:
[   29.497603]  show_stack+0x20/0x38 (C)
[   29.497655]  dump_stack_lvl+0x8c/0xd0
[   29.497703]  print_report+0x118/0x5d0
[   29.497745]  kasan_report+0xdc/0x128
[   29.498086]  __asan_report_store1_noabort+0x20/0x30
[   29.498332]  krealloc_more_oob_helper+0x5c0/0x678
[   29.498456]  krealloc_large_more_oob+0x20/0x38
[   29.498559]  kunit_try_run_case+0x170/0x3f0
[   29.498677]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.498726]  kthread+0x328/0x630
[   29.498768]  ret_from_fork+0x10/0x20
[   29.498818] 
[   29.498839] The buggy address belongs to the physical page:
[   29.498991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b04
[   29.499161] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.499319] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.499471] page_type: f8(unknown)
[   29.499528] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.499689] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.499773] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.500057] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.500240] head: 0bfffe0000000002 ffffc1ffc326c101 00000000ffffffff 00000000ffffffff
[   29.500408] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   29.500473] page dumped because: kasan: bad access detected
[   29.500570] 
[   29.500635] Memory state around the buggy address:
[   29.500684]  fff00000c9b05f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.500726]  fff00000c9b06000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.500766] >fff00000c9b06080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   29.500802]                                                              ^
[   29.500866]  fff00000c9b06100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.500907]  fff00000c9b06180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.500943] ==================================================================
[   29.421835] ==================================================================
[   29.421904] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   29.421968] Write of size 1 at addr fff00000c96880eb by task kunit_try_catch/187
[   29.422017] 
[   29.422066] CPU: 0 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.422149] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.422175] Hardware name: linux,dummy-virt (DT)
[   29.422208] Call trace:
[   29.422496]  show_stack+0x20/0x38 (C)
[   29.422635]  dump_stack_lvl+0x8c/0xd0
[   29.422962]  print_report+0x118/0x5d0
[   29.423332]  kasan_report+0xdc/0x128
[   29.423742]  __asan_report_store1_noabort+0x20/0x30
[   29.424384]  krealloc_more_oob_helper+0x60c/0x678
[   29.424440]  krealloc_more_oob+0x20/0x38
[   29.424487]  kunit_try_run_case+0x170/0x3f0
[   29.424536]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.424939]  kthread+0x328/0x630
[   29.425158]  ret_from_fork+0x10/0x20
[   29.425230] 
[   29.425308] Allocated by task 187:
[   29.425396]  kasan_save_stack+0x3c/0x68
[   29.425450]  kasan_save_track+0x20/0x40
[   29.425488]  kasan_save_alloc_info+0x40/0x58
[   29.425524]  __kasan_krealloc+0x118/0x178
[   29.425950]  krealloc_noprof+0x128/0x360
[   29.425991]  krealloc_more_oob_helper+0x168/0x678
[   29.426031]  krealloc_more_oob+0x20/0x38
[   29.426077]  kunit_try_run_case+0x170/0x3f0
[   29.426137]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.426243]  kthread+0x328/0x630
[   29.426291]  ret_from_fork+0x10/0x20
[   29.426373] 
[   29.426441] The buggy address belongs to the object at fff00000c9688000
[   29.426441]  which belongs to the cache kmalloc-256 of size 256
[   29.426498] The buggy address is located 0 bytes to the right of
[   29.426498]  allocated 235-byte region [fff00000c9688000, fff00000c96880eb)
[   29.426618] 
[   29.426695] The buggy address belongs to the physical page:
[   29.426727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109688
[   29.426968] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.427032] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.427110] page_type: f5(slab)
[   29.427152] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.427682] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.427765] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.427992] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.428234] head: 0bfffe0000000001 ffffc1ffc325a201 00000000ffffffff 00000000ffffffff
[   29.428284] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   29.428566] page dumped because: kasan: bad access detected
[   29.428605] 
[   29.428624] Memory state around the buggy address:
[   29.428663]  fff00000c9687f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.428710]  fff00000c9688000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.428751] >fff00000c9688080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   29.428814]                                                           ^
[   29.428853]  fff00000c9688100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.428894]  fff00000c9688180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.428930] ==================================================================
[   29.490706] ==================================================================
[   29.490774] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   29.490839] Write of size 1 at addr fff00000c9b060eb by task kunit_try_catch/191
[   29.491028] 
[   29.491123] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.491774] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.491915] Hardware name: linux,dummy-virt (DT)
[   29.491948] Call trace:
[   29.491971]  show_stack+0x20/0x38 (C)
[   29.492025]  dump_stack_lvl+0x8c/0xd0
[   29.492090]  print_report+0x118/0x5d0
[   29.492251]  kasan_report+0xdc/0x128
[   29.492294]  __asan_report_store1_noabort+0x20/0x30
[   29.492355]  krealloc_more_oob_helper+0x60c/0x678
[   29.492727]  krealloc_large_more_oob+0x20/0x38
[   29.492778]  kunit_try_run_case+0x170/0x3f0
[   29.492828]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.492877]  kthread+0x328/0x630
[   29.492919]  ret_from_fork+0x10/0x20
[   29.493172] 
[   29.493198] The buggy address belongs to the physical page:
[   29.493329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b04
[   29.493452] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.493622] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.493677] page_type: f8(unknown)
[   29.493719] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.493767] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.493822] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.493951] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.494124] head: 0bfffe0000000002 ffffc1ffc326c101 00000000ffffffff 00000000ffffffff
[   29.494313] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   29.494397] page dumped because: kasan: bad access detected
[   29.494499] 
[   29.494517] Memory state around the buggy address:
[   29.494566]  fff00000c9b05f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.494608]  fff00000c9b06000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.494725] >fff00000c9b06080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   29.494890]                                                           ^
[   29.494927]  fff00000c9b06100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.494968]  fff00000c9b06180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.495386] ==================================================================
[   29.430301] ==================================================================
[   29.430600] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   29.431127] Write of size 1 at addr fff00000c96880f0 by task kunit_try_catch/187
[   29.431253] 
[   29.431428] CPU: 0 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250714 #1 PREEMPT 
[   29.431566] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.431591] Hardware name: linux,dummy-virt (DT)
[   29.431622] Call trace:
[   29.431644]  show_stack+0x20/0x38 (C)
[   29.431699]  dump_stack_lvl+0x8c/0xd0
[   29.431778]  print_report+0x118/0x5d0
[   29.431964]  kasan_report+0xdc/0x128
[   29.432080]  __asan_report_store1_noabort+0x20/0x30
[   29.432129]  krealloc_more_oob_helper+0x5c0/0x678
[   29.432229]  krealloc_more_oob+0x20/0x38
[   29.432647]  kunit_try_run_case+0x170/0x3f0
[   29.432701]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.432912]  kthread+0x328/0x630
[   29.432959]  ret_from_fork+0x10/0x20
[   29.433045] 
[   29.433151] Allocated by task 187:
[   29.433189]  kasan_save_stack+0x3c/0x68
[   29.433448]  kasan_save_track+0x20/0x40
[   29.433490]  kasan_save_alloc_info+0x40/0x58
[   29.433526]  __kasan_krealloc+0x118/0x178
[   29.433563]  krealloc_noprof+0x128/0x360
[   29.433608]  krealloc_more_oob_helper+0x168/0x678
[   29.433657]  krealloc_more_oob+0x20/0x38
[   29.433693]  kunit_try_run_case+0x170/0x3f0
[   29.433959]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.434159]  kthread+0x328/0x630
[   29.434229]  ret_from_fork+0x10/0x20
[   29.434265] 
[   29.434284] The buggy address belongs to the object at fff00000c9688000
[   29.434284]  which belongs to the cache kmalloc-256 of size 256
[   29.434351] The buggy address is located 5 bytes to the right of
[   29.434351]  allocated 235-byte region [fff00000c9688000, fff00000c96880eb)
[   29.434451] 
[   29.434506] The buggy address belongs to the physical page:
[   29.434541] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109688
[   29.434592] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.434802] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.435094] page_type: f5(slab)
[   29.435233] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.435376] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.435425] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.435472] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.435733] head: 0bfffe0000000001 ffffc1ffc325a201 00000000ffffffff 00000000ffffffff
[   29.435785] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   29.435824] page dumped because: kasan: bad access detected
[   29.435925] 
[   29.435943] Memory state around the buggy address:
[   29.436021]  fff00000c9687f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.436100]  fff00000c9688000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.436201] >fff00000c9688080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   29.436237]                                                              ^
[   29.436275]  fff00000c9688100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.436769]  fff00000c9688180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.436832] ==================================================================

[   24.036872] ==================================================================
[   24.037355] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   24.038503] Write of size 1 at addr ffff88810587a0f0 by task kunit_try_catch/209
[   24.039605] 
[   24.039964] CPU: 1 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   24.040023] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.040037] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.040059] Call Trace:
[   24.040078]  <TASK>
[   24.040099]  dump_stack_lvl+0x73/0xb0
[   24.040137]  print_report+0xd1/0x610
[   24.040161]  ? __virt_addr_valid+0x1db/0x2d0
[   24.040184]  ? krealloc_more_oob_helper+0x7eb/0x930
[   24.040206]  ? kasan_addr_to_slab+0x11/0xa0
[   24.040226]  ? krealloc_more_oob_helper+0x7eb/0x930
[   24.040248]  kasan_report+0x141/0x180
[   24.040268]  ? krealloc_more_oob_helper+0x7eb/0x930
[   24.040294]  __asan_report_store1_noabort+0x1b/0x30
[   24.040317]  krealloc_more_oob_helper+0x7eb/0x930
[   24.040339]  ? __schedule+0x10cc/0x2b60
[   24.040362]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   24.040384]  ? finish_task_switch.isra.0+0x153/0x700
[   24.040406]  ? __switch_to+0x47/0xf80
[   24.040431]  ? __schedule+0x10cc/0x2b60
[   24.040452]  ? __pfx_read_tsc+0x10/0x10
[   24.040475]  krealloc_large_more_oob+0x1c/0x30
[   24.040497]  kunit_try_run_case+0x1a5/0x480
[   24.040519]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.040538]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.040560]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.040583]  ? __kthread_parkme+0x82/0x180
[   24.040603]  ? preempt_count_sub+0x50/0x80
[   24.040625]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.040645]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.040682]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.040706]  kthread+0x337/0x6f0
[   24.040725]  ? trace_preempt_on+0x20/0xc0
[   24.040749]  ? __pfx_kthread+0x10/0x10
[   24.040769]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.040790]  ? calculate_sigpending+0x7b/0xa0
[   24.040813]  ? __pfx_kthread+0x10/0x10
[   24.040834]  ret_from_fork+0x116/0x1d0
[   24.040852]  ? __pfx_kthread+0x10/0x10
[   24.040873]  ret_from_fork_asm+0x1a/0x30
[   24.040904]  </TASK>
[   24.040915] 
[   24.052011] The buggy address belongs to the physical page:
[   24.052267] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105878
[   24.052558] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.053096] flags: 0x200000000000040(head|node=0|zone=2)
[   24.053343] page_type: f8(unknown)
[   24.053510] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   24.053758] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   24.054321] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   24.054585] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   24.054928] head: 0200000000000002 ffffea0004161e01 00000000ffffffff 00000000ffffffff
[   24.055262] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.055534] page dumped because: kasan: bad access detected
[   24.055728] 
[   24.055890] Memory state around the buggy address:
[   24.056433]  ffff888105879f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.056732]  ffff88810587a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.057119] >ffff88810587a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   24.057391]                                                              ^
[   24.057646]  ffff88810587a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.057880]  ffff88810587a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.058325] ==================================================================
[   23.819068] ==================================================================
[   23.820103] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   23.820520] Write of size 1 at addr ffff888103d996eb by task kunit_try_catch/205
[   23.821415] 
[   23.821646] CPU: 0 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   23.821754] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.821768] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.821792] Call Trace:
[   23.821808]  <TASK>
[   23.821828]  dump_stack_lvl+0x73/0xb0
[   23.821866]  print_report+0xd1/0x610
[   23.821889]  ? __virt_addr_valid+0x1db/0x2d0
[   23.821912]  ? krealloc_more_oob_helper+0x821/0x930
[   23.821995]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.822021]  ? krealloc_more_oob_helper+0x821/0x930
[   23.822059]  kasan_report+0x141/0x180
[   23.822080]  ? krealloc_more_oob_helper+0x821/0x930
[   23.822107]  __asan_report_store1_noabort+0x1b/0x30
[   23.822130]  krealloc_more_oob_helper+0x821/0x930
[   23.822151]  ? __schedule+0x10cc/0x2b60
[   23.822175]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   23.822198]  ? finish_task_switch.isra.0+0x153/0x700
[   23.822220]  ? __switch_to+0x47/0xf80
[   23.822246]  ? __schedule+0x10cc/0x2b60
[   23.822267]  ? __pfx_read_tsc+0x10/0x10
[   23.822291]  krealloc_more_oob+0x1c/0x30
[   23.822312]  kunit_try_run_case+0x1a5/0x480
[   23.822334]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.822354]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.822376]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.822398]  ? __kthread_parkme+0x82/0x180
[   23.822418]  ? preempt_count_sub+0x50/0x80
[   23.822440]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.822460]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.822484]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.822508]  kthread+0x337/0x6f0
[   23.822528]  ? trace_preempt_on+0x20/0xc0
[   23.822551]  ? __pfx_kthread+0x10/0x10
[   23.822571]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.822592]  ? calculate_sigpending+0x7b/0xa0
[   23.822616]  ? __pfx_kthread+0x10/0x10
[   23.822636]  ret_from_fork+0x116/0x1d0
[   23.822655]  ? __pfx_kthread+0x10/0x10
[   23.822694]  ret_from_fork_asm+0x1a/0x30
[   23.822725]  </TASK>
[   23.822754] 
[   23.836347] Allocated by task 205:
[   23.836734]  kasan_save_stack+0x45/0x70
[   23.837196]  kasan_save_track+0x18/0x40
[   23.837673]  kasan_save_alloc_info+0x3b/0x50
[   23.838089]  __kasan_krealloc+0x190/0x1f0
[   23.838516]  krealloc_noprof+0xf3/0x340
[   23.838885]  krealloc_more_oob_helper+0x1a9/0x930
[   23.839384]  krealloc_more_oob+0x1c/0x30
[   23.839845]  kunit_try_run_case+0x1a5/0x480
[   23.840269]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.840819]  kthread+0x337/0x6f0
[   23.841033]  ret_from_fork+0x116/0x1d0
[   23.841179]  ret_from_fork_asm+0x1a/0x30
[   23.841483] 
[   23.841655] The buggy address belongs to the object at ffff888103d99600
[   23.841655]  which belongs to the cache kmalloc-256 of size 256
[   23.842832] The buggy address is located 0 bytes to the right of
[   23.842832]  allocated 235-byte region [ffff888103d99600, ffff888103d996eb)
[   23.843977] 
[   23.844145] The buggy address belongs to the physical page:
[   23.844733] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d98
[   23.845184] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.845880] flags: 0x200000000000040(head|node=0|zone=2)
[   23.846121] page_type: f5(slab)
[   23.846330] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   23.846993] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.847761] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   23.848447] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.848700] head: 0200000000000001 ffffea00040f6601 00000000ffffffff 00000000ffffffff
[   23.849353] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   23.850052] page dumped because: kasan: bad access detected
[   23.850627] 
[   23.850795] Memory state around the buggy address:
[   23.851279]  ffff888103d99580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.851698]  ffff888103d99600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.852412] >ffff888103d99680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   23.852876]                                                           ^
[   23.853292]  ffff888103d99700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.853685]  ffff888103d99780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.854364] ==================================================================
[   23.855130] ==================================================================
[   23.855516] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x7eb/0x930
[   23.856069] Write of size 1 at addr ffff888103d996f0 by task kunit_try_catch/205
[   23.856851] 
[   23.857079] CPU: 0 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   23.857134] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   23.857148] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.857171] Call Trace:
[   23.857186]  <TASK>
[   23.857205]  dump_stack_lvl+0x73/0xb0
[   23.857239]  print_report+0xd1/0x610
[   23.857263]  ? __virt_addr_valid+0x1db/0x2d0
[   23.857286]  ? krealloc_more_oob_helper+0x7eb/0x930
[   23.857309]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.857334]  ? krealloc_more_oob_helper+0x7eb/0x930
[   23.857356]  kasan_report+0x141/0x180
[   23.857376]  ? krealloc_more_oob_helper+0x7eb/0x930
[   23.857403]  __asan_report_store1_noabort+0x1b/0x30
[   23.857426]  krealloc_more_oob_helper+0x7eb/0x930
[   23.857447]  ? __schedule+0x10cc/0x2b60
[   23.857470]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   23.857493]  ? finish_task_switch.isra.0+0x153/0x700
[   23.857515]  ? __switch_to+0x47/0xf80
[   23.857541]  ? __schedule+0x10cc/0x2b60
[   23.857562]  ? __pfx_read_tsc+0x10/0x10
[   23.857586]  krealloc_more_oob+0x1c/0x30
[   23.857615]  kunit_try_run_case+0x1a5/0x480
[   23.857638]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.857677]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.857701]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.857723]  ? __kthread_parkme+0x82/0x180
[   23.857744]  ? preempt_count_sub+0x50/0x80
[   23.857775]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.857796]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.857820]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.857844]  kthread+0x337/0x6f0
[   23.857864]  ? trace_preempt_on+0x20/0xc0
[   23.857887]  ? __pfx_kthread+0x10/0x10
[   23.857907]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.857928]  ? calculate_sigpending+0x7b/0xa0
[   23.857964]  ? __pfx_kthread+0x10/0x10
[   23.857985]  ret_from_fork+0x116/0x1d0
[   23.858004]  ? __pfx_kthread+0x10/0x10
[   23.858025]  ret_from_fork_asm+0x1a/0x30
[   23.858060]  </TASK>
[   23.858071] 
[   23.868305] Allocated by task 205:
[   23.868794]  kasan_save_stack+0x45/0x70
[   23.869035]  kasan_save_track+0x18/0x40
[   23.869311]  kasan_save_alloc_info+0x3b/0x50
[   23.869525]  __kasan_krealloc+0x190/0x1f0
[   23.869727]  krealloc_noprof+0xf3/0x340
[   23.869932]  krealloc_more_oob_helper+0x1a9/0x930
[   23.870227]  krealloc_more_oob+0x1c/0x30
[   23.870429]  kunit_try_run_case+0x1a5/0x480
[   23.870740]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.871056]  kthread+0x337/0x6f0
[   23.871219]  ret_from_fork+0x116/0x1d0
[   23.871464]  ret_from_fork_asm+0x1a/0x30
[   23.871638] 
[   23.871726] The buggy address belongs to the object at ffff888103d99600
[   23.871726]  which belongs to the cache kmalloc-256 of size 256
[   23.872323] The buggy address is located 5 bytes to the right of
[   23.872323]  allocated 235-byte region [ffff888103d99600, ffff888103d996eb)
[   23.872735] 
[   23.872800] The buggy address belongs to the physical page:
[   23.873201] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103d98
[   23.873566] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.874353] flags: 0x200000000000040(head|node=0|zone=2)
[   23.874644] page_type: f5(slab)
[   23.874898] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   23.875344] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.875614] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   23.875924] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.876259] head: 0200000000000001 ffffea00040f6601 00000000ffffffff 00000000ffffffff
[   23.876614] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   23.877089] page dumped because: kasan: bad access detected
[   23.877414] 
[   23.877521] Memory state around the buggy address:
[   23.877688]  ffff888103d99580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.877917]  ffff888103d99600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.878356] >ffff888103d99680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   23.878722]                                                              ^
[   23.879001]  ffff888103d99700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.879616]  ffff888103d99780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.880122] ==================================================================
[   24.004347] ==================================================================
[   24.005588] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x821/0x930
[   24.005911] Write of size 1 at addr ffff88810587a0eb by task kunit_try_catch/209
[   24.006683] 
[   24.006862] CPU: 1 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) 
[   24.006919] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   24.006933] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.006957] Call Trace:
[   24.006971]  <TASK>
[   24.006991]  dump_stack_lvl+0x73/0xb0
[   24.007026]  print_report+0xd1/0x610
[   24.007049]  ? __virt_addr_valid+0x1db/0x2d0
[   24.007074]  ? krealloc_more_oob_helper+0x821/0x930
[   24.007096]  ? kasan_addr_to_slab+0x11/0xa0
[   24.007116]  ? krealloc_more_oob_helper+0x821/0x930
[   24.007138]  kasan_report+0x141/0x180
[   24.007159]  ? krealloc_more_oob_helper+0x821/0x930
[   24.007185]  __asan_report_store1_noabort+0x1b/0x30
[   24.007209]  krealloc_more_oob_helper+0x821/0x930
[   24.007230]  ? __schedule+0x10cc/0x2b60
[   24.007253]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   24.007275]  ? finish_task_switch.isra.0+0x153/0x700
[   24.007298]  ? __switch_to+0x47/0xf80
[   24.007325]  ? __schedule+0x10cc/0x2b60
[   24.007346]  ? __pfx_read_tsc+0x10/0x10
[   24.007370]  krealloc_large_more_oob+0x1c/0x30
[   24.007392]  kunit_try_run_case+0x1a5/0x480
[   24.007416]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.007438]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.007460]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.007483]  ? __kthread_parkme+0x82/0x180
[   24.007503]  ? preempt_count_sub+0x50/0x80
[   24.007525]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.007546]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.007570]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.007594]  kthread+0x337/0x6f0
[   24.007613]  ? trace_preempt_on+0x20/0xc0
[   24.007639]  ? __pfx_kthread+0x10/0x10
[   24.007670]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.007692]  ? calculate_sigpending+0x7b/0xa0
[   24.007771]  ? __pfx_kthread+0x10/0x10
[   24.007792]  ret_from_fork+0x116/0x1d0
[   24.007811]  ? __pfx_kthread+0x10/0x10
[   24.007931]  ret_from_fork_asm+0x1a/0x30
[   24.007966]  </TASK>
[   24.007977] 
[   24.023884] The buggy address belongs to the physical page:
[   24.024434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105878
[   24.025211] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.025981] flags: 0x200000000000040(head|node=0|zone=2)
[   24.026497] page_type: f8(unknown)
[   24.026824] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   24.027623] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   24.028316] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   24.028556] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   24.028822] head: 0200000000000002 ffffea0004161e01 00000000ffffffff 00000000ffffffff
[   24.029471] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.030197] page dumped because: kasan: bad access detected
[   24.030734] 
[   24.030904] Memory state around the buggy address:
[   24.031375]  ffff888105879f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.031999]  ffff88810587a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.032567] >ffff88810587a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   24.033520]                                                           ^
[   24.033754]  ffff88810587a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.034508]  ffff88810587a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.035867] ==================================================================