Hay
Date
Nov. 26, 2024, 6:09 a.m.

Environment
qemu-arm64
qemu-x86_64

[   30.976140] ==================================================================
[   30.977629] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   30.978560] Write of size 1 at addr fff00000c64660eb by task kunit_try_catch/151
[   30.979431] 
[   30.979927] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.981211] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.981626] Hardware name: linux,dummy-virt (DT)
[   30.982650] Call trace:
[   30.983067]  show_stack+0x20/0x38 (C)
[   30.983605]  dump_stack_lvl+0x8c/0xd0
[   30.984140]  print_report+0x118/0x5e0
[   30.984929]  kasan_report+0xc8/0x118
[   30.985966]  __asan_report_store1_noabort+0x20/0x30
[   30.986668]  krealloc_less_oob_helper+0xa58/0xc50
[   30.987313]  krealloc_large_less_oob+0x20/0x38
[   30.987951]  kunit_try_run_case+0x14c/0x3d0
[   30.988843]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.989542]  kthread+0x24c/0x2d0
[   30.990520]  ret_from_fork+0x10/0x20
[   30.991121] 
[   30.991505] The buggy address belongs to the physical page:
[   30.992972] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106464
[   30.993602] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.994077] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.995100] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.995954] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.997226] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.998140] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.999538] head: 0bfffe0000000002 ffffc1ffc3191901 ffffffffffffffff 0000000000000000
[   31.001008] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   31.001751] page dumped because: kasan: bad access detected
[   31.002554] 
[   31.002973] Memory state around the buggy address:
[   31.003646]  fff00000c6465f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.004519]  fff00000c6466000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.005698] >fff00000c6466080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   31.006814]                                                           ^
[   31.007745]  fff00000c6466100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.009023]  fff00000c6466180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.009810] ==================================================================
[   30.615979] ==================================================================
[   30.616709] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   30.617737] Write of size 1 at addr fff00000c4481eda by task kunit_try_catch/147
[   30.619182] 
[   30.619701] CPU: 0 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.621017] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.621762] Hardware name: linux,dummy-virt (DT)
[   30.622538] Call trace:
[   30.622941]  show_stack+0x20/0x38 (C)
[   30.623448]  dump_stack_lvl+0x8c/0xd0
[   30.624084]  print_report+0x118/0x5e0
[   30.624608]  kasan_report+0xc8/0x118
[   30.625293]  __asan_report_store1_noabort+0x20/0x30
[   30.625966]  krealloc_less_oob_helper+0xa80/0xc50
[   30.626721]  krealloc_less_oob+0x20/0x38
[   30.627272]  kunit_try_run_case+0x14c/0x3d0
[   30.627997]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.628724]  kthread+0x24c/0x2d0
[   30.629318]  ret_from_fork+0x10/0x20
[   30.629865] 
[   30.630283] Allocated by task 147:
[   30.630856]  kasan_save_stack+0x3c/0x68
[   30.631414]  kasan_save_track+0x20/0x40
[   30.632084]  kasan_save_alloc_info+0x40/0x58
[   30.632698]  __kasan_krealloc+0x118/0x178
[   30.633384]  krealloc_noprof+0x128/0x360
[   30.633995]  krealloc_less_oob_helper+0x168/0xc50
[   30.634733]  krealloc_less_oob+0x20/0x38
[   30.635365]  kunit_try_run_case+0x14c/0x3d0
[   30.636066]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.636748]  kthread+0x24c/0x2d0
[   30.637369]  ret_from_fork+0x10/0x20
[   30.637921] 
[   30.638325] The buggy address belongs to the object at fff00000c4481e00
[   30.638325]  which belongs to the cache kmalloc-256 of size 256
[   30.639590] The buggy address is located 17 bytes to the right of
[   30.639590]  allocated 201-byte region [fff00000c4481e00, fff00000c4481ec9)
[   30.640976] 
[   30.641388] The buggy address belongs to the physical page:
[   30.642124] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104480
[   30.643151] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.643961] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.644841] page_type: f5(slab)
[   30.645425] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.646260] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.647186] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.648081] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.648960] head: 0bfffe0000000001 ffffc1ffc3112001 ffffffffffffffff 0000000000000000
[   30.649804] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   30.650673] page dumped because: kasan: bad access detected
[   30.651364] 
[   30.651757] Memory state around the buggy address:
[   30.652271]  fff00000c4481d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.653227]  fff00000c4481e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.654114] >fff00000c4481e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.654985]                                                     ^
[   30.655787]  fff00000c4481f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.656623]  fff00000c4481f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.657497] ==================================================================
[   30.838220] ==================================================================
[   30.839515] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   30.840298] Write of size 1 at addr fff00000c64660c9 by task kunit_try_catch/151
[   30.841630] 
[   30.842031] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.843874] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.844521] Hardware name: linux,dummy-virt (DT)
[   30.845613] Call trace:
[   30.846064]  show_stack+0x20/0x38 (C)
[   30.846600]  dump_stack_lvl+0x8c/0xd0
[   30.847462]  print_report+0x118/0x5e0
[   30.848048]  kasan_report+0xc8/0x118
[   30.848826]  __asan_report_store1_noabort+0x20/0x30
[   30.849428]  krealloc_less_oob_helper+0xa48/0xc50
[   30.850354]  krealloc_large_less_oob+0x20/0x38
[   30.851154]  kunit_try_run_case+0x14c/0x3d0
[   30.851947]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.853046]  kthread+0x24c/0x2d0
[   30.853585]  ret_from_fork+0x10/0x20
[   30.854145] 
[   30.854517] The buggy address belongs to the physical page:
[   30.855189] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106464
[   30.856109] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.857254] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.858528] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.859381] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.860233] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.861581] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.862365] head: 0bfffe0000000002 ffffc1ffc3191901 ffffffffffffffff 0000000000000000
[   30.863311] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.864095] page dumped because: kasan: bad access detected
[   30.865452] 
[   30.865810] Memory state around the buggy address:
[   30.866462]  fff00000c6465f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.867374]  fff00000c6466000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.868040] >fff00000c6466080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.869486]                                               ^
[   30.870118]  fff00000c6466100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.870941]  fff00000c6466180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.871728] ==================================================================
[   30.530113] ==================================================================
[   30.531136] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   30.531892] Write of size 1 at addr fff00000c4481ec9 by task kunit_try_catch/147
[   30.533007] 
[   30.533290] CPU: 0 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.534464] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.534930] Hardware name: linux,dummy-virt (DT)
[   30.535550] Call trace:
[   30.535944]  show_stack+0x20/0x38 (C)
[   30.536574]  dump_stack_lvl+0x8c/0xd0
[   30.537190]  print_report+0x118/0x5e0
[   30.537818]  kasan_report+0xc8/0x118
[   30.538414]  __asan_report_store1_noabort+0x20/0x30
[   30.539186]  krealloc_less_oob_helper+0xa48/0xc50
[   30.539821]  krealloc_less_oob+0x20/0x38
[   30.540363]  kunit_try_run_case+0x14c/0x3d0
[   30.541054]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.541760]  kthread+0x24c/0x2d0
[   30.542366]  ret_from_fork+0x10/0x20
[   30.542896] 
[   30.543273] Allocated by task 147:
[   30.543794]  kasan_save_stack+0x3c/0x68
[   30.544388]  kasan_save_track+0x20/0x40
[   30.544871]  kasan_save_alloc_info+0x40/0x58
[   30.545516]  __kasan_krealloc+0x118/0x178
[   30.546168]  krealloc_noprof+0x128/0x360
[   30.546793]  krealloc_less_oob_helper+0x168/0xc50
[   30.547438]  krealloc_less_oob+0x20/0x38
[   30.547954]  kunit_try_run_case+0x14c/0x3d0
[   30.548592]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.549203]  kthread+0x24c/0x2d0
[   30.549761]  ret_from_fork+0x10/0x20
[   30.550316] 
[   30.550693] The buggy address belongs to the object at fff00000c4481e00
[   30.550693]  which belongs to the cache kmalloc-256 of size 256
[   30.551890] The buggy address is located 0 bytes to the right of
[   30.551890]  allocated 201-byte region [fff00000c4481e00, fff00000c4481ec9)
[   30.553076] 
[   30.553439] The buggy address belongs to the physical page:
[   30.554133] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104480
[   30.555124] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.555857] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.556785] page_type: f5(slab)
[   30.557258] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.558078] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.559005] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.559845] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.560656] head: 0bfffe0000000001 ffffc1ffc3112001 ffffffffffffffff 0000000000000000
[   30.561515] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   30.562257] page dumped because: kasan: bad access detected
[   30.563002] 
[   30.563294] Memory state around the buggy address:
[   30.563946]  fff00000c4481d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.564709]  fff00000c4481e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.565579] >fff00000c4481e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.566317]                                               ^
[   30.567077]  fff00000c4481f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.567810]  fff00000c4481f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.568575] ==================================================================
[   30.705314] ==================================================================
[   30.705984] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   30.706954] Write of size 1 at addr fff00000c4481eeb by task kunit_try_catch/147
[   30.707724] 
[   30.709022] CPU: 0 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.710312] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.710771] Hardware name: linux,dummy-virt (DT)
[   30.711073] Call trace:
[   30.711267]  show_stack+0x20/0x38 (C)
[   30.711543]  dump_stack_lvl+0x8c/0xd0
[   30.711807]  print_report+0x118/0x5e0
[   30.712206]  kasan_report+0xc8/0x118
[   30.712796]  __asan_report_store1_noabort+0x20/0x30
[   30.713593]  krealloc_less_oob_helper+0xa58/0xc50
[   30.714367]  krealloc_less_oob+0x20/0x38
[   30.715042]  kunit_try_run_case+0x14c/0x3d0
[   30.715637]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.716479]  kthread+0x24c/0x2d0
[   30.716967]  ret_from_fork+0x10/0x20
[   30.717634] 
[   30.718031] Allocated by task 147:
[   30.718556]  kasan_save_stack+0x3c/0x68
[   30.719088]  kasan_save_track+0x20/0x40
[   30.719772]  kasan_save_alloc_info+0x40/0x58
[   30.720486]  __kasan_krealloc+0x118/0x178
[   30.721145]  krealloc_noprof+0x128/0x360
[   30.721782]  krealloc_less_oob_helper+0x168/0xc50
[   30.722489]  krealloc_less_oob+0x20/0x38
[   30.723144]  kunit_try_run_case+0x14c/0x3d0
[   30.723830]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.724500]  kthread+0x24c/0x2d0
[   30.725113]  ret_from_fork+0x10/0x20
[   30.725721] 
[   30.726053] The buggy address belongs to the object at fff00000c4481e00
[   30.726053]  which belongs to the cache kmalloc-256 of size 256
[   30.727264] The buggy address is located 34 bytes to the right of
[   30.727264]  allocated 201-byte region [fff00000c4481e00, fff00000c4481ec9)
[   30.728688] 
[   30.729016] The buggy address belongs to the physical page:
[   30.729664] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104480
[   30.730491] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.731386] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.732346] page_type: f5(slab)
[   30.732953] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.733785] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.734751] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.735664] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.736495] head: 0bfffe0000000001 ffffc1ffc3112001 ffffffffffffffff 0000000000000000
[   30.737424] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   30.738240] page dumped because: kasan: bad access detected
[   30.738827] 
[   30.739255] Memory state around the buggy address:
[   30.739849]  fff00000c4481d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.740725]  fff00000c4481e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.741578] >fff00000c4481e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.742391]                                                           ^
[   30.743220]  fff00000c4481f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.744039]  fff00000c4481f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.744876] ==================================================================
[   30.873012] ==================================================================
[   30.873820] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   30.875022] Write of size 1 at addr fff00000c64660d0 by task kunit_try_catch/151
[   30.875941] 
[   30.876376] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.878094] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.879288] Hardware name: linux,dummy-virt (DT)
[   30.880104] Call trace:
[   30.880462]  show_stack+0x20/0x38 (C)
[   30.881281]  dump_stack_lvl+0x8c/0xd0
[   30.881961]  print_report+0x118/0x5e0
[   30.882592]  kasan_report+0xc8/0x118
[   30.883236]  __asan_report_store1_noabort+0x20/0x30
[   30.883973]  krealloc_less_oob_helper+0xb9c/0xc50
[   30.885102]  krealloc_large_less_oob+0x20/0x38
[   30.885743]  kunit_try_run_case+0x14c/0x3d0
[   30.886516]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.887345]  kthread+0x24c/0x2d0
[   30.887872]  ret_from_fork+0x10/0x20
[   30.888558] 
[   30.888919] The buggy address belongs to the physical page:
[   30.889438] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106464
[   30.890594] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.891795] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.893120] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.893828] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.895088] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.895495] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.895868] head: 0bfffe0000000002 ffffc1ffc3191901 ffffffffffffffff 0000000000000000
[   30.896658] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.898176] page dumped because: kasan: bad access detected
[   30.899053] 
[   30.899405] Memory state around the buggy address:
[   30.900033]  fff00000c6465f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.901204]  fff00000c6466000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.901987] >fff00000c6466080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.902769]                                                  ^
[   30.903833]  fff00000c6466100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.905003]  fff00000c6466180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.906089] ==================================================================
[   30.570740] ==================================================================
[   30.571632] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   30.572940] Write of size 1 at addr fff00000c4481ed0 by task kunit_try_catch/147
[   30.573646] 
[   30.575194] CPU: 0 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.576412] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.576930] Hardware name: linux,dummy-virt (DT)
[   30.577481] Call trace:
[   30.577924]  show_stack+0x20/0x38 (C)
[   30.578574]  dump_stack_lvl+0x8c/0xd0
[   30.579170]  print_report+0x118/0x5e0
[   30.579743]  kasan_report+0xc8/0x118
[   30.580377]  __asan_report_store1_noabort+0x20/0x30
[   30.580958]  krealloc_less_oob_helper+0xb9c/0xc50
[   30.581665]  krealloc_less_oob+0x20/0x38
[   30.582250]  kunit_try_run_case+0x14c/0x3d0
[   30.582963]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.583740]  kthread+0x24c/0x2d0
[   30.584250]  ret_from_fork+0x10/0x20
[   30.584881] 
[   30.585253] Allocated by task 147:
[   30.585798]  kasan_save_stack+0x3c/0x68
[   30.586346]  kasan_save_track+0x20/0x40
[   30.587323]  kasan_save_alloc_info+0x40/0x58
[   30.587850]  __kasan_krealloc+0x118/0x178
[   30.588632]  krealloc_noprof+0x128/0x360
[   30.589155]  krealloc_less_oob_helper+0x168/0xc50
[   30.589701]  krealloc_less_oob+0x20/0x38
[   30.590624]  kunit_try_run_case+0x14c/0x3d0
[   30.591345]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.592086]  kthread+0x24c/0x2d0
[   30.592806]  ret_from_fork+0x10/0x20
[   30.593519] 
[   30.593874] The buggy address belongs to the object at fff00000c4481e00
[   30.593874]  which belongs to the cache kmalloc-256 of size 256
[   30.595058] The buggy address is located 7 bytes to the right of
[   30.595058]  allocated 201-byte region [fff00000c4481e00, fff00000c4481ec9)
[   30.596569] 
[   30.596988] The buggy address belongs to the physical page:
[   30.597731] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104480
[   30.598560] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.599526] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.600396] page_type: f5(slab)
[   30.600951] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.601866] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.602782] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.603664] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.604529] head: 0bfffe0000000001 ffffc1ffc3112001 ffffffffffffffff 0000000000000000
[   30.605397] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   30.606238] page dumped because: kasan: bad access detected
[   30.606948] 
[   30.607352] Memory state around the buggy address:
[   30.607987]  fff00000c4481d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.608758]  fff00000c4481e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.609636] >fff00000c4481e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.610376]                                                  ^
[   30.611265]  fff00000c4481f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.612080]  fff00000c4481f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.612872] ==================================================================
[   30.941102] ==================================================================
[   30.941822] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   30.942753] Write of size 1 at addr fff00000c64660ea by task kunit_try_catch/151
[   30.943659] 
[   30.944069] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.945130] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.945588] Hardware name: linux,dummy-virt (DT)
[   30.946709] Call trace:
[   30.947181]  show_stack+0x20/0x38 (C)
[   30.947801]  dump_stack_lvl+0x8c/0xd0
[   30.949632]  print_report+0x118/0x5e0
[   30.950264]  kasan_report+0xc8/0x118
[   30.950829]  __asan_report_store1_noabort+0x20/0x30
[   30.951574]  krealloc_less_oob_helper+0xae4/0xc50
[   30.952200]  krealloc_large_less_oob+0x20/0x38
[   30.953340]  kunit_try_run_case+0x14c/0x3d0
[   30.953948]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.954661]  kthread+0x24c/0x2d0
[   30.955220]  ret_from_fork+0x10/0x20
[   30.955791] 
[   30.956175] The buggy address belongs to the physical page:
[   30.957578] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106464
[   30.958526] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.959345] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.960160] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.961097] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.962366] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.963186] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.963985] head: 0bfffe0000000002 ffffc1ffc3191901 ffffffffffffffff 0000000000000000
[   30.965784] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.966687] page dumped because: kasan: bad access detected
[   30.967335] 
[   30.968000] Memory state around the buggy address:
[   30.969147]  fff00000c6465f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.970127]  fff00000c6466000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.971003] >fff00000c6466080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.971800]                                                           ^
[   30.972708]  fff00000c6466100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.973740]  fff00000c6466180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.974981] ==================================================================
[   30.659674] ==================================================================
[   30.660438] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   30.661385] Write of size 1 at addr fff00000c4481eea by task kunit_try_catch/147
[   30.662563] 
[   30.662926] CPU: 0 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.664823] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.665504] Hardware name: linux,dummy-virt (DT)
[   30.666183] Call trace:
[   30.666551]  show_stack+0x20/0x38 (C)
[   30.667067]  dump_stack_lvl+0x8c/0xd0
[   30.667588]  print_report+0x118/0x5e0
[   30.668482]  kasan_report+0xc8/0x118
[   30.669219]  __asan_report_store1_noabort+0x20/0x30
[   30.670022]  krealloc_less_oob_helper+0xae4/0xc50
[   30.670895]  krealloc_less_oob+0x20/0x38
[   30.671689]  kunit_try_run_case+0x14c/0x3d0
[   30.672277]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.673313]  kthread+0x24c/0x2d0
[   30.673862]  ret_from_fork+0x10/0x20
[   30.674662] 
[   30.675203] Allocated by task 147:
[   30.675849]  kasan_save_stack+0x3c/0x68
[   30.676600]  kasan_save_track+0x20/0x40
[   30.677311]  kasan_save_alloc_info+0x40/0x58
[   30.677861]  __kasan_krealloc+0x118/0x178
[   30.678494]  krealloc_noprof+0x128/0x360
[   30.679062]  krealloc_less_oob_helper+0x168/0xc50
[   30.679729]  krealloc_less_oob+0x20/0x38
[   30.680407]  kunit_try_run_case+0x14c/0x3d0
[   30.681056]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.681691]  kthread+0x24c/0x2d0
[   30.682266]  ret_from_fork+0x10/0x20
[   30.682830] 
[   30.683220] The buggy address belongs to the object at fff00000c4481e00
[   30.683220]  which belongs to the cache kmalloc-256 of size 256
[   30.684467] The buggy address is located 33 bytes to the right of
[   30.684467]  allocated 201-byte region [fff00000c4481e00, fff00000c4481ec9)
[   30.685864] 
[   30.686288] The buggy address belongs to the physical page:
[   30.686982] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104480
[   30.688018] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.688865] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.689758] page_type: f5(slab)
[   30.690224] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.691179] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.692086] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.693052] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.693944] head: 0bfffe0000000001 ffffc1ffc3112001 ffffffffffffffff 0000000000000000
[   30.694832] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   30.695740] page dumped because: kasan: bad access detected
[   30.696391] 
[   30.696789] Memory state around the buggy address:
[   30.697335]  fff00000c4481d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.698194]  fff00000c4481e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.699162] >fff00000c4481e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.700153]                                                           ^
[   30.700856]  fff00000c4481f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.701965]  fff00000c4481f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.702897] ==================================================================
[   30.907955] ==================================================================
[   30.909008] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   30.909630] Write of size 1 at addr fff00000c64660da by task kunit_try_catch/151
[   30.910604] 
[   30.911041] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.912325] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.912802] Hardware name: linux,dummy-virt (DT)
[   30.913472] Call trace:
[   30.913984]  show_stack+0x20/0x38 (C)
[   30.914663]  dump_stack_lvl+0x8c/0xd0
[   30.915287]  print_report+0x118/0x5e0
[   30.915862]  kasan_report+0xc8/0x118
[   30.916488]  __asan_report_store1_noabort+0x20/0x30
[   30.917503]  krealloc_less_oob_helper+0xa80/0xc50
[   30.918501]  krealloc_large_less_oob+0x20/0x38
[   30.919138]  kunit_try_run_case+0x14c/0x3d0
[   30.919858]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.920955]  kthread+0x24c/0x2d0
[   30.921429]  ret_from_fork+0x10/0x20
[   30.922063] 
[   30.922373] The buggy address belongs to the physical page:
[   30.922948] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106464
[   30.923923] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.924761] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.925966] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.926867] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.928148] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.929337] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.930136] head: 0bfffe0000000002 ffffc1ffc3191901 ffffffffffffffff 0000000000000000
[   30.931204] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.931999] page dumped because: kasan: bad access detected
[   30.933473] 
[   30.933724] Memory state around the buggy address:
[   30.934398]  fff00000c6465f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.935190]  fff00000c6466000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.936059] >fff00000c6466080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.936824]                                                     ^
[   30.937871]  fff00000c6466100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.938716]  fff00000c6466180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.939782] ==================================================================

[   30.631218] ==================================================================
[   30.631923] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   30.632296] Write of size 1 at addr fff00000c47dfcea by task kunit_try_catch/147
[   30.633004] 
[   30.633411] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.635807] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.636481] Hardware name: linux,dummy-virt (DT)
[   30.637193] Call trace:
[   30.637709]  show_stack+0x20/0x38 (C)
[   30.638339]  dump_stack_lvl+0x8c/0xd0
[   30.640140]  print_report+0x118/0x5e0
[   30.641017]  kasan_report+0xc8/0x118
[   30.641806]  __asan_report_store1_noabort+0x20/0x30
[   30.642446]  krealloc_less_oob_helper+0xae4/0xc50
[   30.643114]  krealloc_less_oob+0x20/0x38
[   30.643821]  kunit_try_run_case+0x14c/0x3d0
[   30.644489]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.645321]  kthread+0x24c/0x2d0
[   30.645898]  ret_from_fork+0x10/0x20
[   30.646584] 
[   30.646954] Allocated by task 147:
[   30.647433]  kasan_save_stack+0x3c/0x68
[   30.648107]  kasan_save_track+0x20/0x40
[   30.648812]  kasan_save_alloc_info+0x40/0x58
[   30.649440]  __kasan_krealloc+0x118/0x178
[   30.650111]  krealloc_noprof+0x128/0x360
[   30.650788]  krealloc_less_oob_helper+0x168/0xc50
[   30.651416]  krealloc_less_oob+0x20/0x38
[   30.652104]  kunit_try_run_case+0x14c/0x3d0
[   30.652770]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.653603]  kthread+0x24c/0x2d0
[   30.654098]  ret_from_fork+0x10/0x20
[   30.654757] 
[   30.655131] The buggy address belongs to the object at fff00000c47dfc00
[   30.655131]  which belongs to the cache kmalloc-256 of size 256
[   30.656803] The buggy address is located 33 bytes to the right of
[   30.656803]  allocated 201-byte region [fff00000c47dfc00, fff00000c47dfcc9)
[   30.658257] 
[   30.658605] The buggy address belongs to the physical page:
[   30.659475] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1047de
[   30.660605] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.661657] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.662660] page_type: f5(slab)
[   30.663145] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.664223] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.665142] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.666251] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.667342] head: 0bfffe0000000001 ffffc1ffc311f781 ffffffffffffffff 0000000000000000
[   30.668002] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   30.668937] page dumped because: kasan: bad access detected
[   30.669604] 
[   30.670010] Memory state around the buggy address:
[   30.670713]  fff00000c47dfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.671437]  fff00000c47dfc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.672398] >fff00000c47dfc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.673252]                                                           ^
[   30.674074]  fff00000c47dfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.674989]  fff00000c47dfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.675789] ==================================================================
[   30.913460] ==================================================================
[   30.914761] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   30.916420] Write of size 1 at addr fff00000c64ba0ea by task kunit_try_catch/151
[   30.917289] 
[   30.917714] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.919262] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.919782] Hardware name: linux,dummy-virt (DT)
[   30.920447] Call trace:
[   30.920830]  show_stack+0x20/0x38 (C)
[   30.921454]  dump_stack_lvl+0x8c/0xd0
[   30.922934]  print_report+0x118/0x5e0
[   30.923649]  kasan_report+0xc8/0x118
[   30.924063]  __asan_report_store1_noabort+0x20/0x30
[   30.924866]  krealloc_less_oob_helper+0xae4/0xc50
[   30.926116]  krealloc_large_less_oob+0x20/0x38
[   30.926779]  kunit_try_run_case+0x14c/0x3d0
[   30.927387]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.928229]  kthread+0x24c/0x2d0
[   30.928767]  ret_from_fork+0x10/0x20
[   30.929440] 
[   30.930113] The buggy address belongs to the physical page:
[   30.930680] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064b8
[   30.932108] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.933113] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.934018] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.934959] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.936006] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.937006] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.937935] head: 0bfffe0000000002 ffffc1ffc3192e01 ffffffffffffffff 0000000000000000
[   30.938841] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.939680] page dumped because: kasan: bad access detected
[   30.940466] 
[   30.941516] Memory state around the buggy address:
[   30.942563]  fff00000c64b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.943249]  fff00000c64ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.944081] >fff00000c64ba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.944947]                                                           ^
[   30.946083]  fff00000c64ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.946860]  fff00000c64ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.948203] ==================================================================
[   30.949501] ==================================================================
[   30.950608] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   30.951255] Write of size 1 at addr fff00000c64ba0eb by task kunit_try_catch/151
[   30.951950] 
[   30.952347] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.953653] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.954135] Hardware name: linux,dummy-virt (DT)
[   30.954813] Call trace:
[   30.955279]  show_stack+0x20/0x38 (C)
[   30.957221]  dump_stack_lvl+0x8c/0xd0
[   30.958093]  print_report+0x118/0x5e0
[   30.958721]  kasan_report+0xc8/0x118
[   30.959372]  __asan_report_store1_noabort+0x20/0x30
[   30.960183]  krealloc_less_oob_helper+0xa58/0xc50
[   30.961018]  krealloc_large_less_oob+0x20/0x38
[   30.961678]  kunit_try_run_case+0x14c/0x3d0
[   30.962302]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.963252]  kthread+0x24c/0x2d0
[   30.964021]  ret_from_fork+0x10/0x20
[   30.964622] 
[   30.965140] The buggy address belongs to the physical page:
[   30.966404] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064b8
[   30.967576] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.968414] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.969249] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.970591] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.971847] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.972738] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.973636] head: 0bfffe0000000002 ffffc1ffc3192e01 ffffffffffffffff 0000000000000000
[   30.974564] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.975394] page dumped because: kasan: bad access detected
[   30.976089] 
[   30.976502] Memory state around the buggy address:
[   30.977213]  fff00000c64b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.978360]  fff00000c64ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.979898] >fff00000c64ba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.980746]                                                           ^
[   30.981565]  fff00000c64ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.982346]  fff00000c64ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.983210] ==================================================================
[   30.679382] ==================================================================
[   30.680145] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   30.681187] Write of size 1 at addr fff00000c47dfceb by task kunit_try_catch/147
[   30.682386] 
[   30.682776] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.684993] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.685795] Hardware name: linux,dummy-virt (DT)
[   30.686616] Call trace:
[   30.687201]  show_stack+0x20/0x38 (C)
[   30.687795]  dump_stack_lvl+0x8c/0xd0
[   30.688476]  print_report+0x118/0x5e0
[   30.689025]  kasan_report+0xc8/0x118
[   30.689661]  __asan_report_store1_noabort+0x20/0x30
[   30.690432]  krealloc_less_oob_helper+0xa58/0xc50
[   30.691068]  krealloc_less_oob+0x20/0x38
[   30.691727]  kunit_try_run_case+0x14c/0x3d0
[   30.692329]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.693180]  kthread+0x24c/0x2d0
[   30.693800]  ret_from_fork+0x10/0x20
[   30.694417] 
[   30.694754] Allocated by task 147:
[   30.695394]  kasan_save_stack+0x3c/0x68
[   30.695934]  kasan_save_track+0x20/0x40
[   30.696620]  kasan_save_alloc_info+0x40/0x58
[   30.697233]  __kasan_krealloc+0x118/0x178
[   30.697926]  krealloc_noprof+0x128/0x360
[   30.698584]  krealloc_less_oob_helper+0x168/0xc50
[   30.699258]  krealloc_less_oob+0x20/0x38
[   30.699952]  kunit_try_run_case+0x14c/0x3d0
[   30.700645]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.701356]  kthread+0x24c/0x2d0
[   30.701986]  ret_from_fork+0x10/0x20
[   30.702637] 
[   30.703010] The buggy address belongs to the object at fff00000c47dfc00
[   30.703010]  which belongs to the cache kmalloc-256 of size 256
[   30.704343] The buggy address is located 34 bytes to the right of
[   30.704343]  allocated 201-byte region [fff00000c47dfc00, fff00000c47dfcc9)
[   30.705794] 
[   30.706110] The buggy address belongs to the physical page:
[   30.706917] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1047de
[   30.707814] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.708760] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.709658] page_type: f5(slab)
[   30.710219] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.711089] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.712005] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.712988] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.713902] head: 0bfffe0000000001 ffffc1ffc311f781 ffffffffffffffff 0000000000000000
[   30.714827] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   30.715712] page dumped because: kasan: bad access detected
[   30.716398] 
[   30.716797] Memory state around the buggy address:
[   30.717543]  fff00000c47dfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.718290]  fff00000c47dfc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.719254] >fff00000c47dfc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.720070]                                                           ^
[   30.720917]  fff00000c47dfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.721824]  fff00000c47dfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.722665] ==================================================================
[   30.809304] ==================================================================
[   30.810651] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   30.811749] Write of size 1 at addr fff00000c64ba0c9 by task kunit_try_catch/151
[   30.812834] 
[   30.813283] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.814847] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.815393] Hardware name: linux,dummy-virt (DT)
[   30.816073] Call trace:
[   30.816575]  show_stack+0x20/0x38 (C)
[   30.817105]  dump_stack_lvl+0x8c/0xd0
[   30.817676]  print_report+0x118/0x5e0
[   30.818300]  kasan_report+0xc8/0x118
[   30.818883]  __asan_report_store1_noabort+0x20/0x30
[   30.819557]  krealloc_less_oob_helper+0xa48/0xc50
[   30.820198]  krealloc_large_less_oob+0x20/0x38
[   30.820854]  kunit_try_run_case+0x14c/0x3d0
[   30.821483]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.822349]  kthread+0x24c/0x2d0
[   30.822827]  ret_from_fork+0x10/0x20
[   30.823450] 
[   30.823836] The buggy address belongs to the physical page:
[   30.824438] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064b8
[   30.825359] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.826138] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.827223] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.828117] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.828997] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.829934] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.830783] head: 0bfffe0000000002 ffffc1ffc3192e01 ffffffffffffffff 0000000000000000
[   30.831983] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.832844] page dumped because: kasan: bad access detected
[   30.833485] 
[   30.833892] Memory state around the buggy address:
[   30.834398]  fff00000c64b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.835584]  fff00000c64ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.836632] >fff00000c64ba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.837481]                                               ^
[   30.838269]  fff00000c64ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.839241]  fff00000c64ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.839962] ==================================================================
[   30.480011] ==================================================================
[   30.481286] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   30.482130] Write of size 1 at addr fff00000c47dfcc9 by task kunit_try_catch/147
[   30.483569] 
[   30.483964] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.484903] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.485457] Hardware name: linux,dummy-virt (DT)
[   30.486012] Call trace:
[   30.486875]  show_stack+0x20/0x38 (C)
[   30.487518]  dump_stack_lvl+0x8c/0xd0
[   30.488142]  print_report+0x118/0x5e0
[   30.488676]  kasan_report+0xc8/0x118
[   30.489284]  __asan_report_store1_noabort+0x20/0x30
[   30.490478]  krealloc_less_oob_helper+0xa48/0xc50
[   30.491239]  krealloc_less_oob+0x20/0x38
[   30.491770]  kunit_try_run_case+0x14c/0x3d0
[   30.492472]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.493407]  kthread+0x24c/0x2d0
[   30.494444]  ret_from_fork+0x10/0x20
[   30.495119] 
[   30.495484] Allocated by task 147:
[   30.495929]  kasan_save_stack+0x3c/0x68
[   30.496584]  kasan_save_track+0x20/0x40
[   30.497223]  kasan_save_alloc_info+0x40/0x58
[   30.497994]  __kasan_krealloc+0x118/0x178
[   30.498961]  krealloc_noprof+0x128/0x360
[   30.499506]  krealloc_less_oob_helper+0x168/0xc50
[   30.500175]  krealloc_less_oob+0x20/0x38
[   30.501421]  kunit_try_run_case+0x14c/0x3d0
[   30.501983]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.502775]  kthread+0x24c/0x2d0
[   30.503309]  ret_from_fork+0x10/0x20
[   30.504296] 
[   30.504674] The buggy address belongs to the object at fff00000c47dfc00
[   30.504674]  which belongs to the cache kmalloc-256 of size 256
[   30.506643] The buggy address is located 0 bytes to the right of
[   30.506643]  allocated 201-byte region [fff00000c47dfc00, fff00000c47dfcc9)
[   30.507855] 
[   30.508231] The buggy address belongs to the physical page:
[   30.508933] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1047de
[   30.509819] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.511020] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.512007] page_type: f5(slab)
[   30.512507] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.513441] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.515002] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.515822] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.516759] head: 0bfffe0000000001 ffffc1ffc311f781 ffffffffffffffff 0000000000000000
[   30.517624] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   30.518455] page dumped because: kasan: bad access detected
[   30.519545] 
[   30.519910] Memory state around the buggy address:
[   30.520519]  fff00000c47dfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.521326]  fff00000c47dfc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.522842] >fff00000c47dfc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.523610]                                               ^
[   30.524322]  fff00000c47dfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.525671]  fff00000c47dfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.526436] ==================================================================
[   30.841546] ==================================================================
[   30.842709] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   30.843677] Write of size 1 at addr fff00000c64ba0d0 by task kunit_try_catch/151
[   30.844940] 
[   30.845341] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.846912] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.847399] Hardware name: linux,dummy-virt (DT)
[   30.848071] Call trace:
[   30.848431]  show_stack+0x20/0x38 (C)
[   30.849006]  dump_stack_lvl+0x8c/0xd0
[   30.849717]  print_report+0x118/0x5e0
[   30.850717]  kasan_report+0xc8/0x118
[   30.851347]  __asan_report_store1_noabort+0x20/0x30
[   30.852710]  krealloc_less_oob_helper+0xb9c/0xc50
[   30.853924]  krealloc_large_less_oob+0x20/0x38
[   30.855016]  kunit_try_run_case+0x14c/0x3d0
[   30.855967]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.857211]  kthread+0x24c/0x2d0
[   30.857832]  ret_from_fork+0x10/0x20
[   30.858387] 
[   30.858810] The buggy address belongs to the physical page:
[   30.859652] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064b8
[   30.860556] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.861353] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.862226] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.863291] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.864324] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.865240] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.866303] head: 0bfffe0000000002 ffffc1ffc3192e01 ffffffffffffffff 0000000000000000
[   30.867720] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.868657] page dumped because: kasan: bad access detected
[   30.869594] 
[   30.870221] Memory state around the buggy address:
[   30.871041]  fff00000c64b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.871946]  fff00000c64ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.872929] >fff00000c64ba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.874287]                                                  ^
[   30.875460]  fff00000c64ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.876330]  fff00000c64ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.878011] ==================================================================
[   30.528059] ==================================================================
[   30.528754] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   30.530001] Write of size 1 at addr fff00000c47dfcd0 by task kunit_try_catch/147
[   30.530864] 
[   30.531263] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.533371] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.534519] Hardware name: linux,dummy-virt (DT)
[   30.535195] Call trace:
[   30.535658]  show_stack+0x20/0x38 (C)
[   30.536304]  dump_stack_lvl+0x8c/0xd0
[   30.536874]  print_report+0x118/0x5e0
[   30.537510]  kasan_report+0xc8/0x118
[   30.538870]  __asan_report_store1_noabort+0x20/0x30
[   30.539662]  krealloc_less_oob_helper+0xb9c/0xc50
[   30.540241]  krealloc_less_oob+0x20/0x38
[   30.540925]  kunit_try_run_case+0x14c/0x3d0
[   30.541544]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.542327]  kthread+0x24c/0x2d0
[   30.543323]  ret_from_fork+0x10/0x20
[   30.543901] 
[   30.544197] Allocated by task 147:
[   30.544745]  kasan_save_stack+0x3c/0x68
[   30.545367]  kasan_save_track+0x20/0x40
[   30.546840]  kasan_save_alloc_info+0x40/0x58
[   30.547397]  __kasan_krealloc+0x118/0x178
[   30.548065]  krealloc_noprof+0x128/0x360
[   30.548860]  krealloc_less_oob_helper+0x168/0xc50
[   30.549567]  krealloc_less_oob+0x20/0x38
[   30.550461]  kunit_try_run_case+0x14c/0x3d0
[   30.551010]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.551769]  kthread+0x24c/0x2d0
[   30.552286]  ret_from_fork+0x10/0x20
[   30.553072] 
[   30.553420] The buggy address belongs to the object at fff00000c47dfc00
[   30.553420]  which belongs to the cache kmalloc-256 of size 256
[   30.555487] The buggy address is located 7 bytes to the right of
[   30.555487]  allocated 201-byte region [fff00000c47dfc00, fff00000c47dfcc9)
[   30.556908] 
[   30.557281] The buggy address belongs to the physical page:
[   30.558344] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1047de
[   30.559157] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.560114] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.560912] page_type: f5(slab)
[   30.561451] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.562878] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.563831] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.565016] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.566103] head: 0bfffe0000000001 ffffc1ffc311f781 ffffffffffffffff 0000000000000000
[   30.567520] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   30.568381] page dumped because: kasan: bad access detected
[   30.569049] 
[   30.569324] Memory state around the buggy address:
[   30.570411]  fff00000c47dfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.571291]  fff00000c47dfc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.572741] >fff00000c47dfc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.573520]                                                  ^
[   30.574281]  fff00000c47dfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.575574]  fff00000c47dfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.576345] ==================================================================
[   30.879430] ==================================================================
[   30.880245] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   30.881497] Write of size 1 at addr fff00000c64ba0da by task kunit_try_catch/151
[   30.883012] 
[   30.883349] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.884447] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.885091] Hardware name: linux,dummy-virt (DT)
[   30.885663] Call trace:
[   30.886385]  show_stack+0x20/0x38 (C)
[   30.887045]  dump_stack_lvl+0x8c/0xd0
[   30.887687]  print_report+0x118/0x5e0
[   30.888204]  kasan_report+0xc8/0x118
[   30.888929]  __asan_report_store1_noabort+0x20/0x30
[   30.889685]  krealloc_less_oob_helper+0xa80/0xc50
[   30.890662]  krealloc_large_less_oob+0x20/0x38
[   30.891260]  kunit_try_run_case+0x14c/0x3d0
[   30.891956]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.893211]  kthread+0x24c/0x2d0
[   30.893780]  ret_from_fork+0x10/0x20
[   30.894276] 
[   30.894664] The buggy address belongs to the physical page:
[   30.895354] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064b8
[   30.896413] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.897170] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.898653] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.899574] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.900550] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.901408] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.902627] head: 0bfffe0000000002 ffffc1ffc3192e01 ffffffffffffffff 0000000000000000
[   30.903502] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.904501] page dumped because: kasan: bad access detected
[   30.905178] 
[   30.905559] Memory state around the buggy address:
[   30.906159]  fff00000c64b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.907012]  fff00000c64ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.908638] >fff00000c64ba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.909396]                                                     ^
[   30.910125]  fff00000c64ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.911139]  fff00000c64ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.911947] ==================================================================
[   30.579889] ==================================================================
[   30.580638] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   30.581377] Write of size 1 at addr fff00000c47dfcda by task kunit_try_catch/147
[   30.582219] 
[   30.582897] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.584369] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.585041] Hardware name: linux,dummy-virt (DT)
[   30.586150] Call trace:
[   30.586799]  show_stack+0x20/0x38 (C)
[   30.587811]  dump_stack_lvl+0x8c/0xd0
[   30.588698]  print_report+0x118/0x5e0
[   30.589381]  kasan_report+0xc8/0x118
[   30.590252]  __asan_report_store1_noabort+0x20/0x30
[   30.591070]  krealloc_less_oob_helper+0xa80/0xc50
[   30.591693]  krealloc_less_oob+0x20/0x38
[   30.592386]  kunit_try_run_case+0x14c/0x3d0
[   30.593066]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.594019]  kthread+0x24c/0x2d0
[   30.594829]  ret_from_fork+0x10/0x20
[   30.595442] 
[   30.595771] Allocated by task 147:
[   30.596335]  kasan_save_stack+0x3c/0x68
[   30.597497]  kasan_save_track+0x20/0x40
[   30.598327]  kasan_save_alloc_info+0x40/0x58
[   30.599200]  __kasan_krealloc+0x118/0x178
[   30.599821]  krealloc_noprof+0x128/0x360
[   30.600395]  krealloc_less_oob_helper+0x168/0xc50
[   30.601402]  krealloc_less_oob+0x20/0x38
[   30.602778]  kunit_try_run_case+0x14c/0x3d0
[   30.603635]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.604572]  kthread+0x24c/0x2d0
[   30.605268]  ret_from_fork+0x10/0x20
[   30.605972] 
[   30.606497] The buggy address belongs to the object at fff00000c47dfc00
[   30.606497]  which belongs to the cache kmalloc-256 of size 256
[   30.608082] The buggy address is located 17 bytes to the right of
[   30.608082]  allocated 201-byte region [fff00000c47dfc00, fff00000c47dfcc9)
[   30.609440] 
[   30.610212] The buggy address belongs to the physical page:
[   30.611698] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1047de
[   30.612504] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.613355] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.614624] page_type: f5(slab)
[   30.615098] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.615962] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.616858] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.618016] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.618820] head: 0bfffe0000000001 ffffc1ffc311f781 ffffffffffffffff 0000000000000000
[   30.620183] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   30.621032] page dumped because: kasan: bad access detected
[   30.621744] 
[   30.622444] Memory state around the buggy address:
[   30.623271]  fff00000c47dfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.624127]  fff00000c47dfc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.624957] >fff00000c47dfc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.625832]                                                     ^
[   30.626642]  fff00000c47dfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.627346]  fff00000c47dfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.628276] ==================================================================

[   25.107157] ==================================================================
[   25.107991] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd49/0x11d0
[   25.107991] Write of size 1 at addr ffff888102b120eb by task kunit_try_catch/171
[   25.107991] 
[   25.107991] CPU: 1 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   25.107991] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.107991] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.107991] Call Trace:
[   25.107991]  <TASK>
[   25.107991]  dump_stack_lvl+0x73/0xb0
[   25.107991]  print_report+0xd1/0x640
[   25.107991]  ? __virt_addr_valid+0x1db/0x2d0
[   25.107991]  ? kasan_addr_to_slab+0x11/0xa0
[   25.107991]  kasan_report+0x102/0x140
[   25.107991]  ? krealloc_less_oob_helper+0xd49/0x11d0
[   25.107991]  ? krealloc_less_oob_helper+0xd49/0x11d0
[   25.107991]  __asan_report_store1_noabort+0x1b/0x30
[   25.107991]  krealloc_less_oob_helper+0xd49/0x11d0
[   25.107991]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   25.107991]  ? __switch_to+0x5d9/0xf60
[   25.107991]  ? __schedule+0xc3e/0x2790
[   25.107991]  krealloc_large_less_oob+0x1c/0x30
[   25.107991]  kunit_try_run_case+0x1b3/0x490
[   25.107991]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.107991]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.107991]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.107991]  ? __kthread_parkme+0x82/0x160
[   25.107991]  ? preempt_count_sub+0x50/0x80
[   25.107991]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.107991]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.107991]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.107991]  kthread+0x257/0x310
[   25.107991]  ? __pfx_kthread+0x10/0x10
[   25.107991]  ret_from_fork+0x41/0x80
[   25.107991]  ? __pfx_kthread+0x10/0x10
[   25.107991]  ret_from_fork_asm+0x1a/0x30
[   25.107991]  </TASK>
[   25.107991] 
[   25.107991] The buggy address belongs to the physical page:
[   25.107991] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b10
[   25.107991] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.107991] flags: 0x200000000000040(head|node=0|zone=2)
[   25.107991] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.107991] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   25.107991] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.107991] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   25.107991] head: 0200000000000002 ffffea00040ac401 ffffffffffffffff 0000000000000000
[   25.107991] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   25.107991] page dumped because: kasan: bad access detected
[   25.107991] 
[   25.107991] Memory state around the buggy address:
[   25.107991]  ffff888102b11f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.107991]  ffff888102b12000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.107991] >ffff888102b12080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   25.107991]                                                           ^
[   25.107991]  ffff888102b12100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.107991]  ffff888102b12180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.107991] ==================================================================
[   24.761503] ==================================================================
[   24.762215] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd49/0x11d0
[   24.763090] Write of size 1 at addr ffff888100aa9aeb by task kunit_try_catch/165
[   24.763465] 
[   24.763636] TSC found unstable after boot, most likely due to broken BIOS. Use 'tsc=unstable'.
[   24.763639] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   24.763773] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.763813] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.763872] Call Trace:
[   24.763925]  <TASK>
[   24.763976]  dump_stack_lvl+0x73/0xb0
[   24.764071]  print_report+0xd1/0x640
[   24.764147]  ? __virt_addr_valid+0x1db/0x2d0
[   24.764230]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.764315]  kasan_report+0x102/0x140
[   24.764417]  ? krealloc_less_oob_helper+0xd49/0x11d0
[   24.764504]  ? krealloc_less_oob_helper+0xd49/0x11d0
[   24.764597]  __asan_report_store1_noabort+0x1b/0x30
[   24.764673]  krealloc_less_oob_helper+0xd49/0x11d0
[   24.764792]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   24.764875]  ? finish_task_switch.isra.0+0x153/0x700
[   24.764985]  ? __switch_to+0x5d9/0xf60
[   24.765078]  ? __schedule+0xc3e/0x2790
[   24.767192]  ? __pfx_read_tsc+0x10/0x10
[   24.767296]  krealloc_less_oob+0x1c/0x30
[   24.767366]  kunit_try_run_case+0x1b3/0x490
[   24.767436]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.767500]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.767565]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.767630]  ? __kthread_parkme+0x82/0x160
[   24.767745]  ? preempt_count_sub+0x50/0x80
[   24.768486]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.770557] sched_clock: Marking unstable (24632152235, 131065939)<-(24918734144, -155476693)
[   24.772272]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.772386]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.772462]  kthread+0x257/0x310
[   24.773192]  ? __pfx_kthread+0x10/0x10
[   24.773260]  ret_from_fork+0x41/0x80
[   24.764218]  ? __pfx_kthread+0x10/0x10
[   24.764218]  ret_from_fork_asm+0x1a/0x30
[   24.764218]  </TASK>
[   24.764218] 
[   24.764218] Allocated by task 165:
[   24.764218]  kasan_save_stack+0x3d/0x60
[   24.764218]  kasan_save_track+0x18/0x40
[   24.764218]  kasan_save_alloc_info+0x3b/0x50
[   24.764218]  __kasan_krealloc+0x190/0x1f0
[   24.764218]  krealloc_noprof+0xf3/0x340
[   24.764218]  krealloc_less_oob_helper+0x1ab/0x11d0
[   24.764218]  krealloc_less_oob+0x1c/0x30
[   24.764218]  kunit_try_run_case+0x1b3/0x490
[   24.764218]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.764218]  kthread+0x257/0x310
[   24.764218]  ret_from_fork+0x41/0x80
[   24.764218]  ret_from_fork_asm+0x1a/0x30
[   24.764218] 
[   24.764218] The buggy address belongs to the object at ffff888100aa9a00
[   24.764218]  which belongs to the cache kmalloc-256 of size 256
[   24.764218] The buggy address is located 34 bytes to the right of
[   24.764218]  allocated 201-byte region [ffff888100aa9a00, ffff888100aa9ac9)
[   24.764218] 
[   24.764218] The buggy address belongs to the physical page:
[   24.764218] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aa8
[   24.764218] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.764218] flags: 0x200000000000040(head|node=0|zone=2)
[   24.764218] page_type: f5(slab)
[   24.764218] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   24.764218] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   24.764218] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   24.764218] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   24.764218] head: 0200000000000001 ffffea000402aa01 ffffffffffffffff 0000000000000000
[   24.764218] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   24.764218] page dumped because: kasan: bad access detected
[   24.764218] 
[   24.764218] Memory state around the buggy address:
[   24.764218]  ffff888100aa9980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.764218]  ffff888100aa9a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.764218] >ffff888100aa9a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   24.764218]                                                           ^
[   24.764218]  ffff888100aa9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.764218]  ffff888100aa9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.764218] ==================================================================
[   24.573240] ==================================================================
[   24.574527] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe25/0x11d0
[   24.575272] Write of size 1 at addr ffff888100aa9ad0 by task kunit_try_catch/165
[   24.575835] 
[   24.576049] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   24.578040] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.578427] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.579505] Call Trace:
[   24.579828]  <TASK>
[   24.580025]  dump_stack_lvl+0x73/0xb0
[   24.580555]  print_report+0xd1/0x640
[   24.581569]  ? __virt_addr_valid+0x1db/0x2d0
[   24.582113]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.582523]  kasan_report+0x102/0x140
[   24.583401]  ? krealloc_less_oob_helper+0xe25/0x11d0
[   24.583902]  ? krealloc_less_oob_helper+0xe25/0x11d0
[   24.584627]  __asan_report_store1_noabort+0x1b/0x30
[   24.585153]  krealloc_less_oob_helper+0xe25/0x11d0
[   24.585580]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   24.586115]  ? finish_task_switch.isra.0+0x153/0x700
[   24.586606]  ? __switch_to+0x5d9/0xf60
[   24.587732]  ? __schedule+0xc3e/0x2790
[   24.588283]  ? __pfx_read_tsc+0x10/0x10
[   24.588788]  krealloc_less_oob+0x1c/0x30
[   24.589260]  kunit_try_run_case+0x1b3/0x490
[   24.589801]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.590637]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.591827]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.592422]  ? __kthread_parkme+0x82/0x160
[   24.592940]  ? preempt_count_sub+0x50/0x80
[   24.593420]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.594055]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.594885]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.595960]  kthread+0x257/0x310
[   24.596397]  ? __pfx_kthread+0x10/0x10
[   24.597251]  ret_from_fork+0x41/0x80
[   24.597635]  ? __pfx_kthread+0x10/0x10
[   24.598036]  ret_from_fork_asm+0x1a/0x30
[   24.598807]  </TASK>
[   24.599653] 
[   24.599949] Allocated by task 165:
[   24.600370]  kasan_save_stack+0x3d/0x60
[   24.601020]  kasan_save_track+0x18/0x40
[   24.601515]  kasan_save_alloc_info+0x3b/0x50
[   24.601907]  __kasan_krealloc+0x190/0x1f0
[   24.602561]  krealloc_noprof+0xf3/0x340
[   24.603000]  krealloc_less_oob_helper+0x1ab/0x11d0
[   24.603336]  krealloc_less_oob+0x1c/0x30
[   24.604189]  kunit_try_run_case+0x1b3/0x490
[   24.604545]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.605076]  kthread+0x257/0x310
[   24.605461]  ret_from_fork+0x41/0x80
[   24.606440]  ret_from_fork_asm+0x1a/0x30
[   24.606850] 
[   24.607222] The buggy address belongs to the object at ffff888100aa9a00
[   24.607222]  which belongs to the cache kmalloc-256 of size 256
[   24.608386] The buggy address is located 7 bytes to the right of
[   24.608386]  allocated 201-byte region [ffff888100aa9a00, ffff888100aa9ac9)
[   24.610051] 
[   24.610477] The buggy address belongs to the physical page:
[   24.611024] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aa8
[   24.611626] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.612559] flags: 0x200000000000040(head|node=0|zone=2)
[   24.613720] page_type: f5(slab)
[   24.614086] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   24.614781] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   24.615252] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   24.616264] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   24.617005] head: 0200000000000001 ffffea000402aa01 ffffffffffffffff 0000000000000000
[   24.618362] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   24.619017] page dumped because: kasan: bad access detected
[   24.619799] 
[   24.620008] Memory state around the buggy address:
[   24.620632]  ffff888100aa9980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.621952]  ffff888100aa9a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.622458] >ffff888100aa9a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   24.623042]                                                  ^
[   24.623556]  ffff888100aa9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.624447]  ffff888100aa9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.624941] ==================================================================
[   24.942742] ==================================================================
[   24.943528] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd72/0x11d0
[   24.943528] Write of size 1 at addr ffff888102b120c9 by task kunit_try_catch/171
[   24.943528] 
[   24.943528] CPU: 1 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   24.943528] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.943528] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.943528] Call Trace:
[   24.943528]  <TASK>
[   24.943528]  dump_stack_lvl+0x73/0xb0
[   24.943528]  print_report+0xd1/0x640
[   24.943528]  ? __virt_addr_valid+0x1db/0x2d0
[   24.943528]  ? kasan_addr_to_slab+0x11/0xa0
[   24.943528]  kasan_report+0x102/0x140
[   24.943528]  ? krealloc_less_oob_helper+0xd72/0x11d0
[   24.943528]  ? krealloc_less_oob_helper+0xd72/0x11d0
[   24.943528]  __asan_report_store1_noabort+0x1b/0x30
[   24.943528]  krealloc_less_oob_helper+0xd72/0x11d0
[   24.943528]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   24.943528]  ? __switch_to+0x5d9/0xf60
[   24.943528]  ? __schedule+0xc3e/0x2790
[   24.943528]  krealloc_large_less_oob+0x1c/0x30
[   24.943528]  kunit_try_run_case+0x1b3/0x490
[   24.943528]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.943528]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.943528]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.943528]  ? __kthread_parkme+0x82/0x160
[   24.943528]  ? preempt_count_sub+0x50/0x80
[   24.943528]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.943528]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.943528]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.943528]  kthread+0x257/0x310
[   24.943528]  ? __pfx_kthread+0x10/0x10
[   24.943528]  ret_from_fork+0x41/0x80
[   24.943528]  ? __pfx_kthread+0x10/0x10
[   24.943528]  ret_from_fork_asm+0x1a/0x30
[   24.943528]  </TASK>
[   24.943528] 
[   24.943528] The buggy address belongs to the physical page:
[   24.943528] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b10
[   24.943528] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.943528] flags: 0x200000000000040(head|node=0|zone=2)
[   24.943528] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   24.943528] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   24.943528] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   24.943528] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   24.943528] head: 0200000000000002 ffffea00040ac401 ffffffffffffffff 0000000000000000
[   24.943528] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   24.943528] page dumped because: kasan: bad access detected
[   24.943528] 
[   24.943528] Memory state around the buggy address:
[   24.943528]  ffff888102b11f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.943528]  ffff888102b12000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.943528] >ffff888102b12080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   24.943528]                                               ^
[   24.943528]  ffff888102b12100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.943528]  ffff888102b12180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.943528] ==================================================================
[   25.028928] ==================================================================
[   25.029771] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec8/0x11d0
[   25.029771] Write of size 1 at addr ffff888102b120da by task kunit_try_catch/171
[   25.029771] 
[   25.029771] CPU: 1 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   25.029771] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.029771] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.029771] Call Trace:
[   25.029771]  <TASK>
[   25.029771]  dump_stack_lvl+0x73/0xb0
[   25.029771]  print_report+0xd1/0x640
[   25.029771]  ? __virt_addr_valid+0x1db/0x2d0
[   25.029771]  ? kasan_addr_to_slab+0x11/0xa0
[   25.029771]  kasan_report+0x102/0x140
[   25.029771]  ? krealloc_less_oob_helper+0xec8/0x11d0
[   25.029771]  ? krealloc_less_oob_helper+0xec8/0x11d0
[   25.029771]  __asan_report_store1_noabort+0x1b/0x30
[   25.029771]  krealloc_less_oob_helper+0xec8/0x11d0
[   25.029771]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   25.029771]  ? __switch_to+0x5d9/0xf60
[   25.029771]  ? __schedule+0xc3e/0x2790
[   25.029771]  krealloc_large_less_oob+0x1c/0x30
[   25.029771]  kunit_try_run_case+0x1b3/0x490
[   25.029771]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.029771]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.029771]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.029771]  ? __kthread_parkme+0x82/0x160
[   25.029771]  ? preempt_count_sub+0x50/0x80
[   25.029771]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.029771]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.029771]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.029771]  kthread+0x257/0x310
[   25.029771]  ? __pfx_kthread+0x10/0x10
[   25.029771]  ret_from_fork+0x41/0x80
[   25.029771]  ? __pfx_kthread+0x10/0x10
[   25.029771]  ret_from_fork_asm+0x1a/0x30
[   25.029771]  </TASK>
[   25.029771] 
[   25.029771] The buggy address belongs to the physical page:
[   25.029771] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b10
[   25.029771] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.029771] flags: 0x200000000000040(head|node=0|zone=2)
[   25.029771] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.029771] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   25.029771] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.029771] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   25.029771] head: 0200000000000002 ffffea00040ac401 ffffffffffffffff 0000000000000000
[   25.029771] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   25.029771] page dumped because: kasan: bad access detected
[   25.029771] 
[   25.029771] Memory state around the buggy address:
[   25.029771]  ffff888102b11f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.029771]  ffff888102b12000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.029771] >ffff888102b12080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   25.029771]                                                     ^
[   25.029771]  ffff888102b12100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.029771]  ffff888102b12180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.029771] ==================================================================
[   25.066775] ==================================================================
[   25.067294] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe92/0x11d0
[   25.067495] Write of size 1 at addr ffff888102b120ea by task kunit_try_catch/171
[   25.067495] 
[   25.067495] CPU: 1 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   25.067495] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.067495] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.067495] Call Trace:
[   25.067495]  <TASK>
[   25.067495]  dump_stack_lvl+0x73/0xb0
[   25.067495]  print_report+0xd1/0x640
[   25.067495]  ? __virt_addr_valid+0x1db/0x2d0
[   25.067495]  ? kasan_addr_to_slab+0x11/0xa0
[   25.067495]  kasan_report+0x102/0x140
[   25.067495]  ? krealloc_less_oob_helper+0xe92/0x11d0
[   25.067495]  ? krealloc_less_oob_helper+0xe92/0x11d0
[   25.067495]  __asan_report_store1_noabort+0x1b/0x30
[   25.067495]  krealloc_less_oob_helper+0xe92/0x11d0
[   25.067495]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   25.067495]  ? __switch_to+0x5d9/0xf60
[   25.067495]  ? __schedule+0xc3e/0x2790
[   25.067495]  krealloc_large_less_oob+0x1c/0x30
[   25.067495]  kunit_try_run_case+0x1b3/0x490
[   25.067495]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.067495]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.067495]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.067495]  ? __kthread_parkme+0x82/0x160
[   25.067495]  ? preempt_count_sub+0x50/0x80
[   25.067495]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.067495]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.067495]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.067495]  kthread+0x257/0x310
[   25.067495]  ? __pfx_kthread+0x10/0x10
[   25.067495]  ret_from_fork+0x41/0x80
[   25.067495]  ? __pfx_kthread+0x10/0x10
[   25.067495]  ret_from_fork_asm+0x1a/0x30
[   25.067495]  </TASK>
[   25.067495] 
[   25.067495] The buggy address belongs to the physical page:
[   25.067495] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b10
[   25.067495] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.067495] flags: 0x200000000000040(head|node=0|zone=2)
[   25.067495] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.067495] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   25.067495] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.067495] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   25.067495] head: 0200000000000002 ffffea00040ac401 ffffffffffffffff 0000000000000000
[   25.067495] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   25.067495] page dumped because: kasan: bad access detected
[   25.067495] 
[   25.067495] Memory state around the buggy address:
[   25.067495]  ffff888102b11f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.067495]  ffff888102b12000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.067495] >ffff888102b12080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   25.067495]                                                           ^
[   25.067495]  ffff888102b12100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.067495]  ffff888102b12180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   25.067495] ==================================================================
[   24.986650] ==================================================================
[   24.987292] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe25/0x11d0
[   24.987292] Write of size 1 at addr ffff888102b120d0 by task kunit_try_catch/171
[   24.987292] 
[   24.987292] CPU: 1 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   24.987292] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.987292] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.987292] Call Trace:
[   24.987292]  <TASK>
[   24.987292]  dump_stack_lvl+0x73/0xb0
[   24.987292]  print_report+0xd1/0x640
[   24.987292]  ? __virt_addr_valid+0x1db/0x2d0
[   24.987292]  ? kasan_addr_to_slab+0x11/0xa0
[   24.987292]  kasan_report+0x102/0x140
[   24.987292]  ? krealloc_less_oob_helper+0xe25/0x11d0
[   24.987292]  ? krealloc_less_oob_helper+0xe25/0x11d0
[   24.987292]  __asan_report_store1_noabort+0x1b/0x30
[   24.987292]  krealloc_less_oob_helper+0xe25/0x11d0
[   24.987292]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   24.987292]  ? __switch_to+0x5d9/0xf60
[   24.987292]  ? __schedule+0xc3e/0x2790
[   24.987292]  krealloc_large_less_oob+0x1c/0x30
[   24.987292]  kunit_try_run_case+0x1b3/0x490
[   24.987292]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.987292]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.987292]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.987292]  ? __kthread_parkme+0x82/0x160
[   24.987292]  ? preempt_count_sub+0x50/0x80
[   24.987292]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.987292]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.987292]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.987292]  kthread+0x257/0x310
[   24.987292]  ? __pfx_kthread+0x10/0x10
[   24.987292]  ret_from_fork+0x41/0x80
[   24.987292]  ? __pfx_kthread+0x10/0x10
[   24.987292]  ret_from_fork_asm+0x1a/0x30
[   24.987292]  </TASK>
[   24.987292] 
[   24.987292] The buggy address belongs to the physical page:
[   24.987292] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b10
[   24.987292] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.987292] flags: 0x200000000000040(head|node=0|zone=2)
[   24.987292] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   24.987292] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   24.987292] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   24.987292] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   24.987292] head: 0200000000000002 ffffea00040ac401 ffffffffffffffff 0000000000000000
[   24.987292] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   24.987292] page dumped because: kasan: bad access detected
[   24.987292] 
[   24.987292] Memory state around the buggy address:
[   24.987292]  ffff888102b11f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.987292]  ffff888102b12000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.987292] >ffff888102b12080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   24.987292]                                                  ^
[   24.987292]  ffff888102b12100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.987292]  ffff888102b12180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.987292] ==================================================================
[   24.513382] ==================================================================
[   24.514355] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd72/0x11d0
[   24.515193] Write of size 1 at addr ffff888100aa9ac9 by task kunit_try_catch/165
[   24.516747] 
[   24.517527] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   24.518089] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.519005] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.520136] Call Trace:
[   24.520822]  <TASK>
[   24.521589]  dump_stack_lvl+0x73/0xb0
[   24.522671]  print_report+0xd1/0x640
[   24.523073]  ? __virt_addr_valid+0x1db/0x2d0
[   24.523785]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.524557]  kasan_report+0x102/0x140
[   24.524880]  ? krealloc_less_oob_helper+0xd72/0x11d0
[   24.525564]  ? krealloc_less_oob_helper+0xd72/0x11d0
[   24.526472]  __asan_report_store1_noabort+0x1b/0x30
[   24.526966]  krealloc_less_oob_helper+0xd72/0x11d0
[   24.527402]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   24.528384]  ? finish_task_switch.isra.0+0x153/0x700
[   24.528833]  ? __switch_to+0x5d9/0xf60
[   24.529533]  ? __schedule+0xc3e/0x2790
[   24.530554]  ? __pfx_read_tsc+0x10/0x10
[   24.531097]  krealloc_less_oob+0x1c/0x30
[   24.531844]  kunit_try_run_case+0x1b3/0x490
[   24.532321]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.533379]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.534209]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.535080]  ? __kthread_parkme+0x82/0x160
[   24.535758]  ? preempt_count_sub+0x50/0x80
[   24.536450]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.536662]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.537950]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.538532]  kthread+0x257/0x310
[   24.538787]  ? __pfx_kthread+0x10/0x10
[   24.539159]  ret_from_fork+0x41/0x80
[   24.539547]  ? __pfx_kthread+0x10/0x10
[   24.539865]  ret_from_fork_asm+0x1a/0x30
[   24.540198]  </TASK>
[   24.540387] 
[   24.540914] Allocated by task 165:
[   24.541507]  kasan_save_stack+0x3d/0x60
[   24.541894]  kasan_save_track+0x18/0x40
[   24.542903]  kasan_save_alloc_info+0x3b/0x50
[   24.543622]  __kasan_krealloc+0x190/0x1f0
[   24.543943]  krealloc_noprof+0xf3/0x340
[   24.544734]  krealloc_less_oob_helper+0x1ab/0x11d0
[   24.545396]  krealloc_less_oob+0x1c/0x30
[   24.545851]  kunit_try_run_case+0x1b3/0x490
[   24.546022]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.547095]  kthread+0x257/0x310
[   24.547499]  ret_from_fork+0x41/0x80
[   24.548136]  ret_from_fork_asm+0x1a/0x30
[   24.548833] 
[   24.549381] The buggy address belongs to the object at ffff888100aa9a00
[   24.549381]  which belongs to the cache kmalloc-256 of size 256
[   24.551020] The buggy address is located 0 bytes to the right of
[   24.551020]  allocated 201-byte region [ffff888100aa9a00, ffff888100aa9ac9)
[   24.551821] 
[   24.552061] The buggy address belongs to the physical page:
[   24.552526] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aa8
[   24.553397] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.554440] flags: 0x200000000000040(head|node=0|zone=2)
[   24.555407] page_type: f5(slab)
[   24.555825] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   24.556781] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   24.557571] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   24.558300] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   24.560054] head: 0200000000000001 ffffea000402aa01 ffffffffffffffff 0000000000000000
[   24.560438] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   24.561272] page dumped because: kasan: bad access detected
[   24.562428] 
[   24.562587] Memory state around the buggy address:
[   24.562876]  ffff888100aa9980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.563948]  ffff888100aa9a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.565737] >ffff888100aa9a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   24.566244]                                               ^
[   24.566781]  ffff888100aa9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.568566]  ffff888100aa9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.569122] ==================================================================
[   24.626928] ==================================================================
[   24.627620] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec8/0x11d0
[   24.628533] Write of size 1 at addr ffff888100aa9ada by task kunit_try_catch/165
[   24.629634] 
[   24.629934] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   24.630588] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.631414] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.632129] Call Trace:
[   24.632452]  <TASK>
[   24.632774]  dump_stack_lvl+0x73/0xb0
[   24.633152]  print_report+0xd1/0x640
[   24.633446]  ? __virt_addr_valid+0x1db/0x2d0
[   24.636043]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.636613]  kasan_report+0x102/0x140
[   24.638777]  ? krealloc_less_oob_helper+0xec8/0x11d0
[   24.639387]  ? krealloc_less_oob_helper+0xec8/0x11d0
[   24.639912]  __asan_report_store1_noabort+0x1b/0x30
[   24.640521]  krealloc_less_oob_helper+0xec8/0x11d0
[   24.641860]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   24.642956]  ? finish_task_switch.isra.0+0x153/0x700
[   24.644007]  ? __switch_to+0x5d9/0xf60
[   24.645161]  ? __schedule+0xc3e/0x2790
[   24.645718]  ? __pfx_read_tsc+0x10/0x10
[   24.646253]  krealloc_less_oob+0x1c/0x30
[   24.647524]  kunit_try_run_case+0x1b3/0x490
[   24.648934]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.649488]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.649847]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.650465]  ? __kthread_parkme+0x82/0x160
[   24.650874]  ? preempt_count_sub+0x50/0x80
[   24.651314]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.652059]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.652772]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.653802]  kthread+0x257/0x310
[   24.654273]  ? __pfx_kthread+0x10/0x10
[   24.654835]  ret_from_fork+0x41/0x80
[   24.655351]  ? __pfx_kthread+0x10/0x10
[   24.656118]  ret_from_fork_asm+0x1a/0x30
[   24.656720]  </TASK>
[   24.657127] 
[   24.657384] Allocated by task 165:
[   24.657900]  kasan_save_stack+0x3d/0x60
[   24.658483]  kasan_save_track+0x18/0x40
[   24.659028]  kasan_save_alloc_info+0x3b/0x50
[   24.659518]  __kasan_krealloc+0x190/0x1f0
[   24.660110]  krealloc_noprof+0xf3/0x340
[   24.660776]  krealloc_less_oob_helper+0x1ab/0x11d0
[   24.661409]  krealloc_less_oob+0x1c/0x30
[   24.661996]  kunit_try_run_case+0x1b3/0x490
[   24.662612]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.663393]  kthread+0x257/0x310
[   24.663938]  ret_from_fork+0x41/0x80
[   24.664588]  ret_from_fork_asm+0x1a/0x30
[   24.665147] 
[   24.665439] The buggy address belongs to the object at ffff888100aa9a00
[   24.665439]  which belongs to the cache kmalloc-256 of size 256
[   24.667031] The buggy address is located 17 bytes to the right of
[   24.667031]  allocated 201-byte region [ffff888100aa9a00, ffff888100aa9ac9)
[   24.667837] clocksource: timekeeping watchdog on CPU0: Marking clocksource 'tsc' as unstable because the skew is too large:
[   24.668285] 
[   24.668447] The buggy address belongs to the physical page:
[   24.668531] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100aa8
[   24.668613] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.668728] flags: 0x200000000000040(head|node=0|zone=2)
[   24.668801] page_type: f5(slab)
[   24.668876] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   24.668959] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   24.670614] clocksource:                       'hpet' wd_nsec: 464547490 wd_now: 78733987 wd_last: 75ae61aa mask: ffffffff
[   24.670932] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   24.671004] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   24.671066] head: 0200000000000001 ffffea000402aa01 ffffffffffffffff 0000000000000000
[   24.673242] clocksource:                       'tsc' cs_nsec: 465236277 cs_now: 1378f8626a cs_last: 1325c7b18e mask: ffffffffffffffff
[   24.676131] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   24.676206] page dumped because: kasan: bad access detected
[   24.676246] 
[   24.676267] Memory state around the buggy address:
[   24.676399]  ffff888100aa9980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.680027] clocksource:                       Clocksource 'tsc' skewed 688787 ns (0 ms) over watchdog 'hpet' interval of 464547490 ns (464 ms)
[   24.680313] clocksource:                       'tsc' is current clocksource.
[   24.681002]  ffff888100aa9a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.681076] >ffff888100aa9a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   24.681121]                                                     ^
[   24.681192]  ffff888100aa9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.681266]  ffff888100aa9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.681320] ==================================================================

[   20.031318] ==================================================================
[   20.031748] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe25/0x11d0
[   20.032450] Write of size 1 at addr ffff888102a1e0d0 by task kunit_try_catch/169
[   20.033191] 
[   20.033718] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   20.034600] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.035015] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.035790] Call Trace:
[   20.035967]  <TASK>
[   20.036238]  dump_stack_lvl+0x73/0xb0
[   20.036991]  print_report+0xd1/0x640
[   20.038058]  ? __virt_addr_valid+0x1db/0x2d0
[   20.038417]  ? kasan_addr_to_slab+0x11/0xa0
[   20.038820]  kasan_report+0x102/0x140
[   20.039099]  ? krealloc_less_oob_helper+0xe25/0x11d0
[   20.039422]  ? krealloc_less_oob_helper+0xe25/0x11d0
[   20.040004]  __asan_report_store1_noabort+0x1b/0x30
[   20.040611]  krealloc_less_oob_helper+0xe25/0x11d0
[   20.041169]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   20.041809]  ? finish_task_switch.isra.0+0x153/0x700
[   20.042350]  ? __switch_to+0x5d9/0xf60
[   20.042908]  ? __schedule+0xc3e/0x2790
[   20.043385]  ? __pfx_read_tsc+0x10/0x10
[   20.043774]  krealloc_large_less_oob+0x1c/0x30
[   20.044322]  kunit_try_run_case+0x1b3/0x490
[   20.044786]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.045281]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   20.045848]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.046196]  ? __kthread_parkme+0x82/0x160
[   20.046509]  ? preempt_count_sub+0x50/0x80
[   20.047047]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.047650]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.048267]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.048792]  kthread+0x257/0x310
[   20.049225]  ? __pfx_kthread+0x10/0x10
[   20.049623]  ret_from_fork+0x41/0x80
[   20.049909]  ? __pfx_kthread+0x10/0x10
[   20.050191]  ret_from_fork_asm+0x1a/0x30
[   20.050763]  </TASK>
[   20.051090] 
[   20.051343] The buggy address belongs to the physical page:
[   20.051947] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1c
[   20.052743] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.053308] flags: 0x200000000000040(head|node=0|zone=2)
[   20.053882] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   20.054292] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.054910] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   20.055704] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.056390] head: 0200000000000002 ffffea00040a8701 ffffffffffffffff 0000000000000000
[   20.057099] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   20.057716] page dumped because: kasan: bad access detected
[   20.058260] 
[   20.058429] Memory state around the buggy address:
[   20.058947]  ffff888102a1df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.059318]  ffff888102a1e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.059981] >ffff888102a1e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   20.060695]                                                  ^
[   20.061196]  ffff888102a1e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.061748]  ffff888102a1e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.062127] ==================================================================
[   19.775340] ==================================================================
[   19.776157] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec8/0x11d0
[   19.776972] Write of size 1 at addr ffff8881003976da by task kunit_try_catch/165
[   19.778581] 
[   19.778836] CPU: 0 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   19.779446] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.779974] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.780414] Call Trace:
[   19.780724]  <TASK>
[   19.781080]  dump_stack_lvl+0x73/0xb0
[   19.781523]  print_report+0xd1/0x640
[   19.781952]  ? __virt_addr_valid+0x1db/0x2d0
[   19.782379]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.783068]  kasan_report+0x102/0x140
[   19.783407]  ? krealloc_less_oob_helper+0xec8/0x11d0
[   19.783762]  ? krealloc_less_oob_helper+0xec8/0x11d0
[   19.784096]  __asan_report_store1_noabort+0x1b/0x30
[   19.784430]  krealloc_less_oob_helper+0xec8/0x11d0
[   19.784957]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   19.785703]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   19.786229]  ? __pfx_krealloc_less_oob+0x10/0x10
[   19.786758]  krealloc_less_oob+0x1c/0x30
[   19.787198]  kunit_try_run_case+0x1b3/0x490
[   19.787622]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.788011]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   19.788321]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.788716]  ? __kthread_parkme+0x82/0x160
[   19.789149]  ? preempt_count_sub+0x50/0x80
[   19.789634]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.790134]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.790782]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.791311]  kthread+0x257/0x310
[   19.791602]  ? __pfx_kthread+0x10/0x10
[   19.792047]  ret_from_fork+0x41/0x80
[   19.792442]  ? __pfx_kthread+0x10/0x10
[   19.792917]  ret_from_fork_asm+0x1a/0x30
[   19.793334]  </TASK>
[   19.793552] 
[   19.793710] Allocated by task 165:
[   19.794018]  kasan_save_stack+0x3d/0x60
[   19.794465]  kasan_save_track+0x18/0x40
[   19.794959]  kasan_save_alloc_info+0x3b/0x50
[   19.795446]  __kasan_krealloc+0x190/0x1f0
[   19.796005]  krealloc_noprof+0xf3/0x340
[   19.796316]  krealloc_less_oob_helper+0x1ab/0x11d0
[   19.796845]  krealloc_less_oob+0x1c/0x30
[   19.797115]  kunit_try_run_case+0x1b3/0x490
[   19.797396]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.797738]  kthread+0x257/0x310
[   19.797981]  ret_from_fork+0x41/0x80
[   19.798400]  ret_from_fork_asm+0x1a/0x30
[   19.798843] 
[   19.799120] The buggy address belongs to the object at ffff888100397600
[   19.799120]  which belongs to the cache kmalloc-256 of size 256
[   19.800361] The buggy address is located 17 bytes to the right of
[   19.800361]  allocated 201-byte region [ffff888100397600, ffff8881003976c9)
[   19.801796] 
[   19.801970] The buggy address belongs to the physical page:
[   19.802264] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100396
[   19.803049] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.803474] flags: 0x200000000000040(head|node=0|zone=2)
[   19.804030] page_type: f5(slab)
[   19.804381] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   19.805204] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   19.805635] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   19.806027] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   19.806433] head: 0200000000000001 ffffea000400e581 ffffffffffffffff 0000000000000000
[   19.807246] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   19.808065] page dumped because: kasan: bad access detected
[   19.808609] 
[   19.808832] Memory state around the buggy address:
[   19.809284]  ffff888100397580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.810061]  ffff888100397600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.812766] >ffff888100397680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.813210]                                                     ^
[   19.813563]  ffff888100397700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.814200]  ffff888100397780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.817006] ==================================================================
[   19.822398] ==================================================================
[   19.823206] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe92/0x11d0
[   19.824369] Write of size 1 at addr ffff8881003976ea by task kunit_try_catch/165
[   19.825123] 
[   19.825427] CPU: 0 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   19.826260] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.826587] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.827236] Call Trace:
[   19.827455]  <TASK>
[   19.827721]  dump_stack_lvl+0x73/0xb0
[   19.828175]  print_report+0xd1/0x640
[   19.828628]  ? __virt_addr_valid+0x1db/0x2d0
[   19.829097]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.829441]  kasan_report+0x102/0x140
[   19.829978]  ? krealloc_less_oob_helper+0xe92/0x11d0
[   19.830507]  ? krealloc_less_oob_helper+0xe92/0x11d0
[   19.830969]  __asan_report_store1_noabort+0x1b/0x30
[   19.831458]  krealloc_less_oob_helper+0xe92/0x11d0
[   19.831995]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   19.832439]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   19.832896]  ? __pfx_krealloc_less_oob+0x10/0x10
[   19.833442]  krealloc_less_oob+0x1c/0x30
[   19.833886]  kunit_try_run_case+0x1b3/0x490
[   19.834231]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.834757]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   19.835224]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.835583]  ? __kthread_parkme+0x82/0x160
[   19.836058]  ? preempt_count_sub+0x50/0x80
[   19.836541]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.837046]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.837477]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.837848]  kthread+0x257/0x310
[   19.838125]  ? __pfx_kthread+0x10/0x10
[   19.838402]  ret_from_fork+0x41/0x80
[   19.838834]  ? __pfx_kthread+0x10/0x10
[   19.839257]  ret_from_fork_asm+0x1a/0x30
[   19.839880]  </TASK>
[   19.840151] 
[   19.840370] Allocated by task 165:
[   19.840749]  kasan_save_stack+0x3d/0x60
[   19.841173]  kasan_save_track+0x18/0x40
[   19.841614]  kasan_save_alloc_info+0x3b/0x50
[   19.842074]  __kasan_krealloc+0x190/0x1f0
[   19.845307]  krealloc_noprof+0xf3/0x340
[   19.845857]  krealloc_less_oob_helper+0x1ab/0x11d0
[   19.846272]  krealloc_less_oob+0x1c/0x30
[   19.846572]  kunit_try_run_case+0x1b3/0x490
[   19.847017]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.848523]  kthread+0x257/0x310
[   19.849540]  ret_from_fork+0x41/0x80
[   19.850007]  ret_from_fork_asm+0x1a/0x30
[   19.850450] 
[   19.851273] The buggy address belongs to the object at ffff888100397600
[   19.851273]  which belongs to the cache kmalloc-256 of size 256
[   19.852482] The buggy address is located 33 bytes to the right of
[   19.852482]  allocated 201-byte region [ffff888100397600, ffff8881003976c9)
[   19.854195] 
[   19.854356] The buggy address belongs to the physical page:
[   19.854870] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100396
[   19.855560] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.856590] flags: 0x200000000000040(head|node=0|zone=2)
[   19.857163] page_type: f5(slab)
[   19.857552] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   19.858152] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   19.858677] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   19.859702] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   19.860465] head: 0200000000000001 ffffea000400e581 ffffffffffffffff 0000000000000000
[   19.861008] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   19.861387] page dumped because: kasan: bad access detected
[   19.861951] 
[   19.862186] Memory state around the buggy address:
[   19.862532]  ffff888100397580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.863059]  ffff888100397600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.863639] >ffff888100397680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.864423]                                                           ^
[   19.865089]  ffff888100397700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.866374]  ffff888100397780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.866880] ==================================================================
[   20.098941] ==================================================================
[   20.099360] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe92/0x11d0
[   20.100614] Write of size 1 at addr ffff888102a1e0ea by task kunit_try_catch/169
[   20.101257] 
[   20.101525] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   20.102289] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.102563] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.103428] Call Trace:
[   20.103829]  <TASK>
[   20.104131]  dump_stack_lvl+0x73/0xb0
[   20.104641]  print_report+0xd1/0x640
[   20.105108]  ? __virt_addr_valid+0x1db/0x2d0
[   20.105714]  ? kasan_addr_to_slab+0x11/0xa0
[   20.106222]  kasan_report+0x102/0x140
[   20.106743]  ? krealloc_less_oob_helper+0xe92/0x11d0
[   20.107297]  ? krealloc_less_oob_helper+0xe92/0x11d0
[   20.108019]  __asan_report_store1_noabort+0x1b/0x30
[   20.108615]  krealloc_less_oob_helper+0xe92/0x11d0
[   20.109237]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   20.109681]  ? finish_task_switch.isra.0+0x153/0x700
[   20.110236]  ? __switch_to+0x5d9/0xf60
[   20.110761]  ? __schedule+0xc3e/0x2790
[   20.111220]  ? __pfx_read_tsc+0x10/0x10
[   20.111754]  krealloc_large_less_oob+0x1c/0x30
[   20.112102]  kunit_try_run_case+0x1b3/0x490
[   20.112387]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.112704]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   20.113179]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.113608]  ? __kthread_parkme+0x82/0x160
[   20.114074]  ? preempt_count_sub+0x50/0x80
[   20.114448]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.114884]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.115390]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.115992]  kthread+0x257/0x310
[   20.116298]  ? __pfx_kthread+0x10/0x10
[   20.116771]  ret_from_fork+0x41/0x80
[   20.117160]  ? __pfx_kthread+0x10/0x10
[   20.117452]  ret_from_fork_asm+0x1a/0x30
[   20.117972]  </TASK>
[   20.118202] 
[   20.118359] The buggy address belongs to the physical page:
[   20.118730] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1c
[   20.119283] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.119990] flags: 0x200000000000040(head|node=0|zone=2)
[   20.120547] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   20.121075] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.121709] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   20.122229] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.122842] head: 0200000000000002 ffffea00040a8701 ffffffffffffffff 0000000000000000
[   20.123409] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   20.124121] page dumped because: kasan: bad access detected
[   20.124422] 
[   20.124691] Memory state around the buggy address:
[   20.125801]  ffff888102a1df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.126358]  ffff888102a1e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.127067] >ffff888102a1e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   20.127429]                                                           ^
[   20.128047]  ffff888102a1e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.128771]  ffff888102a1e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.129401] ==================================================================
[   19.868356] ==================================================================
[   19.869103] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd49/0x11d0
[   19.869744] Write of size 1 at addr ffff8881003976eb by task kunit_try_catch/165
[   19.870977] 
[   19.871237] CPU: 0 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   19.872739] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.873159] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.873738] Call Trace:
[   19.874065]  <TASK>
[   19.874329]  dump_stack_lvl+0x73/0xb0
[   19.875184]  print_report+0xd1/0x640
[   19.875671]  ? __virt_addr_valid+0x1db/0x2d0
[   19.876546]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.877309]  kasan_report+0x102/0x140
[   19.877944]  ? krealloc_less_oob_helper+0xd49/0x11d0
[   19.878406]  ? krealloc_less_oob_helper+0xd49/0x11d0
[   19.879260]  __asan_report_store1_noabort+0x1b/0x30
[   19.879837]  krealloc_less_oob_helper+0xd49/0x11d0
[   19.880284]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   19.880755]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   19.881211]  ? __pfx_krealloc_less_oob+0x10/0x10
[   19.881770]  krealloc_less_oob+0x1c/0x30
[   19.882241]  kunit_try_run_case+0x1b3/0x490
[   19.882612]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.883090]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   19.883695]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.884154]  ? __kthread_parkme+0x82/0x160
[   19.884710]  ? preempt_count_sub+0x50/0x80
[   19.885203]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.885758]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.886295]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.886884]  kthread+0x257/0x310
[   19.887294]  ? __pfx_kthread+0x10/0x10
[   19.887854]  ret_from_fork+0x41/0x80
[   19.888201]  ? __pfx_kthread+0x10/0x10
[   19.888676]  ret_from_fork_asm+0x1a/0x30
[   19.889144]  </TASK>
[   19.889463] 
[   19.889753] Allocated by task 165:
[   19.890091]  kasan_save_stack+0x3d/0x60
[   19.890534]  kasan_save_track+0x18/0x40
[   19.890941]  kasan_save_alloc_info+0x3b/0x50
[   19.891450]  __kasan_krealloc+0x190/0x1f0
[   19.891941]  krealloc_noprof+0xf3/0x340
[   19.892360]  krealloc_less_oob_helper+0x1ab/0x11d0
[   19.892918]  krealloc_less_oob+0x1c/0x30
[   19.893394]  kunit_try_run_case+0x1b3/0x490
[   19.893899]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.894329]  kthread+0x257/0x310
[   19.894716]  ret_from_fork+0x41/0x80
[   19.895224]  ret_from_fork_asm+0x1a/0x30
[   19.895732] 
[   19.895957] The buggy address belongs to the object at ffff888100397600
[   19.895957]  which belongs to the cache kmalloc-256 of size 256
[   19.897038] The buggy address is located 34 bytes to the right of
[   19.897038]  allocated 201-byte region [ffff888100397600, ffff8881003976c9)
[   19.897992] 
[   19.898251] The buggy address belongs to the physical page:
[   19.898775] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100396
[   19.899185] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.899668] flags: 0x200000000000040(head|node=0|zone=2)
[   19.900260] page_type: f5(slab)
[   19.900698] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   19.901400] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   19.902169] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   19.902848] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   19.903367] head: 0200000000000001 ffffea000400e581 ffffffffffffffff 0000000000000000
[   19.904126] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   19.904735] page dumped because: kasan: bad access detected
[   19.905329] 
[   19.905561] Memory state around the buggy address:
[   19.905970]  ffff888100397580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.906450]  ffff888100397600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.906976] >ffff888100397680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.907658]                                                           ^
[   19.908235]  ffff888100397700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.908931]  ffff888100397780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.909573] ==================================================================
[   20.063331] ==================================================================
[   20.065370] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec8/0x11d0
[   20.066162] Write of size 1 at addr ffff888102a1e0da by task kunit_try_catch/169
[   20.066906] 
[   20.067163] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   20.068111] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.068558] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.069189] Call Trace:
[   20.069528]  <TASK>
[   20.069835]  dump_stack_lvl+0x73/0xb0
[   20.070276]  print_report+0xd1/0x640
[   20.070796]  ? __virt_addr_valid+0x1db/0x2d0
[   20.071223]  ? kasan_addr_to_slab+0x11/0xa0
[   20.071747]  kasan_report+0x102/0x140
[   20.072135]  ? krealloc_less_oob_helper+0xec8/0x11d0
[   20.073258]  ? krealloc_less_oob_helper+0xec8/0x11d0
[   20.074282]  __asan_report_store1_noabort+0x1b/0x30
[   20.074795]  krealloc_less_oob_helper+0xec8/0x11d0
[   20.075290]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   20.076033]  ? finish_task_switch.isra.0+0x153/0x700
[   20.076388]  ? __switch_to+0x5d9/0xf60
[   20.076919]  ? __schedule+0xc3e/0x2790
[   20.077281]  ? __pfx_read_tsc+0x10/0x10
[   20.077644]  krealloc_large_less_oob+0x1c/0x30
[   20.077962]  kunit_try_run_case+0x1b3/0x490
[   20.078455]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.079022]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   20.079526]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.080114]  ? __kthread_parkme+0x82/0x160
[   20.080620]  ? preempt_count_sub+0x50/0x80
[   20.081123]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.081670]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.082171]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.082809]  kthread+0x257/0x310
[   20.083106]  ? __pfx_kthread+0x10/0x10
[   20.083632]  ret_from_fork+0x41/0x80
[   20.083931]  ? __pfx_kthread+0x10/0x10
[   20.084208]  ret_from_fork_asm+0x1a/0x30
[   20.084770]  </TASK>
[   20.085055] 
[   20.085366] The buggy address belongs to the physical page:
[   20.085980] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1c
[   20.086627] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.087082] flags: 0x200000000000040(head|node=0|zone=2)
[   20.087752] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   20.088231] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.088963] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   20.089635] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.090153] head: 0200000000000002 ffffea00040a8701 ffffffffffffffff 0000000000000000
[   20.090570] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   20.091000] page dumped because: kasan: bad access detected
[   20.091302] 
[   20.091455] Memory state around the buggy address:
[   20.092008]  ffff888102a1df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.092694]  ffff888102a1e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.093328] >ffff888102a1e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   20.093967]                                                     ^
[   20.096053]  ffff888102a1e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.096777]  ffff888102a1e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.097328] ==================================================================
[   19.684572] ==================================================================
[   19.685593] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd72/0x11d0
[   19.686442] Write of size 1 at addr ffff8881003976c9 by task kunit_try_catch/165
[   19.687122] 
[   19.687409] CPU: 0 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   19.688439] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.688925] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.690012] Call Trace:
[   19.690288]  <TASK>
[   19.690559]  dump_stack_lvl+0x73/0xb0
[   19.690864]  print_report+0xd1/0x640
[   19.691333]  ? __virt_addr_valid+0x1db/0x2d0
[   19.691836]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.693176]  kasan_report+0x102/0x140
[   19.693644]  ? krealloc_less_oob_helper+0xd72/0x11d0
[   19.694307]  ? krealloc_less_oob_helper+0xd72/0x11d0
[   19.694822]  __asan_report_store1_noabort+0x1b/0x30
[   19.695756]  krealloc_less_oob_helper+0xd72/0x11d0
[   19.696270]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   19.696821]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   19.697781]  ? __pfx_krealloc_less_oob+0x10/0x10
[   19.698523]  krealloc_less_oob+0x1c/0x30
[   19.698975]  kunit_try_run_case+0x1b3/0x490
[   19.700127]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.700441]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   19.701291]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.701605]  ? __kthread_parkme+0x82/0x160
[   19.702066]  ? preempt_count_sub+0x50/0x80
[   19.702535]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.702858]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.704209]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.704682]  kthread+0x257/0x310
[   19.705032]  ? __pfx_kthread+0x10/0x10
[   19.705419]  ret_from_fork+0x41/0x80
[   19.705723]  ? __pfx_kthread+0x10/0x10
[   19.706147]  ret_from_fork_asm+0x1a/0x30
[   19.706802]  </TASK>
[   19.707267] 
[   19.707644] Allocated by task 165:
[   19.708237]  kasan_save_stack+0x3d/0x60
[   19.708814]  kasan_save_track+0x18/0x40
[   19.709441]  kasan_save_alloc_info+0x3b/0x50
[   19.710266]  __kasan_krealloc+0x190/0x1f0
[   19.710844]  krealloc_noprof+0xf3/0x340
[   19.711503]  krealloc_less_oob_helper+0x1ab/0x11d0
[   19.712294]  krealloc_less_oob+0x1c/0x30
[   19.712847]  kunit_try_run_case+0x1b3/0x490
[   19.713557]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.714409]  kthread+0x257/0x310
[   19.714910]  ret_from_fork+0x41/0x80
[   19.715591]  ret_from_fork_asm+0x1a/0x30
[   19.716285] 
[   19.716609] The buggy address belongs to the object at ffff888100397600
[   19.716609]  which belongs to the cache kmalloc-256 of size 256
[   19.718699] The buggy address is located 0 bytes to the right of
[   19.718699]  allocated 201-byte region [ffff888100397600, ffff8881003976c9)
[   19.719929] 
[   19.720430] The buggy address belongs to the physical page:
[   19.721761] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100396
[   19.722770] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.723724] flags: 0x200000000000040(head|node=0|zone=2)
[   19.724059] page_type: f5(slab)
[   19.724584] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   19.726031] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   19.726864] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   19.727629] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   19.728314] head: 0200000000000001 ffffea000400e581 ffffffffffffffff 0000000000000000
[   19.729017] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   19.730088] page dumped because: kasan: bad access detected
[   19.730523] 
[   19.730948] Memory state around the buggy address:
[   19.731406]  ffff888100397580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.731973]  ffff888100397600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.732564] >ffff888100397680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.733278]                                               ^
[   19.734329]  ffff888100397700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.734773]  ffff888100397780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.735193] ==================================================================
[   19.738837] ==================================================================
[   19.739766] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe25/0x11d0
[   19.740248] Write of size 1 at addr ffff8881003976d0 by task kunit_try_catch/165
[   19.740907] 
[   19.741138] CPU: 0 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   19.741816] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.742277] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.742965] Call Trace:
[   19.743269]  <TASK>
[   19.743475]  dump_stack_lvl+0x73/0xb0
[   19.743950]  print_report+0xd1/0x640
[   19.744354]  ? __virt_addr_valid+0x1db/0x2d0
[   19.744697]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.745040]  kasan_report+0x102/0x140
[   19.745624]  ? krealloc_less_oob_helper+0xe25/0x11d0
[   19.746139]  ? krealloc_less_oob_helper+0xe25/0x11d0
[   19.746689]  __asan_report_store1_noabort+0x1b/0x30
[   19.747178]  krealloc_less_oob_helper+0xe25/0x11d0
[   19.747585]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   19.748109]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   19.748634]  ? __pfx_krealloc_less_oob+0x10/0x10
[   19.748974]  krealloc_less_oob+0x1c/0x30
[   19.749266]  kunit_try_run_case+0x1b3/0x490
[   19.749601]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.750101]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   19.750696]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.751192]  ? __kthread_parkme+0x82/0x160
[   19.751661]  ? preempt_count_sub+0x50/0x80
[   19.752113]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.752473]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.753030]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.753372]  kthread+0x257/0x310
[   19.753653]  ? __pfx_kthread+0x10/0x10
[   19.754082]  ret_from_fork+0x41/0x80
[   19.754476]  ? __pfx_kthread+0x10/0x10
[   19.754904]  ret_from_fork_asm+0x1a/0x30
[   19.755396]  </TASK>
[   19.755643] 
[   19.755863] Allocated by task 165:
[   19.756216]  kasan_save_stack+0x3d/0x60
[   19.756652]  kasan_save_track+0x18/0x40
[   19.756952]  kasan_save_alloc_info+0x3b/0x50
[   19.757382]  __kasan_krealloc+0x190/0x1f0
[   19.757901]  krealloc_noprof+0xf3/0x340
[   19.758187]  krealloc_less_oob_helper+0x1ab/0x11d0
[   19.758507]  krealloc_less_oob+0x1c/0x30
[   19.758815]  kunit_try_run_case+0x1b3/0x490
[   19.759254]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.759791]  kthread+0x257/0x310
[   19.760110]  ret_from_fork+0x41/0x80
[   19.760427]  ret_from_fork_asm+0x1a/0x30
[   19.760955] 
[   19.761122] The buggy address belongs to the object at ffff888100397600
[   19.761122]  which belongs to the cache kmalloc-256 of size 256
[   19.762243] The buggy address is located 7 bytes to the right of
[   19.762243]  allocated 201-byte region [ffff888100397600, ffff8881003976c9)
[   19.762832] 
[   19.762997] The buggy address belongs to the physical page:
[   19.763293] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100396
[   19.763915] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.764598] flags: 0x200000000000040(head|node=0|zone=2)
[   19.765323] page_type: f5(slab)
[   19.765729] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   19.766416] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   19.767296] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   19.767839] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   19.768387] head: 0200000000000001 ffffea000400e581 ffffffffffffffff 0000000000000000
[   19.769045] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   19.769653] page dumped because: kasan: bad access detected
[   19.769950] 
[   19.770110] Memory state around the buggy address:
[   19.770560]  ffff888100397580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.771282]  ffff888100397600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.772036] >ffff888100397680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.772509]                                                  ^
[   19.773230]  ffff888100397700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.773625]  ffff888100397780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.773986] ==================================================================
[   20.130388] ==================================================================
[   20.131849] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd49/0x11d0
[   20.132809] Write of size 1 at addr ffff888102a1e0eb by task kunit_try_catch/169
[   20.133427] 
[   20.133681] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   20.134388] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.134893] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.135751] Call Trace:
[   20.136096]  <TASK>
[   20.136385]  dump_stack_lvl+0x73/0xb0
[   20.136828]  print_report+0xd1/0x640
[   20.137253]  ? __virt_addr_valid+0x1db/0x2d0
[   20.137713]  ? kasan_addr_to_slab+0x11/0xa0
[   20.138018]  kasan_report+0x102/0x140
[   20.138312]  ? krealloc_less_oob_helper+0xd49/0x11d0
[   20.138915]  ? krealloc_less_oob_helper+0xd49/0x11d0
[   20.139450]  __asan_report_store1_noabort+0x1b/0x30
[   20.140014]  krealloc_less_oob_helper+0xd49/0x11d0
[   20.140617]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   20.141137]  ? finish_task_switch.isra.0+0x153/0x700
[   20.141707]  ? __switch_to+0x5d9/0xf60
[   20.142006]  ? __schedule+0xc3e/0x2790
[   20.142441]  ? __pfx_read_tsc+0x10/0x10
[   20.142991]  krealloc_large_less_oob+0x1c/0x30
[   20.143525]  kunit_try_run_case+0x1b3/0x490
[   20.143949]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.144266]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   20.144669]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.145245]  ? __kthread_parkme+0x82/0x160
[   20.145773]  ? preempt_count_sub+0x50/0x80
[   20.146236]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.146827]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.147392]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.147814]  kthread+0x257/0x310
[   20.148243]  ? __pfx_kthread+0x10/0x10
[   20.148753]  ret_from_fork+0x41/0x80
[   20.149169]  ? __pfx_kthread+0x10/0x10
[   20.149697]  ret_from_fork_asm+0x1a/0x30
[   20.150187]  </TASK>
[   20.150379] 
[   20.150559] The buggy address belongs to the physical page:
[   20.151148] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1c
[   20.151860] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.152383] flags: 0x200000000000040(head|node=0|zone=2)
[   20.152971] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   20.153686] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.154091] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   20.154658] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.155074] head: 0200000000000002 ffffea00040a8701 ffffffffffffffff 0000000000000000
[   20.156894] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   20.157586] page dumped because: kasan: bad access detected
[   20.158105] 
[   20.158324] Memory state around the buggy address:
[   20.158892]  ffff888102a1df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.159617]  ffff888102a1e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.160179] >ffff888102a1e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   20.160566]                                                           ^
[   20.160980]  ffff888102a1e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.161721]  ffff888102a1e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.162410] ==================================================================
[   19.995842] ==================================================================
[   19.996748] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd72/0x11d0
[   19.997425] Write of size 1 at addr ffff888102a1e0c9 by task kunit_try_catch/169
[   19.997952] 
[   19.998406] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   19.999439] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.999684] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.000376] Call Trace:
[   20.000721]  <TASK>
[   20.001012]  dump_stack_lvl+0x73/0xb0
[   20.001374]  print_report+0xd1/0x640
[   20.001867]  ? __virt_addr_valid+0x1db/0x2d0
[   20.002393]  ? kasan_addr_to_slab+0x11/0xa0
[   20.002977]  kasan_report+0x102/0x140
[   20.003323]  ? krealloc_less_oob_helper+0xd72/0x11d0
[   20.003910]  ? krealloc_less_oob_helper+0xd72/0x11d0
[   20.004430]  __asan_report_store1_noabort+0x1b/0x30
[   20.005085]  krealloc_less_oob_helper+0xd72/0x11d0
[   20.006155]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   20.007511]  ? finish_task_switch.isra.0+0x153/0x700
[   20.008054]  ? __switch_to+0x5d9/0xf60
[   20.008405]  ? __schedule+0xc3e/0x2790
[   20.008858]  ? __pfx_read_tsc+0x10/0x10
[   20.009297]  krealloc_large_less_oob+0x1c/0x30
[   20.009862]  kunit_try_run_case+0x1b3/0x490
[   20.010249]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.010781]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   20.011151]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.011674]  ? __kthread_parkme+0x82/0x160
[   20.012023]  ? preempt_count_sub+0x50/0x80
[   20.012321]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.012763]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.013350]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.014037]  kthread+0x257/0x310
[   20.014435]  ? __pfx_kthread+0x10/0x10
[   20.014910]  ret_from_fork+0x41/0x80
[   20.015186]  ? __pfx_kthread+0x10/0x10
[   20.015709]  ret_from_fork_asm+0x1a/0x30
[   20.016172]  </TASK>
[   20.016449] 
[   20.016733] The buggy address belongs to the physical page:
[   20.017371] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a1c
[   20.018964] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.020173] flags: 0x200000000000040(head|node=0|zone=2)
[   20.020865] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   20.021729] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.022329] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   20.023217] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.023791] head: 0200000000000002 ffffea00040a8701 ffffffffffffffff 0000000000000000
[   20.024651] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   20.025061] page dumped because: kasan: bad access detected
[   20.025636] 
[   20.026279] Memory state around the buggy address:
[   20.026698]  ffff888102a1df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.027448]  ffff888102a1e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.028254] >ffff888102a1e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   20.028904]                                               ^
[   20.029529]  ffff888102a1e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.030061]  ffff888102a1e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.030288] ==================================================================