Hay
Date
Nov. 20, 2024, 6:35 a.m.
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[   43.371900] ==================================================================
[   43.373156] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   43.374003] Read of size 8 at addr fff00000c65cbf78 by task kunit_try_catch/270
[   43.375129] 
[   43.375514] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   43.376428] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.377015] Hardware name: linux,dummy-virt (DT)
[   43.378281] Call trace:
[   43.378964]  show_stack+0x20/0x38 (C)
[   43.380002]  dump_stack_lvl+0x8c/0xd0
[   43.380627]  print_report+0x118/0x5e0
[   43.381635]  kasan_report+0xc8/0x118
[   43.382145]  __asan_report_load8_noabort+0x20/0x30
[   43.383231]  copy_to_kernel_nofault+0x204/0x250
[   43.384011]  copy_to_kernel_nofault_oob+0x158/0x418
[   43.384765]  kunit_try_run_case+0x14c/0x3d0
[   43.385341]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.386030]  kthread+0x24c/0x2d0
[   43.387048]  ret_from_fork+0x10/0x20
[   43.387542] 
[   43.387902] Allocated by task 270:
[   43.388406]  kasan_save_stack+0x3c/0x68
[   43.388946]  kasan_save_track+0x20/0x40
[   43.390637]  kasan_save_alloc_info+0x40/0x58
[   43.391205]  __kasan_kmalloc+0xd4/0xd8
[   43.391790]  __kmalloc_cache_noprof+0x15c/0x3c8
[   43.392326]  copy_to_kernel_nofault_oob+0xc8/0x418
[   43.393004]  kunit_try_run_case+0x14c/0x3d0
[   43.394195]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.394880]  kthread+0x24c/0x2d0
[   43.395469]  ret_from_fork+0x10/0x20
[   43.395998] 
[   43.396383] The buggy address belongs to the object at fff00000c65cbf00
[   43.396383]  which belongs to the cache kmalloc-128 of size 128
[   43.397782] The buggy address is located 0 bytes to the right of
[   43.397782]  allocated 120-byte region [fff00000c65cbf00, fff00000c65cbf78)
[   43.399385] 
[   43.399737] The buggy address belongs to the physical page:
[   43.400437] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065cb
[   43.402306] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.402707] page_type: f5(slab)
[   43.402941] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   43.403310] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   43.404025] page dumped because: kasan: bad access detected
[   43.404604] 
[   43.404836] Memory state around the buggy address:
[   43.407522]  fff00000c65cbe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   43.408461]  fff00000c65cbe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.409123] >fff00000c65cbf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   43.410395]                                                                 ^
[   43.411204]  fff00000c65cbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.412185]  fff00000c65cc000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   43.413174] ==================================================================
[   43.416815] ==================================================================
[   43.417593] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   43.418632] Write of size 8 at addr fff00000c65cbf78 by task kunit_try_catch/270
[   43.419948] 
[   43.420411] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   43.421633] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.422184] Hardware name: linux,dummy-virt (DT)
[   43.422796] Call trace:
[   43.423197]  show_stack+0x20/0x38 (C)
[   43.424138]  dump_stack_lvl+0x8c/0xd0
[   43.424719]  print_report+0x118/0x5e0
[   43.425372]  kasan_report+0xc8/0x118
[   43.425993]  kasan_check_range+0x100/0x1a8
[   43.426681]  __kasan_check_write+0x20/0x30
[   43.427395]  copy_to_kernel_nofault+0x8c/0x250
[   43.428053]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   43.428630]  kunit_try_run_case+0x14c/0x3d0
[   43.429398]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.430227]  kthread+0x24c/0x2d0
[   43.430849]  ret_from_fork+0x10/0x20
[   43.431469] 
[   43.431848] Allocated by task 270:
[   43.432342]  kasan_save_stack+0x3c/0x68
[   43.432793]  kasan_save_track+0x20/0x40
[   43.433199]  kasan_save_alloc_info+0x40/0x58
[   43.433909]  __kasan_kmalloc+0xd4/0xd8
[   43.434562]  __kmalloc_cache_noprof+0x15c/0x3c8
[   43.435393]  copy_to_kernel_nofault_oob+0xc8/0x418
[   43.436122]  kunit_try_run_case+0x14c/0x3d0
[   43.436849]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.437581]  kthread+0x24c/0x2d0
[   43.438130]  ret_from_fork+0x10/0x20
[   43.438667] 
[   43.439055] The buggy address belongs to the object at fff00000c65cbf00
[   43.439055]  which belongs to the cache kmalloc-128 of size 128
[   43.440335] The buggy address is located 0 bytes to the right of
[   43.440335]  allocated 120-byte region [fff00000c65cbf00, fff00000c65cbf78)
[   43.441670] 
[   43.442020] The buggy address belongs to the physical page:
[   43.442780] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065cb
[   43.443792] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.444693] page_type: f5(slab)
[   43.445379] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   43.446214] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   43.447210] page dumped because: kasan: bad access detected
[   43.447861] 
[   43.448213] Memory state around the buggy address:
[   43.448798]  fff00000c65cbe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   43.449706]  fff00000c65cbe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.450605] >fff00000c65cbf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   43.451228]                                                                 ^
[   43.452124]  fff00000c65cbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.453051]  fff00000c65cc000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   43.453960] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[   37.686156] ==================================================================
[   37.688360] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   37.689237] Read of size 8 at addr fff00000c65b0300 by task kunit_try_catch/189
[   37.690089] 
[   37.691270] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   37.692486] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.693043] Hardware name: linux,dummy-virt (DT)
[   37.694189] Call trace:
[   37.694616]  show_stack+0x20/0x38 (C)
[   37.695240]  dump_stack_lvl+0x8c/0xd0
[   37.695851]  print_report+0x118/0x5e0
[   37.696406]  kasan_report+0xc8/0x118
[   37.696897]  __asan_report_load8_noabort+0x20/0x30
[   37.697984]  workqueue_uaf+0x480/0x4a8
[   37.698577]  kunit_try_run_case+0x14c/0x3d0
[   37.699186]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.700271]  kthread+0x24c/0x2d0
[   37.700787]  ret_from_fork+0x10/0x20
[   37.701313] 
[   37.702095] Allocated by task 189:
[   37.702473]  kasan_save_stack+0x3c/0x68
[   37.702880]  kasan_save_track+0x20/0x40
[   37.703961]  kasan_save_alloc_info+0x40/0x58
[   37.705046]  __kasan_kmalloc+0xd4/0xd8
[   37.705844]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.706654]  workqueue_uaf+0x13c/0x4a8
[   37.707157]  kunit_try_run_case+0x14c/0x3d0
[   37.707723]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.708377]  kthread+0x24c/0x2d0
[   37.708849]  ret_from_fork+0x10/0x20
[   37.710121] 
[   37.710500] Freed by task 31:
[   37.711011]  kasan_save_stack+0x3c/0x68
[   37.711522]  kasan_save_track+0x20/0x40
[   37.712087]  kasan_save_free_info+0x4c/0x78
[   37.712734]  __kasan_slab_free+0x6c/0x98
[   37.713824]  kfree+0x114/0x3d0
[   37.714249]  workqueue_uaf_work+0x18/0x30
[   37.714851]  process_one_work+0x530/0xfa8
[   37.715358]  worker_thread+0x614/0xf28
[   37.715927]  kthread+0x24c/0x2d0
[   37.716470]  ret_from_fork+0x10/0x20
[   37.716920] 
[   37.718458] Last potentially related work creation:
[   37.718946]  kasan_save_stack+0x3c/0x68
[   37.719481]  __kasan_record_aux_stack+0xbc/0xe8
[   37.720119]  kasan_record_aux_stack_noalloc+0x14/0x20
[   37.720777]  __queue_work+0x654/0xfe0
[   37.721255]  queue_work_on+0xbc/0xf8
[   37.721814]  workqueue_uaf+0x210/0x4a8
[   37.722372]  kunit_try_run_case+0x14c/0x3d0
[   37.723549]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.724215]  kthread+0x24c/0x2d0
[   37.724760]  ret_from_fork+0x10/0x20
[   37.725280] 
[   37.725980] The buggy address belongs to the object at fff00000c65b0300
[   37.725980]  which belongs to the cache kmalloc-32 of size 32
[   37.727594] The buggy address is located 0 bytes inside of
[   37.727594]  freed 32-byte region [fff00000c65b0300, fff00000c65b0320)
[   37.729203] 
[   37.729910] The buggy address belongs to the physical page:
[   37.730783] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b0
[   37.731683] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.732456] page_type: f5(slab)
[   37.732940] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   37.733796] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   37.734593] page dumped because: kasan: bad access detected
[   37.735258] 
[   37.736128] Memory state around the buggy address:
[   37.737255]  fff00000c65b0200: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   37.738273]  fff00000c65b0280: 00 00 00 fc fc fc fc fc 00 00 00 07 fc fc fc fc
[   37.739188] >fff00000c65b0300: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   37.740023]                    ^
[   37.740502]  fff00000c65b0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.741153]  fff00000c65b0400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.742493] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[   37.605903] ==================================================================
[   37.607096] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   37.607928] Read of size 4 at addr fff00000c65b0200 by task swapper/1/0
[   37.608524] 
[   37.608829] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G    B            N 6.12.0-next-20241120 #1
[   37.610342] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.611125] Hardware name: linux,dummy-virt (DT)
[   37.611840] Call trace:
[   37.612277]  show_stack+0x20/0x38 (C)
[   37.612773]  dump_stack_lvl+0x8c/0xd0
[   37.613738]  print_report+0x118/0x5e0
[   37.614431]  kasan_report+0xc8/0x118
[   37.614945]  __asan_report_load4_noabort+0x20/0x30
[   37.615636]  rcu_uaf_reclaim+0x64/0x70
[   37.616138]  rcu_core+0xa54/0x1df8
[   37.616686]  rcu_core_si+0x18/0x30
[   37.617251]  handle_softirqs+0x374/0xb20
[   37.618320]  __do_softirq+0x1c/0x28
[   37.618780]  ____do_softirq+0x18/0x30
[   37.619343]  call_on_irq_stack+0x24/0x58
[   37.619909]  do_softirq_own_stack+0x24/0x38
[   37.620547]  __irq_exit_rcu+0x1fc/0x318
[   37.621135]  irq_exit_rcu+0x1c/0x80
[   37.622111]  el1_interrupt+0x38/0x58
[   37.622610]  el1h_64_irq_handler+0x18/0x28
[   37.623178]  el1h_64_irq+0x6c/0x70
[   37.623819]  arch_local_irq_enable+0x4/0x8 (P)
[   37.624534]  default_idle_call+0x6c/0x78 (L)
[   37.625127]  do_idle+0x384/0x4e8
[   37.626113]  cpu_startup_entry+0x68/0x80
[   37.626722]  secondary_start_kernel+0x288/0x340
[   37.627320]  __secondary_switched+0xc0/0xc8
[   37.627962] 
[   37.628308] Allocated by task 187:
[   37.628825]  kasan_save_stack+0x3c/0x68
[   37.629362]  kasan_save_track+0x20/0x40
[   37.630478]  kasan_save_alloc_info+0x40/0x58
[   37.631035]  __kasan_kmalloc+0xd4/0xd8
[   37.631619]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.632177]  rcu_uaf+0xb0/0x2d0
[   37.632700]  kunit_try_run_case+0x14c/0x3d0
[   37.633394]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.634426]  kthread+0x24c/0x2d0
[   37.635140]  ret_from_fork+0x10/0x20
[   37.635767] 
[   37.636259] Freed by task 0:
[   37.636775]  kasan_save_stack+0x3c/0x68
[   37.637428]  kasan_save_track+0x20/0x40
[   37.638245]  kasan_save_free_info+0x4c/0x78
[   37.639041]  __kasan_slab_free+0x6c/0x98
[   37.639753]  kfree+0x114/0x3d0
[   37.640327]  rcu_uaf_reclaim+0x28/0x70
[   37.640808]  rcu_core+0xa54/0x1df8
[   37.641231]  rcu_core_si+0x18/0x30
[   37.642299]  handle_softirqs+0x374/0xb20
[   37.642895]  __do_softirq+0x1c/0x28
[   37.643519] 
[   37.643966] Last potentially related work creation:
[   37.644721]  kasan_save_stack+0x3c/0x68
[   37.645472]  __kasan_record_aux_stack+0xbc/0xe8
[   37.646482]  kasan_record_aux_stack_noalloc+0x14/0x20
[   37.647009]  __call_rcu_common.constprop.0+0x74/0xa18
[   37.647821]  call_rcu+0x18/0x30
[   37.648484]  rcu_uaf+0x14c/0x2d0
[   37.648910]  kunit_try_run_case+0x14c/0x3d0
[   37.650035]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.650969]  kthread+0x24c/0x2d0
[   37.651373]  ret_from_fork+0x10/0x20
[   37.651859] 
[   37.652190] The buggy address belongs to the object at fff00000c65b0200
[   37.652190]  which belongs to the cache kmalloc-32 of size 32
[   37.653171] The buggy address is located 0 bytes inside of
[   37.653171]  freed 32-byte region [fff00000c65b0200, fff00000c65b0220)
[   37.655206] 
[   37.655626] The buggy address belongs to the physical page:
[   37.656421] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b0
[   37.657648] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.658660] page_type: f5(slab)
[   37.659182] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   37.660003] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   37.660907] page dumped because: kasan: bad access detected
[   37.661424] 
[   37.661785] Memory state around the buggy address:
[   37.662434]  fff00000c65b0100: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   37.663836]  fff00000c65b0180: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   37.664660] >fff00000c65b0200: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   37.665839]                    ^
[   37.666251]  fff00000c65b0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.666945]  fff00000c65b0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.667712] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[   37.443791] ==================================================================
[   37.444831] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x600
[   37.446284] Read of size 1 at addr fff00000c1bf0100 by task kunit_try_catch/185
[   37.447612] 
[   37.448561] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   37.449625] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.450174] Hardware name: linux,dummy-virt (DT)
[   37.450751] Call trace:
[   37.451090]  show_stack+0x20/0x38 (C)
[   37.451613]  dump_stack_lvl+0x8c/0xd0
[   37.452096]  print_report+0x118/0x5e0
[   37.452695]  kasan_report+0xc8/0x118
[   37.453190]  __kasan_check_byte+0x54/0x70
[   37.453750]  ksize+0x30/0x88
[   37.454288]  ksize_uaf+0x168/0x600
[   37.455568]  kunit_try_run_case+0x14c/0x3d0
[   37.456167]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.456831]  kthread+0x24c/0x2d0
[   37.457716]  ret_from_fork+0x10/0x20
[   37.458957] 
[   37.459752] Allocated by task 185:
[   37.460267]  kasan_save_stack+0x3c/0x68
[   37.460811]  kasan_save_track+0x20/0x40
[   37.461683]  kasan_save_alloc_info+0x40/0x58
[   37.462283]  __kasan_kmalloc+0xd4/0xd8
[   37.462814]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.463370]  ksize_uaf+0xb8/0x600
[   37.464164]  kunit_try_run_case+0x14c/0x3d0
[   37.464783]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.465997]  kthread+0x24c/0x2d0
[   37.466782]  ret_from_fork+0x10/0x20
[   37.467255] 
[   37.467554] Freed by task 185:
[   37.468076]  kasan_save_stack+0x3c/0x68
[   37.468733]  kasan_save_track+0x20/0x40
[   37.469767]  kasan_save_free_info+0x4c/0x78
[   37.470217]  __kasan_slab_free+0x6c/0x98
[   37.470820]  kfree+0x114/0x3d0
[   37.471332]  ksize_uaf+0x11c/0x600
[   37.471802]  kunit_try_run_case+0x14c/0x3d0
[   37.472490]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.473282]  kthread+0x24c/0x2d0
[   37.474535]  ret_from_fork+0x10/0x20
[   37.475381] 
[   37.476103] The buggy address belongs to the object at fff00000c1bf0100
[   37.476103]  which belongs to the cache kmalloc-128 of size 128
[   37.477289] The buggy address is located 0 bytes inside of
[   37.477289]  freed 128-byte region [fff00000c1bf0100, fff00000c1bf0180)
[   37.479133] 
[   37.479391] The buggy address belongs to the physical page:
[   37.479941] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf0
[   37.480743] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.481795] page_type: f5(slab)
[   37.482682] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.483481] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   37.484315] page dumped because: kasan: bad access detected
[   37.485863] 
[   37.486203] Memory state around the buggy address:
[   37.486729]  fff00000c1bf0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.488107]  fff00000c1bf0080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.488962] >fff00000c1bf0100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.489757]                    ^
[   37.490186]  fff00000c1bf0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.492068]  fff00000c1bf0200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.492798] ==================================================================
[   37.538624] ==================================================================
[   37.539563] BUG: KASAN: slab-use-after-free in ksize_uaf+0x548/0x600
[   37.540095] Read of size 1 at addr fff00000c1bf0178 by task kunit_try_catch/185
[   37.541081] 
[   37.541851] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   37.543342] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.543934] Hardware name: linux,dummy-virt (DT)
[   37.544770] Call trace:
[   37.545177]  show_stack+0x20/0x38 (C)
[   37.546005]  dump_stack_lvl+0x8c/0xd0
[   37.546768]  print_report+0x118/0x5e0
[   37.547368]  kasan_report+0xc8/0x118
[   37.548209]  __asan_report_load1_noabort+0x20/0x30
[   37.549038]  ksize_uaf+0x548/0x600
[   37.549749]  kunit_try_run_case+0x14c/0x3d0
[   37.550389]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.551274]  kthread+0x24c/0x2d0
[   37.551844]  ret_from_fork+0x10/0x20
[   37.552405] 
[   37.552791] Allocated by task 185:
[   37.553350]  kasan_save_stack+0x3c/0x68
[   37.553943]  kasan_save_track+0x20/0x40
[   37.554508]  kasan_save_alloc_info+0x40/0x58
[   37.555170]  __kasan_kmalloc+0xd4/0xd8
[   37.555811]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.556383]  ksize_uaf+0xb8/0x600
[   37.556959]  kunit_try_run_case+0x14c/0x3d0
[   37.557541]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.558260]  kthread+0x24c/0x2d0
[   37.558840]  ret_from_fork+0x10/0x20
[   37.559455] 
[   37.559784] Freed by task 185:
[   37.560275]  kasan_save_stack+0x3c/0x68
[   37.560937]  kasan_save_track+0x20/0x40
[   37.561531]  kasan_save_free_info+0x4c/0x78
[   37.562138]  __kasan_slab_free+0x6c/0x98
[   37.562773]  kfree+0x114/0x3d0
[   37.563314]  ksize_uaf+0x11c/0x600
[   37.563905]  kunit_try_run_case+0x14c/0x3d0
[   37.564531]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.565211]  kthread+0x24c/0x2d0
[   37.565646]  ret_from_fork+0x10/0x20
[   37.566181] 
[   37.566527] The buggy address belongs to the object at fff00000c1bf0100
[   37.566527]  which belongs to the cache kmalloc-128 of size 128
[   37.567670] The buggy address is located 120 bytes inside of
[   37.567670]  freed 128-byte region [fff00000c1bf0100, fff00000c1bf0180)
[   37.568896] 
[   37.569253] The buggy address belongs to the physical page:
[   37.569840] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf0
[   37.570745] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.571461] page_type: f5(slab)
[   37.571906] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.572797] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   37.573472] page dumped because: kasan: bad access detected
[   37.574166] 
[   37.574513] Memory state around the buggy address:
[   37.575085]  fff00000c1bf0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.575897]  fff00000c1bf0080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.576711] >fff00000c1bf0100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.577502]                                                                 ^
[   37.578281]  fff00000c1bf0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.579049]  fff00000c1bf0200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.579839] ==================================================================
[   37.496261] ==================================================================
[   37.497385] BUG: KASAN: slab-use-after-free in ksize_uaf+0x59c/0x600
[   37.498171] Read of size 1 at addr fff00000c1bf0100 by task kunit_try_catch/185
[   37.499071] 
[   37.499504] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   37.500678] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.501242] Hardware name: linux,dummy-virt (DT)
[   37.501919] Call trace:
[   37.502346]  show_stack+0x20/0x38 (C)
[   37.502990]  dump_stack_lvl+0x8c/0xd0
[   37.503623]  print_report+0x118/0x5e0
[   37.504184]  kasan_report+0xc8/0x118
[   37.504874]  __asan_report_load1_noabort+0x20/0x30
[   37.505555]  ksize_uaf+0x59c/0x600
[   37.506145]  kunit_try_run_case+0x14c/0x3d0
[   37.506809]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.507645]  kthread+0x24c/0x2d0
[   37.508201]  ret_from_fork+0x10/0x20
[   37.508827] 
[   37.509157] Allocated by task 185:
[   37.509663]  kasan_save_stack+0x3c/0x68
[   37.510143]  kasan_save_track+0x20/0x40
[   37.510741]  kasan_save_alloc_info+0x40/0x58
[   37.511369]  __kasan_kmalloc+0xd4/0xd8
[   37.511969]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.512634]  ksize_uaf+0xb8/0x600
[   37.513099]  kunit_try_run_case+0x14c/0x3d0
[   37.513750]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.514435]  kthread+0x24c/0x2d0
[   37.514953]  ret_from_fork+0x10/0x20
[   37.515529] 
[   37.515873] Freed by task 185:
[   37.516306]  kasan_save_stack+0x3c/0x68
[   37.516837]  kasan_save_track+0x20/0x40
[   37.517353]  kasan_save_free_info+0x4c/0x78
[   37.517978]  __kasan_slab_free+0x6c/0x98
[   37.518536]  kfree+0x114/0x3d0
[   37.518966]  ksize_uaf+0x11c/0x600
[   37.519514]  kunit_try_run_case+0x14c/0x3d0
[   37.520125]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.520713]  kthread+0x24c/0x2d0
[   37.521234]  ret_from_fork+0x10/0x20
[   37.521804] 
[   37.522152] The buggy address belongs to the object at fff00000c1bf0100
[   37.522152]  which belongs to the cache kmalloc-128 of size 128
[   37.523249] The buggy address is located 0 bytes inside of
[   37.523249]  freed 128-byte region [fff00000c1bf0100, fff00000c1bf0180)
[   37.524581] 
[   37.524996] The buggy address belongs to the physical page:
[   37.525731] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf0
[   37.526479] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.527310] page_type: f5(slab)
[   37.527853] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.528803] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   37.529680] page dumped because: kasan: bad access detected
[   37.530256] 
[   37.530570] Memory state around the buggy address:
[   37.531177]  fff00000c1bf0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.532027]  fff00000c1bf0080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.532789] >fff00000c1bf0100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.533937]                    ^
[   37.534496]  fff00000c1bf0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.535249]  fff00000c1bf0200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.536194] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[   70.887181] ==================================================================
[   70.887852] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[   70.887852] 
[   70.888573] Use-after-free read at 0x000000003a070cce (in kfence-#246):
[   70.889367]  test_krealloc+0x51c/0x830
[   70.889913]  test_krealloc+0x458/0x830
[   70.890506]  kunit_try_run_case+0x14c/0x3d0
[   70.891140]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.891846]  kthread+0x24c/0x2d0
[   70.892320]  ret_from_fork+0x10/0x20
[   70.892910] 
[   70.893262] kfence-#246: 0x000000003a070cce-0x00000000a4a80f0a, size=32, cache=kmalloc-32
[   70.893262] 
[   70.894285] allocated by task 326 on cpu 0 at 70.886088s (0.008186s ago):
[   70.895034]  test_alloc+0x298/0x620
[   70.895566]  test_krealloc+0xc0/0x830
[   70.896038]  kunit_try_run_case+0x14c/0x3d0
[   70.896669]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.897389]  kthread+0x24c/0x2d0
[   70.897849]  ret_from_fork+0x10/0x20
[   70.898404] 
[   70.898772] freed by task 326 on cpu 0 at 70.886550s (0.012210s ago):
[   70.899587]  krealloc_noprof+0x148/0x360
[   70.900166]  test_krealloc+0x1dc/0x830
[   70.900698]  kunit_try_run_case+0x14c/0x3d0
[   70.901303]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.901971]  kthread+0x24c/0x2d0
[   70.902503]  ret_from_fork+0x10/0x20
[   70.903004] 
[   70.903359] CPU: 0 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   70.904317] Tainted: [B]=BAD_PAGE, [N]=TEST
[   70.904889] Hardware name: linux,dummy-virt (DT)
[   70.905345] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   37.348121] ==================================================================
[   37.348711] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x750
[   37.349400] Read of size 1 at addr fff00000c6564978 by task kunit_try_catch/183
[   37.350274] 
[   37.350687] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   37.352087] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.352658] Hardware name: linux,dummy-virt (DT)
[   37.355335] Call trace:
[   37.355758]  show_stack+0x20/0x38 (C)
[   37.356418]  dump_stack_lvl+0x8c/0xd0
[   37.357061]  print_report+0x118/0x5e0
[   37.357717]  kasan_report+0xc8/0x118
[   37.358210]  __asan_report_load1_noabort+0x20/0x30
[   37.358909]  ksize_unpoisons_memory+0x628/0x750
[   37.359965]  kunit_try_run_case+0x14c/0x3d0
[   37.360623]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.361473]  kthread+0x24c/0x2d0
[   37.361947]  ret_from_fork+0x10/0x20
[   37.362846] 
[   37.363346] Allocated by task 183:
[   37.363784]  kasan_save_stack+0x3c/0x68
[   37.364406]  kasan_save_track+0x20/0x40
[   37.364988]  kasan_save_alloc_info+0x40/0x58
[   37.365961]  __kasan_kmalloc+0xd4/0xd8
[   37.366396]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.367392]  ksize_unpoisons_memory+0xc0/0x750
[   37.368572]  kunit_try_run_case+0x14c/0x3d0
[   37.369023]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.370291]  kthread+0x24c/0x2d0
[   37.371079]  ret_from_fork+0x10/0x20
[   37.371609] 
[   37.371930] The buggy address belongs to the object at fff00000c6564900
[   37.371930]  which belongs to the cache kmalloc-128 of size 128
[   37.373117] The buggy address is located 5 bytes to the right of
[   37.373117]  allocated 115-byte region [fff00000c6564900, fff00000c6564973)
[   37.374593] 
[   37.375224] The buggy address belongs to the physical page:
[   37.376076] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106564
[   37.377590] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.378511] page_type: f5(slab)
[   37.379021] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.379924] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   37.380971] page dumped because: kasan: bad access detected
[   37.381953] 
[   37.382254] Memory state around the buggy address:
[   37.382928]  fff00000c6564800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   37.384496]  fff00000c6564880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.385840] >fff00000c6564900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   37.386529]                                                                 ^
[   37.387318]  fff00000c6564980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.388472]  fff00000c6564a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.389226] ==================================================================
[   37.309947] ==================================================================
[   37.311053] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x638/0x750
[   37.311796] Read of size 1 at addr fff00000c6564973 by task kunit_try_catch/183
[   37.312608] 
[   37.312923] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   37.314507] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.315096] Hardware name: linux,dummy-virt (DT)
[   37.316422] Call trace:
[   37.317017]  show_stack+0x20/0x38 (C)
[   37.317826]  dump_stack_lvl+0x8c/0xd0
[   37.318354]  print_report+0x118/0x5e0
[   37.318999]  kasan_report+0xc8/0x118
[   37.319671]  __asan_report_load1_noabort+0x20/0x30
[   37.320517]  ksize_unpoisons_memory+0x638/0x750
[   37.321300]  kunit_try_run_case+0x14c/0x3d0
[   37.321929]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.322723]  kthread+0x24c/0x2d0
[   37.323317]  ret_from_fork+0x10/0x20
[   37.323953] 
[   37.324276] Allocated by task 183:
[   37.324788]  kasan_save_stack+0x3c/0x68
[   37.325321]  kasan_save_track+0x20/0x40
[   37.325907]  kasan_save_alloc_info+0x40/0x58
[   37.326530]  __kasan_kmalloc+0xd4/0xd8
[   37.327061]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.327616]  ksize_unpoisons_memory+0xc0/0x750
[   37.328266]  kunit_try_run_case+0x14c/0x3d0
[   37.328898]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.329557]  kthread+0x24c/0x2d0
[   37.330062]  ret_from_fork+0x10/0x20
[   37.330680] 
[   37.331018] The buggy address belongs to the object at fff00000c6564900
[   37.331018]  which belongs to the cache kmalloc-128 of size 128
[   37.332164] The buggy address is located 0 bytes to the right of
[   37.332164]  allocated 115-byte region [fff00000c6564900, fff00000c6564973)
[   37.333345] 
[   37.333644] The buggy address belongs to the physical page:
[   37.334184] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106564
[   37.335077] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.335916] page_type: f5(slab)
[   37.336479] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.337468] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   37.338083] page dumped because: kasan: bad access detected
[   37.338814] 
[   37.339150] Memory state around the buggy address:
[   37.339823]  fff00000c6564800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   37.342738]  fff00000c6564880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.343455] >fff00000c6564900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   37.344217]                                                              ^
[   37.344910]  fff00000c6564980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.345649]  fff00000c6564a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.346551] ==================================================================
[   37.391840] ==================================================================
[   37.393225] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x6a0/0x750
[   37.394435] Read of size 1 at addr fff00000c656497f by task kunit_try_catch/183
[   37.395357] 
[   37.395756] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   37.397084] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.397995] Hardware name: linux,dummy-virt (DT)
[   37.398914] Call trace:
[   37.399461]  show_stack+0x20/0x38 (C)
[   37.400162]  dump_stack_lvl+0x8c/0xd0
[   37.400712]  print_report+0x118/0x5e0
[   37.401253]  kasan_report+0xc8/0x118
[   37.401764]  __asan_report_load1_noabort+0x20/0x30
[   37.402438]  ksize_unpoisons_memory+0x6a0/0x750
[   37.403640]  kunit_try_run_case+0x14c/0x3d0
[   37.404155]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.404965]  kthread+0x24c/0x2d0
[   37.406513]  ret_from_fork+0x10/0x20
[   37.407042] 
[   37.407338] Allocated by task 183:
[   37.407859]  kasan_save_stack+0x3c/0x68
[   37.408327]  kasan_save_track+0x20/0x40
[   37.408922]  kasan_save_alloc_info+0x40/0x58
[   37.409949]  __kasan_kmalloc+0xd4/0xd8
[   37.410453]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.411074]  ksize_unpoisons_memory+0xc0/0x750
[   37.412026]  kunit_try_run_case+0x14c/0x3d0
[   37.412608]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.413889]  kthread+0x24c/0x2d0
[   37.414602]  ret_from_fork+0x10/0x20
[   37.414988] 
[   37.415149] The buggy address belongs to the object at fff00000c6564900
[   37.415149]  which belongs to the cache kmalloc-128 of size 128
[   37.415698] The buggy address is located 12 bytes to the right of
[   37.415698]  allocated 115-byte region [fff00000c6564900, fff00000c6564973)
[   37.416254] 
[   37.416409] The buggy address belongs to the physical page:
[   37.417099] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106564
[   37.418695] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.419525] page_type: f5(slab)
[   37.420054] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.421016] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   37.423019] page dumped because: kasan: bad access detected
[   37.423851] 
[   37.424132] Memory state around the buggy address:
[   37.424807]  fff00000c6564800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   37.426090]  fff00000c6564880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.426760] >fff00000c6564900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   37.427711]                                                                 ^
[   37.428461]  fff00000c6564980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.429270]  fff00000c6564a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.430210] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[   70.705055] ==================================================================
[   70.705823] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[   70.705823] 
[   70.706720] Use-after-free read at 0x000000009bdae6a0 (in kfence-#244):
[   70.707566]  test_memcache_typesafe_by_rcu+0x280/0x560
[   70.708137]  test_memcache_typesafe_by_rcu+0x260/0x560
[   70.708878]  kunit_try_run_case+0x14c/0x3d0
[   70.709623]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.710306]  kthread+0x24c/0x2d0
[   70.710883]  ret_from_fork+0x10/0x20
[   70.711521] 
[   70.711871] kfence-#244: 0x000000009bdae6a0-0x0000000079884d65, size=32, cache=test
[   70.711871] 
[   70.712841] allocated by task 324 on cpu 0 at 70.678753s (0.034077s ago):
[   70.713713]  test_alloc+0x22c/0x620
[   70.714160]  test_memcache_typesafe_by_rcu+0x15c/0x560
[   70.714835]  kunit_try_run_case+0x14c/0x3d0
[   70.715374]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.716097]  kthread+0x24c/0x2d0
[   70.716635]  ret_from_fork+0x10/0x20
[   70.717192] 
[   70.717541] freed by task 324 on cpu 0 at 70.678894s (0.038635s ago):
[   70.718233]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[   70.718935]  kunit_try_run_case+0x14c/0x3d0
[   70.719544]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   70.720255]  kthread+0x24c/0x2d0
[   70.720757]  ret_from_fork+0x10/0x20
[   70.721319] 
[   70.721717] CPU: 0 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   70.722812] Tainted: [B]=BAD_PAGE, [N]=TEST
[   70.723285] Hardware name: linux,dummy-virt (DT)
[   70.723895] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[   52.724538] ==================================================================
[   52.726278] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   52.726278] 
[   52.727211] Invalid read at 0x0000000087087db5:
[   52.728056]  test_invalid_access+0xdc/0x1f0
[   52.728833]  kunit_try_run_case+0x14c/0x3d0
[   52.730380]  kunit_try_run_case+0x14c/0x3d0
[   52.731001]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.731817]  kthread+0x24c/0x2d0
[   52.732453]  ret_from_fork+0x10/0x20
[   52.733030] 
[   52.734101] CPU: 0 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   52.735328] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.735894] Hardware name: linux,dummy-virt (DT)
[   52.736589] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[   52.478734] ==================================================================
[   52.479489] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   52.479489] 
[   52.480461] Corrupted memory at 0x00000000d8f90041 [ ! . . . . . . . . . . . . . . . ] (in kfence-#237):
[   52.482944]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   52.483546]  kunit_try_run_case+0x14c/0x3d0
[   52.484185]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.484871]  kthread+0x24c/0x2d0
[   52.485359]  ret_from_fork+0x10/0x20
[   52.485948] 
[   52.486336] kfence-#237: 0x00000000e789e62f-0x000000005c3f15fc, size=73, cache=kmalloc-96
[   52.486336] 
[   52.487318] allocated by task 314 on cpu 0 at 52.478225s (0.009082s ago):
[   52.488136]  test_alloc+0x298/0x620
[   52.488706]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   52.489288]  kunit_try_run_case+0x14c/0x3d0
[   52.489818]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.490546]  kthread+0x24c/0x2d0
[   52.491028]  ret_from_fork+0x10/0x20
[   52.491613] 
[   52.491966] freed by task 314 on cpu 0 at 52.478492s (0.013463s ago):
[   52.492841]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   52.493464]  kunit_try_run_case+0x14c/0x3d0
[   52.494017]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.494661]  kthread+0x24c/0x2d0
[   52.495224]  ret_from_fork+0x10/0x20
[   52.495750] 
[   52.496142] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   52.497195] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.497647] Hardware name: linux,dummy-virt (DT)
[   52.498255] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[   52.375068] ==================================================================
[   52.375938] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   52.375938] 
[   52.376984] Out-of-bounds read at 0x00000000f4831405 (105B right of kfence-#236):
[   52.377834]  test_kmalloc_aligned_oob_read+0x238/0x468
[   52.378418]  test_kmalloc_aligned_oob_read+0x100/0x468
[   52.379142]  kunit_try_run_case+0x14c/0x3d0
[   52.379805]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.380578]  kthread+0x24c/0x2d0
[   52.381109]  ret_from_fork+0x10/0x20
[   52.381766] 
[   52.382080] kfence-#236: 0x0000000078055937-0x000000000f266a86, size=73, cache=kmalloc-96
[   52.382080] 
[   52.383123] allocated by task 312 on cpu 1 at 52.374562s (0.008550s ago):
[   52.384054]  test_alloc+0x298/0x620
[   52.384666]  test_kmalloc_aligned_oob_read+0x100/0x468
[   52.385438]  kunit_try_run_case+0x14c/0x3d0
[   52.386015]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.386766]  kthread+0x24c/0x2d0
[   52.387263]  ret_from_fork+0x10/0x20
[   52.387851] 
[   52.388285] CPU: 1 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   52.389358] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.389933] Hardware name: linux,dummy-virt (DT)
[   52.390546] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[   46.862500] ==================================================================
[   46.863456] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   46.863456] 
[   46.864873] Corrupted memory at 0x0000000024d0661b [ ! . . . . . . . . . . . . . . . ] (in kfence-#183):
[   46.867210]  test_corruption+0x120/0x378
[   46.867767]  kunit_try_run_case+0x14c/0x3d0
[   46.868332]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.868986]  kthread+0x24c/0x2d0
[   46.869990]  ret_from_fork+0x10/0x20
[   46.870467] 
[   46.870956] kfence-#183: 0x000000000f9b6d3f-0x00000000410c48d0, size=32, cache=test
[   46.870956] 
[   46.872067] allocated by task 302 on cpu 0 at 46.862188s (0.009868s ago):
[   46.873188]  test_alloc+0x22c/0x620
[   46.873679]  test_corruption+0xdc/0x378
[   46.874203]  kunit_try_run_case+0x14c/0x3d0
[   46.875044]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.875884]  kthread+0x24c/0x2d0
[   46.876536]  ret_from_fork+0x10/0x20
[   46.877214] 
[   46.877692] freed by task 302 on cpu 0 at 46.862309s (0.015375s ago):
[   46.878608]  test_corruption+0x120/0x378
[   46.879268]  kunit_try_run_case+0x14c/0x3d0
[   46.879832]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.880901]  kthread+0x24c/0x2d0
[   46.881327]  ret_from_fork+0x10/0x20
[   46.882027] 
[   46.882593] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   46.883768] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.884470] Hardware name: linux,dummy-virt (DT)
[   46.884990] ==================================================================
[   46.654736] ==================================================================
[   46.655612] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   46.655612] 
[   46.656266] Corrupted memory at 0x000000007fc18f3b [ ! ] (in kfence-#181):
[   46.657529]  test_corruption+0x284/0x378
[   46.658172]  kunit_try_run_case+0x14c/0x3d0
[   46.658853]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.659665]  kthread+0x24c/0x2d0
[   46.660217]  ret_from_fork+0x10/0x20
[   46.660811] 
[   46.661152] kfence-#181: 0x0000000094907e0c-0x00000000be35e98b, size=32, cache=kmalloc-32
[   46.661152] 
[   46.662237] allocated by task 300 on cpu 0 at 46.654210s (0.008016s ago):
[   46.663102]  test_alloc+0x298/0x620
[   46.663661]  test_corruption+0x198/0x378
[   46.664238]  kunit_try_run_case+0x14c/0x3d0
[   46.664789]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.665567]  kthread+0x24c/0x2d0
[   46.666097]  ret_from_fork+0x10/0x20
[   46.666597] 
[   46.666948] freed by task 300 on cpu 0 at 46.654379s (0.012557s ago):
[   46.667667]  test_corruption+0x284/0x378
[   46.668261]  kunit_try_run_case+0x14c/0x3d0
[   46.668886]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.669612]  kthread+0x24c/0x2d0
[   46.670088]  ret_from_fork+0x10/0x20
[   46.670654] 
[   46.671036] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   46.672186] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.672788] Hardware name: linux,dummy-virt (DT)
[   46.673376] ==================================================================
[   46.446612] ==================================================================
[   46.447351] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   46.447351] 
[   46.448188] Corrupted memory at 0x0000000046c0e89f [ ! . . . . . . . . . . . . . . . ] (in kfence-#179):
[   46.450519]  test_corruption+0x278/0x378
[   46.450982]  kunit_try_run_case+0x14c/0x3d0
[   46.451617]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.452240]  kthread+0x24c/0x2d0
[   46.452799]  ret_from_fork+0x10/0x20
[   46.453316] 
[   46.453647] kfence-#179: 0x0000000027c91dbc-0x00000000004a9dae, size=32, cache=kmalloc-32
[   46.453647] 
[   46.454566] allocated by task 300 on cpu 0 at 46.446236s (0.008317s ago):
[   46.455493]  test_alloc+0x298/0x620
[   46.455925]  test_corruption+0xdc/0x378
[   46.456526]  kunit_try_run_case+0x14c/0x3d0
[   46.457155]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.457838]  kthread+0x24c/0x2d0
[   46.458308]  ret_from_fork+0x10/0x20
[   46.458888] 
[   46.459240] freed by task 300 on cpu 0 at 46.446431s (0.012798s ago):
[   46.459989]  test_corruption+0x278/0x378
[   46.460605]  kunit_try_run_case+0x14c/0x3d0
[   46.461180]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.461822]  kthread+0x24c/0x2d0
[   46.462352]  ret_from_fork+0x10/0x20
[   46.462926] 
[   46.463338] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   46.464247] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.464827] Hardware name: linux,dummy-virt (DT)
[   46.465512] ==================================================================
[   46.966487] ==================================================================
[   46.967331] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   46.967331] 
[   46.968144] Corrupted memory at 0x00000000caca7fc0 [ ! ] (in kfence-#184):
[   46.970098]  test_corruption+0x1d8/0x378
[   46.970866]  kunit_try_run_case+0x14c/0x3d0
[   46.971628]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.972463]  kthread+0x24c/0x2d0
[   46.973119]  ret_from_fork+0x10/0x20
[   46.973808] 
[   46.974122] kfence-#184: 0x00000000b377c82a-0x000000003842af8f, size=32, cache=test
[   46.974122] 
[   46.975023] allocated by task 302 on cpu 0 at 46.966204s (0.008807s ago):
[   46.976235]  test_alloc+0x22c/0x620
[   46.976746]  test_corruption+0x198/0x378
[   46.977227]  kunit_try_run_case+0x14c/0x3d0
[   46.977801]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.978457]  kthread+0x24c/0x2d0
[   46.978942]  ret_from_fork+0x10/0x20
[   46.979508] 
[   46.979845] freed by task 302 on cpu 0 at 46.966303s (0.013530s ago):
[   46.980547]  test_corruption+0x1d8/0x378
[   46.981124]  kunit_try_run_case+0x14c/0x3d0
[   46.981742]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.982398]  kthread+0x24c/0x2d0
[   46.982878]  ret_from_fork+0x10/0x20
[   46.983373] 
[   46.983778] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   46.984828] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.985305] Hardware name: linux,dummy-virt (DT)
[   46.985891] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[   46.342434] ==================================================================
[   46.343224] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   46.343224] 
[   46.343776] Invalid free of 0x00000000d2b65336 (in kfence-#178):
[   46.344633]  test_invalid_addr_free+0xec/0x238
[   46.345872]  kunit_try_run_case+0x14c/0x3d0
[   46.346489]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.347330]  kthread+0x24c/0x2d0
[   46.348013]  ret_from_fork+0x10/0x20
[   46.348571] 
[   46.348893] kfence-#178: 0x000000006451f5b7-0x000000006b1b4f92, size=32, cache=test
[   46.348893] 
[   46.350162] allocated by task 298 on cpu 1 at 46.342196s (0.007954s ago):
[   46.351267]  test_alloc+0x22c/0x620
[   46.351880]  test_invalid_addr_free+0xd4/0x238
[   46.352416]  kunit_try_run_case+0x14c/0x3d0
[   46.352966]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.353968]  kthread+0x24c/0x2d0
[   46.354579]  ret_from_fork+0x10/0x20
[   46.355100] 
[   46.355627] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   46.356875] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.357600] Hardware name: linux,dummy-virt (DT)
[   46.358344] ==================================================================
[   46.238395] ==================================================================
[   46.239242] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   46.239242] 
[   46.240053] Invalid free of 0x000000001f7b1fa4 (in kfence-#177):
[   46.240805]  test_invalid_addr_free+0x1ac/0x238
[   46.241386]  kunit_try_run_case+0x14c/0x3d0
[   46.241891]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.242507]  kthread+0x24c/0x2d0
[   46.243008]  ret_from_fork+0x10/0x20
[   46.243628] 
[   46.244011] kfence-#177: 0x00000000d9f96522-0x000000007715870b, size=32, cache=kmalloc-32
[   46.244011] 
[   46.244962] allocated by task 296 on cpu 0 at 46.238141s (0.006810s ago):
[   46.245836]  test_alloc+0x298/0x620
[   46.246388]  test_invalid_addr_free+0xd4/0x238
[   46.246930]  kunit_try_run_case+0x14c/0x3d0
[   46.247407]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.248212]  kthread+0x24c/0x2d0
[   46.248811]  ret_from_fork+0x10/0x20
[   46.249403] 
[   46.249815] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   46.251025] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.251585] Hardware name: linux,dummy-virt (DT)
[   46.252255] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[   46.030755] ==================================================================
[   46.031612] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   46.031612] 
[   46.032421] Invalid free of 0x00000000933b4eee (in kfence-#175):
[   46.033495]  test_double_free+0x1bc/0x238
[   46.034235]  kunit_try_run_case+0x14c/0x3d0
[   46.034818]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.035658]  kthread+0x24c/0x2d0
[   46.036279]  ret_from_fork+0x10/0x20
[   46.036828] 
[   46.037168] kfence-#175: 0x00000000933b4eee-0x00000000671ba236, size=32, cache=kmalloc-32
[   46.037168] 
[   46.038110] allocated by task 292 on cpu 1 at 46.030209s (0.007890s ago):
[   46.039036]  test_alloc+0x298/0x620
[   46.039597]  test_double_free+0xd4/0x238
[   46.040165]  kunit_try_run_case+0x14c/0x3d0
[   46.040851]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.041524]  kthread+0x24c/0x2d0
[   46.042107]  ret_from_fork+0x10/0x20
[   46.042643] 
[   46.042985] freed by task 292 on cpu 1 at 46.030371s (0.012603s ago):
[   46.043762]  test_double_free+0x1ac/0x238
[   46.044362]  kunit_try_run_case+0x14c/0x3d0
[   46.044889]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.045631]  kthread+0x24c/0x2d0
[   46.046166]  ret_from_fork+0x10/0x20
[   46.046662] 
[   46.047062] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   46.048022] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.048620] Hardware name: linux,dummy-virt (DT)
[   46.049230] ==================================================================
[   46.134484] ==================================================================
[   46.135158] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   46.135158] 
[   46.135887] Invalid free of 0x0000000039a3f95e (in kfence-#176):
[   46.136644]  test_double_free+0x100/0x238
[   46.137216]  kunit_try_run_case+0x14c/0x3d0
[   46.137776]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.138408]  kthread+0x24c/0x2d0
[   46.138970]  ret_from_fork+0x10/0x20
[   46.139473] 
[   46.139803] kfence-#176: 0x0000000039a3f95e-0x00000000d21f691c, size=32, cache=test
[   46.139803] 
[   46.140845] allocated by task 294 on cpu 1 at 46.134109s (0.006724s ago):
[   46.141640]  test_alloc+0x22c/0x620
[   46.142184]  test_double_free+0xd4/0x238
[   46.142760]  kunit_try_run_case+0x14c/0x3d0
[   46.143313]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.143917]  kthread+0x24c/0x2d0
[   46.144491]  ret_from_fork+0x10/0x20
[   46.144966] 
[   46.145315] freed by task 294 on cpu 1 at 46.134210s (0.011092s ago):
[   46.146131]  test_double_free+0xf0/0x238
[   46.146728]  kunit_try_run_case+0x14c/0x3d0
[   46.147264]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.147991]  kthread+0x24c/0x2d0
[   46.148521]  ret_from_fork+0x10/0x20
[   46.148993] 
[   46.149378] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   46.150525] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.151091] Hardware name: linux,dummy-virt (DT)
[   46.151582] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[   45.614833] ==================================================================
[   45.615677] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   45.615677] 
[   45.616554] Use-after-free read at 0x0000000039a5448e (in kfence-#171):
[   45.617703]  test_use_after_free_read+0x114/0x248
[   45.618328]  test_use_after_free_read+0x1c0/0x248
[   45.618871]  kunit_try_run_case+0x14c/0x3d0
[   45.619527]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.620253]  kthread+0x24c/0x2d0
[   45.620810]  ret_from_fork+0x10/0x20
[   45.621368] 
[   45.621733] kfence-#171: 0x0000000039a5448e-0x00000000bc89df75, size=32, cache=kmalloc-32
[   45.621733] 
[   45.622540] allocated by task 284 on cpu 1 at 45.614263s (0.008265s ago):
[   45.623397]  test_alloc+0x298/0x620
[   45.623953]  test_use_after_free_read+0xd0/0x248
[   45.624515]  kunit_try_run_case+0x14c/0x3d0
[   45.625168]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.625767]  kthread+0x24c/0x2d0
[   45.626302]  ret_from_fork+0x10/0x20
[   45.626897] 
[   45.627198] freed by task 284 on cpu 1 at 45.614391s (0.012795s ago):
[   45.627959]  test_use_after_free_read+0x1c0/0x248
[   45.628637]  kunit_try_run_case+0x14c/0x3d0
[   45.629145]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.629880]  kthread+0x24c/0x2d0
[   45.630413]  ret_from_fork+0x10/0x20
[   45.630939] 
[   45.631333] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   45.632356] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.632877] Hardware name: linux,dummy-virt (DT)
[   45.633412] ==================================================================
[   45.718767] ==================================================================
[   45.719500] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   45.719500] 
[   45.720396] Use-after-free read at 0x0000000022c28eab (in kfence-#172):
[   45.721260]  test_use_after_free_read+0x114/0x248
[   45.721862]  test_use_after_free_read+0xf0/0x248
[   45.722599]  kunit_try_run_case+0x14c/0x3d0
[   45.723278]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.724053]  kthread+0x24c/0x2d0
[   45.724633]  ret_from_fork+0x10/0x20
[   45.725286] 
[   45.725665] kfence-#172: 0x0000000022c28eab-0x00000000eb049ac8, size=32, cache=test
[   45.725665] 
[   45.726658] allocated by task 286 on cpu 1 at 45.718370s (0.008275s ago):
[   45.727523]  test_alloc+0x22c/0x620
[   45.728074]  test_use_after_free_read+0xd0/0x248
[   45.728741]  kunit_try_run_case+0x14c/0x3d0
[   45.729386]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.730167]  kthread+0x24c/0x2d0
[   45.730727]  ret_from_fork+0x10/0x20
[   45.731323] 
[   45.731687] freed by task 286 on cpu 1 at 45.718497s (0.013178s ago):
[   45.732661]  test_use_after_free_read+0xf0/0x248
[   45.733354]  kunit_try_run_case+0x14c/0x3d0
[   45.733896]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.734663]  kthread+0x24c/0x2d0
[   45.735207]  ret_from_fork+0x10/0x20
[   45.735772] 
[   45.736200] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   45.737303] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.737923] Hardware name: linux,dummy-virt (DT)
[   45.738486] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[   45.510398] ==================================================================
[   45.511298] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   45.511298] 
[   45.512262] Out-of-bounds write at 0x00000000f35d4dd0 (1B left of kfence-#170):
[   45.513217]  test_out_of_bounds_write+0x100/0x240
[   45.513844]  test_out_of_bounds_write+0xc8/0x240
[   45.514541]  kunit_try_run_case+0x14c/0x3d0
[   45.515206]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.515973]  kthread+0x24c/0x2d0
[   45.516542]  ret_from_fork+0x10/0x20
[   45.517122] 
[   45.517548] kfence-#170: 0x00000000100c786e-0x00000000ff793896, size=32, cache=test
[   45.517548] 
[   45.518478] allocated by task 282 on cpu 0 at 45.510195s (0.008271s ago):
[   45.519458]  test_alloc+0x22c/0x620
[   45.519970]  test_out_of_bounds_write+0xc8/0x240
[   45.520614]  kunit_try_run_case+0x14c/0x3d0
[   45.521305]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.521920]  kthread+0x24c/0x2d0
[   45.522500]  ret_from_fork+0x10/0x20
[   45.523119] 
[   45.523560] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   45.524638] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.525246] Hardware name: linux,dummy-virt (DT)
[   45.525811] ==================================================================
[   45.406489] ==================================================================
[   45.407333] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   45.407333] 
[   45.408243] Out-of-bounds write at 0x0000000070cc7112 (1B left of kfence-#169):
[   45.409153]  test_out_of_bounds_write+0x100/0x240
[   45.409813]  test_out_of_bounds_write+0xc8/0x240
[   45.410519]  kunit_try_run_case+0x14c/0x3d0
[   45.411184]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.411917]  kthread+0x24c/0x2d0
[   45.412436]  ret_from_fork+0x10/0x20
[   45.413036] 
[   45.413393] kfence-#169: 0x00000000680c45b2-0x00000000ab7c676f, size=32, cache=kmalloc-32
[   45.413393] 
[   45.414345] allocated by task 280 on cpu 1 at 45.406169s (0.008166s ago):
[   45.415274]  test_alloc+0x298/0x620
[   45.415880]  test_out_of_bounds_write+0xc8/0x240
[   45.416587]  kunit_try_run_case+0x14c/0x3d0
[   45.417199]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.417846]  kthread+0x24c/0x2d0
[   45.418421]  ret_from_fork+0x10/0x20
[   45.418991] 
[   45.419399] CPU: 1 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   45.420465] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.421041] Hardware name: linux,dummy-virt (DT)
[   45.421583] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[   44.574371] ==================================================================
[   44.575155] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   44.575155] 
[   44.575729] Out-of-bounds read at 0x000000004fbcac5b (1B left of kfence-#161):
[   44.576940]  test_out_of_bounds_read+0x114/0x3e0
[   44.577936]  test_out_of_bounds_read+0xdc/0x3e0
[   44.578535]  kunit_try_run_case+0x14c/0x3d0
[   44.579177]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.579554]  kthread+0x24c/0x2d0
[   44.580360]  ret_from_fork+0x10/0x20
[   44.580815] 
[   44.581052] kfence-#161: 0x000000009402a092-0x0000000011856bf9, size=32, cache=test
[   44.581052] 
[   44.581904] allocated by task 278 on cpu 0 at 44.574175s (0.007723s ago):
[   44.583686]  test_alloc+0x22c/0x620
[   44.584340]  test_out_of_bounds_read+0xdc/0x3e0
[   44.584961]  kunit_try_run_case+0x14c/0x3d0
[   44.585546]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.586248]  kthread+0x24c/0x2d0
[   44.586795]  ret_from_fork+0x10/0x20
[   44.587300] 
[   44.587707] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   44.588727] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.589301] Hardware name: linux,dummy-virt (DT)
[   44.589870] ==================================================================
[   44.886366] ==================================================================
[   44.887525] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   44.887525] 
[   44.888884] Out-of-bounds read at 0x0000000014404e7a (32B right of kfence-#164):
[   44.890347]  test_out_of_bounds_read+0x1c8/0x3e0
[   44.891064]  test_out_of_bounds_read+0x198/0x3e0
[   44.891694]  kunit_try_run_case+0x14c/0x3d0
[   44.892369]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.893125]  kthread+0x24c/0x2d0
[   44.893694]  ret_from_fork+0x10/0x20
[   44.894227] 
[   44.894544] kfence-#164: 0x000000008b99714c-0x00000000911e87c4, size=32, cache=test
[   44.894544] 
[   44.895363] allocated by task 278 on cpu 0 at 44.886198s (0.009153s ago):
[   44.896322]  test_alloc+0x22c/0x620
[   44.896838]  test_out_of_bounds_read+0x198/0x3e0
[   44.897570]  kunit_try_run_case+0x14c/0x3d0
[   44.898225]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.898897]  kthread+0x24c/0x2d0
[   44.899471]  ret_from_fork+0x10/0x20
[   44.900040] 
[   44.900427] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   44.901555] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.902077] Hardware name: linux,dummy-virt (DT)
[   44.902739] ==================================================================
[   44.366615] ==================================================================
[   44.367433] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   44.367433] 
[   44.368291] Out-of-bounds read at 0x00000000c3b5d2e7 (32B right of kfence-#159):
[   44.369167]  test_out_of_bounds_read+0x1c8/0x3e0
[   44.369759]  test_out_of_bounds_read+0x198/0x3e0
[   44.370417]  kunit_try_run_case+0x14c/0x3d0
[   44.371065]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.371645]  kthread+0x24c/0x2d0
[   44.372177]  ret_from_fork+0x10/0x20
[   44.372792] 
[   44.373148] kfence-#159: 0x0000000032848aa7-0x00000000d379d54b, size=32, cache=kmalloc-32
[   44.373148] 
[   44.374136] allocated by task 276 on cpu 1 at 44.366196s (0.007928s ago):
[   44.375005]  test_alloc+0x298/0x620
[   44.375577]  test_out_of_bounds_read+0x198/0x3e0
[   44.376238]  kunit_try_run_case+0x14c/0x3d0
[   44.376789]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.377509]  kthread+0x24c/0x2d0
[   44.378048]  ret_from_fork+0x10/0x20
[   44.378600] 
[   44.378927] CPU: 1 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   44.380061] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.380643] Hardware name: linux,dummy-virt (DT)
[   44.381271] ==================================================================
[   44.159590] ==================================================================
[   44.160462] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   44.160462] 
[   44.161552] Out-of-bounds read at 0x00000000ac7dac03 (1B left of kfence-#157):
[   44.162528]  test_out_of_bounds_read+0x114/0x3e0
[   44.163109]  test_out_of_bounds_read+0xdc/0x3e0
[   44.163767]  kunit_try_run_case+0x14c/0x3d0
[   44.164379]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.165184]  kthread+0x24c/0x2d0
[   44.165762]  ret_from_fork+0x10/0x20
[   44.166329] 
[   44.166690] kfence-#157: 0x000000007274e0f3-0x0000000078ff0205, size=32, cache=kmalloc-32
[   44.166690] 
[   44.167648] allocated by task 276 on cpu 1 at 44.158241s (0.009395s ago):
[   44.168484]  test_alloc+0x298/0x620
[   44.169045]  test_out_of_bounds_read+0xdc/0x3e0
[   44.169723]  kunit_try_run_case+0x14c/0x3d0
[   44.170209]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.170951]  kthread+0x24c/0x2d0
[   44.171436]  ret_from_fork+0x10/0x20
[   44.172088] 
[   44.172518] CPU: 1 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   44.173495] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.174070] Hardware name: linux,dummy-virt (DT)
[   44.174711] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-kmalloc_track_caller_oob_right
[   35.649048] ==================================================================
[   35.651349] BUG: KFENCE: memory corruption in kmalloc_track_caller_oob_right+0x224/0x490
[   35.651349] 
[   35.652504] Corrupted memory at 0x0000000043c762e1 [ ! . . . . . . . ] (in kfence-#112):
[   35.656694]  kmalloc_track_caller_oob_right+0x224/0x490
[   35.657640]  kunit_try_run_case+0x14c/0x3d0
[   35.658183]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.659203]  kthread+0x24c/0x2d0
[   35.659943]  ret_from_fork+0x10/0x20
[   35.660538] 
[   35.661155] kfence-#112: 0x0000000036682ac1-0x000000005bdc357c, size=120, cache=kmalloc-128
[   35.661155] 
[   35.663000] allocated by task 131 on cpu 0 at 35.646050s (0.016442s ago):
[   35.664259]  kmalloc_track_caller_oob_right+0x184/0x490
[   35.664944]  kunit_try_run_case+0x14c/0x3d0
[   35.665728]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.666597]  kthread+0x24c/0x2d0
[   35.667034]  ret_from_fork+0x10/0x20
[   35.667628] 
[   35.668079] freed by task 131 on cpu 0 at 35.648252s (0.019674s ago):
[   35.668932]  kmalloc_track_caller_oob_right+0x224/0x490
[   35.670037]  kunit_try_run_case+0x14c/0x3d0
[   35.670624]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.671299]  kthread+0x24c/0x2d0
[   35.671959]  ret_from_fork+0x10/0x20
[   35.672684] 
[   35.673161] CPU: 0 UID: 0 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   35.674873] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.675480] Hardware name: linux,dummy-virt (DT)
[   35.676129] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[   43.779742] ==================================================================
[   43.780294] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   43.781183] Write of size 1 at addr fff00000c65d5278 by task kunit_try_catch/274
[   43.782112] 
[   43.782519] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   43.783686] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.784221] Hardware name: linux,dummy-virt (DT)
[   43.784843] Call trace:
[   43.785214]  show_stack+0x20/0x38 (C)
[   43.785838]  dump_stack_lvl+0x8c/0xd0
[   43.786490]  print_report+0x118/0x5e0
[   43.787083]  kasan_report+0xc8/0x118
[   43.787700]  __asan_report_store1_noabort+0x20/0x30
[   43.788415]  strncpy_from_user+0x270/0x2a0
[   43.788997]  copy_user_test_oob+0x5c0/0xec0
[   43.789611]  kunit_try_run_case+0x14c/0x3d0
[   43.790126]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.790903]  kthread+0x24c/0x2d0
[   43.791477]  ret_from_fork+0x10/0x20
[   43.792056] 
[   43.792376] Allocated by task 274:
[   43.792817]  kasan_save_stack+0x3c/0x68
[   43.793408]  kasan_save_track+0x20/0x40
[   43.794007]  kasan_save_alloc_info+0x40/0x58
[   43.794643]  __kasan_kmalloc+0xd4/0xd8
[   43.795134]  __kmalloc_noprof+0x188/0x4c8
[   43.795701]  kunit_kmalloc_array+0x34/0x88
[   43.796340]  copy_user_test_oob+0xac/0xec0
[   43.796949]  kunit_try_run_case+0x14c/0x3d0
[   43.797601]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.798238]  kthread+0x24c/0x2d0
[   43.798759]  ret_from_fork+0x10/0x20
[   43.799231] 
[   43.799593] The buggy address belongs to the object at fff00000c65d5200
[   43.799593]  which belongs to the cache kmalloc-128 of size 128
[   43.800833] The buggy address is located 0 bytes to the right of
[   43.800833]  allocated 120-byte region [fff00000c65d5200, fff00000c65d5278)
[   43.801908] 
[   43.802259] The buggy address belongs to the physical page:
[   43.802953] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d5
[   43.803740] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.804601] page_type: f5(slab)
[   43.805121] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   43.805942] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   43.806695] page dumped because: kasan: bad access detected
[   43.807389] 
[   43.807726] Memory state around the buggy address:
[   43.808406]  fff00000c65d5100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   43.809285]  fff00000c65d5180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.810156] >fff00000c65d5200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   43.811018]                                                                 ^
[   43.811752]  fff00000c65d5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.812545]  fff00000c65d5300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.813288] ==================================================================
[   43.740244] ==================================================================
[   43.740905] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   43.742332] Write of size 121 at addr fff00000c65d5200 by task kunit_try_catch/274
[   43.743594] 
[   43.744341] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   43.745812] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.746436] Hardware name: linux,dummy-virt (DT)
[   43.747124] Call trace:
[   43.747531]  show_stack+0x20/0x38 (C)
[   43.748190]  dump_stack_lvl+0x8c/0xd0
[   43.748901]  print_report+0x118/0x5e0
[   43.749407]  kasan_report+0xc8/0x118
[   43.749912]  kasan_check_range+0x100/0x1a8
[   43.750519]  __kasan_check_write+0x20/0x30
[   43.751080]  strncpy_from_user+0x3c/0x2a0
[   43.751801]  copy_user_test_oob+0x5c0/0xec0
[   43.752493]  kunit_try_run_case+0x14c/0x3d0
[   43.753182]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.753985]  kthread+0x24c/0x2d0
[   43.754612]  ret_from_fork+0x10/0x20
[   43.755185] 
[   43.755542] Allocated by task 274:
[   43.756080]  kasan_save_stack+0x3c/0x68
[   43.756765]  kasan_save_track+0x20/0x40
[   43.757367]  kasan_save_alloc_info+0x40/0x58
[   43.758003]  __kasan_kmalloc+0xd4/0xd8
[   43.758558]  __kmalloc_noprof+0x188/0x4c8
[   43.759118]  kunit_kmalloc_array+0x34/0x88
[   43.759780]  copy_user_test_oob+0xac/0xec0
[   43.760410]  kunit_try_run_case+0x14c/0x3d0
[   43.760995]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.761813]  kthread+0x24c/0x2d0
[   43.762395]  ret_from_fork+0x10/0x20
[   43.762969] 
[   43.763359] The buggy address belongs to the object at fff00000c65d5200
[   43.763359]  which belongs to the cache kmalloc-128 of size 128
[   43.764618] The buggy address is located 0 bytes inside of
[   43.764618]  allocated 120-byte region [fff00000c65d5200, fff00000c65d5278)
[   43.765784] 
[   43.766209] The buggy address belongs to the physical page:
[   43.766940] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d5
[   43.767824] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.768578] page_type: f5(slab)
[   43.769145] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   43.770034] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   43.770913] page dumped because: kasan: bad access detected
[   43.771523] 
[   43.771899] Memory state around the buggy address:
[   43.772542]  fff00000c65d5100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   43.773317]  fff00000c65d5180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.774113] >fff00000c65d5200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   43.774942]                                                                 ^
[   43.775802]  fff00000c65d5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.776662]  fff00000c65d5300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.777425] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[   43.587617] ==================================================================
[   43.588391] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec0
[   43.588999] Write of size 121 at addr fff00000c65d5200 by task kunit_try_catch/274
[   43.589982] 
[   43.590378] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   43.591294] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.591890] Hardware name: linux,dummy-virt (DT)
[   43.592537] Call trace:
[   43.592905]  show_stack+0x20/0x38 (C)
[   43.593534]  dump_stack_lvl+0x8c/0xd0
[   43.594140]  print_report+0x118/0x5e0
[   43.594658]  kasan_report+0xc8/0x118
[   43.595323]  kasan_check_range+0x100/0x1a8
[   43.595996]  __kasan_check_write+0x20/0x30
[   43.596682]  copy_user_test_oob+0x35c/0xec0
[   43.597290]  kunit_try_run_case+0x14c/0x3d0
[   43.597985]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.598760]  kthread+0x24c/0x2d0
[   43.599320]  ret_from_fork+0x10/0x20
[   43.599865] 
[   43.600211] Allocated by task 274:
[   43.600758]  kasan_save_stack+0x3c/0x68
[   43.601252]  kasan_save_track+0x20/0x40
[   43.601857]  kasan_save_alloc_info+0x40/0x58
[   43.602473]  __kasan_kmalloc+0xd4/0xd8
[   43.602914]  __kmalloc_noprof+0x188/0x4c8
[   43.603532]  kunit_kmalloc_array+0x34/0x88
[   43.604138]  copy_user_test_oob+0xac/0xec0
[   43.604786]  kunit_try_run_case+0x14c/0x3d0
[   43.605482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.606156]  kthread+0x24c/0x2d0
[   43.606643]  ret_from_fork+0x10/0x20
[   43.607114] 
[   43.607474] The buggy address belongs to the object at fff00000c65d5200
[   43.607474]  which belongs to the cache kmalloc-128 of size 128
[   43.608720] The buggy address is located 0 bytes inside of
[   43.608720]  allocated 120-byte region [fff00000c65d5200, fff00000c65d5278)
[   43.609982] 
[   43.610315] The buggy address belongs to the physical page:
[   43.611021] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d5
[   43.611802] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.612640] page_type: f5(slab)
[   43.613146] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   43.613976] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   43.614775] page dumped because: kasan: bad access detected
[   43.615482] 
[   43.615803] Memory state around the buggy address:
[   43.616461]  fff00000c65d5100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   43.617238]  fff00000c65d5180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.618043] >fff00000c65d5200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   43.618826]                                                                 ^
[   43.619722]  fff00000c65d5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.620504]  fff00000c65d5300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.621288] ==================================================================
[   43.488366] ==================================================================
[   43.489705] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec0
[   43.490872] Write of size 121 at addr fff00000c65d5200 by task kunit_try_catch/274
[   43.491753] 
[   43.492181] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   43.493580] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.494309] Hardware name: linux,dummy-virt (DT)
[   43.495675] Call trace:
[   43.496184]  show_stack+0x20/0x38 (C)
[   43.496855]  dump_stack_lvl+0x8c/0xd0
[   43.497585]  print_report+0x118/0x5e0
[   43.498319]  kasan_report+0xc8/0x118
[   43.498917]  kasan_check_range+0x100/0x1a8
[   43.499600]  __kasan_check_write+0x20/0x30
[   43.500247]  copy_user_test_oob+0x234/0xec0
[   43.500823]  kunit_try_run_case+0x14c/0x3d0
[   43.501873]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.502781]  kthread+0x24c/0x2d0
[   43.503201]  ret_from_fork+0x10/0x20
[   43.503894] 
[   43.504333] Allocated by task 274:
[   43.504983]  kasan_save_stack+0x3c/0x68
[   43.505938]  kasan_save_track+0x20/0x40
[   43.506640]  kasan_save_alloc_info+0x40/0x58
[   43.507304]  __kasan_kmalloc+0xd4/0xd8
[   43.507899]  __kmalloc_noprof+0x188/0x4c8
[   43.508531]  kunit_kmalloc_array+0x34/0x88
[   43.509150]  copy_user_test_oob+0xac/0xec0
[   43.510225]  kunit_try_run_case+0x14c/0x3d0
[   43.510833]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.511603]  kthread+0x24c/0x2d0
[   43.512343]  ret_from_fork+0x10/0x20
[   43.513040] 
[   43.513745] The buggy address belongs to the object at fff00000c65d5200
[   43.513745]  which belongs to the cache kmalloc-128 of size 128
[   43.515140] The buggy address is located 0 bytes inside of
[   43.515140]  allocated 120-byte region [fff00000c65d5200, fff00000c65d5278)
[   43.516480] 
[   43.516851] The buggy address belongs to the physical page:
[   43.517525] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d5
[   43.518366] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.519822] page_type: f5(slab)
[   43.520946] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   43.522142] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   43.523276] page dumped because: kasan: bad access detected
[   43.523851] 
[   43.524088] Memory state around the buggy address:
[   43.524625]  fff00000c65d5100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   43.526179]  fff00000c65d5180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.527038] >fff00000c65d5200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   43.528472]                                                                 ^
[   43.529491]  fff00000c65d5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.530684]  fff00000c65d5300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.531425] ==================================================================
[   43.540117] ==================================================================
[   43.540926] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec0
[   43.542267] Read of size 121 at addr fff00000c65d5200 by task kunit_try_catch/274
[   43.543589] 
[   43.543898] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   43.545171] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.546262] Hardware name: linux,dummy-virt (DT)
[   43.547208] Call trace:
[   43.547588]  show_stack+0x20/0x38 (C)
[   43.548152]  dump_stack_lvl+0x8c/0xd0
[   43.548603]  print_report+0x118/0x5e0
[   43.549259]  kasan_report+0xc8/0x118
[   43.549936]  kasan_check_range+0x100/0x1a8
[   43.550561]  __kasan_check_read+0x20/0x30
[   43.551161]  copy_user_test_oob+0x728/0xec0
[   43.551882]  kunit_try_run_case+0x14c/0x3d0
[   43.552598]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.553391]  kthread+0x24c/0x2d0
[   43.554032]  ret_from_fork+0x10/0x20
[   43.554656] 
[   43.555040] Allocated by task 274:
[   43.555525]  kasan_save_stack+0x3c/0x68
[   43.556126]  kasan_save_track+0x20/0x40
[   43.556780]  kasan_save_alloc_info+0x40/0x58
[   43.557482]  __kasan_kmalloc+0xd4/0xd8
[   43.558067]  __kmalloc_noprof+0x188/0x4c8
[   43.558658]  kunit_kmalloc_array+0x34/0x88
[   43.559277]  copy_user_test_oob+0xac/0xec0
[   43.559929]  kunit_try_run_case+0x14c/0x3d0
[   43.560487]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.561278]  kthread+0x24c/0x2d0
[   43.561876]  ret_from_fork+0x10/0x20
[   43.562519] 
[   43.562900] The buggy address belongs to the object at fff00000c65d5200
[   43.562900]  which belongs to the cache kmalloc-128 of size 128
[   43.564146] The buggy address is located 0 bytes inside of
[   43.564146]  allocated 120-byte region [fff00000c65d5200, fff00000c65d5278)
[   43.565520] 
[   43.565926] The buggy address belongs to the physical page:
[   43.566623] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d5
[   43.567519] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.568298] page_type: f5(slab)
[   43.568917] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   43.569786] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   43.570757] page dumped because: kasan: bad access detected
[   43.571382] 
[   43.571748] Memory state around the buggy address:
[   43.572334]  fff00000c65d5100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   43.573111]  fff00000c65d5180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.573939] >fff00000c65d5200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   43.574621]                                                                 ^
[   43.575417]  fff00000c65d5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.576179]  fff00000c65d5300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.577021] ==================================================================
[   43.623388] ==================================================================
[   43.624526] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec0
[   43.625146] Read of size 121 at addr fff00000c65d5200 by task kunit_try_catch/274
[   43.626512] 
[   43.626864] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   43.628382] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.629118] Hardware name: linux,dummy-virt (DT)
[   43.629916] Call trace:
[   43.630501]  show_stack+0x20/0x38 (C)
[   43.631240]  dump_stack_lvl+0x8c/0xd0
[   43.631845]  print_report+0x118/0x5e0
[   43.632628]  kasan_report+0xc8/0x118
[   43.633337]  kasan_check_range+0x100/0x1a8
[   43.634125]  __kasan_check_read+0x20/0x30
[   43.634869]  copy_user_test_oob+0x3c8/0xec0
[   43.635716]  kunit_try_run_case+0x14c/0x3d0
[   43.636561]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.637472]  kthread+0x24c/0x2d0
[   43.638003]  ret_from_fork+0x10/0x20
[   43.638758] 
[   43.639090] Allocated by task 274:
[   43.639598]  kasan_save_stack+0x3c/0x68
[   43.640237]  kasan_save_track+0x20/0x40
[   43.640840]  kasan_save_alloc_info+0x40/0x58
[   43.641418]  __kasan_kmalloc+0xd4/0xd8
[   43.642002]  __kmalloc_noprof+0x188/0x4c8
[   43.642652]  kunit_kmalloc_array+0x34/0x88
[   43.643306]  copy_user_test_oob+0xac/0xec0
[   43.643919]  kunit_try_run_case+0x14c/0x3d0
[   43.644546]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.645140]  kthread+0x24c/0x2d0
[   43.645718]  ret_from_fork+0x10/0x20
[   43.646284] 
[   43.646678] The buggy address belongs to the object at fff00000c65d5200
[   43.646678]  which belongs to the cache kmalloc-128 of size 128
[   43.648024] The buggy address is located 0 bytes inside of
[   43.648024]  allocated 120-byte region [fff00000c65d5200, fff00000c65d5278)
[   43.649372] 
[   43.649737] The buggy address belongs to the physical page:
[   43.650370] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d5
[   43.651422] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.652076] page_type: f5(slab)
[   43.652504] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   43.653665] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   43.654721] page dumped because: kasan: bad access detected
[   43.655549] 
[   43.655938] Memory state around the buggy address:
[   43.656655]  fff00000c65d5100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   43.657485]  fff00000c65d5180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.658301] >fff00000c65d5200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   43.659148]                                                                 ^
[   43.660005]  fff00000c65d5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.660888]  fff00000c65d5300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.661732] ==================================================================
[   43.702615] ==================================================================
[   43.703584] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec0
[   43.704396] Read of size 121 at addr fff00000c65d5200 by task kunit_try_catch/274
[   43.705209] 
[   43.705684] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   43.706906] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.707530] Hardware name: linux,dummy-virt (DT)
[   43.708164] Call trace:
[   43.708615]  show_stack+0x20/0x38 (C)
[   43.709302]  dump_stack_lvl+0x8c/0xd0
[   43.709891]  print_report+0x118/0x5e0
[   43.710481]  kasan_report+0xc8/0x118
[   43.711107]  kasan_check_range+0x100/0x1a8
[   43.711800]  __kasan_check_read+0x20/0x30
[   43.712420]  copy_user_test_oob+0x4a0/0xec0
[   43.713125]  kunit_try_run_case+0x14c/0x3d0
[   43.713874]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.714624]  kthread+0x24c/0x2d0
[   43.715076]  ret_from_fork+0x10/0x20
[   43.715594] 
[   43.715893] Allocated by task 274:
[   43.716363]  kasan_save_stack+0x3c/0x68
[   43.716915]  kasan_save_track+0x20/0x40
[   43.717519]  kasan_save_alloc_info+0x40/0x58
[   43.718045]  __kasan_kmalloc+0xd4/0xd8
[   43.718709]  __kmalloc_noprof+0x188/0x4c8
[   43.719306]  kunit_kmalloc_array+0x34/0x88
[   43.719847]  copy_user_test_oob+0xac/0xec0
[   43.720495]  kunit_try_run_case+0x14c/0x3d0
[   43.721089]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.721886]  kthread+0x24c/0x2d0
[   43.722484]  ret_from_fork+0x10/0x20
[   43.723052] 
[   43.723375] The buggy address belongs to the object at fff00000c65d5200
[   43.723375]  which belongs to the cache kmalloc-128 of size 128
[   43.724635] The buggy address is located 0 bytes inside of
[   43.724635]  allocated 120-byte region [fff00000c65d5200, fff00000c65d5278)
[   43.725840] 
[   43.726184] The buggy address belongs to the physical page:
[   43.726897] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d5
[   43.727835] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.728605] page_type: f5(slab)
[   43.729185] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   43.730136] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   43.731025] page dumped because: kasan: bad access detected
[   43.731677] 
[   43.732053] Memory state around the buggy address:
[   43.732697]  fff00000c65d5100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   43.733611]  fff00000c65d5180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.734393] >fff00000c65d5200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   43.735248]                                                                 ^
[   43.736071]  fff00000c65d5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.736943]  fff00000c65d5300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.737713] ==================================================================
[   43.663780] ==================================================================
[   43.664660] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec0
[   43.665070] Write of size 121 at addr fff00000c65d5200 by task kunit_try_catch/274
[   43.665718] 
[   43.666166] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   43.667379] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.667860] Hardware name: linux,dummy-virt (DT)
[   43.668333] Call trace:
[   43.669275]  show_stack+0x20/0x38 (C)
[   43.670002]  dump_stack_lvl+0x8c/0xd0
[   43.670723]  print_report+0x118/0x5e0
[   43.671326]  kasan_report+0xc8/0x118
[   43.672130]  kasan_check_range+0x100/0x1a8
[   43.672914]  __kasan_check_write+0x20/0x30
[   43.673684]  copy_user_test_oob+0x434/0xec0
[   43.674296]  kunit_try_run_case+0x14c/0x3d0
[   43.675106]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.675986]  kthread+0x24c/0x2d0
[   43.676698]  ret_from_fork+0x10/0x20
[   43.677280] 
[   43.677855] Allocated by task 274:
[   43.678482]  kasan_save_stack+0x3c/0x68
[   43.679067]  kasan_save_track+0x20/0x40
[   43.679579]  kasan_save_alloc_info+0x40/0x58
[   43.680107]  __kasan_kmalloc+0xd4/0xd8
[   43.681140]  __kmalloc_noprof+0x188/0x4c8
[   43.681647]  kunit_kmalloc_array+0x34/0x88
[   43.682480]  copy_user_test_oob+0xac/0xec0
[   43.683048]  kunit_try_run_case+0x14c/0x3d0
[   43.683594]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.684371]  kthread+0x24c/0x2d0
[   43.684876]  ret_from_fork+0x10/0x20
[   43.685481] 
[   43.685827] The buggy address belongs to the object at fff00000c65d5200
[   43.685827]  which belongs to the cache kmalloc-128 of size 128
[   43.687074] The buggy address is located 0 bytes inside of
[   43.687074]  allocated 120-byte region [fff00000c65d5200, fff00000c65d5278)
[   43.688334] 
[   43.688778] The buggy address belongs to the physical page:
[   43.689423] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d5
[   43.690257] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.691129] page_type: f5(slab)
[   43.691724] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   43.692684] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   43.693594] page dumped because: kasan: bad access detected
[   43.694239] 
[   43.694636] Memory state around the buggy address:
[   43.695285]  fff00000c65d5100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   43.696011]  fff00000c65d5180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.696656] >fff00000c65d5200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   43.697541]                                                                 ^
[   43.698326]  fff00000c65d5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.699239]  fff00000c65d5300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.700115] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[   43.252021] ==================================================================
[   43.253415] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   43.254901] Read of size 1 at addr ffff80008010b7f3 by task kunit_try_catch/258
[   43.255777] 
[   43.256099] CPU: 1 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   43.257171] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.257991] Hardware name: linux,dummy-virt (DT)
[   43.258904] Call trace:
[   43.259338]  show_stack+0x20/0x38 (C)
[   43.260028]  dump_stack_lvl+0x8c/0xd0
[   43.260672]  print_report+0x2fc/0x5e0
[   43.261586]  kasan_report+0xc8/0x118
[   43.262218]  __asan_report_load1_noabort+0x20/0x30
[   43.262835]  vmalloc_oob+0x578/0x5d0
[   43.263406]  kunit_try_run_case+0x14c/0x3d0
[   43.264068]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.264742]  kthread+0x24c/0x2d0
[   43.265521]  ret_from_fork+0x10/0x20
[   43.266309] 
[   43.266657] The buggy address belongs to the virtual mapping at
[   43.266657]  [ffff80008010b000, ffff80008010d000) created by:
[   43.266657]  vmalloc_oob+0x98/0x5d0
[   43.268089] 
[   43.268420] The buggy address belongs to the physical page:
[   43.269112] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10655e
[   43.270056] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.271053] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   43.271775] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   43.272617] page dumped because: kasan: bad access detected
[   43.273188] 
[   43.274189] Memory state around the buggy address:
[   43.274758]  ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   43.275650]  ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   43.276363] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   43.277065]                                                              ^
[   43.278487]  ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   43.279397]  ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   43.280183] ==================================================================
[   43.283062] ==================================================================
[   43.283765] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   43.284878] Read of size 1 at addr ffff80008010b7f8 by task kunit_try_catch/258
[   43.286522] 
[   43.286942] CPU: 1 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   43.288322] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.289038] Hardware name: linux,dummy-virt (DT)
[   43.290188] Call trace:
[   43.290562]  show_stack+0x20/0x38 (C)
[   43.291089]  dump_stack_lvl+0x8c/0xd0
[   43.291630]  print_report+0x2fc/0x5e0
[   43.292205]  kasan_report+0xc8/0x118
[   43.292745]  __asan_report_load1_noabort+0x20/0x30
[   43.293967]  vmalloc_oob+0x51c/0x5d0
[   43.294566]  kunit_try_run_case+0x14c/0x3d0
[   43.295454]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.296387]  kthread+0x24c/0x2d0
[   43.296942]  ret_from_fork+0x10/0x20
[   43.297899] 
[   43.298485] The buggy address belongs to the virtual mapping at
[   43.298485]  [ffff80008010b000, ffff80008010d000) created by:
[   43.298485]  vmalloc_oob+0x98/0x5d0
[   43.300063] 
[   43.300328] The buggy address belongs to the physical page:
[   43.301128] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10655e
[   43.302627] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.303541] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   43.304574] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   43.305576] page dumped because: kasan: bad access detected
[   43.306137] 
[   43.306392] Memory state around the buggy address:
[   43.307959]  ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   43.308901]  ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   43.310008] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   43.310829]                                                                 ^
[   43.311841]  ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   43.312776]  ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   43.313795] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   43.040889] ==================================================================
[   43.041680] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   43.042558] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   43.043219] 
[   43.044870] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   43.046256] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.046796] Hardware name: linux,dummy-virt (DT)
[   43.047651] Call trace:
[   43.048209]  show_stack+0x20/0x38 (C)
[   43.048815]  dump_stack_lvl+0x8c/0xd0
[   43.049651]  print_report+0x118/0x5e0
[   43.050433]  kasan_report+0xc8/0x118
[   43.051126]  kasan_check_range+0x100/0x1a8
[   43.051746]  __kasan_check_write+0x20/0x30
[   43.052300]  kasan_atomics_helper+0x16d0/0x4858
[   43.053257]  kasan_atomics+0x198/0x2e8
[   43.053972]  kunit_try_run_case+0x14c/0x3d0
[   43.054735]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.055611]  kthread+0x24c/0x2d0
[   43.056328]  ret_from_fork+0x10/0x20
[   43.056897] 
[   43.057484] Allocated by task 254:
[   43.058102]  kasan_save_stack+0x3c/0x68
[   43.058821]  kasan_save_track+0x20/0x40
[   43.059364]  kasan_save_alloc_info+0x40/0x58
[   43.060205]  __kasan_kmalloc+0xd4/0xd8
[   43.060963]  __kmalloc_cache_noprof+0x15c/0x3c8
[   43.061602]  kasan_atomics+0xb8/0x2e8
[   43.062368]  kunit_try_run_case+0x14c/0x3d0
[   43.063120]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.063968]  kthread+0x24c/0x2d0
[   43.064652]  ret_from_fork+0x10/0x20
[   43.065150] 
[   43.065728] The buggy address belongs to the object at fff00000c65bde00
[   43.065728]  which belongs to the cache kmalloc-64 of size 64
[   43.067076] The buggy address is located 0 bytes to the right of
[   43.067076]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   43.068525] 
[   43.069083] The buggy address belongs to the physical page:
[   43.069720] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   43.070718] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.071731] page_type: f5(slab)
[   43.072427] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   43.073476] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   43.074306] page dumped because: kasan: bad access detected
[   43.075160] 
[   43.075671] Memory state around the buggy address:
[   43.076415]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.077271]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.078067] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   43.078895]                                      ^
[   43.079508]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.080335]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.081144] ==================================================================
[   42.595035] ==================================================================
[   42.595782] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   42.596662] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   42.597515] 
[   42.597899] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   42.599068] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.599630] Hardware name: linux,dummy-virt (DT)
[   42.600246] Call trace:
[   42.600706]  show_stack+0x20/0x38 (C)
[   42.601392]  dump_stack_lvl+0x8c/0xd0
[   42.602013]  print_report+0x118/0x5e0
[   42.602691]  kasan_report+0xc8/0x118
[   42.603321]  kasan_check_range+0x100/0x1a8
[   42.604049]  __kasan_check_write+0x20/0x30
[   42.604663]  kasan_atomics_helper+0x126c/0x4858
[   42.605486]  kasan_atomics+0x198/0x2e8
[   42.606163]  kunit_try_run_case+0x14c/0x3d0
[   42.606814]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.607598]  kthread+0x24c/0x2d0
[   42.608194]  ret_from_fork+0x10/0x20
[   42.608814] 
[   42.609143] Allocated by task 254:
[   42.609705]  kasan_save_stack+0x3c/0x68
[   42.610234]  kasan_save_track+0x20/0x40
[   42.610929]  kasan_save_alloc_info+0x40/0x58
[   42.611551]  __kasan_kmalloc+0xd4/0xd8
[   42.612164]  __kmalloc_cache_noprof+0x15c/0x3c8
[   42.612801]  kasan_atomics+0xb8/0x2e8
[   42.613396]  kunit_try_run_case+0x14c/0x3d0
[   42.614001]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.614747]  kthread+0x24c/0x2d0
[   42.615397]  ret_from_fork+0x10/0x20
[   42.615927] 
[   42.616322] The buggy address belongs to the object at fff00000c65bde00
[   42.616322]  which belongs to the cache kmalloc-64 of size 64
[   42.617515] The buggy address is located 0 bytes to the right of
[   42.617515]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   42.618785] 
[   42.619166] The buggy address belongs to the physical page:
[   42.619800] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   42.620746] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.621604] page_type: f5(slab)
[   42.622178] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.623102] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.624007] page dumped because: kasan: bad access detected
[   42.624769] 
[   42.625365] Memory state around the buggy address:
[   42.626080]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.626855]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.627709] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.628747]                                      ^
[   42.629622]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.630799]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.631881] ==================================================================
[   41.404222] ==================================================================
[   41.405093] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   41.406118] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   41.407549] 
[   41.408071] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   41.409193] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.410040] Hardware name: linux,dummy-virt (DT)
[   41.410809] Call trace:
[   41.411383]  show_stack+0x20/0x38 (C)
[   41.412145]  dump_stack_lvl+0x8c/0xd0
[   41.412891]  print_report+0x118/0x5e0
[   41.413683]  kasan_report+0xc8/0x118
[   41.414182]  kasan_check_range+0x100/0x1a8
[   41.414766]  __kasan_check_write+0x20/0x30
[   41.415317]  kasan_atomics_helper+0x6ec/0x4858
[   41.416398]  kasan_atomics+0x198/0x2e8
[   41.417151]  kunit_try_run_case+0x14c/0x3d0
[   41.417953]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.418862]  kthread+0x24c/0x2d0
[   41.419560]  ret_from_fork+0x10/0x20
[   41.420297] 
[   41.420639] Allocated by task 254:
[   41.421392]  kasan_save_stack+0x3c/0x68
[   41.422132]  kasan_save_track+0x20/0x40
[   41.422786]  kasan_save_alloc_info+0x40/0x58
[   41.423418]  __kasan_kmalloc+0xd4/0xd8
[   41.424263]  __kmalloc_cache_noprof+0x15c/0x3c8
[   41.425130]  kasan_atomics+0xb8/0x2e8
[   41.425845]  kunit_try_run_case+0x14c/0x3d0
[   41.426434]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.427370]  kthread+0x24c/0x2d0
[   41.428087]  ret_from_fork+0x10/0x20
[   41.428857] 
[   41.429192] The buggy address belongs to the object at fff00000c65bde00
[   41.429192]  which belongs to the cache kmalloc-64 of size 64
[   41.430665] The buggy address is located 0 bytes to the right of
[   41.430665]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   41.432121] 
[   41.432701] The buggy address belongs to the physical page:
[   41.433311] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   41.434123] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.434994] page_type: f5(slab)
[   41.435455] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.436370] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.437218] page dumped because: kasan: bad access detected
[   41.437828] 
[   41.438159] Memory state around the buggy address:
[   41.438667]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.439545]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.440342] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.441113]                                      ^
[   41.441632]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.442491]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.443318] ==================================================================
[   42.145210] ==================================================================
[   42.146371] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   42.147285] Read of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   42.147924] 
[   42.148320] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   42.149708] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.150435] Hardware name: linux,dummy-virt (DT)
[   42.151118] Call trace:
[   42.151579]  show_stack+0x20/0x38 (C)
[   42.152265]  dump_stack_lvl+0x8c/0xd0
[   42.152911]  print_report+0x118/0x5e0
[   42.153534]  kasan_report+0xc8/0x118
[   42.154117]  __asan_report_load8_noabort+0x20/0x30
[   42.154804]  kasan_atomics_helper+0x3f58/0x4858
[   42.155398]  kasan_atomics+0x198/0x2e8
[   42.156043]  kunit_try_run_case+0x14c/0x3d0
[   42.156733]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.157495]  kthread+0x24c/0x2d0
[   42.158056]  ret_from_fork+0x10/0x20
[   42.158659] 
[   42.159043] Allocated by task 254:
[   42.159547]  kasan_save_stack+0x3c/0x68
[   42.160203]  kasan_save_track+0x20/0x40
[   42.160836]  kasan_save_alloc_info+0x40/0x58
[   42.161519]  __kasan_kmalloc+0xd4/0xd8
[   42.162130]  __kmalloc_cache_noprof+0x15c/0x3c8
[   42.162838]  kasan_atomics+0xb8/0x2e8
[   42.163421]  kunit_try_run_case+0x14c/0x3d0
[   42.164073]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.164823]  kthread+0x24c/0x2d0
[   42.165404]  ret_from_fork+0x10/0x20
[   42.166046] 
[   42.166419] The buggy address belongs to the object at fff00000c65bde00
[   42.166419]  which belongs to the cache kmalloc-64 of size 64
[   42.167615] The buggy address is located 0 bytes to the right of
[   42.167615]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   42.168903] 
[   42.169236] The buggy address belongs to the physical page:
[   42.169924] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   42.170937] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.171702] page_type: f5(slab)
[   42.172306] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.173165] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.174102] page dumped because: kasan: bad access detected
[   42.174760] 
[   42.175137] Memory state around the buggy address:
[   42.175776]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.176647]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.177520] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.178363]                                      ^
[   42.178950]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.179862]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.180651] ==================================================================
[   40.714682] ==================================================================
[   40.716377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   40.717185] Read of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   40.719089] 
[   40.719780] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   40.721092] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.721938] Hardware name: linux,dummy-virt (DT)
[   40.722687] Call trace:
[   40.723354]  show_stack+0x20/0x38 (C)
[   40.724391]  dump_stack_lvl+0x8c/0xd0
[   40.724993]  print_report+0x118/0x5e0
[   40.725924]  kasan_report+0xc8/0x118
[   40.726562]  __asan_report_load4_noabort+0x20/0x30
[   40.727412]  kasan_atomics_helper+0x40a8/0x4858
[   40.728193]  kasan_atomics+0x198/0x2e8
[   40.728933]  kunit_try_run_case+0x14c/0x3d0
[   40.729785]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.730278]  kthread+0x24c/0x2d0
[   40.730705]  ret_from_fork+0x10/0x20
[   40.731224] 
[   40.731682] Allocated by task 254:
[   40.732364]  kasan_save_stack+0x3c/0x68
[   40.733109]  kasan_save_track+0x20/0x40
[   40.733808]  kasan_save_alloc_info+0x40/0x58
[   40.734659]  __kasan_kmalloc+0xd4/0xd8
[   40.735503]  __kmalloc_cache_noprof+0x15c/0x3c8
[   40.736313]  kasan_atomics+0xb8/0x2e8
[   40.737025]  kunit_try_run_case+0x14c/0x3d0
[   40.737877]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.739114]  kthread+0x24c/0x2d0
[   40.739605]  ret_from_fork+0x10/0x20
[   40.740538] 
[   40.740948] The buggy address belongs to the object at fff00000c65bde00
[   40.740948]  which belongs to the cache kmalloc-64 of size 64
[   40.743119] The buggy address is located 0 bytes to the right of
[   40.743119]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   40.744262] 
[   40.744971] The buggy address belongs to the physical page:
[   40.745711] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   40.746792] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.747323] page_type: f5(slab)
[   40.747727] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   40.749156] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   40.750256] page dumped because: kasan: bad access detected
[   40.751110] 
[   40.751646] Memory state around the buggy address:
[   40.752474]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   40.753735]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   40.754872] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   40.755801]                                      ^
[   40.756531]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.757899]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.759000] ==================================================================
[   41.592487] ==================================================================
[   41.593303] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   41.594203] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   41.594809] 
[   41.595196] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   41.596142] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.596674] Hardware name: linux,dummy-virt (DT)
[   41.597137] Call trace:
[   41.597583]  show_stack+0x20/0x38 (C)
[   41.598207]  dump_stack_lvl+0x8c/0xd0
[   41.598832]  print_report+0x118/0x5e0
[   41.599385]  kasan_report+0xc8/0x118
[   41.599908]  kasan_check_range+0x100/0x1a8
[   41.600558]  __kasan_check_write+0x20/0x30
[   41.601136]  kasan_atomics_helper+0x934/0x4858
[   41.601716]  kasan_atomics+0x198/0x2e8
[   41.602319]  kunit_try_run_case+0x14c/0x3d0
[   41.603009]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.603709]  kthread+0x24c/0x2d0
[   41.604278]  ret_from_fork+0x10/0x20
[   41.604851] 
[   41.605166] Allocated by task 254:
[   41.605705]  kasan_save_stack+0x3c/0x68
[   41.606209]  kasan_save_track+0x20/0x40
[   41.606809]  kasan_save_alloc_info+0x40/0x58
[   41.607409]  __kasan_kmalloc+0xd4/0xd8
[   41.607912]  __kmalloc_cache_noprof+0x15c/0x3c8
[   41.608599]  kasan_atomics+0xb8/0x2e8
[   41.609157]  kunit_try_run_case+0x14c/0x3d0
[   41.609760]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.610510]  kthread+0x24c/0x2d0
[   41.611046]  ret_from_fork+0x10/0x20
[   41.611551] 
[   41.611834] The buggy address belongs to the object at fff00000c65bde00
[   41.611834]  which belongs to the cache kmalloc-64 of size 64
[   41.613162] The buggy address is located 0 bytes to the right of
[   41.613162]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   41.614355] 
[   41.614728] The buggy address belongs to the physical page:
[   41.615381] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   41.616077] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.616912] page_type: f5(slab)
[   41.617476] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.618244] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.619093] page dumped because: kasan: bad access detected
[   41.619794] 
[   41.620108] Memory state around the buggy address:
[   41.620769]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.621539]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.622345] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.623061]                                      ^
[   41.623651]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.624494]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.625109] ==================================================================
[   41.850831] ==================================================================
[   41.851571] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   41.852357] Read of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   41.853109] 
[   41.853706] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   41.854781] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.855296] Hardware name: linux,dummy-virt (DT)
[   41.856359] Call trace:
[   41.856940]  show_stack+0x20/0x38 (C)
[   41.857685]  dump_stack_lvl+0x8c/0xd0
[   41.858394]  print_report+0x118/0x5e0
[   41.859087]  kasan_report+0xc8/0x118
[   41.859789]  __asan_report_load4_noabort+0x20/0x30
[   41.860612]  kasan_atomics_helper+0x3dbc/0x4858
[   41.861377]  kasan_atomics+0x198/0x2e8
[   41.862076]  kunit_try_run_case+0x14c/0x3d0
[   41.862654]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.863320]  kthread+0x24c/0x2d0
[   41.863838]  ret_from_fork+0x10/0x20
[   41.864347] 
[   41.865219] Allocated by task 254:
[   41.865630]  kasan_save_stack+0x3c/0x68
[   41.866420]  kasan_save_track+0x20/0x40
[   41.866896]  kasan_save_alloc_info+0x40/0x58
[   41.867529]  __kasan_kmalloc+0xd4/0xd8
[   41.868015]  __kmalloc_cache_noprof+0x15c/0x3c8
[   41.868694]  kasan_atomics+0xb8/0x2e8
[   41.869238]  kunit_try_run_case+0x14c/0x3d0
[   41.869789]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.870520]  kthread+0x24c/0x2d0
[   41.870959]  ret_from_fork+0x10/0x20
[   41.871538] 
[   41.871892] The buggy address belongs to the object at fff00000c65bde00
[   41.871892]  which belongs to the cache kmalloc-64 of size 64
[   41.873058] The buggy address is located 0 bytes to the right of
[   41.873058]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   41.874189] 
[   41.874549] The buggy address belongs to the physical page:
[   41.875150] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   41.875974] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.876728] page_type: f5(slab)
[   41.877257] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.878059] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.878757] page dumped because: kasan: bad access detected
[   41.879460] 
[   41.879806] Memory state around the buggy address:
[   41.880431]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.881213]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.882019] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.882775]                                      ^
[   41.883315]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.884519]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.885465] ==================================================================
[   42.896471] ==================================================================
[   42.897173] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   42.898244] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   42.899631] 
[   42.900042] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   42.901226] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.901806] Hardware name: linux,dummy-virt (DT)
[   42.902354] Call trace:
[   42.902744]  show_stack+0x20/0x38 (C)
[   42.903380]  dump_stack_lvl+0x8c/0xd0
[   42.903927]  print_report+0x118/0x5e0
[   42.904467]  kasan_report+0xc8/0x118
[   42.904939]  kasan_check_range+0x100/0x1a8
[   42.905550]  __kasan_check_write+0x20/0x30
[   42.906154]  kasan_atomics_helper+0x15b4/0x4858
[   42.906783]  kasan_atomics+0x198/0x2e8
[   42.907262]  kunit_try_run_case+0x14c/0x3d0
[   42.907973]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.908796]  kthread+0x24c/0x2d0
[   42.909371]  ret_from_fork+0x10/0x20
[   42.910072] 
[   42.910453] Allocated by task 254:
[   42.911003]  kasan_save_stack+0x3c/0x68
[   42.911585]  kasan_save_track+0x20/0x40
[   42.912112]  kasan_save_alloc_info+0x40/0x58
[   42.912681]  __kasan_kmalloc+0xd4/0xd8
[   42.913292]  __kmalloc_cache_noprof+0x15c/0x3c8
[   42.913964]  kasan_atomics+0xb8/0x2e8
[   42.914428]  kunit_try_run_case+0x14c/0x3d0
[   42.915144]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.915829]  kthread+0x24c/0x2d0
[   42.916402]  ret_from_fork+0x10/0x20
[   42.916992] 
[   42.917319] The buggy address belongs to the object at fff00000c65bde00
[   42.917319]  which belongs to the cache kmalloc-64 of size 64
[   42.918588] The buggy address is located 0 bytes to the right of
[   42.918588]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   42.919866] 
[   42.920248] The buggy address belongs to the physical page:
[   42.920962] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   42.921791] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.922569] page_type: f5(slab)
[   42.923044] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.923935] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.924786] page dumped because: kasan: bad access detected
[   42.925474] 
[   42.925807] Memory state around the buggy address:
[   42.926354]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.927260]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.928126] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.928968]                                      ^
[   42.929617]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.930486]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.931306] ==================================================================
[   42.672694] ==================================================================
[   42.673416] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   42.674854] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   42.675622] 
[   42.676035] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   42.677309] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.677898] Hardware name: linux,dummy-virt (DT)
[   42.678604] Call trace:
[   42.679078]  show_stack+0x20/0x38 (C)
[   42.679768]  dump_stack_lvl+0x8c/0xd0
[   42.680389]  print_report+0x118/0x5e0
[   42.680982]  kasan_report+0xc8/0x118
[   42.681660]  kasan_check_range+0x100/0x1a8
[   42.682306]  __kasan_check_write+0x20/0x30
[   42.683023]  kasan_atomics_helper+0x1384/0x4858
[   42.683722]  kasan_atomics+0x198/0x2e8
[   42.684400]  kunit_try_run_case+0x14c/0x3d0
[   42.685038]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.685780]  kthread+0x24c/0x2d0
[   42.686349]  ret_from_fork+0x10/0x20
[   42.686943] 
[   42.687322] Allocated by task 254:
[   42.687913]  kasan_save_stack+0x3c/0x68
[   42.688508]  kasan_save_track+0x20/0x40
[   42.689068]  kasan_save_alloc_info+0x40/0x58
[   42.689756]  __kasan_kmalloc+0xd4/0xd8
[   42.690327]  __kmalloc_cache_noprof+0x15c/0x3c8
[   42.691013]  kasan_atomics+0xb8/0x2e8
[   42.691526]  kunit_try_run_case+0x14c/0x3d0
[   42.692253]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.692999]  kthread+0x24c/0x2d0
[   42.693623]  ret_from_fork+0x10/0x20
[   42.694187] 
[   42.694555] The buggy address belongs to the object at fff00000c65bde00
[   42.694555]  which belongs to the cache kmalloc-64 of size 64
[   42.695992] The buggy address is located 0 bytes to the right of
[   42.695992]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   42.696851] 
[   42.697023] The buggy address belongs to the physical page:
[   42.697306] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   42.698474] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.699146] page_type: f5(slab)
[   42.699755] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.700702] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.701633] page dumped because: kasan: bad access detected
[   42.702251] 
[   42.702558] Memory state around the buggy address:
[   42.703118]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.703882]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.704593] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.705529]                                      ^
[   42.706221]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.707140]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.707949] ==================================================================
[   42.404202] ==================================================================
[   42.404945] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   42.405772] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   42.406589] 
[   42.407017] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   42.408222] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.408751] Hardware name: linux,dummy-virt (DT)
[   42.409428] Call trace:
[   42.409908]  show_stack+0x20/0x38 (C)
[   42.410533]  dump_stack_lvl+0x8c/0xd0
[   42.411220]  print_report+0x118/0x5e0
[   42.411844]  kasan_report+0xc8/0x118
[   42.412378]  kasan_check_range+0x100/0x1a8
[   42.412960]  __kasan_check_write+0x20/0x30
[   42.413635]  kasan_atomics_helper+0x1058/0x4858
[   42.414324]  kasan_atomics+0x198/0x2e8
[   42.414978]  kunit_try_run_case+0x14c/0x3d0
[   42.415710]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.416477]  kthread+0x24c/0x2d0
[   42.417059]  ret_from_fork+0x10/0x20
[   42.417660] 
[   42.418048] Allocated by task 254:
[   42.418619]  kasan_save_stack+0x3c/0x68
[   42.419168]  kasan_save_track+0x20/0x40
[   42.419800]  kasan_save_alloc_info+0x40/0x58
[   42.420424]  __kasan_kmalloc+0xd4/0xd8
[   42.421048]  __kmalloc_cache_noprof+0x15c/0x3c8
[   42.421712]  kasan_atomics+0xb8/0x2e8
[   42.422333]  kunit_try_run_case+0x14c/0x3d0
[   42.422960]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.423652]  kthread+0x24c/0x2d0
[   42.424172]  ret_from_fork+0x10/0x20
[   42.424802] 
[   42.425190] The buggy address belongs to the object at fff00000c65bde00
[   42.425190]  which belongs to the cache kmalloc-64 of size 64
[   42.426389] The buggy address is located 0 bytes to the right of
[   42.426389]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   42.427726] 
[   42.428082] The buggy address belongs to the physical page:
[   42.428712] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   42.429690] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.430547] page_type: f5(slab)
[   42.431119] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.431996] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.432889] page dumped because: kasan: bad access detected
[   42.433551] 
[   42.433931] Memory state around the buggy address:
[   42.434557]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.435422]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.436242] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.437078]                                      ^
[   42.437726]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.438532]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.439319] ==================================================================
[   41.482971] ==================================================================
[   41.484456] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   41.485279] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   41.487013] 
[   41.487580] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   41.488595] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.489123] Hardware name: linux,dummy-virt (DT)
[   41.489736] Call trace:
[   41.490159]  show_stack+0x20/0x38 (C)
[   41.490786]  dump_stack_lvl+0x8c/0xd0
[   41.491370]  print_report+0x118/0x5e0
[   41.491931]  kasan_report+0xc8/0x118
[   41.492497]  kasan_check_range+0x100/0x1a8
[   41.493071]  __kasan_check_write+0x20/0x30
[   41.493586]  kasan_atomics_helper+0x7cc/0x4858
[   41.494257]  kasan_atomics+0x198/0x2e8
[   41.494869]  kunit_try_run_case+0x14c/0x3d0
[   41.495500]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.496163]  kthread+0x24c/0x2d0
[   41.496763]  ret_from_fork+0x10/0x20
[   41.497334] 
[   41.497680] Allocated by task 254:
[   41.498219]  kasan_save_stack+0x3c/0x68
[   41.498828]  kasan_save_track+0x20/0x40
[   41.499286]  kasan_save_alloc_info+0x40/0x58
[   41.499911]  __kasan_kmalloc+0xd4/0xd8
[   41.500472]  __kmalloc_cache_noprof+0x15c/0x3c8
[   41.501060]  kasan_atomics+0xb8/0x2e8
[   41.501594]  kunit_try_run_case+0x14c/0x3d0
[   41.502210]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.502939]  kthread+0x24c/0x2d0
[   41.503471]  ret_from_fork+0x10/0x20
[   41.504006] 
[   41.504369] The buggy address belongs to the object at fff00000c65bde00
[   41.504369]  which belongs to the cache kmalloc-64 of size 64
[   41.505537] The buggy address is located 0 bytes to the right of
[   41.505537]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   41.506668] 
[   41.507031] The buggy address belongs to the physical page:
[   41.507737] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   41.508565] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.509331] page_type: f5(slab)
[   41.509884] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.510682] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.511461] page dumped because: kasan: bad access detected
[   41.512077] 
[   41.512456] Memory state around the buggy address:
[   41.513021]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.513822]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.514640] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.515303]                                      ^
[   41.515935]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.516829]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.517493] ==================================================================
[   41.163816] ==================================================================
[   41.164408] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   41.165114] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   41.167025] 
[   41.167456] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   41.169044] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.169835] Hardware name: linux,dummy-virt (DT)
[   41.171200] Call trace:
[   41.171650]  show_stack+0x20/0x38 (C)
[   41.172219]  dump_stack_lvl+0x8c/0xd0
[   41.172749]  print_report+0x118/0x5e0
[   41.173695]  kasan_report+0xc8/0x118
[   41.174377]  kasan_check_range+0x100/0x1a8
[   41.175281]  __kasan_check_write+0x20/0x30
[   41.175966]  kasan_atomics_helper+0x47c/0x4858
[   41.176714]  kasan_atomics+0x198/0x2e8
[   41.177279]  kunit_try_run_case+0x14c/0x3d0
[   41.177958]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.179762]  kthread+0x24c/0x2d0
[   41.180515]  ret_from_fork+0x10/0x20
[   41.181036] 
[   41.181743] Allocated by task 254:
[   41.182517]  kasan_save_stack+0x3c/0x68
[   41.183245]  kasan_save_track+0x20/0x40
[   41.183993]  kasan_save_alloc_info+0x40/0x58
[   41.184753]  __kasan_kmalloc+0xd4/0xd8
[   41.185589]  __kmalloc_cache_noprof+0x15c/0x3c8
[   41.186745]  kasan_atomics+0xb8/0x2e8
[   41.187193]  kunit_try_run_case+0x14c/0x3d0
[   41.187642]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.188386]  kthread+0x24c/0x2d0
[   41.189016]  ret_from_fork+0x10/0x20
[   41.189623] 
[   41.189975] The buggy address belongs to the object at fff00000c65bde00
[   41.189975]  which belongs to the cache kmalloc-64 of size 64
[   41.191326] The buggy address is located 0 bytes to the right of
[   41.191326]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   41.193237] 
[   41.193616] The buggy address belongs to the physical page:
[   41.194718] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   41.195600] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.196464] page_type: f5(slab)
[   41.197078] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.198289] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.199157] page dumped because: kasan: bad access detected
[   41.199817] 
[   41.200181] Memory state around the buggy address:
[   41.200810]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.202572]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.203459] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.204252]                                      ^
[   41.204911]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.205653]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.206372] ==================================================================
[   41.924968] ==================================================================
[   41.925898] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   41.926906] Read of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   41.928303] 
[   41.928930] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   41.930226] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.930828] Hardware name: linux,dummy-virt (DT)
[   41.931220] Call trace:
[   41.931657]  show_stack+0x20/0x38 (C)
[   41.932282]  dump_stack_lvl+0x8c/0xd0
[   41.932948]  print_report+0x118/0x5e0
[   41.933495]  kasan_report+0xc8/0x118
[   41.934012]  __asan_report_load4_noabort+0x20/0x30
[   41.934714]  kasan_atomics_helper+0x3de4/0x4858
[   41.935331]  kasan_atomics+0x198/0x2e8
[   41.935946]  kunit_try_run_case+0x14c/0x3d0
[   41.936550]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.937293]  kthread+0x24c/0x2d0
[   41.937753]  ret_from_fork+0x10/0x20
[   41.938345] 
[   41.938703] Allocated by task 254:
[   41.939198]  kasan_save_stack+0x3c/0x68
[   41.939815]  kasan_save_track+0x20/0x40
[   41.940372]  kasan_save_alloc_info+0x40/0x58
[   41.940938]  __kasan_kmalloc+0xd4/0xd8
[   41.941545]  __kmalloc_cache_noprof+0x15c/0x3c8
[   41.942131]  kasan_atomics+0xb8/0x2e8
[   41.942730]  kunit_try_run_case+0x14c/0x3d0
[   41.943270]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.944019]  kthread+0x24c/0x2d0
[   41.944587]  ret_from_fork+0x10/0x20
[   41.945175] 
[   41.945535] The buggy address belongs to the object at fff00000c65bde00
[   41.945535]  which belongs to the cache kmalloc-64 of size 64
[   41.946731] The buggy address is located 0 bytes to the right of
[   41.946731]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   41.947794] 
[   41.948164] The buggy address belongs to the physical page:
[   41.948896] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   41.949797] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.950437] page_type: f5(slab)
[   41.950970] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.951894] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.952658] page dumped because: kasan: bad access detected
[   41.953365] 
[   41.953727] Memory state around the buggy address:
[   41.954216]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.955134]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.955811] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.956685]                                      ^
[   41.957275]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.958133]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.958842] ==================================================================
[   42.859309] ==================================================================
[   42.860004] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   42.860876] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   42.861801] 
[   42.862153] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   42.863326] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.863878] Hardware name: linux,dummy-virt (DT)
[   42.864554] Call trace:
[   42.865034]  show_stack+0x20/0x38 (C)
[   42.865685]  dump_stack_lvl+0x8c/0xd0
[   42.866330]  print_report+0x118/0x5e0
[   42.866981]  kasan_report+0xc8/0x118
[   42.867633]  kasan_check_range+0x100/0x1a8
[   42.868226]  __kasan_check_write+0x20/0x30
[   42.868887]  kasan_atomics_helper+0x154c/0x4858
[   42.869544]  kasan_atomics+0x198/0x2e8
[   42.870124]  kunit_try_run_case+0x14c/0x3d0
[   42.870776]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.871576]  kthread+0x24c/0x2d0
[   42.872117]  ret_from_fork+0x10/0x20
[   42.872788] 
[   42.873146] Allocated by task 254:
[   42.873640]  kasan_save_stack+0x3c/0x68
[   42.874253]  kasan_save_track+0x20/0x40
[   42.874829]  kasan_save_alloc_info+0x40/0x58
[   42.875516]  __kasan_kmalloc+0xd4/0xd8
[   42.876051]  __kmalloc_cache_noprof+0x15c/0x3c8
[   42.876657]  kasan_atomics+0xb8/0x2e8
[   42.877272]  kunit_try_run_case+0x14c/0x3d0
[   42.877860]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.878621]  kthread+0x24c/0x2d0
[   42.879190]  ret_from_fork+0x10/0x20
[   42.879743] 
[   42.880096] The buggy address belongs to the object at fff00000c65bde00
[   42.880096]  which belongs to the cache kmalloc-64 of size 64
[   42.881317] The buggy address is located 0 bytes to the right of
[   42.881317]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   42.882590] 
[   42.882943] The buggy address belongs to the physical page:
[   42.883676] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   42.884563] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.885387] page_type: f5(slab)
[   42.885969] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.886796] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.887606] page dumped because: kasan: bad access detected
[   42.888188] 
[   42.888560] Memory state around the buggy address:
[   42.889076]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.889913]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.890842] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.891578]                                      ^
[   42.892261]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.893072]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.893857] ==================================================================
[   42.516454] ==================================================================
[   42.517174] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   42.518089] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   42.518902] 
[   42.519321] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   42.520371] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.520989] Hardware name: linux,dummy-virt (DT)
[   42.521651] Call trace:
[   42.522048]  show_stack+0x20/0x38 (C)
[   42.522610]  dump_stack_lvl+0x8c/0xd0
[   42.523250]  print_report+0x118/0x5e0
[   42.523897]  kasan_report+0xc8/0x118
[   42.524512]  kasan_check_range+0x100/0x1a8
[   42.525044]  __kasan_check_write+0x20/0x30
[   42.525634]  kasan_atomics_helper+0x1190/0x4858
[   42.526276]  kasan_atomics+0x198/0x2e8
[   42.526927]  kunit_try_run_case+0x14c/0x3d0
[   42.527616]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.528353]  kthread+0x24c/0x2d0
[   42.528917]  ret_from_fork+0x10/0x20
[   42.529571] 
[   42.529931] Allocated by task 254:
[   42.530431]  kasan_save_stack+0x3c/0x68
[   42.531011]  kasan_save_track+0x20/0x40
[   42.531649]  kasan_save_alloc_info+0x40/0x58
[   42.532271]  __kasan_kmalloc+0xd4/0xd8
[   42.532886]  __kmalloc_cache_noprof+0x15c/0x3c8
[   42.533552]  kasan_atomics+0xb8/0x2e8
[   42.534151]  kunit_try_run_case+0x14c/0x3d0
[   42.534779]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.535524]  kthread+0x24c/0x2d0
[   42.536015]  ret_from_fork+0x10/0x20
[   42.536629] 
[   42.537010] The buggy address belongs to the object at fff00000c65bde00
[   42.537010]  which belongs to the cache kmalloc-64 of size 64
[   42.538223] The buggy address is located 0 bytes to the right of
[   42.538223]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   42.539535] 
[   42.539878] The buggy address belongs to the physical page:
[   42.540504] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   42.541433] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.542228] page_type: f5(slab)
[   42.542836] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.543927] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.544937] page dumped because: kasan: bad access detected
[   42.545788] 
[   42.546283] Memory state around the buggy address:
[   42.547007]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.548023]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.548886] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.549834]                                      ^
[   42.550599]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.551556]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.552530] ==================================================================
[   41.444883] ==================================================================
[   41.445712] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[   41.447040] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   41.447922] 
[   41.448276] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   41.449372] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.449935] Hardware name: linux,dummy-virt (DT)
[   41.450501] Call trace:
[   41.450925]  show_stack+0x20/0x38 (C)
[   41.451571]  dump_stack_lvl+0x8c/0xd0
[   41.452183]  print_report+0x118/0x5e0
[   41.452815]  kasan_report+0xc8/0x118
[   41.453390]  kasan_check_range+0x100/0x1a8
[   41.454005]  __kasan_check_write+0x20/0x30
[   41.454649]  kasan_atomics_helper+0x760/0x4858
[   41.455383]  kasan_atomics+0x198/0x2e8
[   41.456014]  kunit_try_run_case+0x14c/0x3d0
[   41.456639]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.457294]  kthread+0x24c/0x2d0
[   41.457852]  ret_from_fork+0x10/0x20
[   41.458388] 
[   41.458758] Allocated by task 254:
[   41.459198]  kasan_save_stack+0x3c/0x68
[   41.459794]  kasan_save_track+0x20/0x40
[   41.460352]  kasan_save_alloc_info+0x40/0x58
[   41.461006]  __kasan_kmalloc+0xd4/0xd8
[   41.461594]  __kmalloc_cache_noprof+0x15c/0x3c8
[   41.462243]  kasan_atomics+0xb8/0x2e8
[   41.462712]  kunit_try_run_case+0x14c/0x3d0
[   41.463326]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.464305]  kthread+0x24c/0x2d0
[   41.464766]  ret_from_fork+0x10/0x20
[   41.465236] 
[   41.465646] The buggy address belongs to the object at fff00000c65bde00
[   41.465646]  which belongs to the cache kmalloc-64 of size 64
[   41.467142] The buggy address is located 0 bytes to the right of
[   41.467142]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   41.468675] 
[   41.469058] The buggy address belongs to the physical page:
[   41.469795] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   41.470762] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.471614] page_type: f5(slab)
[   41.472051] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.472852] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.473644] page dumped because: kasan: bad access detected
[   41.474247] 
[   41.474597] Memory state around the buggy address:
[   41.475256]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.476073]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.476964] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.477862]                                      ^
[   41.478492]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.479374]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.480175] ==================================================================
[   40.983038] ==================================================================
[   40.983773] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   40.985953] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   40.986568] 
[   40.986874] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   40.988028] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.988603] Hardware name: linux,dummy-virt (DT)
[   40.989177] Call trace:
[   40.989588]  show_stack+0x20/0x38 (C)
[   40.990645]  dump_stack_lvl+0x8c/0xd0
[   40.991288]  print_report+0x118/0x5e0
[   40.991792]  kasan_report+0xc8/0x118
[   40.992316]  kasan_check_range+0x100/0x1a8
[   40.992864]  __kasan_check_write+0x20/0x30
[   40.994680]  kasan_atomics_helper+0x32c/0x4858
[   40.995855]  kasan_atomics+0x198/0x2e8
[   40.996637]  kunit_try_run_case+0x14c/0x3d0
[   40.997579]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.998137]  kthread+0x24c/0x2d0
[   40.999579]  ret_from_fork+0x10/0x20
[   41.000470] 
[   41.000837] Allocated by task 254:
[   41.001381]  kasan_save_stack+0x3c/0x68
[   41.002260]  kasan_save_track+0x20/0x40
[   41.002674]  kasan_save_alloc_info+0x40/0x58
[   41.003494]  __kasan_kmalloc+0xd4/0xd8
[   41.004023]  __kmalloc_cache_noprof+0x15c/0x3c8
[   41.005008]  kasan_atomics+0xb8/0x2e8
[   41.005836]  kunit_try_run_case+0x14c/0x3d0
[   41.007570]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.008437]  kthread+0x24c/0x2d0
[   41.008980]  ret_from_fork+0x10/0x20
[   41.010027] 
[   41.010234] The buggy address belongs to the object at fff00000c65bde00
[   41.010234]  which belongs to the cache kmalloc-64 of size 64
[   41.011496] The buggy address is located 0 bytes to the right of
[   41.011496]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   41.012746] 
[   41.013088] The buggy address belongs to the physical page:
[   41.014111] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   41.015148] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.016293] page_type: f5(slab)
[   41.017670] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.019149] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.020077] page dumped because: kasan: bad access detected
[   41.020792] 
[   41.021143] Memory state around the buggy address:
[   41.022668]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.023033]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.023377] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.024031]                                      ^
[   41.025161]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.026509]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.027269] ==================================================================
[   41.960944] ==================================================================
[   41.961832] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   41.962631] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   41.963390] 
[   41.963765] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   41.964750] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.965382] Hardware name: linux,dummy-virt (DT)
[   41.965928] Call trace:
[   41.966359]  show_stack+0x20/0x38 (C)
[   41.967012]  dump_stack_lvl+0x8c/0xd0
[   41.967636]  print_report+0x118/0x5e0
[   41.968194]  kasan_report+0xc8/0x118
[   41.968720]  kasan_check_range+0x100/0x1a8
[   41.969374]  __kasan_check_write+0x20/0x30
[   41.969984]  kasan_atomics_helper+0xca0/0x4858
[   41.970676]  kasan_atomics+0x198/0x2e8
[   41.971281]  kunit_try_run_case+0x14c/0x3d0
[   41.971895]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.972611]  kthread+0x24c/0x2d0
[   41.973174]  ret_from_fork+0x10/0x20
[   41.973803] 
[   41.974126] Allocated by task 254:
[   41.974616]  kasan_save_stack+0x3c/0x68
[   41.975252]  kasan_save_track+0x20/0x40
[   41.975748]  kasan_save_alloc_info+0x40/0x58
[   41.976382]  __kasan_kmalloc+0xd4/0xd8
[   41.976861]  __kmalloc_cache_noprof+0x15c/0x3c8
[   41.977518]  kasan_atomics+0xb8/0x2e8
[   41.978095]  kunit_try_run_case+0x14c/0x3d0
[   41.978680]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.979410]  kthread+0x24c/0x2d0
[   41.979953]  ret_from_fork+0x10/0x20
[   41.980721] 
[   41.981085] The buggy address belongs to the object at fff00000c65bde00
[   41.981085]  which belongs to the cache kmalloc-64 of size 64
[   41.982070] The buggy address is located 0 bytes to the right of
[   41.982070]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   41.983197] 
[   41.983558] The buggy address belongs to the physical page:
[   41.984228] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   41.985139] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.985872] page_type: f5(slab)
[   41.986412] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.987189] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.988059] page dumped because: kasan: bad access detected
[   41.988682] 
[   41.989030] Memory state around the buggy address:
[   41.989657]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.990393]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.991236] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.991938]                                      ^
[   41.992564]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.993422]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.994094] ==================================================================
[   41.119030] ==================================================================
[   41.119743] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   41.120707] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   41.122257] 
[   41.122657] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   41.123672] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.124181] Hardware name: linux,dummy-virt (DT)
[   41.125707] Call trace:
[   41.126564]  show_stack+0x20/0x38 (C)
[   41.127311]  dump_stack_lvl+0x8c/0xd0
[   41.127950]  print_report+0x118/0x5e0
[   41.128582]  kasan_report+0xc8/0x118
[   41.129133]  kasan_check_range+0x100/0x1a8
[   41.129738]  __kasan_check_write+0x20/0x30
[   41.130382]  kasan_atomics_helper+0x414/0x4858
[   41.130945]  kasan_atomics+0x198/0x2e8
[   41.132164]  kunit_try_run_case+0x14c/0x3d0
[   41.132663]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.133641]  kthread+0x24c/0x2d0
[   41.134479]  ret_from_fork+0x10/0x20
[   41.135247] 
[   41.135650] Allocated by task 254:
[   41.136204]  kasan_save_stack+0x3c/0x68
[   41.136850]  kasan_save_track+0x20/0x40
[   41.137635]  kasan_save_alloc_info+0x40/0x58
[   41.138603]  __kasan_kmalloc+0xd4/0xd8
[   41.139213]  __kmalloc_cache_noprof+0x15c/0x3c8
[   41.140396]  kasan_atomics+0xb8/0x2e8
[   41.140961]  kunit_try_run_case+0x14c/0x3d0
[   41.141761]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.142836]  kthread+0x24c/0x2d0
[   41.143638]  ret_from_fork+0x10/0x20
[   41.144420] 
[   41.144909] The buggy address belongs to the object at fff00000c65bde00
[   41.144909]  which belongs to the cache kmalloc-64 of size 64
[   41.146483] The buggy address is located 0 bytes to the right of
[   41.146483]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   41.148266] 
[   41.148642] The buggy address belongs to the physical page:
[   41.149605] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   41.150486] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.151207] page_type: f5(slab)
[   41.152048] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.153120] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.154194] page dumped because: kasan: bad access detected
[   41.155055] 
[   41.155322] Memory state around the buggy address:
[   41.156075]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.157481]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.158553] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.159306]                                      ^
[   41.159827]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.160714]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.161540] ==================================================================
[   43.006795] ==================================================================
[   43.007488] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   43.008335] Read of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   43.009138] 
[   43.009519] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   43.010574] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.010999] Hardware name: linux,dummy-virt (DT)
[   43.011624] Call trace:
[   43.012009]  show_stack+0x20/0x38 (C)
[   43.012632]  dump_stack_lvl+0x8c/0xd0
[   43.013242]  print_report+0x118/0x5e0
[   43.013859]  kasan_report+0xc8/0x118
[   43.014374]  __asan_report_load8_noabort+0x20/0x30
[   43.015079]  kasan_atomics_helper+0x3df4/0x4858
[   43.015653]  kasan_atomics+0x198/0x2e8
[   43.016251]  kunit_try_run_case+0x14c/0x3d0
[   43.016812]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.017567]  kthread+0x24c/0x2d0
[   43.018021]  ret_from_fork+0x10/0x20
[   43.018649] 
[   43.018999] Allocated by task 254:
[   43.019516]  kasan_save_stack+0x3c/0x68
[   43.020075]  kasan_save_track+0x20/0x40
[   43.020594]  kasan_save_alloc_info+0x40/0x58
[   43.021209]  __kasan_kmalloc+0xd4/0xd8
[   43.021732]  __kmalloc_cache_noprof+0x15c/0x3c8
[   43.022377]  kasan_atomics+0xb8/0x2e8
[   43.022917]  kunit_try_run_case+0x14c/0x3d0
[   43.023409]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.024163]  kthread+0x24c/0x2d0
[   43.024639]  ret_from_fork+0x10/0x20
[   43.025245] 
[   43.025613] The buggy address belongs to the object at fff00000c65bde00
[   43.025613]  which belongs to the cache kmalloc-64 of size 64
[   43.026716] The buggy address is located 0 bytes to the right of
[   43.026716]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   43.027965] 
[   43.028284] The buggy address belongs to the physical page:
[   43.028992] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   43.029743] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.030581] page_type: f5(slab)
[   43.031113] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   43.031876] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   43.032676] page dumped because: kasan: bad access detected
[   43.033362] 
[   43.033702] Memory state around the buggy address:
[   43.034262]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.035138]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.035860] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   43.036718]                                      ^
[   43.037217]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.038091]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.038792] ==================================================================
[   42.478546] ==================================================================
[   42.479680] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   42.480534] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   42.481094] 
[   42.481400] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   42.482571] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.483218] Hardware name: linux,dummy-virt (DT)
[   42.483846] Call trace:
[   42.484329]  show_stack+0x20/0x38 (C)
[   42.485009]  dump_stack_lvl+0x8c/0xd0
[   42.485677]  print_report+0x118/0x5e0
[   42.486279]  kasan_report+0xc8/0x118
[   42.486967]  kasan_check_range+0x100/0x1a8
[   42.487624]  __kasan_check_write+0x20/0x30
[   42.488181]  kasan_atomics_helper+0x1128/0x4858
[   42.488911]  kasan_atomics+0x198/0x2e8
[   42.489527]  kunit_try_run_case+0x14c/0x3d0
[   42.490221]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.491008]  kthread+0x24c/0x2d0
[   42.491605]  ret_from_fork+0x10/0x20
[   42.492246] 
[   42.492620] Allocated by task 254:
[   42.493180]  kasan_save_stack+0x3c/0x68
[   42.493779]  kasan_save_track+0x20/0x40
[   42.494298]  kasan_save_alloc_info+0x40/0x58
[   42.495081]  __kasan_kmalloc+0xd4/0xd8
[   42.495976]  __kmalloc_cache_noprof+0x15c/0x3c8
[   42.496603]  kasan_atomics+0xb8/0x2e8
[   42.496862]  kunit_try_run_case+0x14c/0x3d0
[   42.497121]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.497410]  kthread+0x24c/0x2d0
[   42.497820]  ret_from_fork+0x10/0x20
[   42.498221] 
[   42.499115] The buggy address belongs to the object at fff00000c65bde00
[   42.499115]  which belongs to the cache kmalloc-64 of size 64
[   42.500657] The buggy address is located 0 bytes to the right of
[   42.500657]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   42.501969] 
[   42.502326] The buggy address belongs to the physical page:
[   42.502922] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   42.503838] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.504639] page_type: f5(slab)
[   42.505246] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.506102] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.506988] page dumped because: kasan: bad access detected
[   42.507670] 
[   42.508025] Memory state around the buggy address:
[   42.508717]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.509634]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.510489] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.511269]                                      ^
[   42.511891]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.512722]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.513507] ==================================================================
[   40.760319] ==================================================================
[   40.760940] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   40.762423] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   40.763291] 
[   40.763662] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   40.764901] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.766117] Hardware name: linux,dummy-virt (DT)
[   40.766701] Call trace:
[   40.767173]  show_stack+0x20/0x38 (C)
[   40.767800]  dump_stack_lvl+0x8c/0xd0
[   40.768394]  print_report+0x118/0x5e0
[   40.768891]  kasan_report+0xc8/0x118
[   40.769790]  __asan_report_store4_noabort+0x20/0x30
[   40.770634]  kasan_atomics_helper+0x3f7c/0x4858
[   40.771138]  kasan_atomics+0x198/0x2e8
[   40.772144]  kunit_try_run_case+0x14c/0x3d0
[   40.772699]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.774237]  kthread+0x24c/0x2d0
[   40.774864]  ret_from_fork+0x10/0x20
[   40.775468] 
[   40.775842] Allocated by task 254:
[   40.776366]  kasan_save_stack+0x3c/0x68
[   40.776979]  kasan_save_track+0x20/0x40
[   40.777623]  kasan_save_alloc_info+0x40/0x58
[   40.778741]  __kasan_kmalloc+0xd4/0xd8
[   40.779953]  __kmalloc_cache_noprof+0x15c/0x3c8
[   40.780537]  kasan_atomics+0xb8/0x2e8
[   40.781014]  kunit_try_run_case+0x14c/0x3d0
[   40.782029]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.782844]  kthread+0x24c/0x2d0
[   40.783516]  ret_from_fork+0x10/0x20
[   40.784200] 
[   40.784726] The buggy address belongs to the object at fff00000c65bde00
[   40.784726]  which belongs to the cache kmalloc-64 of size 64
[   40.786982] The buggy address is located 0 bytes to the right of
[   40.786982]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   40.788629] 
[   40.788918] The buggy address belongs to the physical page:
[   40.790003] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   40.791010] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.791991] page_type: f5(slab)
[   40.792703] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   40.794038] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   40.794957] page dumped because: kasan: bad access detected
[   40.795731] 
[   40.796313] Memory state around the buggy address:
[   40.797148]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   40.798512]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   40.799521] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   40.800325]                                      ^
[   40.800955]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.801939]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.802705] ==================================================================
[   43.083055] ==================================================================
[   43.083767] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   43.084599] Read of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   43.086896] 
[   43.087201] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   43.088255] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.088804] Hardware name: linux,dummy-virt (DT)
[   43.089331] Call trace:
[   43.089735]  show_stack+0x20/0x38 (C)
[   43.090345]  dump_stack_lvl+0x8c/0xd0
[   43.090957]  print_report+0x118/0x5e0
[   43.091495]  kasan_report+0xc8/0x118
[   43.092078]  __asan_report_load8_noabort+0x20/0x30
[   43.092773]  kasan_atomics_helper+0x3e10/0x4858
[   43.093465]  kasan_atomics+0x198/0x2e8
[   43.094062]  kunit_try_run_case+0x14c/0x3d0
[   43.094684]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.095299]  kthread+0x24c/0x2d0
[   43.095882]  ret_from_fork+0x10/0x20
[   43.096419] 
[   43.096778] Allocated by task 254:
[   43.097290]  kasan_save_stack+0x3c/0x68
[   43.097876]  kasan_save_track+0x20/0x40
[   43.098491]  kasan_save_alloc_info+0x40/0x58
[   43.099108]  __kasan_kmalloc+0xd4/0xd8
[   43.099660]  __kmalloc_cache_noprof+0x15c/0x3c8
[   43.100262]  kasan_atomics+0xb8/0x2e8
[   43.100843]  kunit_try_run_case+0x14c/0x3d0
[   43.101474]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.102139]  kthread+0x24c/0x2d0
[   43.102580]  ret_from_fork+0x10/0x20
[   43.103152] 
[   43.103504] The buggy address belongs to the object at fff00000c65bde00
[   43.103504]  which belongs to the cache kmalloc-64 of size 64
[   43.104665] The buggy address is located 0 bytes to the right of
[   43.104665]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   43.105914] 
[   43.106237] The buggy address belongs to the physical page:
[   43.106951] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   43.107871] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.108572] page_type: f5(slab)
[   43.108996] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   43.109907] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   43.110810] page dumped because: kasan: bad access detected
[   43.111535] 
[   43.111875] Memory state around the buggy address:
[   43.112463]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.113248]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.114034] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   43.114787]                                      ^
[   43.115338]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.116099]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.116784] ==================================================================
[   41.359590] ==================================================================
[   41.360631] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   41.362233] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   41.364083] 
[   41.364639] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   41.365978] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.366551] Hardware name: linux,dummy-virt (DT)
[   41.367102] Call trace:
[   41.367472]  show_stack+0x20/0x38 (C)
[   41.368000]  dump_stack_lvl+0x8c/0xd0
[   41.369277]  print_report+0x118/0x5e0
[   41.369821]  kasan_report+0xc8/0x118
[   41.370329]  kasan_check_range+0x100/0x1a8
[   41.370870]  __kasan_check_write+0x20/0x30
[   41.371397]  kasan_atomics_helper+0x684/0x4858
[   41.372605]  kasan_atomics+0x198/0x2e8
[   41.373197]  kunit_try_run_case+0x14c/0x3d0
[   41.373844]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.374872]  kthread+0x24c/0x2d0
[   41.375610]  ret_from_fork+0x10/0x20
[   41.376334] 
[   41.376677] Allocated by task 254:
[   41.377471]  kasan_save_stack+0x3c/0x68
[   41.378041]  kasan_save_track+0x20/0x40
[   41.378847]  kasan_save_alloc_info+0x40/0x58
[   41.379615]  __kasan_kmalloc+0xd4/0xd8
[   41.380327]  __kmalloc_cache_noprof+0x15c/0x3c8
[   41.380964]  kasan_atomics+0xb8/0x2e8
[   41.381757]  kunit_try_run_case+0x14c/0x3d0
[   41.382557]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.383412]  kthread+0x24c/0x2d0
[   41.383930]  ret_from_fork+0x10/0x20
[   41.384745] 
[   41.385260] The buggy address belongs to the object at fff00000c65bde00
[   41.385260]  which belongs to the cache kmalloc-64 of size 64
[   41.386724] The buggy address is located 0 bytes to the right of
[   41.386724]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   41.388278] 
[   41.388641] The buggy address belongs to the physical page:
[   41.389556] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   41.390595] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.391368] page_type: f5(slab)
[   41.392162] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.393216] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.394216] page dumped because: kasan: bad access detected
[   41.394989] 
[   41.395337] Memory state around the buggy address:
[   41.396257]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.397102]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.398122] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.399085]                                      ^
[   41.399889]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.400867]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.401699] ==================================================================
[   42.440962] ==================================================================
[   42.441495] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   42.442943] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   42.443889] 
[   42.444328] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   42.445539] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.446104] Hardware name: linux,dummy-virt (DT)
[   42.446648] Call trace:
[   42.447148]  show_stack+0x20/0x38 (C)
[   42.447863]  dump_stack_lvl+0x8c/0xd0
[   42.448468]  print_report+0x118/0x5e0
[   42.449118]  kasan_report+0xc8/0x118
[   42.449768]  kasan_check_range+0x100/0x1a8
[   42.450399]  __kasan_check_write+0x20/0x30
[   42.451075]  kasan_atomics_helper+0x10c0/0x4858
[   42.451736]  kasan_atomics+0x198/0x2e8
[   42.452419]  kunit_try_run_case+0x14c/0x3d0
[   42.453087]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.453888]  kthread+0x24c/0x2d0
[   42.454400]  ret_from_fork+0x10/0x20
[   42.455015] 
[   42.455395] Allocated by task 254:
[   42.455953]  kasan_save_stack+0x3c/0x68
[   42.456601]  kasan_save_track+0x20/0x40
[   42.457135]  kasan_save_alloc_info+0x40/0x58
[   42.457784]  __kasan_kmalloc+0xd4/0xd8
[   42.458309]  __kmalloc_cache_noprof+0x15c/0x3c8
[   42.459010]  kasan_atomics+0xb8/0x2e8
[   42.459499]  kunit_try_run_case+0x14c/0x3d0
[   42.460159]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.460863]  kthread+0x24c/0x2d0
[   42.461410]  ret_from_fork+0x10/0x20
[   42.461947] 
[   42.462320] The buggy address belongs to the object at fff00000c65bde00
[   42.462320]  which belongs to the cache kmalloc-64 of size 64
[   42.463591] The buggy address is located 0 bytes to the right of
[   42.463591]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   42.464943] 
[   42.465306] The buggy address belongs to the physical page:
[   42.465897] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   42.466864] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.467642] page_type: f5(slab)
[   42.468152] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.469057] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.469932] page dumped because: kasan: bad access detected
[   42.470588] 
[   42.470960] Memory state around the buggy address:
[   42.471654]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.472387]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.473238] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.473985]                                      ^
[   42.474603]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.475514]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.476301] ==================================================================
[   40.806077] ==================================================================
[   40.806900] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   40.807636] Read of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   40.808201] 
[   40.808654] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   40.809810] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.810746] Hardware name: linux,dummy-virt (DT)
[   40.811225] Call trace:
[   40.812680]  show_stack+0x20/0x38 (C)
[   40.813360]  dump_stack_lvl+0x8c/0xd0
[   40.814305]  print_report+0x118/0x5e0
[   40.815191]  kasan_report+0xc8/0x118
[   40.815760]  kasan_check_range+0x100/0x1a8
[   40.816435]  __kasan_check_read+0x20/0x30
[   40.817034]  kasan_atomics_helper+0x1ec/0x4858
[   40.817949]  kasan_atomics+0x198/0x2e8
[   40.818468]  kunit_try_run_case+0x14c/0x3d0
[   40.819336]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.820347]  kthread+0x24c/0x2d0
[   40.821093]  ret_from_fork+0x10/0x20
[   40.821900] 
[   40.822247] Allocated by task 254:
[   40.823117]  kasan_save_stack+0x3c/0x68
[   40.823686]  kasan_save_track+0x20/0x40
[   40.824324]  kasan_save_alloc_info+0x40/0x58
[   40.824894]  __kasan_kmalloc+0xd4/0xd8
[   40.825809]  __kmalloc_cache_noprof+0x15c/0x3c8
[   40.826526]  kasan_atomics+0xb8/0x2e8
[   40.828006]  kunit_try_run_case+0x14c/0x3d0
[   40.828623]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.828947]  kthread+0x24c/0x2d0
[   40.829173]  ret_from_fork+0x10/0x20
[   40.829615] 
[   40.830028] The buggy address belongs to the object at fff00000c65bde00
[   40.830028]  which belongs to the cache kmalloc-64 of size 64
[   40.831599] The buggy address is located 0 bytes to the right of
[   40.831599]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   40.832955] 
[   40.833539] The buggy address belongs to the physical page:
[   40.834662] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   40.835364] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.836273] page_type: f5(slab)
[   40.836769] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   40.837807] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   40.838971] page dumped because: kasan: bad access detected
[   40.839285] 
[   40.839436] Memory state around the buggy address:
[   40.840335]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   40.841198]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   40.842313] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   40.843528]                                      ^
[   40.844154]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.844898]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.846040] ==================================================================
[   42.367908] ==================================================================
[   42.368872] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   42.369640] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   42.370435] 
[   42.370847] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   42.371938] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.372540] Hardware name: linux,dummy-virt (DT)
[   42.373099] Call trace:
[   42.373507]  show_stack+0x20/0x38 (C)
[   42.374134]  dump_stack_lvl+0x8c/0xd0
[   42.374664]  print_report+0x118/0x5e0
[   42.375263]  kasan_report+0xc8/0x118
[   42.375828]  kasan_check_range+0x100/0x1a8
[   42.376469]  __kasan_check_write+0x20/0x30
[   42.377109]  kasan_atomics_helper+0xff0/0x4858
[   42.377793]  kasan_atomics+0x198/0x2e8
[   42.378325]  kunit_try_run_case+0x14c/0x3d0
[   42.379053]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.379837]  kthread+0x24c/0x2d0
[   42.380460]  ret_from_fork+0x10/0x20
[   42.381033] 
[   42.381340] Allocated by task 254:
[   42.381881]  kasan_save_stack+0x3c/0x68
[   42.382430]  kasan_save_track+0x20/0x40
[   42.383000]  kasan_save_alloc_info+0x40/0x58
[   42.383643]  __kasan_kmalloc+0xd4/0xd8
[   42.384256]  __kmalloc_cache_noprof+0x15c/0x3c8
[   42.384926]  kasan_atomics+0xb8/0x2e8
[   42.385539]  kunit_try_run_case+0x14c/0x3d0
[   42.386172]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.386844]  kthread+0x24c/0x2d0
[   42.387372]  ret_from_fork+0x10/0x20
[   42.387980] 
[   42.388350] The buggy address belongs to the object at fff00000c65bde00
[   42.388350]  which belongs to the cache kmalloc-64 of size 64
[   42.389355] The buggy address is located 0 bytes to the right of
[   42.389355]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   42.390787] 
[   42.391151] The buggy address belongs to the physical page:
[   42.391882] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   42.392690] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.393464] page_type: f5(slab)
[   42.394007] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.394966] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.395760] page dumped because: kasan: bad access detected
[   42.396476] 
[   42.396820] Memory state around the buggy address:
[   42.397401]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.398251]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.398988] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.399860]                                      ^
[   42.400514]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.401358]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.402022] ==================================================================
[   42.635123] ==================================================================
[   42.635879] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   42.636793] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   42.637682] 
[   42.638148] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   42.639275] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.639882] Hardware name: linux,dummy-virt (DT)
[   42.640507] Call trace:
[   42.640988]  show_stack+0x20/0x38 (C)
[   42.641665]  dump_stack_lvl+0x8c/0xd0
[   42.642318]  print_report+0x118/0x5e0
[   42.643001]  kasan_report+0xc8/0x118
[   42.643564]  kasan_check_range+0x100/0x1a8
[   42.644282]  __kasan_check_write+0x20/0x30
[   42.644914]  kasan_atomics_helper+0x12d8/0x4858
[   42.645586]  kasan_atomics+0x198/0x2e8
[   42.646247]  kunit_try_run_case+0x14c/0x3d0
[   42.646949]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.647672]  kthread+0x24c/0x2d0
[   42.648302]  ret_from_fork+0x10/0x20
[   42.648956] 
[   42.649351] Allocated by task 254:
[   42.649941]  kasan_save_stack+0x3c/0x68
[   42.650500]  kasan_save_track+0x20/0x40
[   42.651151]  kasan_save_alloc_info+0x40/0x58
[   42.651752]  __kasan_kmalloc+0xd4/0xd8
[   42.652254]  __kmalloc_cache_noprof+0x15c/0x3c8
[   42.652834]  kasan_atomics+0xb8/0x2e8
[   42.653397]  kunit_try_run_case+0x14c/0x3d0
[   42.654071]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.654808]  kthread+0x24c/0x2d0
[   42.655364]  ret_from_fork+0x10/0x20
[   42.656041] 
[   42.656357] The buggy address belongs to the object at fff00000c65bde00
[   42.656357]  which belongs to the cache kmalloc-64 of size 64
[   42.657810] The buggy address is located 0 bytes to the right of
[   42.657810]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   42.659023] 
[   42.659481] The buggy address belongs to the physical page:
[   42.660241] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   42.661160] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.661992] page_type: f5(slab)
[   42.662598] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.663416] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.664405] page dumped because: kasan: bad access detected
[   42.665061] 
[   42.665467] Memory state around the buggy address:
[   42.666112]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.666893]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.667720] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.668555]                                      ^
[   42.669220]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.670059]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.670869] ==================================================================
[   42.106758] ==================================================================
[   42.107542] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   42.108937] Read of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   42.109848] 
[   42.110150] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   42.111101] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.112600] Hardware name: linux,dummy-virt (DT)
[   42.113329] Call trace:
[   42.113748]  show_stack+0x20/0x38 (C)
[   42.114316]  dump_stack_lvl+0x8c/0xd0
[   42.114918]  print_report+0x118/0x5e0
[   42.115425]  kasan_report+0xc8/0x118
[   42.116048]  kasan_check_range+0x100/0x1a8
[   42.116740]  __kasan_check_read+0x20/0x30
[   42.117262]  kasan_atomics_helper+0xdd4/0x4858
[   42.117795]  kasan_atomics+0x198/0x2e8
[   42.118255]  kunit_try_run_case+0x14c/0x3d0
[   42.119306]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.120327]  kthread+0x24c/0x2d0
[   42.120805]  ret_from_fork+0x10/0x20
[   42.121402] 
[   42.121741] Allocated by task 254:
[   42.122263]  kasan_save_stack+0x3c/0x68
[   42.122804]  kasan_save_track+0x20/0x40
[   42.123420]  kasan_save_alloc_info+0x40/0x58
[   42.124023]  __kasan_kmalloc+0xd4/0xd8
[   42.124609]  __kmalloc_cache_noprof+0x15c/0x3c8
[   42.125170]  kasan_atomics+0xb8/0x2e8
[   42.125660]  kunit_try_run_case+0x14c/0x3d0
[   42.126308]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.126987]  kthread+0x24c/0x2d0
[   42.127553]  ret_from_fork+0x10/0x20
[   42.128090] 
[   42.128460] The buggy address belongs to the object at fff00000c65bde00
[   42.128460]  which belongs to the cache kmalloc-64 of size 64
[   42.129503] The buggy address is located 0 bytes to the right of
[   42.129503]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   42.130855] 
[   42.131205] The buggy address belongs to the physical page:
[   42.131808] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   42.132813] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.133429] page_type: f5(slab)
[   42.133967] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.134892] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.135787] page dumped because: kasan: bad access detected
[   42.136355] 
[   42.136729] Memory state around the buggy address:
[   42.137373]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.138133]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.139006] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.139798]                                      ^
[   42.140360]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.141175]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.141867] ==================================================================
[   41.626952] ==================================================================
[   41.627714] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   41.628578] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   41.629358] 
[   41.629723] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   41.630839] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.631411] Hardware name: linux,dummy-virt (DT)
[   41.632088] Call trace:
[   41.632467]  show_stack+0x20/0x38 (C)
[   41.633097]  dump_stack_lvl+0x8c/0xd0
[   41.633737]  print_report+0x118/0x5e0
[   41.634223]  kasan_report+0xc8/0x118
[   41.634846]  kasan_check_range+0x100/0x1a8
[   41.635406]  __kasan_check_write+0x20/0x30
[   41.636107]  kasan_atomics_helper+0x99c/0x4858
[   41.636741]  kasan_atomics+0x198/0x2e8
[   41.637348]  kunit_try_run_case+0x14c/0x3d0
[   41.637959]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.638725]  kthread+0x24c/0x2d0
[   41.639196]  ret_from_fork+0x10/0x20
[   41.639819] 
[   41.640173] Allocated by task 254:
[   41.640698]  kasan_save_stack+0x3c/0x68
[   41.641227]  kasan_save_track+0x20/0x40
[   41.641862]  kasan_save_alloc_info+0x40/0x58
[   41.642463]  __kasan_kmalloc+0xd4/0xd8
[   41.643043]  __kmalloc_cache_noprof+0x15c/0x3c8
[   41.643674]  kasan_atomics+0xb8/0x2e8
[   41.644254]  kunit_try_run_case+0x14c/0x3d0
[   41.644839]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.645496]  kthread+0x24c/0x2d0
[   41.646034]  ret_from_fork+0x10/0x20
[   41.646607] 
[   41.646947] The buggy address belongs to the object at fff00000c65bde00
[   41.646947]  which belongs to the cache kmalloc-64 of size 64
[   41.648051] The buggy address is located 0 bytes to the right of
[   41.648051]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   41.649357] 
[   41.649721] The buggy address belongs to the physical page:
[   41.650336] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   41.651292] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.652043] page_type: f5(slab)
[   41.652521] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.653484] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.654331] page dumped because: kasan: bad access detected
[   41.655109] 
[   41.655726] Memory state around the buggy address:
[   41.656419]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.657192]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.657987] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.658848]                                      ^
[   41.659469]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.660213]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.660921] ==================================================================
[   42.933120] ==================================================================
[   42.934961] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   42.935802] Read of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   42.936750] 
[   42.937144] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   42.938277] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.938904] Hardware name: linux,dummy-virt (DT)
[   42.939524] Call trace:
[   42.939894]  show_stack+0x20/0x38 (C)
[   42.940396]  dump_stack_lvl+0x8c/0xd0
[   42.941037]  print_report+0x118/0x5e0
[   42.941603]  kasan_report+0xc8/0x118
[   42.942301]  __asan_report_load8_noabort+0x20/0x30
[   42.943049]  kasan_atomics_helper+0x3db0/0x4858
[   42.943803]  kasan_atomics+0x198/0x2e8
[   42.944472]  kunit_try_run_case+0x14c/0x3d0
[   42.945108]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.945915]  kthread+0x24c/0x2d0
[   42.946512]  ret_from_fork+0x10/0x20
[   42.947132] 
[   42.947513] Allocated by task 254:
[   42.948075]  kasan_save_stack+0x3c/0x68
[   42.948670]  kasan_save_track+0x20/0x40
[   42.949322]  kasan_save_alloc_info+0x40/0x58
[   42.949989]  __kasan_kmalloc+0xd4/0xd8
[   42.950595]  __kmalloc_cache_noprof+0x15c/0x3c8
[   42.951262]  kasan_atomics+0xb8/0x2e8
[   42.951855]  kunit_try_run_case+0x14c/0x3d0
[   42.952513]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.953270]  kthread+0x24c/0x2d0
[   42.953829]  ret_from_fork+0x10/0x20
[   42.954425] 
[   42.954826] The buggy address belongs to the object at fff00000c65bde00
[   42.954826]  which belongs to the cache kmalloc-64 of size 64
[   42.956215] The buggy address is located 0 bytes to the right of
[   42.956215]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   42.957611] 
[   42.958033] The buggy address belongs to the physical page:
[   42.958722] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   42.959747] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.960459] page_type: f5(slab)
[   42.960879] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.961676] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.962511] page dumped because: kasan: bad access detected
[   42.963276] 
[   42.963708] Memory state around the buggy address:
[   42.964377]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.965211]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.966062] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.966906]                                      ^
[   42.967542]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.968278]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.968998] ==================================================================
[   42.183525] ==================================================================
[   42.184264] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   42.185054] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   42.185742] 
[   42.186227] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   42.187510] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.188053] Hardware name: linux,dummy-virt (DT)
[   42.188708] Call trace:
[   42.189217]  show_stack+0x20/0x38 (C)
[   42.189927]  dump_stack_lvl+0x8c/0xd0
[   42.190631]  print_report+0x118/0x5e0
[   42.191380]  kasan_report+0xc8/0x118
[   42.192190]  kasan_check_range+0x100/0x1a8
[   42.192885]  __kasan_check_write+0x20/0x30
[   42.193188]  kasan_atomics_helper+0xe44/0x4858
[   42.193552]  kasan_atomics+0x198/0x2e8
[   42.194371]  kunit_try_run_case+0x14c/0x3d0
[   42.195076]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.195840]  kthread+0x24c/0x2d0
[   42.196382]  ret_from_fork+0x10/0x20
[   42.197084] 
[   42.197405] Allocated by task 254:
[   42.197903]  kasan_save_stack+0x3c/0x68
[   42.198422]  kasan_save_track+0x20/0x40
[   42.199048]  kasan_save_alloc_info+0x40/0x58
[   42.199650]  __kasan_kmalloc+0xd4/0xd8
[   42.200174]  __kmalloc_cache_noprof+0x15c/0x3c8
[   42.200864]  kasan_atomics+0xb8/0x2e8
[   42.201359]  kunit_try_run_case+0x14c/0x3d0
[   42.202025]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.202646]  kthread+0x24c/0x2d0
[   42.203192]  ret_from_fork+0x10/0x20
[   42.203807] 
[   42.204162] The buggy address belongs to the object at fff00000c65bde00
[   42.204162]  which belongs to the cache kmalloc-64 of size 64
[   42.205217] The buggy address is located 0 bytes to the right of
[   42.205217]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   42.206643] 
[   42.207004] The buggy address belongs to the physical page:
[   42.207613] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   42.208568] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.209410] page_type: f5(slab)
[   42.209996] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.210938] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.211797] page dumped because: kasan: bad access detected
[   42.212460] 
[   42.212800] Memory state around the buggy address:
[   42.213290]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.214138]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.215007] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.215772]                                      ^
[   42.216455]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.217193]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.218113] ==================================================================
[   41.208629] ==================================================================
[   41.209234] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   41.210312] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   41.212204] 
[   41.212716] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   41.214163] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.214777] Hardware name: linux,dummy-virt (DT)
[   41.215544] Call trace:
[   41.216003]  show_stack+0x20/0x38 (C)
[   41.216686]  dump_stack_lvl+0x8c/0xd0
[   41.217419]  print_report+0x118/0x5e0
[   41.217916]  kasan_report+0xc8/0x118
[   41.218566]  kasan_check_range+0x100/0x1a8
[   41.219209]  __kasan_check_write+0x20/0x30
[   41.219872]  kasan_atomics_helper+0x4e4/0x4858
[   41.220598]  kasan_atomics+0x198/0x2e8
[   41.221320]  kunit_try_run_case+0x14c/0x3d0
[   41.222032]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.222906]  kthread+0x24c/0x2d0
[   41.223494]  ret_from_fork+0x10/0x20
[   41.224056] 
[   41.224343] Allocated by task 254:
[   41.224919]  kasan_save_stack+0x3c/0x68
[   41.225414]  kasan_save_track+0x20/0x40
[   41.226026]  kasan_save_alloc_info+0x40/0x58
[   41.226640]  __kasan_kmalloc+0xd4/0xd8
[   41.227101]  __kmalloc_cache_noprof+0x15c/0x3c8
[   41.227627]  kasan_atomics+0xb8/0x2e8
[   41.228204]  kunit_try_run_case+0x14c/0x3d0
[   41.228848]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.229630]  kthread+0x24c/0x2d0
[   41.230079]  ret_from_fork+0x10/0x20
[   41.230647] 
[   41.230975] The buggy address belongs to the object at fff00000c65bde00
[   41.230975]  which belongs to the cache kmalloc-64 of size 64
[   41.231964] The buggy address is located 0 bytes to the right of
[   41.231964]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   41.233124] 
[   41.233557] The buggy address belongs to the physical page:
[   41.234265] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   41.235306] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.235986] page_type: f5(slab)
[   41.236537] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.237371] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.238277] page dumped because: kasan: bad access detected
[   41.238971] 
[   41.239261] Memory state around the buggy address:
[   41.239887]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.240814]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.241490] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.242331]                                      ^
[   41.243027]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.243781]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.244601] ==================================================================
[   41.071888] ==================================================================
[   41.072716] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[   41.074328] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   41.075331] 
[   41.075718] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   41.077566] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.078109] Hardware name: linux,dummy-virt (DT)
[   41.078978] Call trace:
[   41.079692]  show_stack+0x20/0x38 (C)
[   41.080276]  dump_stack_lvl+0x8c/0xd0
[   41.080954]  print_report+0x118/0x5e0
[   41.082594]  kasan_report+0xc8/0x118
[   41.083133]  kasan_check_range+0x100/0x1a8
[   41.083749]  __kasan_check_write+0x20/0x30
[   41.084326]  kasan_atomics_helper+0x3ac/0x4858
[   41.084995]  kasan_atomics+0x198/0x2e8
[   41.086133]  kunit_try_run_case+0x14c/0x3d0
[   41.086761]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.087513]  kthread+0x24c/0x2d0
[   41.088225]  ret_from_fork+0x10/0x20
[   41.088940] 
[   41.089376] Allocated by task 254:
[   41.090034]  kasan_save_stack+0x3c/0x68
[   41.090635]  kasan_save_track+0x20/0x40
[   41.091139]  kasan_save_alloc_info+0x40/0x58
[   41.092611]  __kasan_kmalloc+0xd4/0xd8
[   41.093118]  __kmalloc_cache_noprof+0x15c/0x3c8
[   41.093786]  kasan_atomics+0xb8/0x2e8
[   41.094615]  kunit_try_run_case+0x14c/0x3d0
[   41.095633]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.096479]  kthread+0x24c/0x2d0
[   41.097034]  ret_from_fork+0x10/0x20
[   41.097916] 
[   41.098461] The buggy address belongs to the object at fff00000c65bde00
[   41.098461]  which belongs to the cache kmalloc-64 of size 64
[   41.099899] The buggy address is located 0 bytes to the right of
[   41.099899]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   41.102408] 
[   41.102715] The buggy address belongs to the physical page:
[   41.103573] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   41.104599] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.105559] page_type: f5(slab)
[   41.107171] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.108101] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.108952] page dumped because: kasan: bad access detected
[   41.109989] 
[   41.110197] Memory state around the buggy address:
[   41.110494]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.111216]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.112831] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.113794]                                      ^
[   41.114639]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.115569]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.116109] ==================================================================
[   41.284590] ==================================================================
[   41.285400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   41.286356] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   41.287301] 
[   41.287746] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   41.288803] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.289404] Hardware name: linux,dummy-virt (DT)
[   41.290064] Call trace:
[   41.290550]  show_stack+0x20/0x38 (C)
[   41.291157]  dump_stack_lvl+0x8c/0xd0
[   41.291822]  print_report+0x118/0x5e0
[   41.292515]  kasan_report+0xc8/0x118
[   41.293104]  kasan_check_range+0x100/0x1a8
[   41.293795]  __kasan_check_write+0x20/0x30
[   41.294426]  kasan_atomics_helper+0x5b4/0x4858
[   41.295119]  kasan_atomics+0x198/0x2e8
[   41.295737]  kunit_try_run_case+0x14c/0x3d0
[   41.296392]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.297163]  kthread+0x24c/0x2d0
[   41.297782]  ret_from_fork+0x10/0x20
[   41.298350] 
[   41.298750] Allocated by task 254:
[   41.299261]  kasan_save_stack+0x3c/0x68
[   41.299865]  kasan_save_track+0x20/0x40
[   41.300508]  kasan_save_alloc_info+0x40/0x58
[   41.301092]  __kasan_kmalloc+0xd4/0xd8
[   41.301718]  __kmalloc_cache_noprof+0x15c/0x3c8
[   41.302309]  kasan_atomics+0xb8/0x2e8
[   41.302910]  kunit_try_run_case+0x14c/0x3d0
[   41.303503]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.304224]  kthread+0x24c/0x2d0
[   41.304868]  ret_from_fork+0x10/0x20
[   41.305465] 
[   41.305838] The buggy address belongs to the object at fff00000c65bde00
[   41.305838]  which belongs to the cache kmalloc-64 of size 64
[   41.307071] The buggy address is located 0 bytes to the right of
[   41.307071]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   41.308308] 
[   41.308662] The buggy address belongs to the physical page:
[   41.309382] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   41.310277] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.311086] page_type: f5(slab)
[   41.311680] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.312566] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.313404] page dumped because: kasan: bad access detected
[   41.314067] 
[   41.314413] Memory state around the buggy address:
[   41.315216]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.316010]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.316904] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.317713]                                      ^
[   41.318303]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.319141]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.319953] ==================================================================
[   40.936132] ==================================================================
[   40.936883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   40.937995] Read of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   40.940143] 
[   40.940695] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   40.942154] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.942802] Hardware name: linux,dummy-virt (DT)
[   40.943385] Call trace:
[   40.943739]  show_stack+0x20/0x38 (C)
[   40.944409]  dump_stack_lvl+0x8c/0xd0
[   40.945061]  print_report+0x118/0x5e0
[   40.946102]  kasan_report+0xc8/0x118
[   40.947483]  __asan_report_load4_noabort+0x20/0x30
[   40.948143]  kasan_atomics_helper+0x40fc/0x4858
[   40.948779]  kasan_atomics+0x198/0x2e8
[   40.949195]  kunit_try_run_case+0x14c/0x3d0
[   40.949725]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.950223]  kthread+0x24c/0x2d0
[   40.951309]  ret_from_fork+0x10/0x20
[   40.951816] 
[   40.952194] Allocated by task 254:
[   40.952757]  kasan_save_stack+0x3c/0x68
[   40.953679]  kasan_save_track+0x20/0x40
[   40.954304]  kasan_save_alloc_info+0x40/0x58
[   40.954986]  __kasan_kmalloc+0xd4/0xd8
[   40.955438]  __kmalloc_cache_noprof+0x15c/0x3c8
[   40.957903]  kasan_atomics+0xb8/0x2e8
[   40.958313]  kunit_try_run_case+0x14c/0x3d0
[   40.959027]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.959830]  kthread+0x24c/0x2d0
[   40.960672]  ret_from_fork+0x10/0x20
[   40.961453] 
[   40.962195] The buggy address belongs to the object at fff00000c65bde00
[   40.962195]  which belongs to the cache kmalloc-64 of size 64
[   40.964226] The buggy address is located 0 bytes to the right of
[   40.964226]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   40.965620] 
[   40.965955] The buggy address belongs to the physical page:
[   40.967245] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   40.968096] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.968971] page_type: f5(slab)
[   40.969834] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   40.971621] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   40.972633] page dumped because: kasan: bad access detected
[   40.973744] 
[   40.974020] Memory state around the buggy address:
[   40.974803]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   40.975734]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   40.976795] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   40.978700]                                      ^
[   40.979306]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.980091]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.980936] ==================================================================
[   42.971047] ==================================================================
[   42.971701] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   42.972636] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   42.973702] 
[   42.974272] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   42.975361] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.976002] Hardware name: linux,dummy-virt (DT)
[   42.976585] Call trace:
[   42.976936]  show_stack+0x20/0x38 (C)
[   42.977561]  dump_stack_lvl+0x8c/0xd0
[   42.978178]  print_report+0x118/0x5e0
[   42.978793]  kasan_report+0xc8/0x118
[   42.979487]  kasan_check_range+0x100/0x1a8
[   42.980098]  __kasan_check_write+0x20/0x30
[   42.980653]  kasan_atomics_helper+0x1644/0x4858
[   42.981210]  kasan_atomics+0x198/0x2e8
[   42.981747]  kunit_try_run_case+0x14c/0x3d0
[   42.982471]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.983275]  kthread+0x24c/0x2d0
[   42.983833]  ret_from_fork+0x10/0x20
[   42.984511] 
[   42.984924] Allocated by task 254:
[   42.985526]  kasan_save_stack+0x3c/0x68
[   42.986149]  kasan_save_track+0x20/0x40
[   42.986805]  kasan_save_alloc_info+0x40/0x58
[   42.987356]  __kasan_kmalloc+0xd4/0xd8
[   42.988002]  __kmalloc_cache_noprof+0x15c/0x3c8
[   42.988544]  kasan_atomics+0xb8/0x2e8
[   42.988997]  kunit_try_run_case+0x14c/0x3d0
[   42.989624]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.990241]  kthread+0x24c/0x2d0
[   42.990790]  ret_from_fork+0x10/0x20
[   42.991316] 
[   42.991648] The buggy address belongs to the object at fff00000c65bde00
[   42.991648]  which belongs to the cache kmalloc-64 of size 64
[   42.992858] The buggy address is located 0 bytes to the right of
[   42.992858]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   42.993996] 
[   42.994336] The buggy address belongs to the physical page:
[   42.995083] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   42.995814] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.996647] page_type: f5(slab)
[   42.997170] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.998074] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.998812] page dumped because: kasan: bad access detected
[   42.999492] 
[   42.999834] Memory state around the buggy address:
[   43.000465]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.001253]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.002016] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   43.002733]                                      ^
[   43.003370]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.004092]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.004986] ==================================================================
[   41.246722] ==================================================================
[   41.247598] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   41.248463] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   41.249393] 
[   41.249786] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   41.250953] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.251527] Hardware name: linux,dummy-virt (DT)
[   41.252167] Call trace:
[   41.252633]  show_stack+0x20/0x38 (C)
[   41.253370]  dump_stack_lvl+0x8c/0xd0
[   41.254075]  print_report+0x118/0x5e0
[   41.254590]  kasan_report+0xc8/0x118
[   41.255310]  kasan_check_range+0x100/0x1a8
[   41.256073]  __kasan_check_write+0x20/0x30
[   41.256808]  kasan_atomics_helper+0x54c/0x4858
[   41.257437]  kasan_atomics+0x198/0x2e8
[   41.258061]  kunit_try_run_case+0x14c/0x3d0
[   41.258775]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.259660]  kthread+0x24c/0x2d0
[   41.260114]  ret_from_fork+0x10/0x20
[   41.260829] 
[   41.261294] Allocated by task 254:
[   41.261874]  kasan_save_stack+0x3c/0x68
[   41.262635]  kasan_save_track+0x20/0x40
[   41.263240]  kasan_save_alloc_info+0x40/0x58
[   41.263978]  __kasan_kmalloc+0xd4/0xd8
[   41.264518]  __kmalloc_cache_noprof+0x15c/0x3c8
[   41.265338]  kasan_atomics+0xb8/0x2e8
[   41.265971]  kunit_try_run_case+0x14c/0x3d0
[   41.266572]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.267286]  kthread+0x24c/0x2d0
[   41.267877]  ret_from_fork+0x10/0x20
[   41.268398] 
[   41.268767] The buggy address belongs to the object at fff00000c65bde00
[   41.268767]  which belongs to the cache kmalloc-64 of size 64
[   41.270006] The buggy address is located 0 bytes to the right of
[   41.270006]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   41.271364] 
[   41.271728] The buggy address belongs to the physical page:
[   41.272495] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   41.273310] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.274070] page_type: f5(slab)
[   41.274624] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.275539] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.276382] page dumped because: kasan: bad access detected
[   41.277026] 
[   41.277404] Memory state around the buggy address:
[   41.278023]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.278850]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.279634] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.280401]                                      ^
[   41.281046]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.281876]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.282693] ==================================================================
[   41.736888] ==================================================================
[   41.737808] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   41.738657] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   41.739373] 
[   41.739955] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   41.741029] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.742202] Hardware name: linux,dummy-virt (DT)
[   41.742739] Call trace:
[   41.743323]  show_stack+0x20/0x38 (C)
[   41.744087]  dump_stack_lvl+0x8c/0xd0
[   41.744834]  print_report+0x118/0x5e0
[   41.745592]  kasan_report+0xc8/0x118
[   41.746295]  kasan_check_range+0x100/0x1a8
[   41.747082]  __kasan_check_write+0x20/0x30
[   41.747817]  kasan_atomics_helper+0xad4/0x4858
[   41.748428]  kasan_atomics+0x198/0x2e8
[   41.749263]  kunit_try_run_case+0x14c/0x3d0
[   41.750045]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.750918]  kthread+0x24c/0x2d0
[   41.751622]  ret_from_fork+0x10/0x20
[   41.752362] 
[   41.752852] Allocated by task 254:
[   41.753415]  kasan_save_stack+0x3c/0x68
[   41.754167]  kasan_save_track+0x20/0x40
[   41.754723]  kasan_save_alloc_info+0x40/0x58
[   41.755272]  __kasan_kmalloc+0xd4/0xd8
[   41.756026]  __kmalloc_cache_noprof+0x15c/0x3c8
[   41.756636]  kasan_atomics+0xb8/0x2e8
[   41.757142]  kunit_try_run_case+0x14c/0x3d0
[   41.757782]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.758462]  kthread+0x24c/0x2d0
[   41.758988]  ret_from_fork+0x10/0x20
[   41.759581] 
[   41.759955] The buggy address belongs to the object at fff00000c65bde00
[   41.759955]  which belongs to the cache kmalloc-64 of size 64
[   41.761221] The buggy address is located 0 bytes to the right of
[   41.761221]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   41.762566] 
[   41.762889] The buggy address belongs to the physical page:
[   41.763629] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   41.764540] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.765310] page_type: f5(slab)
[   41.765899] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.766782] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.767630] page dumped because: kasan: bad access detected
[   41.768303] 
[   41.768631] Memory state around the buggy address:
[   41.769303]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.770105]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.770969] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.771761]                                      ^
[   41.772407]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.773178]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.773999] ==================================================================
[   41.776198] ==================================================================
[   41.776961] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   41.777817] Read of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   41.778726] 
[   41.779149] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   41.780172] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.780780] Hardware name: linux,dummy-virt (DT)
[   41.781308] Call trace:
[   41.781778]  show_stack+0x20/0x38 (C)
[   41.782417]  dump_stack_lvl+0x8c/0xd0
[   41.783013]  print_report+0x118/0x5e0
[   41.783641]  kasan_report+0xc8/0x118
[   41.784267]  __asan_report_load4_noabort+0x20/0x30
[   41.784963]  kasan_atomics_helper+0x3dcc/0x4858
[   41.785642]  kasan_atomics+0x198/0x2e8
[   41.786211]  kunit_try_run_case+0x14c/0x3d0
[   41.786898]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.787688]  kthread+0x24c/0x2d0
[   41.788305]  ret_from_fork+0x10/0x20
[   41.788844] 
[   41.789217] Allocated by task 254:
[   41.789786]  kasan_save_stack+0x3c/0x68
[   41.790360]  kasan_save_track+0x20/0x40
[   41.790974]  kasan_save_alloc_info+0x40/0x58
[   41.791657]  __kasan_kmalloc+0xd4/0xd8
[   41.792192]  __kmalloc_cache_noprof+0x15c/0x3c8
[   41.792890]  kasan_atomics+0xb8/0x2e8
[   41.793420]  kunit_try_run_case+0x14c/0x3d0
[   41.794095]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.794761]  kthread+0x24c/0x2d0
[   41.795390]  ret_from_fork+0x10/0x20
[   41.795948] 
[   41.796332] The buggy address belongs to the object at fff00000c65bde00
[   41.796332]  which belongs to the cache kmalloc-64 of size 64
[   41.797549] The buggy address is located 0 bytes to the right of
[   41.797549]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   41.798786] 
[   41.799133] The buggy address belongs to the physical page:
[   41.799867] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   41.800788] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.801620] page_type: f5(slab)
[   41.802120] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.802965] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.803799] page dumped because: kasan: bad access detected
[   41.804435] 
[   41.804880] Memory state around the buggy address:
[   41.805482]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.806367]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.807139] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.807983]                                      ^
[   41.808604]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.809434]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.810233] ==================================================================
[   42.746700] ==================================================================
[   42.747540] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   42.748353] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   42.749043] 
[   42.749482] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   42.750430] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.751010] Hardware name: linux,dummy-virt (DT)
[   42.751607] Call trace:
[   42.752033]  show_stack+0x20/0x38 (C)
[   42.752681]  dump_stack_lvl+0x8c/0xd0
[   42.753224]  print_report+0x118/0x5e0
[   42.753843]  kasan_report+0xc8/0x118
[   42.754510]  kasan_check_range+0x100/0x1a8
[   42.755128]  __kasan_check_write+0x20/0x30
[   42.755707]  kasan_atomics_helper+0x1414/0x4858
[   42.756682]  kasan_atomics+0x198/0x2e8
[   42.757379]  kunit_try_run_case+0x14c/0x3d0
[   42.758133]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.759002]  kthread+0x24c/0x2d0
[   42.759710]  ret_from_fork+0x10/0x20
[   42.760462] 
[   42.760962] Allocated by task 254:
[   42.761560]  kasan_save_stack+0x3c/0x68
[   42.762155]  kasan_save_track+0x20/0x40
[   42.762948]  kasan_save_alloc_info+0x40/0x58
[   42.763723]  __kasan_kmalloc+0xd4/0xd8
[   42.764209]  __kmalloc_cache_noprof+0x15c/0x3c8
[   42.765054]  kasan_atomics+0xb8/0x2e8
[   42.765770]  kunit_try_run_case+0x14c/0x3d0
[   42.766580]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.767405]  kthread+0x24c/0x2d0
[   42.767944]  ret_from_fork+0x10/0x20
[   42.768426] 
[   42.769108] The buggy address belongs to the object at fff00000c65bde00
[   42.769108]  which belongs to the cache kmalloc-64 of size 64
[   42.769949] The buggy address is located 0 bytes to the right of
[   42.769949]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   42.770559] 
[   42.770724] The buggy address belongs to the physical page:
[   42.771004] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   42.771381] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.772322] page_type: f5(slab)
[   42.773026] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.774190] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.775209] page dumped because: kasan: bad access detected
[   42.775985] 
[   42.776471] Memory state around the buggy address:
[   42.777239]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.778041]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.778784] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.779416]                                      ^
[   42.780100]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.780989]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.781762] ==================================================================
[   41.812711] ==================================================================
[   41.813410] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   41.815172] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   41.816760] 
[   41.817552] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   41.818509] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.819005] Hardware name: linux,dummy-virt (DT)
[   41.819746] Call trace:
[   41.820150]  show_stack+0x20/0x38 (C)
[   41.820886]  dump_stack_lvl+0x8c/0xd0
[   41.821569]  print_report+0x118/0x5e0
[   41.822205]  kasan_report+0xc8/0x118
[   41.822854]  kasan_check_range+0x100/0x1a8
[   41.823536]  __kasan_check_write+0x20/0x30
[   41.824209]  kasan_atomics_helper+0xb70/0x4858
[   41.824955]  kasan_atomics+0x198/0x2e8
[   41.825513]  kunit_try_run_case+0x14c/0x3d0
[   41.826232]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.827097]  kthread+0x24c/0x2d0
[   41.827586]  ret_from_fork+0x10/0x20
[   41.828177] 
[   41.828542] Allocated by task 254:
[   41.829096]  kasan_save_stack+0x3c/0x68
[   41.829609]  kasan_save_track+0x20/0x40
[   41.830231]  kasan_save_alloc_info+0x40/0x58
[   41.830920]  __kasan_kmalloc+0xd4/0xd8
[   41.831516]  __kmalloc_cache_noprof+0x15c/0x3c8
[   41.832163]  kasan_atomics+0xb8/0x2e8
[   41.832691]  kunit_try_run_case+0x14c/0x3d0
[   41.833316]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.833990]  kthread+0x24c/0x2d0
[   41.834559]  ret_from_fork+0x10/0x20
[   41.835203] 
[   41.835547] The buggy address belongs to the object at fff00000c65bde00
[   41.835547]  which belongs to the cache kmalloc-64 of size 64
[   41.836813] The buggy address is located 0 bytes to the right of
[   41.836813]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   41.838087] 
[   41.838482] The buggy address belongs to the physical page:
[   41.839218] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   41.840141] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.840889] page_type: f5(slab)
[   41.841458] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.842350] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.843231] page dumped because: kasan: bad access detected
[   41.843864] 
[   41.844254] Memory state around the buggy address:
[   41.845000]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.845754]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.846625] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.847419]                                      ^
[   41.848045]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.848964]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.849379] ==================================================================
[   41.519295] ==================================================================
[   41.520044] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   41.521765] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   41.522504] 
[   41.522780] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   41.524307] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.524927] Hardware name: linux,dummy-virt (DT)
[   41.525499] Call trace:
[   41.525883]  show_stack+0x20/0x38 (C)
[   41.526502]  dump_stack_lvl+0x8c/0xd0
[   41.527038]  print_report+0x118/0x5e0
[   41.527646]  kasan_report+0xc8/0x118
[   41.528214]  kasan_check_range+0x100/0x1a8
[   41.528870]  __kasan_check_write+0x20/0x30
[   41.529507]  kasan_atomics_helper+0x894/0x4858
[   41.530118]  kasan_atomics+0x198/0x2e8
[   41.530689]  kunit_try_run_case+0x14c/0x3d0
[   41.531278]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.531988]  kthread+0x24c/0x2d0
[   41.532574]  ret_from_fork+0x10/0x20
[   41.533165] 
[   41.533534] Allocated by task 254:
[   41.534051]  kasan_save_stack+0x3c/0x68
[   41.534532]  kasan_save_track+0x20/0x40
[   41.535171]  kasan_save_alloc_info+0x40/0x58
[   41.535722]  __kasan_kmalloc+0xd4/0xd8
[   41.536304]  __kmalloc_cache_noprof+0x15c/0x3c8
[   41.536935]  kasan_atomics+0xb8/0x2e8
[   41.537518]  kunit_try_run_case+0x14c/0x3d0
[   41.538087]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.538671]  kthread+0x24c/0x2d0
[   41.539197]  ret_from_fork+0x10/0x20
[   41.539718] 
[   41.540045] The buggy address belongs to the object at fff00000c65bde00
[   41.540045]  which belongs to the cache kmalloc-64 of size 64
[   41.541233] The buggy address is located 0 bytes to the right of
[   41.541233]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   41.542417] 
[   41.542761] The buggy address belongs to the physical page:
[   41.543455] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   41.544325] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.545072] page_type: f5(slab)
[   41.545630] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.546420] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.547299] page dumped because: kasan: bad access detected
[   41.547928] 
[   41.548670] Memory state around the buggy address:
[   41.549177]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.549952]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.551065] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.552044]                                      ^
[   41.552594]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.553389]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.554119] ==================================================================
[   42.554522] ==================================================================
[   42.555179] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   42.556790] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   42.557570] 
[   42.558268] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   42.559386] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.560257] Hardware name: linux,dummy-virt (DT)
[   42.560856] Call trace:
[   42.561238]  show_stack+0x20/0x38 (C)
[   42.562110]  dump_stack_lvl+0x8c/0xd0
[   42.562842]  print_report+0x118/0x5e0
[   42.563564]  kasan_report+0xc8/0x118
[   42.564320]  kasan_check_range+0x100/0x1a8
[   42.565031]  __kasan_check_write+0x20/0x30
[   42.565772]  kasan_atomics_helper+0x11f8/0x4858
[   42.566405]  kasan_atomics+0x198/0x2e8
[   42.566968]  kunit_try_run_case+0x14c/0x3d0
[   42.567840]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.568575]  kthread+0x24c/0x2d0
[   42.569080]  ret_from_fork+0x10/0x20
[   42.569570] 
[   42.569920] Allocated by task 254:
[   42.570472]  kasan_save_stack+0x3c/0x68
[   42.571077]  kasan_save_track+0x20/0x40
[   42.571738]  kasan_save_alloc_info+0x40/0x58
[   42.572359]  __kasan_kmalloc+0xd4/0xd8
[   42.573012]  __kmalloc_cache_noprof+0x15c/0x3c8
[   42.573682]  kasan_atomics+0xb8/0x2e8
[   42.574302]  kunit_try_run_case+0x14c/0x3d0
[   42.574965]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.575737]  kthread+0x24c/0x2d0
[   42.576284]  ret_from_fork+0x10/0x20
[   42.576930] 
[   42.577209] The buggy address belongs to the object at fff00000c65bde00
[   42.577209]  which belongs to the cache kmalloc-64 of size 64
[   42.578359] The buggy address is located 0 bytes to the right of
[   42.578359]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   42.579736] 
[   42.580085] The buggy address belongs to the physical page:
[   42.580865] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   42.581796] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.582639] page_type: f5(slab)
[   42.583217] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.584125] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.585061] page dumped because: kasan: bad access detected
[   42.585748] 
[   42.586112] Memory state around the buggy address:
[   42.586822]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.587719]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.588592] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.589400]                                      ^
[   42.590026]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.590922]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.591750] ==================================================================
[   41.321903] ==================================================================
[   41.322683] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   41.323564] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   41.324411] 
[   41.324914] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   41.326123] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.326741] Hardware name: linux,dummy-virt (DT)
[   41.327295] Call trace:
[   41.327766]  show_stack+0x20/0x38 (C)
[   41.328360]  dump_stack_lvl+0x8c/0xd0
[   41.328993]  print_report+0x118/0x5e0
[   41.329675]  kasan_report+0xc8/0x118
[   41.330280]  kasan_check_range+0x100/0x1a8
[   41.330866]  __kasan_check_write+0x20/0x30
[   41.331566]  kasan_atomics_helper+0x61c/0x4858
[   41.332229]  kasan_atomics+0x198/0x2e8
[   41.332848]  kunit_try_run_case+0x14c/0x3d0
[   41.333535]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.334335]  kthread+0x24c/0x2d0
[   41.334951]  ret_from_fork+0x10/0x20
[   41.335573] 
[   41.335828] Allocated by task 254:
[   41.336658]  kasan_save_stack+0x3c/0x68
[   41.337274]  kasan_save_track+0x20/0x40
[   41.337758]  kasan_save_alloc_info+0x40/0x58
[   41.338414]  __kasan_kmalloc+0xd4/0xd8
[   41.338984]  __kmalloc_cache_noprof+0x15c/0x3c8
[   41.339688]  kasan_atomics+0xb8/0x2e8
[   41.340221]  kunit_try_run_case+0x14c/0x3d0
[   41.340904]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.341609]  kthread+0x24c/0x2d0
[   41.342178]  ret_from_fork+0x10/0x20
[   41.342714] 
[   41.343095] The buggy address belongs to the object at fff00000c65bde00
[   41.343095]  which belongs to the cache kmalloc-64 of size 64
[   41.344279] The buggy address is located 0 bytes to the right of
[   41.344279]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   41.345575] 
[   41.345956] The buggy address belongs to the physical page:
[   41.346618] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   41.347584] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.348419] page_type: f5(slab)
[   41.348957] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.349854] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.350721] page dumped because: kasan: bad access detected
[   41.351341] 
[   41.351741] Memory state around the buggy address:
[   41.352336]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.353177]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.354098] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.354986]                                      ^
[   41.355690]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.356400]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.357530] ==================================================================
[   40.847912] ==================================================================
[   40.848824] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   40.849492] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   40.851222] 
[   40.851615] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   40.852817] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.854084] Hardware name: linux,dummy-virt (DT)
[   40.854678] Call trace:
[   40.855026]  show_stack+0x20/0x38 (C)
[   40.855722]  dump_stack_lvl+0x8c/0xd0
[   40.856362]  print_report+0x118/0x5e0
[   40.857010]  kasan_report+0xc8/0x118
[   40.857814]  kasan_check_range+0x100/0x1a8
[   40.858622]  __kasan_check_write+0x20/0x30
[   40.859078]  kasan_atomics_helper+0x24c/0x4858
[   40.859668]  kasan_atomics+0x198/0x2e8
[   40.860399]  kunit_try_run_case+0x14c/0x3d0
[   40.861158]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.862201]  kthread+0x24c/0x2d0
[   40.862707]  ret_from_fork+0x10/0x20
[   40.863297] 
[   40.863673] Allocated by task 254:
[   40.864248]  kasan_save_stack+0x3c/0x68
[   40.864885]  kasan_save_track+0x20/0x40
[   40.865814]  kasan_save_alloc_info+0x40/0x58
[   40.866544]  __kasan_kmalloc+0xd4/0xd8
[   40.866957]  __kmalloc_cache_noprof+0x15c/0x3c8
[   40.867507]  kasan_atomics+0xb8/0x2e8
[   40.868114]  kunit_try_run_case+0x14c/0x3d0
[   40.868808]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.869621]  kthread+0x24c/0x2d0
[   40.870203]  ret_from_fork+0x10/0x20
[   40.871195] 
[   40.871541] The buggy address belongs to the object at fff00000c65bde00
[   40.871541]  which belongs to the cache kmalloc-64 of size 64
[   40.872954] The buggy address is located 0 bytes to the right of
[   40.872954]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   40.874612] 
[   40.876186] The buggy address belongs to the physical page:
[   40.876783] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   40.878286] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.879233] page_type: f5(slab)
[   40.879935] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   40.881026] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   40.882046] page dumped because: kasan: bad access detected
[   40.882649] 
[   40.882971] Memory state around the buggy address:
[   40.884310]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   40.885386]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   40.886501] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   40.887544]                                      ^
[   40.888576]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.889528]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.889938] ==================================================================
[   41.887021] ==================================================================
[   41.888209] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   41.889007] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   41.890401] 
[   41.890703] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   41.891657] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.892100] Hardware name: linux,dummy-virt (DT)
[   41.893134] Call trace:
[   41.893647]  show_stack+0x20/0x38 (C)
[   41.894329]  dump_stack_lvl+0x8c/0xd0
[   41.894919]  print_report+0x118/0x5e0
[   41.895569]  kasan_report+0xc8/0x118
[   41.896169]  kasan_check_range+0x100/0x1a8
[   41.896798]  __kasan_check_write+0x20/0x30
[   41.897466]  kasan_atomics_helper+0xc08/0x4858
[   41.898107]  kasan_atomics+0x198/0x2e8
[   41.898755]  kunit_try_run_case+0x14c/0x3d0
[   41.899394]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.900090]  kthread+0x24c/0x2d0
[   41.900705]  ret_from_fork+0x10/0x20
[   41.901277] 
[   41.901658] Allocated by task 254:
[   41.902179]  kasan_save_stack+0x3c/0x68
[   41.902713]  kasan_save_track+0x20/0x40
[   41.903340]  kasan_save_alloc_info+0x40/0x58
[   41.904020]  __kasan_kmalloc+0xd4/0xd8
[   41.904592]  __kmalloc_cache_noprof+0x15c/0x3c8
[   41.905257]  kasan_atomics+0xb8/0x2e8
[   41.905851]  kunit_try_run_case+0x14c/0x3d0
[   41.906425]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.907201]  kthread+0x24c/0x2d0
[   41.907787]  ret_from_fork+0x10/0x20
[   41.908408] 
[   41.908774] The buggy address belongs to the object at fff00000c65bde00
[   41.908774]  which belongs to the cache kmalloc-64 of size 64
[   41.909982] The buggy address is located 0 bytes to the right of
[   41.909982]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   41.911241] 
[   41.911684] The buggy address belongs to the physical page:
[   41.912307] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   41.913302] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.914124] page_type: f5(slab)
[   41.914575] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.915314] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.916053] page dumped because: kasan: bad access detected
[   41.916657] 
[   41.917010] Memory state around the buggy address:
[   41.917591]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.918510]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.919530] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.920508]                                      ^
[   41.921110]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.921859]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.922981] ==================================================================
[   41.995885] ==================================================================
[   41.997154] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   41.998216] Read of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   41.999644] 
[   42.000111] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   42.002094] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.002845] Hardware name: linux,dummy-virt (DT)
[   42.003616] Call trace:
[   42.004009]  show_stack+0x20/0x38 (C)
[   42.004556]  dump_stack_lvl+0x8c/0xd0
[   42.005003]  print_report+0x118/0x5e0
[   42.006091]  kasan_report+0xc8/0x118
[   42.006607]  __asan_report_load4_noabort+0x20/0x30
[   42.007432]  kasan_atomics_helper+0x3dd8/0x4858
[   42.008274]  kasan_atomics+0x198/0x2e8
[   42.009009]  kunit_try_run_case+0x14c/0x3d0
[   42.009575]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.010249]  kthread+0x24c/0x2d0
[   42.010722]  ret_from_fork+0x10/0x20
[   42.011318] 
[   42.011685] Allocated by task 254:
[   42.012154]  kasan_save_stack+0x3c/0x68
[   42.012704]  kasan_save_track+0x20/0x40
[   42.013288]  kasan_save_alloc_info+0x40/0x58
[   42.013902]  __kasan_kmalloc+0xd4/0xd8
[   42.014513]  __kmalloc_cache_noprof+0x15c/0x3c8
[   42.015125]  kasan_atomics+0xb8/0x2e8
[   42.015636]  kunit_try_run_case+0x14c/0x3d0
[   42.016275]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.017023]  kthread+0x24c/0x2d0
[   42.017549]  ret_from_fork+0x10/0x20
[   42.018119] 
[   42.018484] The buggy address belongs to the object at fff00000c65bde00
[   42.018484]  which belongs to the cache kmalloc-64 of size 64
[   42.019579] The buggy address is located 0 bytes to the right of
[   42.019579]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   42.020914] 
[   42.021273] The buggy address belongs to the physical page:
[   42.021861] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   42.022810] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.023661] page_type: f5(slab)
[   42.024141] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.025409] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.026137] page dumped because: kasan: bad access detected
[   42.026823] 
[   42.027173] Memory state around the buggy address:
[   42.027829]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.028598]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.029435] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.030278]                                      ^
[   42.030903]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.031741]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.032510] ==================================================================
[   43.196044] ==================================================================
[   43.197325] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   43.198213] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   43.199074] 
[   43.199461] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   43.200670] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.201247] Hardware name: linux,dummy-virt (DT)
[   43.201855] Call trace:
[   43.202295]  show_stack+0x20/0x38 (C)
[   43.202980]  dump_stack_lvl+0x8c/0xd0
[   43.203650]  print_report+0x118/0x5e0
[   43.204197]  kasan_report+0xc8/0x118
[   43.204932]  kasan_check_range+0x100/0x1a8
[   43.205590]  __kasan_check_write+0x20/0x30
[   43.206217]  kasan_atomics_helper+0x17ec/0x4858
[   43.206920]  kasan_atomics+0x198/0x2e8
[   43.207484]  kunit_try_run_case+0x14c/0x3d0
[   43.208138]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.208933]  kthread+0x24c/0x2d0
[   43.209535]  ret_from_fork+0x10/0x20
[   43.210165] 
[   43.210566] Allocated by task 254:
[   43.211092]  kasan_save_stack+0x3c/0x68
[   43.211757]  kasan_save_track+0x20/0x40
[   43.212377]  kasan_save_alloc_info+0x40/0x58
[   43.213014]  __kasan_kmalloc+0xd4/0xd8
[   43.213551]  __kmalloc_cache_noprof+0x15c/0x3c8
[   43.214228]  kasan_atomics+0xb8/0x2e8
[   43.214824]  kunit_try_run_case+0x14c/0x3d0
[   43.215426]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.216189]  kthread+0x24c/0x2d0
[   43.216760]  ret_from_fork+0x10/0x20
[   43.217291] 
[   43.217670] The buggy address belongs to the object at fff00000c65bde00
[   43.217670]  which belongs to the cache kmalloc-64 of size 64
[   43.218963] The buggy address is located 0 bytes to the right of
[   43.218963]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   43.220267] 
[   43.220622] The buggy address belongs to the physical page:
[   43.221284] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   43.222275] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.223004] page_type: f5(slab)
[   43.223586] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   43.224478] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   43.225229] page dumped because: kasan: bad access detected
[   43.225905] 
[   43.226288] Memory state around the buggy address:
[   43.226949]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.227681]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.228570] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   43.229352]                                      ^
[   43.229958]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.230788]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.231606] ==================================================================
[   42.219850] ==================================================================
[   42.220681] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   42.221771] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   42.222703] 
[   42.223083] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   42.224194] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.224709] Hardware name: linux,dummy-virt (DT)
[   42.225353] Call trace:
[   42.225780]  show_stack+0x20/0x38 (C)
[   42.226399]  dump_stack_lvl+0x8c/0xd0
[   42.227012]  print_report+0x118/0x5e0
[   42.227559]  kasan_report+0xc8/0x118
[   42.228167]  __asan_report_store8_noabort+0x20/0x30
[   42.228918]  kasan_atomics_helper+0x3e5c/0x4858
[   42.229563]  kasan_atomics+0x198/0x2e8
[   42.230073]  kunit_try_run_case+0x14c/0x3d0
[   42.230736]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.231415]  kthread+0x24c/0x2d0
[   42.231980]  ret_from_fork+0x10/0x20
[   42.232569] 
[   42.232904] Allocated by task 254:
[   42.233455]  kasan_save_stack+0x3c/0x68
[   42.234062]  kasan_save_track+0x20/0x40
[   42.234658]  kasan_save_alloc_info+0x40/0x58
[   42.235295]  __kasan_kmalloc+0xd4/0xd8
[   42.235833]  __kmalloc_cache_noprof+0x15c/0x3c8
[   42.236493]  kasan_atomics+0xb8/0x2e8
[   42.237064]  kunit_try_run_case+0x14c/0x3d0
[   42.237620]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.238355]  kthread+0x24c/0x2d0
[   42.238918]  ret_from_fork+0x10/0x20
[   42.239503] 
[   42.239846] The buggy address belongs to the object at fff00000c65bde00
[   42.239846]  which belongs to the cache kmalloc-64 of size 64
[   42.240992] The buggy address is located 0 bytes to the right of
[   42.240992]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   42.242146] 
[   42.242532] The buggy address belongs to the physical page:
[   42.243220] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   42.244039] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.244872] page_type: f5(slab)
[   42.245404] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.246269] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.247192] page dumped because: kasan: bad access detected
[   42.247888] 
[   42.248257] Memory state around the buggy address:
[   42.248940]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.249853]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.250613] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.251498]                                      ^
[   42.252186]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.253025]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.253797] ==================================================================
[   42.822665] ==================================================================
[   42.823401] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   42.824196] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   42.825111] 
[   42.825521] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   42.826591] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.827203] Hardware name: linux,dummy-virt (DT)
[   42.827880] Call trace:
[   42.828307]  show_stack+0x20/0x38 (C)
[   42.828981]  dump_stack_lvl+0x8c/0xd0
[   42.829565]  print_report+0x118/0x5e0
[   42.830207]  kasan_report+0xc8/0x118
[   42.830861]  kasan_check_range+0x100/0x1a8
[   42.831438]  __kasan_check_write+0x20/0x30
[   42.832146]  kasan_atomics_helper+0x14e4/0x4858
[   42.832791]  kasan_atomics+0x198/0x2e8
[   42.833401]  kunit_try_run_case+0x14c/0x3d0
[   42.834077]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.834882]  kthread+0x24c/0x2d0
[   42.835431]  ret_from_fork+0x10/0x20
[   42.836056] 
[   42.836413] Allocated by task 254:
[   42.836980]  kasan_save_stack+0x3c/0x68
[   42.837534]  kasan_save_track+0x20/0x40
[   42.838151]  kasan_save_alloc_info+0x40/0x58
[   42.838795]  __kasan_kmalloc+0xd4/0xd8
[   42.839407]  __kmalloc_cache_noprof+0x15c/0x3c8
[   42.839987]  kasan_atomics+0xb8/0x2e8
[   42.840614]  kunit_try_run_case+0x14c/0x3d0
[   42.841202]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.841953]  kthread+0x24c/0x2d0
[   42.842424]  ret_from_fork+0x10/0x20
[   42.843035] 
[   42.843424] The buggy address belongs to the object at fff00000c65bde00
[   42.843424]  which belongs to the cache kmalloc-64 of size 64
[   42.844698] The buggy address is located 0 bytes to the right of
[   42.844698]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   42.845995] 
[   42.846343] The buggy address belongs to the physical page:
[   42.846993] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   42.847903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.848730] page_type: f5(slab)
[   42.849225] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.850155] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.851038] page dumped because: kasan: bad access detected
[   42.851687] 
[   42.852071] Memory state around the buggy address:
[   42.852760]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.853506]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.854422] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.855221]                                      ^
[   42.855880]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.856787]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.857660] ==================================================================
[   41.662534] ==================================================================
[   41.663243] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   41.664104] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   41.665488] 
[   41.665886] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   41.666847] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.667418] Hardware name: linux,dummy-virt (DT)
[   41.667960] Call trace:
[   41.668384]  show_stack+0x20/0x38 (C)
[   41.669029]  dump_stack_lvl+0x8c/0xd0
[   41.669672]  print_report+0x118/0x5e0
[   41.670266]  kasan_report+0xc8/0x118
[   41.670881]  kasan_check_range+0x100/0x1a8
[   41.671507]  __kasan_check_write+0x20/0x30
[   41.672151]  kasan_atomics_helper+0xa04/0x4858
[   41.672841]  kasan_atomics+0x198/0x2e8
[   41.673345]  kunit_try_run_case+0x14c/0x3d0
[   41.674033]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.674816]  kthread+0x24c/0x2d0
[   41.675272]  ret_from_fork+0x10/0x20
[   41.675899] 
[   41.676254] Allocated by task 254:
[   41.676787]  kasan_save_stack+0x3c/0x68
[   41.677314]  kasan_save_track+0x20/0x40
[   41.677909]  kasan_save_alloc_info+0x40/0x58
[   41.678396]  __kasan_kmalloc+0xd4/0xd8
[   41.678995]  __kmalloc_cache_noprof+0x15c/0x3c8
[   41.679684]  kasan_atomics+0xb8/0x2e8
[   41.680272]  kunit_try_run_case+0x14c/0x3d0
[   41.680918]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.681484]  kthread+0x24c/0x2d0
[   41.682017]  ret_from_fork+0x10/0x20
[   41.682597] 
[   41.682956] The buggy address belongs to the object at fff00000c65bde00
[   41.682956]  which belongs to the cache kmalloc-64 of size 64
[   41.684102] The buggy address is located 0 bytes to the right of
[   41.684102]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   41.685236] 
[   41.685607] The buggy address belongs to the physical page:
[   41.686191] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   41.687042] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.687664] page_type: f5(slab)
[   41.688201] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.689127] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.689879] page dumped because: kasan: bad access detected
[   41.690560] 
[   41.690901] Memory state around the buggy address:
[   41.691407]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.692251]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.693063] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.693822]                                      ^
[   41.694489]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.695180]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.696037] ==================================================================
[   41.556168] ==================================================================
[   41.556908] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   41.558490] Read of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   41.559331] 
[   41.559626] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   41.560615] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.561321] Hardware name: linux,dummy-virt (DT)
[   41.561923] Call trace:
[   41.562244]  show_stack+0x20/0x38 (C)
[   41.562713]  dump_stack_lvl+0x8c/0xd0
[   41.563162]  print_report+0x118/0x5e0
[   41.563603]  kasan_report+0xc8/0x118
[   41.564073]  __asan_report_load4_noabort+0x20/0x30
[   41.564903]  kasan_atomics_helper+0x42d8/0x4858
[   41.565610]  kasan_atomics+0x198/0x2e8
[   41.566190]  kunit_try_run_case+0x14c/0x3d0
[   41.567431]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.568322]  kthread+0x24c/0x2d0
[   41.568854]  ret_from_fork+0x10/0x20
[   41.569454] 
[   41.569802] Allocated by task 254:
[   41.570295]  kasan_save_stack+0x3c/0x68
[   41.570912]  kasan_save_track+0x20/0x40
[   41.571476]  kasan_save_alloc_info+0x40/0x58
[   41.572013]  __kasan_kmalloc+0xd4/0xd8
[   41.572614]  __kmalloc_cache_noprof+0x15c/0x3c8
[   41.573179]  kasan_atomics+0xb8/0x2e8
[   41.573770]  kunit_try_run_case+0x14c/0x3d0
[   41.574275]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.574964]  kthread+0x24c/0x2d0
[   41.575434]  ret_from_fork+0x10/0x20
[   41.575957] 
[   41.576314] The buggy address belongs to the object at fff00000c65bde00
[   41.576314]  which belongs to the cache kmalloc-64 of size 64
[   41.577364] The buggy address is located 0 bytes to the right of
[   41.577364]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   41.578589] 
[   41.578935] The buggy address belongs to the physical page:
[   41.579594] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   41.580388] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.581186] page_type: f5(slab)
[   41.581642] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.582559] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.583339] page dumped because: kasan: bad access detected
[   41.584044] 
[   41.584405] Memory state around the buggy address:
[   41.584961]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.585806]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.586677] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.587395]                                      ^
[   41.588030]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.588766]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.589528] ==================================================================
[   42.072114] ==================================================================
[   42.072874] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   42.074721] Read of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   42.075646] 
[   42.075970] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   42.077044] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.077522] Hardware name: linux,dummy-virt (DT)
[   42.078111] Call trace:
[   42.078524]  show_stack+0x20/0x38 (C)
[   42.079102]  dump_stack_lvl+0x8c/0xd0
[   42.079681]  print_report+0x118/0x5e0
[   42.080255]  kasan_report+0xc8/0x118
[   42.080762]  __asan_report_load4_noabort+0x20/0x30
[   42.081435]  kasan_atomics_helper+0x3e04/0x4858
[   42.082037]  kasan_atomics+0x198/0x2e8
[   42.082576]  kunit_try_run_case+0x14c/0x3d0
[   42.083163]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.083827]  kthread+0x24c/0x2d0
[   42.084408]  ret_from_fork+0x10/0x20
[   42.085062] 
[   42.085413] Allocated by task 254:
[   42.085935]  kasan_save_stack+0x3c/0x68
[   42.086399]  kasan_save_track+0x20/0x40
[   42.086856]  kasan_save_alloc_info+0x40/0x58
[   42.087375]  __kasan_kmalloc+0xd4/0xd8
[   42.087778]  __kmalloc_cache_noprof+0x15c/0x3c8
[   42.088069]  kasan_atomics+0xb8/0x2e8
[   42.088324]  kunit_try_run_case+0x14c/0x3d0
[   42.088792]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.089357]  kthread+0x24c/0x2d0
[   42.090731]  ret_from_fork+0x10/0x20
[   42.091734] 
[   42.092083] The buggy address belongs to the object at fff00000c65bde00
[   42.092083]  which belongs to the cache kmalloc-64 of size 64
[   42.093208] The buggy address is located 0 bytes to the right of
[   42.093208]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   42.094349] 
[   42.094716] The buggy address belongs to the physical page:
[   42.095344] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   42.096230] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.096977] page_type: f5(slab)
[   42.097505] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.098304] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.099123] page dumped because: kasan: bad access detected
[   42.099730] 
[   42.100077] Memory state around the buggy address:
[   42.100582]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.101433]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.102237] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.102967]                                      ^
[   42.103582]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.104454]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.105133] ==================================================================
[   41.029008] ==================================================================
[   41.030371] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   41.030963] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   41.031991] 
[   41.032481] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   41.033862] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.034743] Hardware name: linux,dummy-virt (DT)
[   41.035334] Call trace:
[   41.035625]  show_stack+0x20/0x38 (C)
[   41.036319]  dump_stack_lvl+0x8c/0xd0
[   41.036968]  print_report+0x118/0x5e0
[   41.037618]  kasan_report+0xc8/0x118
[   41.038949]  __asan_report_store4_noabort+0x20/0x30
[   41.039773]  kasan_atomics_helper+0x3f94/0x4858
[   41.040592]  kasan_atomics+0x198/0x2e8
[   41.041301]  kunit_try_run_case+0x14c/0x3d0
[   41.041997]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.043167]  kthread+0x24c/0x2d0
[   41.043664]  ret_from_fork+0x10/0x20
[   41.044173] 
[   41.044554] Allocated by task 254:
[   41.044972]  kasan_save_stack+0x3c/0x68
[   41.045871]  kasan_save_track+0x20/0x40
[   41.046525]  kasan_save_alloc_info+0x40/0x58
[   41.047749]  __kasan_kmalloc+0xd4/0xd8
[   41.048296]  __kmalloc_cache_noprof+0x15c/0x3c8
[   41.049059]  kasan_atomics+0xb8/0x2e8
[   41.049684]  kunit_try_run_case+0x14c/0x3d0
[   41.050339]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.051689]  kthread+0x24c/0x2d0
[   41.052155]  ret_from_fork+0x10/0x20
[   41.052733] 
[   41.053052] The buggy address belongs to the object at fff00000c65bde00
[   41.053052]  which belongs to the cache kmalloc-64 of size 64
[   41.054488] The buggy address is located 0 bytes to the right of
[   41.054488]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   41.056104] 
[   41.056609] The buggy address belongs to the physical page:
[   41.057520] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   41.058677] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.059642] page_type: f5(slab)
[   41.060124] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.060617] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.062298] page dumped because: kasan: bad access detected
[   41.063147] 
[   41.063675] Memory state around the buggy address:
[   41.064257]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.065279]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.066306] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.067276]                                      ^
[   41.067854]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.068921]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.069841] ==================================================================
[   43.159167] ==================================================================
[   43.159784] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   43.160705] Read of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   43.161950] 
[   43.162477] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   43.163704] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.164425] Hardware name: linux,dummy-virt (DT)
[   43.165140] Call trace:
[   43.165718]  show_stack+0x20/0x38 (C)
[   43.166454]  dump_stack_lvl+0x8c/0xd0
[   43.166960]  print_report+0x118/0x5e0
[   43.167481]  kasan_report+0xc8/0x118
[   43.167984]  __asan_report_load8_noabort+0x20/0x30
[   43.168644]  kasan_atomics_helper+0x3e20/0x4858
[   43.169177]  kasan_atomics+0x198/0x2e8
[   43.170282]  kunit_try_run_case+0x14c/0x3d0
[   43.170899]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.171646]  kthread+0x24c/0x2d0
[   43.172281]  ret_from_fork+0x10/0x20
[   43.172848] 
[   43.173254] Allocated by task 254:
[   43.173773]  kasan_save_stack+0x3c/0x68
[   43.174416]  kasan_save_track+0x20/0x40
[   43.175121]  kasan_save_alloc_info+0x40/0x58
[   43.175715]  __kasan_kmalloc+0xd4/0xd8
[   43.176208]  __kmalloc_cache_noprof+0x15c/0x3c8
[   43.176795]  kasan_atomics+0xb8/0x2e8
[   43.177264]  kunit_try_run_case+0x14c/0x3d0
[   43.177828]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.178411]  kthread+0x24c/0x2d0
[   43.179024]  ret_from_fork+0x10/0x20
[   43.179673] 
[   43.180089] The buggy address belongs to the object at fff00000c65bde00
[   43.180089]  which belongs to the cache kmalloc-64 of size 64
[   43.181501] The buggy address is located 0 bytes to the right of
[   43.181501]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   43.182715] 
[   43.183193] The buggy address belongs to the physical page:
[   43.183977] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   43.184818] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.185696] page_type: f5(slab)
[   43.186273] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   43.187120] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   43.187929] page dumped because: kasan: bad access detected
[   43.188645] 
[   43.189053] Memory state around the buggy address:
[   43.189622]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.190398]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.191151] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   43.191921]                                      ^
[   43.192517]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.193435]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.194302] ==================================================================
[   41.698342] ==================================================================
[   41.699122] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   41.699884] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   41.701477] 
[   41.701763] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   41.702713] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.703155] Hardware name: linux,dummy-virt (DT)
[   41.704256] Call trace:
[   41.705009]  show_stack+0x20/0x38 (C)
[   41.705531]  dump_stack_lvl+0x8c/0xd0
[   41.706135]  print_report+0x118/0x5e0
[   41.706727]  kasan_report+0xc8/0x118
[   41.707264]  kasan_check_range+0x100/0x1a8
[   41.707795]  __kasan_check_write+0x20/0x30
[   41.708381]  kasan_atomics_helper+0xa6c/0x4858
[   41.709064]  kasan_atomics+0x198/0x2e8
[   41.709643]  kunit_try_run_case+0x14c/0x3d0
[   41.710305]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.711027]  kthread+0x24c/0x2d0
[   41.711502]  ret_from_fork+0x10/0x20
[   41.712093] 
[   41.712452] Allocated by task 254:
[   41.712922]  kasan_save_stack+0x3c/0x68
[   41.713528]  kasan_save_track+0x20/0x40
[   41.714064]  kasan_save_alloc_info+0x40/0x58
[   41.714649]  __kasan_kmalloc+0xd4/0xd8
[   41.715171]  __kmalloc_cache_noprof+0x15c/0x3c8
[   41.715837]  kasan_atomics+0xb8/0x2e8
[   41.716403]  kunit_try_run_case+0x14c/0x3d0
[   41.717026]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.718019]  kthread+0x24c/0x2d0
[   41.718766]  ret_from_fork+0x10/0x20
[   41.719217] 
[   41.719581] The buggy address belongs to the object at fff00000c65bde00
[   41.719581]  which belongs to the cache kmalloc-64 of size 64
[   41.721165] The buggy address is located 0 bytes to the right of
[   41.721165]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   41.722681] 
[   41.723196] The buggy address belongs to the physical page:
[   41.723843] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   41.724726] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   41.725930] page_type: f5(slab)
[   41.726386] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   41.727429] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   41.728427] page dumped because: kasan: bad access detected
[   41.729247] 
[   41.729742] Memory state around the buggy address:
[   41.730617]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.731303]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   41.732063] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   41.732788]                                      ^
[   41.733415]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.734245]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   41.734953] ==================================================================
[   42.294209] ==================================================================
[   42.295068] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   42.295968] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   42.296890] 
[   42.297306] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   42.298971] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.299490] Hardware name: linux,dummy-virt (DT)
[   42.300107] Call trace:
[   42.300602]  show_stack+0x20/0x38 (C)
[   42.301225]  dump_stack_lvl+0x8c/0xd0
[   42.301913]  print_report+0x118/0x5e0
[   42.302569]  kasan_report+0xc8/0x118
[   42.303241]  kasan_check_range+0x100/0x1a8
[   42.303930]  __kasan_check_write+0x20/0x30
[   42.304609]  kasan_atomics_helper+0xf20/0x4858
[   42.305354]  kasan_atomics+0x198/0x2e8
[   42.305912]  kunit_try_run_case+0x14c/0x3d0
[   42.306612]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.307294]  kthread+0x24c/0x2d0
[   42.307824]  ret_from_fork+0x10/0x20
[   42.308432] 
[   42.308838] Allocated by task 254:
[   42.309269]  kasan_save_stack+0x3c/0x68
[   42.309895]  kasan_save_track+0x20/0x40
[   42.310460]  kasan_save_alloc_info+0x40/0x58
[   42.311077]  __kasan_kmalloc+0xd4/0xd8
[   42.311648]  __kmalloc_cache_noprof+0x15c/0x3c8
[   42.312332]  kasan_atomics+0xb8/0x2e8
[   42.312869]  kunit_try_run_case+0x14c/0x3d0
[   42.313417]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.314122]  kthread+0x24c/0x2d0
[   42.314655]  ret_from_fork+0x10/0x20
[   42.315260] 
[   42.315633] The buggy address belongs to the object at fff00000c65bde00
[   42.315633]  which belongs to the cache kmalloc-64 of size 64
[   42.316751] The buggy address is located 0 bytes to the right of
[   42.316751]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   42.317968] 
[   42.318338] The buggy address belongs to the physical page:
[   42.319518] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   42.320369] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.321223] page_type: f5(slab)
[   42.321775] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.322556] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.323461] page dumped because: kasan: bad access detected
[   42.324079] 
[   42.324434] Memory state around the buggy address:
[   42.325095]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.325877]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.326722] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.327568]                                      ^
[   42.328146]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.328927]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.329780] ==================================================================
[   42.711074] ==================================================================
[   42.711839] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   42.713628] Read of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   42.714754] 
[   42.715145] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   42.716109] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.717092] Hardware name: linux,dummy-virt (DT)
[   42.717821] Call trace:
[   42.718206]  show_stack+0x20/0x38 (C)
[   42.718789]  dump_stack_lvl+0x8c/0xd0
[   42.719337]  print_report+0x118/0x5e0
[   42.719906]  kasan_report+0xc8/0x118
[   42.720408]  __asan_report_load8_noabort+0x20/0x30
[   42.721105]  kasan_atomics_helper+0x3f04/0x4858
[   42.721735]  kasan_atomics+0x198/0x2e8
[   42.722281]  kunit_try_run_case+0x14c/0x3d0
[   42.722874]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.723563]  kthread+0x24c/0x2d0
[   42.724120]  ret_from_fork+0x10/0x20
[   42.724720] 
[   42.725051] Allocated by task 254:
[   42.725580]  kasan_save_stack+0x3c/0x68
[   42.726125]  kasan_save_track+0x20/0x40
[   42.726749]  kasan_save_alloc_info+0x40/0x58
[   42.727369]  __kasan_kmalloc+0xd4/0xd8
[   42.727946]  __kmalloc_cache_noprof+0x15c/0x3c8
[   42.728644]  kasan_atomics+0xb8/0x2e8
[   42.729209]  kunit_try_run_case+0x14c/0x3d0
[   42.729823]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.730467]  kthread+0x24c/0x2d0
[   42.730948]  ret_from_fork+0x10/0x20
[   42.731435] 
[   42.731798] The buggy address belongs to the object at fff00000c65bde00
[   42.731798]  which belongs to the cache kmalloc-64 of size 64
[   42.732999] The buggy address is located 0 bytes to the right of
[   42.732999]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   42.734146] 
[   42.734510] The buggy address belongs to the physical page:
[   42.735244] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   42.736041] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.736875] page_type: f5(slab)
[   42.737314] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.738253] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.739000] page dumped because: kasan: bad access detected
[   42.739709] 
[   42.740058] Memory state around the buggy address:
[   42.740624]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.741409]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.742104] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.742921]                                      ^
[   42.743571]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.744187]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.745000] ==================================================================
[   42.783964] ==================================================================
[   42.784823] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   42.785757] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   42.786533] 
[   42.786965] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   42.788209] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.788809] Hardware name: linux,dummy-virt (DT)
[   42.789331] Call trace:
[   42.789808]  show_stack+0x20/0x38 (C)
[   42.790496]  dump_stack_lvl+0x8c/0xd0
[   42.791093]  print_report+0x118/0x5e0
[   42.791745]  kasan_report+0xc8/0x118
[   42.792285]  kasan_check_range+0x100/0x1a8
[   42.792984]  __kasan_check_write+0x20/0x30
[   42.793661]  kasan_atomics_helper+0x147c/0x4858
[   42.794338]  kasan_atomics+0x198/0x2e8
[   42.794997]  kunit_try_run_case+0x14c/0x3d0
[   42.795558]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.796386]  kthread+0x24c/0x2d0
[   42.796996]  ret_from_fork+0x10/0x20
[   42.797626] 
[   42.798014] Allocated by task 254:
[   42.798606]  kasan_save_stack+0x3c/0x68
[   42.799190]  kasan_save_track+0x20/0x40
[   42.799752]  kasan_save_alloc_info+0x40/0x58
[   42.800468]  __kasan_kmalloc+0xd4/0xd8
[   42.801030]  __kmalloc_cache_noprof+0x15c/0x3c8
[   42.801753]  kasan_atomics+0xb8/0x2e8
[   42.802277]  kunit_try_run_case+0x14c/0x3d0
[   42.802957]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.803664]  kthread+0x24c/0x2d0
[   42.804237]  ret_from_fork+0x10/0x20
[   42.804779] 
[   42.805208] The buggy address belongs to the object at fff00000c65bde00
[   42.805208]  which belongs to the cache kmalloc-64 of size 64
[   42.806590] The buggy address is located 0 bytes to the right of
[   42.806590]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   42.807873] 
[   42.808214] The buggy address belongs to the physical page:
[   42.808973] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   42.809792] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.810661] page_type: f5(slab)
[   42.811194] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.812077] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.812945] page dumped because: kasan: bad access detected
[   42.813652] 
[   42.814034] Memory state around the buggy address:
[   42.814744]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.815589]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.816435] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.817249]                                      ^
[   42.817863]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.818716]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.819528] ==================================================================
[   42.331501] ==================================================================
[   42.332311] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   42.333205] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   42.334636] 
[   42.335070] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   42.336209] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.336730] Hardware name: linux,dummy-virt (DT)
[   42.337362] Call trace:
[   42.337831]  show_stack+0x20/0x38 (C)
[   42.338455]  dump_stack_lvl+0x8c/0xd0
[   42.338985]  print_report+0x118/0x5e0
[   42.339599]  kasan_report+0xc8/0x118
[   42.340198]  kasan_check_range+0x100/0x1a8
[   42.340738]  __kasan_check_write+0x20/0x30
[   42.341378]  kasan_atomics_helper+0xf88/0x4858
[   42.342015]  kasan_atomics+0x198/0x2e8
[   42.342541]  kunit_try_run_case+0x14c/0x3d0
[   42.343196]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.343922]  kthread+0x24c/0x2d0
[   42.344415]  ret_from_fork+0x10/0x20
[   42.345097] 
[   42.345425] Allocated by task 254:
[   42.345874]  kasan_save_stack+0x3c/0x68
[   42.346493]  kasan_save_track+0x20/0x40
[   42.347088]  kasan_save_alloc_info+0x40/0x58
[   42.347628]  __kasan_kmalloc+0xd4/0xd8
[   42.348209]  __kmalloc_cache_noprof+0x15c/0x3c8
[   42.348782]  kasan_atomics+0xb8/0x2e8
[   42.349349]  kunit_try_run_case+0x14c/0x3d0
[   42.349873]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.350628]  kthread+0x24c/0x2d0
[   42.351052]  ret_from_fork+0x10/0x20
[   42.351825] 
[   42.352462] The buggy address belongs to the object at fff00000c65bde00
[   42.352462]  which belongs to the cache kmalloc-64 of size 64
[   42.353830] The buggy address is located 0 bytes to the right of
[   42.353830]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   42.354423] 
[   42.354855] The buggy address belongs to the physical page:
[   42.355659] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   42.356716] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.357590] page_type: f5(slab)
[   42.358094] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.359015] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.359387] page dumped because: kasan: bad access detected
[   42.359940] 
[   42.360317] Memory state around the buggy address:
[   42.360994]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.361865]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.362852] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.363610]                                      ^
[   42.364303]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.365164]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.365889] ==================================================================
[   40.891106] ==================================================================
[   40.891904] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   40.892673] Read of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   40.893993] 
[   40.894432] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   40.896165] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.897480] Hardware name: linux,dummy-virt (DT)
[   40.898065] Call trace:
[   40.898664]  show_stack+0x20/0x38 (C)
[   40.899201]  dump_stack_lvl+0x8c/0xd0
[   40.899795]  print_report+0x118/0x5e0
[   40.900564]  kasan_report+0xc8/0x118
[   40.901193]  kasan_check_range+0x100/0x1a8
[   40.901937]  __kasan_check_read+0x20/0x30
[   40.902826]  kasan_atomics_helper+0x2b0/0x4858
[   40.903560]  kasan_atomics+0x198/0x2e8
[   40.904201]  kunit_try_run_case+0x14c/0x3d0
[   40.904880]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.905737]  kthread+0x24c/0x2d0
[   40.906536]  ret_from_fork+0x10/0x20
[   40.906959] 
[   40.907203] Allocated by task 254:
[   40.907582]  kasan_save_stack+0x3c/0x68
[   40.908063]  kasan_save_track+0x20/0x40
[   40.908749]  kasan_save_alloc_info+0x40/0x58
[   40.909475]  __kasan_kmalloc+0xd4/0xd8
[   40.910124]  __kmalloc_cache_noprof+0x15c/0x3c8
[   40.910850]  kasan_atomics+0xb8/0x2e8
[   40.911360]  kunit_try_run_case+0x14c/0x3d0
[   40.912269]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.913009]  kthread+0x24c/0x2d0
[   40.913858]  ret_from_fork+0x10/0x20
[   40.914652] 
[   40.915171] The buggy address belongs to the object at fff00000c65bde00
[   40.915171]  which belongs to the cache kmalloc-64 of size 64
[   40.916581] The buggy address is located 0 bytes to the right of
[   40.916581]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   40.918352] 
[   40.919227] The buggy address belongs to the physical page:
[   40.920055] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   40.920969] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.922765] page_type: f5(slab)
[   40.923468] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   40.924149] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   40.925107] page dumped because: kasan: bad access detected
[   40.926363] 
[   40.926753] Memory state around the buggy address:
[   40.927319]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   40.928076]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   40.929316] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   40.930544]                                      ^
[   40.931087]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.932854]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.933937] ==================================================================
[   42.034462] ==================================================================
[   42.035167] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   42.035853] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254
[   42.036428] 
[   42.036825] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   42.038034] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.038721] Hardware name: linux,dummy-virt (DT)
[   42.039359] Call trace:
[   42.039847]  show_stack+0x20/0x38 (C)
[   42.040522]  dump_stack_lvl+0x8c/0xd0
[   42.041177]  print_report+0x118/0x5e0
[   42.041820]  kasan_report+0xc8/0x118
[   42.042464]  kasan_check_range+0x100/0x1a8
[   42.043138]  __kasan_check_write+0x20/0x30
[   42.043771]  kasan_atomics_helper+0xd3c/0x4858
[   42.044499]  kasan_atomics+0x198/0x2e8
[   42.045025]  kunit_try_run_case+0x14c/0x3d0
[   42.045742]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.046439]  kthread+0x24c/0x2d0
[   42.047056]  ret_from_fork+0x10/0x20
[   42.047723] 
[   42.048099] Allocated by task 254:
[   42.048583]  kasan_save_stack+0x3c/0x68
[   42.049202]  kasan_save_track+0x20/0x40
[   42.049835]  kasan_save_alloc_info+0x40/0x58
[   42.050414]  __kasan_kmalloc+0xd4/0xd8
[   42.050978]  __kmalloc_cache_noprof+0x15c/0x3c8
[   42.051603]  kasan_atomics+0xb8/0x2e8
[   42.052079]  kunit_try_run_case+0x14c/0x3d0
[   42.052919]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.053723]  kthread+0x24c/0x2d0
[   42.054340]  ret_from_fork+0x10/0x20
[   42.054961] 
[   42.055387] The buggy address belongs to the object at fff00000c65bde00
[   42.055387]  which belongs to the cache kmalloc-64 of size 64
[   42.056830] The buggy address is located 0 bytes to the right of
[   42.056830]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   42.058114] 
[   42.058414] The buggy address belongs to the physical page:
[   42.059092] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   42.059936] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.060795] page_type: f5(slab)
[   42.061380] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.062393] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.063354] page dumped because: kasan: bad access detected
[   42.064162] 
[   42.064594] Memory state around the buggy address:
[   42.065216]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.065967]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.066830] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.067660]                                      ^
[   42.068253]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.069033]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.069817] ==================================================================
[   43.118614] ==================================================================
[   43.119361] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   43.120069] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   43.120779] 
[   43.121036] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   43.123112] Tainted: [B]=BAD_PAGE, [N]=TEST
[   43.123673] Hardware name: linux,dummy-virt (DT)
[   43.124209] Call trace:
[   43.124667]  show_stack+0x20/0x38 (C)
[   43.125279]  dump_stack_lvl+0x8c/0xd0
[   43.125885]  print_report+0x118/0x5e0
[   43.126514]  kasan_report+0xc8/0x118
[   43.127102]  kasan_check_range+0x100/0x1a8
[   43.127715]  __kasan_check_write+0x20/0x30
[   43.128306]  kasan_atomics_helper+0x175c/0x4858
[   43.128990]  kasan_atomics+0x198/0x2e8
[   43.129612]  kunit_try_run_case+0x14c/0x3d0
[   43.130254]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.130964]  kthread+0x24c/0x2d0
[   43.131536]  ret_from_fork+0x10/0x20
[   43.132106] 
[   43.132425] Allocated by task 254:
[   43.132966]  kasan_save_stack+0x3c/0x68
[   43.133499]  kasan_save_track+0x20/0x40
[   43.134088]  kasan_save_alloc_info+0x40/0x58
[   43.134723]  __kasan_kmalloc+0xd4/0xd8
[   43.135212]  __kmalloc_cache_noprof+0x15c/0x3c8
[   43.135873]  kasan_atomics+0xb8/0x2e8
[   43.136378]  kunit_try_run_case+0x14c/0x3d0
[   43.136983]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   43.137720]  kthread+0x24c/0x2d0
[   43.138223]  ret_from_fork+0x10/0x20
[   43.139094] 
[   43.139601] The buggy address belongs to the object at fff00000c65bde00
[   43.139601]  which belongs to the cache kmalloc-64 of size 64
[   43.141147] The buggy address is located 0 bytes to the right of
[   43.141147]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   43.142589] 
[   43.142916] The buggy address belongs to the physical page:
[   43.143810] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   43.144687] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   43.145613] page_type: f5(slab)
[   43.146296] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   43.147325] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   43.148321] page dumped because: kasan: bad access detected
[   43.149135] 
[   43.149460] Memory state around the buggy address:
[   43.150025]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.151121]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   43.152105] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   43.153056]                                      ^
[   43.153870]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.154847]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   43.155783] ==================================================================
[   42.257057] ==================================================================
[   42.258121] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   42.259092] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254
[   42.260026] 
[   42.260521] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   42.261705] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.262326] Hardware name: linux,dummy-virt (DT)
[   42.262991] Call trace:
[   42.263499]  show_stack+0x20/0x38 (C)
[   42.264178]  dump_stack_lvl+0x8c/0xd0
[   42.264818]  print_report+0x118/0x5e0
[   42.265531]  kasan_report+0xc8/0x118
[   42.266163]  kasan_check_range+0x100/0x1a8
[   42.266872]  __kasan_check_write+0x20/0x30
[   42.267539]  kasan_atomics_helper+0xeb8/0x4858
[   42.268225]  kasan_atomics+0x198/0x2e8
[   42.268861]  kunit_try_run_case+0x14c/0x3d0
[   42.269567]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.270332]  kthread+0x24c/0x2d0
[   42.270932]  ret_from_fork+0x10/0x20
[   42.271517] 
[   42.271902] Allocated by task 254:
[   42.272409]  kasan_save_stack+0x3c/0x68
[   42.273061]  kasan_save_track+0x20/0x40
[   42.273647]  kasan_save_alloc_info+0x40/0x58
[   42.274300]  __kasan_kmalloc+0xd4/0xd8
[   42.274947]  __kmalloc_cache_noprof+0x15c/0x3c8
[   42.275658]  kasan_atomics+0xb8/0x2e8
[   42.276271]  kunit_try_run_case+0x14c/0x3d0
[   42.276881]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.277628]  kthread+0x24c/0x2d0
[   42.278147]  ret_from_fork+0x10/0x20
[   42.278779] 
[   42.279087] The buggy address belongs to the object at fff00000c65bde00
[   42.279087]  which belongs to the cache kmalloc-64 of size 64
[   42.280081] The buggy address is located 0 bytes to the right of
[   42.280081]  allocated 48-byte region [fff00000c65bde00, fff00000c65bde30)
[   42.281430] 
[   42.281822] The buggy address belongs to the physical page:
[   42.282403] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd
[   42.283284] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   42.284136] page_type: f5(slab)
[   42.284738] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   42.285635] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   42.286371] page dumped because: kasan: bad access detected
[   42.287107] 
[   42.287409] Memory state around the buggy address:
[   42.288042]  fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.288877]  fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   42.289683] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   42.290371]                                      ^
[   42.291026]  fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.291700]  fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   42.292558] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   40.404573] ==================================================================
[   40.406187] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8
[   40.407183] Read of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250
[   40.407952] 
[   40.408355] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   40.410107] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.410693] Hardware name: linux,dummy-virt (DT)
[   40.411331] Call trace:
[   40.411776]  show_stack+0x20/0x38 (C)
[   40.412369]  dump_stack_lvl+0x8c/0xd0
[   40.412868]  print_report+0x118/0x5e0
[   40.413482]  kasan_report+0xc8/0x118
[   40.414057]  __asan_report_load8_noabort+0x20/0x30
[   40.414702]  kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8
[   40.415600]  kasan_bitops_generic+0x11c/0x1c8
[   40.416133]  kunit_try_run_case+0x14c/0x3d0
[   40.416814]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.417485]  kthread+0x24c/0x2d0
[   40.418030]  ret_from_fork+0x10/0x20
[   40.418634] 
[   40.418930] Allocated by task 250:
[   40.419421]  kasan_save_stack+0x3c/0x68
[   40.420025]  kasan_save_track+0x20/0x40
[   40.420586]  kasan_save_alloc_info+0x40/0x58
[   40.421131]  __kasan_kmalloc+0xd4/0xd8
[   40.421722]  __kmalloc_cache_noprof+0x15c/0x3c8
[   40.422347]  kasan_bitops_generic+0xa0/0x1c8
[   40.423082]  kunit_try_run_case+0x14c/0x3d0
[   40.423692]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.424407]  kthread+0x24c/0x2d0
[   40.424958]  ret_from_fork+0x10/0x20
[   40.425522] 
[   40.425875] The buggy address belongs to the object at fff00000c1bb3c00
[   40.425875]  which belongs to the cache kmalloc-16 of size 16
[   40.426973] The buggy address is located 8 bytes inside of
[   40.426973]  allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09)
[   40.428160] 
[   40.428532] The buggy address belongs to the physical page:
[   40.429162] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3
[   40.429999] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.430793] page_type: f5(slab)
[   40.431291] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   40.432116] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   40.432901] page dumped because: kasan: bad access detected
[   40.433609] 
[   40.433950] Memory state around the buggy address:
[   40.434510]  fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.435302]  fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.436178] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.436970]                       ^
[   40.437521]  fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.438251]  fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.439106] ==================================================================
[   40.661116] ==================================================================
[   40.661814] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8
[   40.662729] Read of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250
[   40.664087] 
[   40.664479] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   40.665400] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.666000] Hardware name: linux,dummy-virt (DT)
[   40.666621] Call trace:
[   40.666969]  show_stack+0x20/0x38 (C)
[   40.667603]  dump_stack_lvl+0x8c/0xd0
[   40.668167]  print_report+0x118/0x5e0
[   40.668744]  kasan_report+0xc8/0x118
[   40.669236]  __asan_report_load8_noabort+0x20/0x30
[   40.669929]  kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8
[   40.670586]  kasan_bitops_generic+0x11c/0x1c8
[   40.671231]  kunit_try_run_case+0x14c/0x3d0
[   40.671831]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.672592]  kthread+0x24c/0x2d0
[   40.673134]  ret_from_fork+0x10/0x20
[   40.673684] 
[   40.674002] Allocated by task 250:
[   40.674554]  kasan_save_stack+0x3c/0x68
[   40.675093]  kasan_save_track+0x20/0x40
[   40.675635]  kasan_save_alloc_info+0x40/0x58
[   40.676289]  __kasan_kmalloc+0xd4/0xd8
[   40.676871]  __kmalloc_cache_noprof+0x15c/0x3c8
[   40.677494]  kasan_bitops_generic+0xa0/0x1c8
[   40.678096]  kunit_try_run_case+0x14c/0x3d0
[   40.678734]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.679462]  kthread+0x24c/0x2d0
[   40.679997]  ret_from_fork+0x10/0x20
[   40.680596] 
[   40.680943] The buggy address belongs to the object at fff00000c1bb3c00
[   40.680943]  which belongs to the cache kmalloc-16 of size 16
[   40.682023] The buggy address is located 8 bytes inside of
[   40.682023]  allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09)
[   40.683331] 
[   40.683706] The buggy address belongs to the physical page:
[   40.684272] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3
[   40.685177] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.685977] page_type: f5(slab)
[   40.686514] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   40.687272] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   40.688162] page dumped because: kasan: bad access detected
[   40.688797] 
[   40.689149] Memory state around the buggy address:
[   40.689687]  fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.690526]  fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.691282] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.692027]                       ^
[   40.692588]  fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.693316]  fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.694083] ==================================================================
[   40.478582] ==================================================================
[   40.479367] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8
[   40.481035] Read of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250
[   40.481769] 
[   40.482165] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   40.483314] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.484416] Hardware name: linux,dummy-virt (DT)
[   40.485234] Call trace:
[   40.485885]  show_stack+0x20/0x38 (C)
[   40.486650]  dump_stack_lvl+0x8c/0xd0
[   40.487361]  print_report+0x118/0x5e0
[   40.488080]  kasan_report+0xc8/0x118
[   40.488799]  __asan_report_load8_noabort+0x20/0x30
[   40.489600]  kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8
[   40.490491]  kasan_bitops_generic+0x11c/0x1c8
[   40.491070]  kunit_try_run_case+0x14c/0x3d0
[   40.491653]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.492313]  kthread+0x24c/0x2d0
[   40.492898]  ret_from_fork+0x10/0x20
[   40.493504] 
[   40.493860] Allocated by task 250:
[   40.494350]  kasan_save_stack+0x3c/0x68
[   40.495020]  kasan_save_track+0x20/0x40
[   40.495560]  kasan_save_alloc_info+0x40/0x58
[   40.496101]  __kasan_kmalloc+0xd4/0xd8
[   40.496674]  __kmalloc_cache_noprof+0x15c/0x3c8
[   40.497208]  kasan_bitops_generic+0xa0/0x1c8
[   40.497848]  kunit_try_run_case+0x14c/0x3d0
[   40.498424]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.499046]  kthread+0x24c/0x2d0
[   40.499590]  ret_from_fork+0x10/0x20
[   40.500094] 
[   40.500462] The buggy address belongs to the object at fff00000c1bb3c00
[   40.500462]  which belongs to the cache kmalloc-16 of size 16
[   40.501576] The buggy address is located 8 bytes inside of
[   40.501576]  allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09)
[   40.502792] 
[   40.503154] The buggy address belongs to the physical page:
[   40.503696] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3
[   40.504673] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.505369] page_type: f5(slab)
[   40.505915] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   40.506665] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   40.507559] page dumped because: kasan: bad access detected
[   40.508250] 
[   40.508578] Memory state around the buggy address:
[   40.509215]  fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.509904]  fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.510776] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.511425]                       ^
[   40.511973]  fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.512709]  fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.513562] ==================================================================
[   40.515869] ==================================================================
[   40.516697] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[   40.517638] Write of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250
[   40.518533] 
[   40.518920] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   40.519857] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.520436] Hardware name: linux,dummy-virt (DT)
[   40.521064] Call trace:
[   40.521524]  show_stack+0x20/0x38 (C)
[   40.522028]  dump_stack_lvl+0x8c/0xd0
[   40.522652]  print_report+0x118/0x5e0
[   40.523199]  kasan_report+0xc8/0x118
[   40.523757]  kasan_check_range+0x100/0x1a8
[   40.524320]  __kasan_check_write+0x20/0x30
[   40.525032]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[   40.525758]  kasan_bitops_generic+0x11c/0x1c8
[   40.526414]  kunit_try_run_case+0x14c/0x3d0
[   40.527074]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.527777]  kthread+0x24c/0x2d0
[   40.528364]  ret_from_fork+0x10/0x20
[   40.528995] 
[   40.529341] Allocated by task 250:
[   40.529855]  kasan_save_stack+0x3c/0x68
[   40.530328]  kasan_save_track+0x20/0x40
[   40.530952]  kasan_save_alloc_info+0x40/0x58
[   40.531490]  __kasan_kmalloc+0xd4/0xd8
[   40.532059]  __kmalloc_cache_noprof+0x15c/0x3c8
[   40.532671]  kasan_bitops_generic+0xa0/0x1c8
[   40.533292]  kunit_try_run_case+0x14c/0x3d0
[   40.533844]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.534594]  kthread+0x24c/0x2d0
[   40.535191]  ret_from_fork+0x10/0x20
[   40.535769] 
[   40.536072] The buggy address belongs to the object at fff00000c1bb3c00
[   40.536072]  which belongs to the cache kmalloc-16 of size 16
[   40.537259] The buggy address is located 8 bytes inside of
[   40.537259]  allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09)
[   40.539051] 
[   40.539595] The buggy address belongs to the physical page:
[   40.540228] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3
[   40.541096] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.541832] page_type: f5(slab)
[   40.542319] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   40.543094] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   40.543927] page dumped because: kasan: bad access detected
[   40.544580] 
[   40.544953] Memory state around the buggy address:
[   40.545500]  fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.546308]  fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.547086] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.547775]                       ^
[   40.548327]  fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.549114]  fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.549970] ==================================================================
[   40.588965] ==================================================================
[   40.590230] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[   40.591327] Write of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250
[   40.592208] 
[   40.592588] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   40.593650] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.594206] Hardware name: linux,dummy-virt (DT)
[   40.594842] Call trace:
[   40.595266]  show_stack+0x20/0x38 (C)
[   40.595892]  dump_stack_lvl+0x8c/0xd0
[   40.596455]  print_report+0x118/0x5e0
[   40.597058]  kasan_report+0xc8/0x118
[   40.597652]  kasan_check_range+0x100/0x1a8
[   40.598287]  __kasan_check_write+0x20/0x30
[   40.598941]  kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[   40.599718]  kasan_bitops_generic+0x11c/0x1c8
[   40.600371]  kunit_try_run_case+0x14c/0x3d0
[   40.601028]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.601710]  kthread+0x24c/0x2d0
[   40.602281]  ret_from_fork+0x10/0x20
[   40.602881] 
[   40.603234] Allocated by task 250:
[   40.603757]  kasan_save_stack+0x3c/0x68
[   40.604361]  kasan_save_track+0x20/0x40
[   40.604912]  kasan_save_alloc_info+0x40/0x58
[   40.605497]  __kasan_kmalloc+0xd4/0xd8
[   40.606020]  __kmalloc_cache_noprof+0x15c/0x3c8
[   40.606661]  kasan_bitops_generic+0xa0/0x1c8
[   40.607183]  kunit_try_run_case+0x14c/0x3d0
[   40.607815]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.608474]  kthread+0x24c/0x2d0
[   40.608914]  ret_from_fork+0x10/0x20
[   40.609478] 
[   40.609817] The buggy address belongs to the object at fff00000c1bb3c00
[   40.609817]  which belongs to the cache kmalloc-16 of size 16
[   40.610866] The buggy address is located 8 bytes inside of
[   40.610866]  allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09)
[   40.612049] 
[   40.612407] The buggy address belongs to the physical page:
[   40.613043] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3
[   40.613937] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.614684] page_type: f5(slab)
[   40.615187] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   40.616046] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   40.616877] page dumped because: kasan: bad access detected
[   40.617529] 
[   40.617869] Memory state around the buggy address:
[   40.618437]  fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.619296]  fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.620113] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.620895]                       ^
[   40.621330]  fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.622092]  fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.622952] ==================================================================
[   40.442352] ==================================================================
[   40.443106] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[   40.443991] Write of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250
[   40.444794] 
[   40.445255] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   40.446574] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.447089] Hardware name: linux,dummy-virt (DT)
[   40.447651] Call trace:
[   40.448015]  show_stack+0x20/0x38 (C)
[   40.448690]  dump_stack_lvl+0x8c/0xd0
[   40.449328]  print_report+0x118/0x5e0
[   40.449878]  kasan_report+0xc8/0x118
[   40.450511]  kasan_check_range+0x100/0x1a8
[   40.451056]  __kasan_check_write+0x20/0x30
[   40.451694]  kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[   40.452454]  kasan_bitops_generic+0x11c/0x1c8
[   40.453108]  kunit_try_run_case+0x14c/0x3d0
[   40.453726]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.454507]  kthread+0x24c/0x2d0
[   40.455121]  ret_from_fork+0x10/0x20
[   40.455729] 
[   40.456054] Allocated by task 250:
[   40.456506]  kasan_save_stack+0x3c/0x68
[   40.457118]  kasan_save_track+0x20/0x40
[   40.457728]  kasan_save_alloc_info+0x40/0x58
[   40.458366]  __kasan_kmalloc+0xd4/0xd8
[   40.458921]  __kmalloc_cache_noprof+0x15c/0x3c8
[   40.459583]  kasan_bitops_generic+0xa0/0x1c8
[   40.460105]  kunit_try_run_case+0x14c/0x3d0
[   40.460766]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.461494]  kthread+0x24c/0x2d0
[   40.462027]  ret_from_fork+0x10/0x20
[   40.462582] 
[   40.462928] The buggy address belongs to the object at fff00000c1bb3c00
[   40.462928]  which belongs to the cache kmalloc-16 of size 16
[   40.464138] The buggy address is located 8 bytes inside of
[   40.464138]  allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09)
[   40.465419] 
[   40.465788] The buggy address belongs to the physical page:
[   40.466409] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3
[   40.467263] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.468086] page_type: f5(slab)
[   40.468642] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   40.469572] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   40.470425] page dumped because: kasan: bad access detected
[   40.471129] 
[   40.471485] Memory state around the buggy address:
[   40.471996]  fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.472864]  fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.473632] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.474360]                       ^
[   40.475267]  fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.476215]  fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.477187] ==================================================================
[   40.625185] ==================================================================
[   40.625919] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8
[   40.626941] Read of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250
[   40.627748] 
[   40.628135] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   40.629268] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.629713] Hardware name: linux,dummy-virt (DT)
[   40.630327] Call trace:
[   40.630832]  show_stack+0x20/0x38 (C)
[   40.631432]  dump_stack_lvl+0x8c/0xd0
[   40.631988]  print_report+0x118/0x5e0
[   40.632619]  kasan_report+0xc8/0x118
[   40.633204]  __asan_report_load8_noabort+0x20/0x30
[   40.633899]  kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8
[   40.634645]  kasan_bitops_generic+0x11c/0x1c8
[   40.635276]  kunit_try_run_case+0x14c/0x3d0
[   40.635852]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.636577]  kthread+0x24c/0x2d0
[   40.637019]  ret_from_fork+0x10/0x20
[   40.637633] 
[   40.637951] Allocated by task 250:
[   40.638511]  kasan_save_stack+0x3c/0x68
[   40.639011]  kasan_save_track+0x20/0x40
[   40.639631]  kasan_save_alloc_info+0x40/0x58
[   40.640266]  __kasan_kmalloc+0xd4/0xd8
[   40.640862]  __kmalloc_cache_noprof+0x15c/0x3c8
[   40.641546]  kasan_bitops_generic+0xa0/0x1c8
[   40.642095]  kunit_try_run_case+0x14c/0x3d0
[   40.642758]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.643415]  kthread+0x24c/0x2d0
[   40.643975]  ret_from_fork+0x10/0x20
[   40.644561] 
[   40.644900] The buggy address belongs to the object at fff00000c1bb3c00
[   40.644900]  which belongs to the cache kmalloc-16 of size 16
[   40.646054] The buggy address is located 8 bytes inside of
[   40.646054]  allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09)
[   40.647148] 
[   40.647510] The buggy address belongs to the physical page:
[   40.648210] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3
[   40.649119] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.649831] page_type: f5(slab)
[   40.650236] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   40.651581] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   40.652399] page dumped because: kasan: bad access detected
[   40.652993] 
[   40.653349] Memory state around the buggy address:
[   40.653950]  fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.654819]  fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.655544] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.656394]                       ^
[   40.656898]  fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.657644]  fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.658461] ==================================================================
[   40.551825] ==================================================================
[   40.552624] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8
[   40.554053] Read of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250
[   40.555240] 
[   40.555619] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   40.557455] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.557986] Hardware name: linux,dummy-virt (DT)
[   40.558571] Call trace:
[   40.558954]  show_stack+0x20/0x38 (C)
[   40.559859]  dump_stack_lvl+0x8c/0xd0
[   40.560430]  print_report+0x118/0x5e0
[   40.561092]  kasan_report+0xc8/0x118
[   40.561723]  __asan_report_load8_noabort+0x20/0x30
[   40.562306]  kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8
[   40.563155]  kasan_bitops_generic+0x11c/0x1c8
[   40.563799]  kunit_try_run_case+0x14c/0x3d0
[   40.564434]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.565118]  kthread+0x24c/0x2d0
[   40.565672]  ret_from_fork+0x10/0x20
[   40.566284] 
[   40.566683] Allocated by task 250:
[   40.567173]  kasan_save_stack+0x3c/0x68
[   40.567723]  kasan_save_track+0x20/0x40
[   40.568339]  kasan_save_alloc_info+0x40/0x58
[   40.568917]  __kasan_kmalloc+0xd4/0xd8
[   40.569529]  __kmalloc_cache_noprof+0x15c/0x3c8
[   40.570143]  kasan_bitops_generic+0xa0/0x1c8
[   40.570817]  kunit_try_run_case+0x14c/0x3d0
[   40.571353]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.572102]  kthread+0x24c/0x2d0
[   40.572660]  ret_from_fork+0x10/0x20
[   40.573164] 
[   40.573570] The buggy address belongs to the object at fff00000c1bb3c00
[   40.573570]  which belongs to the cache kmalloc-16 of size 16
[   40.574797] The buggy address is located 8 bytes inside of
[   40.574797]  allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09)
[   40.575992] 
[   40.576377] The buggy address belongs to the physical page:
[   40.577127] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3
[   40.577911] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.578792] page_type: f5(slab)
[   40.579306] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   40.580197] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   40.581056] page dumped because: kasan: bad access detected
[   40.581694] 
[   40.582058] Memory state around the buggy address:
[   40.582750]  fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.583582]  fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.584392] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.585113]                       ^
[   40.585661]  fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.586469]  fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.587223] ==================================================================
[   40.368789] ==================================================================
[   40.369621] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[   40.370591] Write of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250
[   40.371336] 
[   40.371740] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   40.372912] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.373390] Hardware name: linux,dummy-virt (DT)
[   40.374028] Call trace:
[   40.374475]  show_stack+0x20/0x38 (C)
[   40.375124]  dump_stack_lvl+0x8c/0xd0
[   40.375703]  print_report+0x118/0x5e0
[   40.376315]  kasan_report+0xc8/0x118
[   40.376911]  kasan_check_range+0x100/0x1a8
[   40.377550]  __kasan_check_write+0x20/0x30
[   40.378173]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[   40.378945]  kasan_bitops_generic+0x11c/0x1c8
[   40.379549]  kunit_try_run_case+0x14c/0x3d0
[   40.380167]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.380819]  kthread+0x24c/0x2d0
[   40.381391]  ret_from_fork+0x10/0x20
[   40.382019] 
[   40.382317] Allocated by task 250:
[   40.382858]  kasan_save_stack+0x3c/0x68
[   40.383345]  kasan_save_track+0x20/0x40
[   40.383949]  kasan_save_alloc_info+0x40/0x58
[   40.384578]  __kasan_kmalloc+0xd4/0xd8
[   40.385088]  __kmalloc_cache_noprof+0x15c/0x3c8
[   40.385755]  kasan_bitops_generic+0xa0/0x1c8
[   40.386381]  kunit_try_run_case+0x14c/0x3d0
[   40.386971]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.387682]  kthread+0x24c/0x2d0
[   40.388222]  ret_from_fork+0x10/0x20
[   40.388806] 
[   40.389111] The buggy address belongs to the object at fff00000c1bb3c00
[   40.389111]  which belongs to the cache kmalloc-16 of size 16
[   40.390291] The buggy address is located 8 bytes inside of
[   40.390291]  allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09)
[   40.391325] 
[   40.391698] The buggy address belongs to the physical page:
[   40.392397] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3
[   40.393314] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.394118] page_type: f5(slab)
[   40.394663] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   40.395634] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   40.396358] page dumped because: kasan: bad access detected
[   40.397073] 
[   40.397415] Memory state around the buggy address:
[   40.397912]  fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.398796]  fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.399543] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.400334]                       ^
[   40.400888]  fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.401715]  fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.402560] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[   39.971611] ==================================================================
[   39.972854] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8
[   39.974607] Write of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250
[   39.975891] 
[   39.976228] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   39.977368] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.977922] Hardware name: linux,dummy-virt (DT)
[   39.978456] Call trace:
[   39.978887]  show_stack+0x20/0x38 (C)
[   39.979865]  dump_stack_lvl+0x8c/0xd0
[   39.980477]  print_report+0x118/0x5e0
[   39.980992]  kasan_report+0xc8/0x118
[   39.981890]  kasan_check_range+0x100/0x1a8
[   39.982486]  __kasan_check_write+0x20/0x30
[   39.983076]  kasan_bitops_modify.constprop.0+0x100/0xbc8
[   39.983895]  kasan_bitops_generic+0x110/0x1c8
[   39.984554]  kunit_try_run_case+0x14c/0x3d0
[   39.985123]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.986229]  kthread+0x24c/0x2d0
[   39.986708]  ret_from_fork+0x10/0x20
[   39.987296] 
[   39.987655] Allocated by task 250:
[   39.988181]  kasan_save_stack+0x3c/0x68
[   39.988717]  kasan_save_track+0x20/0x40
[   39.989285]  kasan_save_alloc_info+0x40/0x58
[   39.989927]  __kasan_kmalloc+0xd4/0xd8
[   39.990415]  __kmalloc_cache_noprof+0x15c/0x3c8
[   39.991083]  kasan_bitops_generic+0xa0/0x1c8
[   39.992184]  kunit_try_run_case+0x14c/0x3d0
[   39.992781]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.994037]  kthread+0x24c/0x2d0
[   39.994471]  ret_from_fork+0x10/0x20
[   39.994982] 
[   39.995307] The buggy address belongs to the object at fff00000c1bb3c00
[   39.995307]  which belongs to the cache kmalloc-16 of size 16
[   39.996202] The buggy address is located 8 bytes inside of
[   39.996202]  allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09)
[   39.997671] 
[   39.998283] The buggy address belongs to the physical page:
[   39.998920] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3
[   39.999894] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.000689] page_type: f5(slab)
[   40.001243] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   40.002153] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   40.003354] page dumped because: kasan: bad access detected
[   40.003990] 
[   40.004318] Memory state around the buggy address:
[   40.004878]  fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.006228]  fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.006993] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.007841]                       ^
[   40.008323]  fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.009123]  fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.010415] ==================================================================
[   40.012177] ==================================================================
[   40.013000] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[   40.014045] Read of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250
[   40.015805] 
[   40.016120] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   40.016987] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.018130] Hardware name: linux,dummy-virt (DT)
[   40.018790] Call trace:
[   40.019307]  show_stack+0x20/0x38 (C)
[   40.019968]  dump_stack_lvl+0x8c/0xd0
[   40.020767]  print_report+0x118/0x5e0
[   40.021157]  kasan_report+0xc8/0x118
[   40.021879]  __asan_report_load8_noabort+0x20/0x30
[   40.022839]  kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[   40.023637]  kasan_bitops_generic+0x110/0x1c8
[   40.024428]  kunit_try_run_case+0x14c/0x3d0
[   40.024956]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.025691]  kthread+0x24c/0x2d0
[   40.026710]  ret_from_fork+0x10/0x20
[   40.027416] 
[   40.027838] Allocated by task 250:
[   40.028358]  kasan_save_stack+0x3c/0x68
[   40.028994]  kasan_save_track+0x20/0x40
[   40.029513]  kasan_save_alloc_info+0x40/0x58
[   40.030391]  __kasan_kmalloc+0xd4/0xd8
[   40.031046]  __kmalloc_cache_noprof+0x15c/0x3c8
[   40.031748]  kasan_bitops_generic+0xa0/0x1c8
[   40.032354]  kunit_try_run_case+0x14c/0x3d0
[   40.032993]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.034068]  kthread+0x24c/0x2d0
[   40.034540]  ret_from_fork+0x10/0x20
[   40.035071] 
[   40.035431] The buggy address belongs to the object at fff00000c1bb3c00
[   40.035431]  which belongs to the cache kmalloc-16 of size 16
[   40.037703] The buggy address is located 8 bytes inside of
[   40.037703]  allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09)
[   40.038752] 
[   40.039107] The buggy address belongs to the physical page:
[   40.039714] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3
[   40.040599] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.041803] page_type: f5(slab)
[   40.042272] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   40.043046] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   40.043938] page dumped because: kasan: bad access detected
[   40.044640] 
[   40.045009] Memory state around the buggy address:
[   40.046019]  fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.046793]  fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.047599] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.048458]                       ^
[   40.049014]  fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.049838]  fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.050962] ==================================================================
[   40.258306] ==================================================================
[   40.258987] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc8
[   40.259803] Write of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250
[   40.260583] 
[   40.260958] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   40.262483] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.263097] Hardware name: linux,dummy-virt (DT)
[   40.263769] Call trace:
[   40.264254]  show_stack+0x20/0x38 (C)
[   40.264849]  dump_stack_lvl+0x8c/0xd0
[   40.265505]  print_report+0x118/0x5e0
[   40.266150]  kasan_report+0xc8/0x118
[   40.266787]  kasan_check_range+0x100/0x1a8
[   40.267478]  __kasan_check_write+0x20/0x30
[   40.268083]  kasan_bitops_modify.constprop.0+0x344/0xbc8
[   40.268824]  kasan_bitops_generic+0x110/0x1c8
[   40.269433]  kunit_try_run_case+0x14c/0x3d0
[   40.270139]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.270963]  kthread+0x24c/0x2d0
[   40.271593]  ret_from_fork+0x10/0x20
[   40.272171] 
[   40.272549] Allocated by task 250:
[   40.273154]  kasan_save_stack+0x3c/0x68
[   40.273774]  kasan_save_track+0x20/0x40
[   40.274289]  kasan_save_alloc_info+0x40/0x58
[   40.274908]  __kasan_kmalloc+0xd4/0xd8
[   40.275492]  __kmalloc_cache_noprof+0x15c/0x3c8
[   40.276041]  kasan_bitops_generic+0xa0/0x1c8
[   40.276682]  kunit_try_run_case+0x14c/0x3d0
[   40.277297]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.277933]  kthread+0x24c/0x2d0
[   40.278497]  ret_from_fork+0x10/0x20
[   40.279054] 
[   40.279402] The buggy address belongs to the object at fff00000c1bb3c00
[   40.279402]  which belongs to the cache kmalloc-16 of size 16
[   40.280606] The buggy address is located 8 bytes inside of
[   40.280606]  allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09)
[   40.281761] 
[   40.282111] The buggy address belongs to the physical page:
[   40.282837] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3
[   40.283709] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.284402] page_type: f5(slab)
[   40.284843] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   40.285548] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   40.286462] page dumped because: kasan: bad access detected
[   40.287163] 
[   40.287513] Memory state around the buggy address:
[   40.288144]  fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.288991]  fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.289671] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.290513]                       ^
[   40.291048]  fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.291920]  fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.292794] ==================================================================
[   40.222149] ==================================================================
[   40.222918] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[   40.223812] Read of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250
[   40.224671] 
[   40.225097] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   40.226497] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.226882] Hardware name: linux,dummy-virt (DT)
[   40.227286] Call trace:
[   40.227751]  show_stack+0x20/0x38 (C)
[   40.228804]  dump_stack_lvl+0x8c/0xd0
[   40.229386]  print_report+0x118/0x5e0
[   40.230109]  kasan_report+0xc8/0x118
[   40.230693]  __asan_report_load8_noabort+0x20/0x30
[   40.231383]  kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[   40.232066]  kasan_bitops_generic+0x110/0x1c8
[   40.232709]  kunit_try_run_case+0x14c/0x3d0
[   40.233399]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.234146]  kthread+0x24c/0x2d0
[   40.234617]  ret_from_fork+0x10/0x20
[   40.235308] 
[   40.235623] Allocated by task 250:
[   40.235873]  kasan_save_stack+0x3c/0x68
[   40.236132]  kasan_save_track+0x20/0x40
[   40.236392]  kasan_save_alloc_info+0x40/0x58
[   40.236920]  __kasan_kmalloc+0xd4/0xd8
[   40.237582]  __kmalloc_cache_noprof+0x15c/0x3c8
[   40.238297]  kasan_bitops_generic+0xa0/0x1c8
[   40.238977]  kunit_try_run_case+0x14c/0x3d0
[   40.239672]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.240379]  kthread+0x24c/0x2d0
[   40.241011]  ret_from_fork+0x10/0x20
[   40.241621] 
[   40.241977] The buggy address belongs to the object at fff00000c1bb3c00
[   40.241977]  which belongs to the cache kmalloc-16 of size 16
[   40.243244] The buggy address is located 8 bytes inside of
[   40.243244]  allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09)
[   40.244562] 
[   40.244904] The buggy address belongs to the physical page:
[   40.245553] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3
[   40.246553] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.247315] page_type: f5(slab)
[   40.247812] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   40.248807] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   40.249706] page dumped because: kasan: bad access detected
[   40.250350] 
[   40.250680] Memory state around the buggy address:
[   40.251385]  fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.252190]  fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.253022] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.253924]                       ^
[   40.254455]  fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.255207]  fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.256023] ==================================================================
[   40.294843] ==================================================================
[   40.295590] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[   40.296362] Write of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250
[   40.298050] 
[   40.298526] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   40.299989] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.300651] Hardware name: linux,dummy-virt (DT)
[   40.301196] Call trace:
[   40.301682]  show_stack+0x20/0x38 (C)
[   40.302303]  dump_stack_lvl+0x8c/0xd0
[   40.302786]  print_report+0x118/0x5e0
[   40.303388]  kasan_report+0xc8/0x118
[   40.304008]  kasan_check_range+0x100/0x1a8
[   40.304667]  __kasan_check_write+0x20/0x30
[   40.305301]  kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[   40.306014]  kasan_bitops_generic+0x110/0x1c8
[   40.306703]  kunit_try_run_case+0x14c/0x3d0
[   40.307264]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.308039]  kthread+0x24c/0x2d0
[   40.308597]  ret_from_fork+0x10/0x20
[   40.309091] 
[   40.309431] Allocated by task 250:
[   40.309975]  kasan_save_stack+0x3c/0x68
[   40.310583]  kasan_save_track+0x20/0x40
[   40.311093]  kasan_save_alloc_info+0x40/0x58
[   40.311700]  __kasan_kmalloc+0xd4/0xd8
[   40.312175]  __kmalloc_cache_noprof+0x15c/0x3c8
[   40.312851]  kasan_bitops_generic+0xa0/0x1c8
[   40.313476]  kunit_try_run_case+0x14c/0x3d0
[   40.313990]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.314764]  kthread+0x24c/0x2d0
[   40.315324]  ret_from_fork+0x10/0x20
[   40.315814] 
[   40.316164] The buggy address belongs to the object at fff00000c1bb3c00
[   40.316164]  which belongs to the cache kmalloc-16 of size 16
[   40.317181] The buggy address is located 8 bytes inside of
[   40.317181]  allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09)
[   40.318657] 
[   40.318876] The buggy address belongs to the physical page:
[   40.319174] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3
[   40.319687] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.320509] page_type: f5(slab)
[   40.321344] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   40.322389] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   40.323427] page dumped because: kasan: bad access detected
[   40.324279] 
[   40.324638] Memory state around the buggy address:
[   40.325416]  fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.326297]  fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.327151] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.327984]                       ^
[   40.328532]  fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.329376]  fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.330181] ==================================================================
[   40.138340] ==================================================================
[   40.139178] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[   40.140120] Write of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250
[   40.140996] 
[   40.141419] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   40.142972] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.143693] Hardware name: linux,dummy-virt (DT)
[   40.144416] Call trace:
[   40.144884]  show_stack+0x20/0x38 (C)
[   40.145696]  dump_stack_lvl+0x8c/0xd0
[   40.146614]  print_report+0x118/0x5e0
[   40.147284]  kasan_report+0xc8/0x118
[   40.147877]  kasan_check_range+0x100/0x1a8
[   40.148560]  __kasan_check_write+0x20/0x30
[   40.149422]  kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[   40.150144]  kasan_bitops_generic+0x110/0x1c8
[   40.150778]  kunit_try_run_case+0x14c/0x3d0
[   40.151399]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.152362]  kthread+0x24c/0x2d0
[   40.152933]  ret_from_fork+0x10/0x20
[   40.153891] 
[   40.154237] Allocated by task 250:
[   40.154899]  kasan_save_stack+0x3c/0x68
[   40.155457]  kasan_save_track+0x20/0x40
[   40.156084]  kasan_save_alloc_info+0x40/0x58
[   40.156740]  __kasan_kmalloc+0xd4/0xd8
[   40.157321]  __kmalloc_cache_noprof+0x15c/0x3c8
[   40.158267]  kasan_bitops_generic+0xa0/0x1c8
[   40.158890]  kunit_try_run_case+0x14c/0x3d0
[   40.159489]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.160205]  kthread+0x24c/0x2d0
[   40.160817]  ret_from_fork+0x10/0x20
[   40.161723] 
[   40.162354] The buggy address belongs to the object at fff00000c1bb3c00
[   40.162354]  which belongs to the cache kmalloc-16 of size 16
[   40.164226] The buggy address is located 8 bytes inside of
[   40.164226]  allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09)
[   40.166152] 
[   40.166843] The buggy address belongs to the physical page:
[   40.167511] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3
[   40.168378] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.169142] page_type: f5(slab)
[   40.169705] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   40.170380] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   40.171273] page dumped because: kasan: bad access detected
[   40.172152] 
[   40.172518] Memory state around the buggy address:
[   40.173129]  fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.174351]  fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.175255] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.176028]                       ^
[   40.176566]  fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.177328]  fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.178517] ==================================================================
[   40.332406] ==================================================================
[   40.333130] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8
[   40.333874] Read of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250
[   40.335821] 
[   40.336488] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   40.337553] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.338079] Hardware name: linux,dummy-virt (DT)
[   40.338727] Call trace:
[   40.339157]  show_stack+0x20/0x38 (C)
[   40.339728]  dump_stack_lvl+0x8c/0xd0
[   40.340383]  print_report+0x118/0x5e0
[   40.340965]  kasan_report+0xc8/0x118
[   40.341593]  __asan_report_load8_noabort+0x20/0x30
[   40.342207]  kasan_bitops_modify.constprop.0+0xa28/0xbc8
[   40.342983]  kasan_bitops_generic+0x110/0x1c8
[   40.343698]  kunit_try_run_case+0x14c/0x3d0
[   40.344250]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.345069]  kthread+0x24c/0x2d0
[   40.345607]  ret_from_fork+0x10/0x20
[   40.346155] 
[   40.346485] Allocated by task 250:
[   40.346954]  kasan_save_stack+0x3c/0x68
[   40.347576]  kasan_save_track+0x20/0x40
[   40.348174]  kasan_save_alloc_info+0x40/0x58
[   40.348805]  __kasan_kmalloc+0xd4/0xd8
[   40.349393]  __kmalloc_cache_noprof+0x15c/0x3c8
[   40.349956]  kasan_bitops_generic+0xa0/0x1c8
[   40.350595]  kunit_try_run_case+0x14c/0x3d0
[   40.351244]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.351920]  kthread+0x24c/0x2d0
[   40.352480]  ret_from_fork+0x10/0x20
[   40.353012] 
[   40.353306] The buggy address belongs to the object at fff00000c1bb3c00
[   40.353306]  which belongs to the cache kmalloc-16 of size 16
[   40.354464] The buggy address is located 8 bytes inside of
[   40.354464]  allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09)
[   40.355595] 
[   40.355951] The buggy address belongs to the physical page:
[   40.356657] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3
[   40.357543] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.358381] page_type: f5(slab)
[   40.358928] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   40.359689] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   40.360625] page dumped because: kasan: bad access detected
[   40.361223] 
[   40.361595] Memory state around the buggy address:
[   40.362087]  fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.362937]  fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.363685] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.364490]                       ^
[   40.364991]  fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.365787]  fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.366507] ==================================================================
[   40.180999] ==================================================================
[   40.181779] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc8
[   40.182429] Write of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250
[   40.183739] 
[   40.184126] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   40.185207] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.185828] Hardware name: linux,dummy-virt (DT)
[   40.186639] Call trace:
[   40.187043]  show_stack+0x20/0x38 (C)
[   40.187737]  dump_stack_lvl+0x8c/0xd0
[   40.188372]  print_report+0x118/0x5e0
[   40.188982]  kasan_report+0xc8/0x118
[   40.189945]  kasan_check_range+0x100/0x1a8
[   40.190732]  __kasan_check_write+0x20/0x30
[   40.191356]  kasan_bitops_modify.constprop.0+0x320/0xbc8
[   40.192222]  kasan_bitops_generic+0x110/0x1c8
[   40.192885]  kunit_try_run_case+0x14c/0x3d0
[   40.193894]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.194670]  kthread+0x24c/0x2d0
[   40.195199]  ret_from_fork+0x10/0x20
[   40.195755] 
[   40.196108] Allocated by task 250:
[   40.196671]  kasan_save_stack+0x3c/0x68
[   40.197218]  kasan_save_track+0x20/0x40
[   40.198111]  kasan_save_alloc_info+0x40/0x58
[   40.198695]  __kasan_kmalloc+0xd4/0xd8
[   40.199217]  __kmalloc_cache_noprof+0x15c/0x3c8
[   40.199821]  kasan_bitops_generic+0xa0/0x1c8
[   40.200479]  kunit_try_run_case+0x14c/0x3d0
[   40.201021]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.202231]  kthread+0x24c/0x2d0
[   40.203175]  ret_from_fork+0x10/0x20
[   40.203568] 
[   40.203931] The buggy address belongs to the object at fff00000c1bb3c00
[   40.203931]  which belongs to the cache kmalloc-16 of size 16
[   40.205256] The buggy address is located 8 bytes inside of
[   40.205256]  allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09)
[   40.206420] 
[   40.207162] The buggy address belongs to the physical page:
[   40.208086] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3
[   40.209183] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.210342] page_type: f5(slab)
[   40.210811] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   40.211677] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   40.212643] page dumped because: kasan: bad access detected
[   40.213393] 
[   40.214278] Memory state around the buggy address:
[   40.214906]  fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.215836]  fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.216715] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.217550]                       ^
[   40.218014]  fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.218776]  fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.219903] ==================================================================
[   40.096291] ==================================================================
[   40.096924] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8
[   40.098829] Read of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250
[   40.099649] 
[   40.101456] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   40.102550] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.103259] Hardware name: linux,dummy-virt (DT)
[   40.104015] Call trace:
[   40.104645]  show_stack+0x20/0x38 (C)
[   40.105423]  dump_stack_lvl+0x8c/0xd0
[   40.106352]  print_report+0x118/0x5e0
[   40.106884]  kasan_report+0xc8/0x118
[   40.107496]  __asan_report_load8_noabort+0x20/0x30
[   40.108118]  kasan_bitops_modify.constprop.0+0xa88/0xbc8
[   40.108895]  kasan_bitops_generic+0x110/0x1c8
[   40.109862]  kunit_try_run_case+0x14c/0x3d0
[   40.110482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.111180]  kthread+0x24c/0x2d0
[   40.111718]  ret_from_fork+0x10/0x20
[   40.112252] 
[   40.112618] Allocated by task 250:
[   40.113150]  kasan_save_stack+0x3c/0x68
[   40.114050]  kasan_save_track+0x20/0x40
[   40.114608]  kasan_save_alloc_info+0x40/0x58
[   40.115248]  __kasan_kmalloc+0xd4/0xd8
[   40.115827]  __kmalloc_cache_noprof+0x15c/0x3c8
[   40.116422]  kasan_bitops_generic+0xa0/0x1c8
[   40.117004]  kunit_try_run_case+0x14c/0x3d0
[   40.118158]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.118727]  kthread+0x24c/0x2d0
[   40.119117]  ret_from_fork+0x10/0x20
[   40.119583] 
[   40.119936] The buggy address belongs to the object at fff00000c1bb3c00
[   40.119936]  which belongs to the cache kmalloc-16 of size 16
[   40.121555] The buggy address is located 8 bytes inside of
[   40.121555]  allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09)
[   40.123227] 
[   40.123600] The buggy address belongs to the physical page:
[   40.124297] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3
[   40.125102] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.125773] page_type: f5(slab)
[   40.127063] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   40.128016] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   40.128775] page dumped because: kasan: bad access detected
[   40.129538] 
[   40.129845] Memory state around the buggy address:
[   40.130539]  fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.131358]  fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.132565] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.133602]                       ^
[   40.134254]  fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.135190]  fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.135988] ==================================================================
[   40.054608] ==================================================================
[   40.055375] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[   40.056366] Write of size 8 at addr fff00000c1bb3c08 by task kunit_try_catch/250
[   40.057297] 
[   40.058002] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   40.059158] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.059971] Hardware name: linux,dummy-virt (DT)
[   40.060513] Call trace:
[   40.060835]  show_stack+0x20/0x38 (C)
[   40.062001]  dump_stack_lvl+0x8c/0xd0
[   40.062679]  print_report+0x118/0x5e0
[   40.063251]  kasan_report+0xc8/0x118
[   40.063721]  kasan_check_range+0x100/0x1a8
[   40.064453]  __kasan_check_write+0x20/0x30
[   40.065164]  kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[   40.066288]  kasan_bitops_generic+0x110/0x1c8
[   40.066973]  kunit_try_run_case+0x14c/0x3d0
[   40.067630]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.068392]  kthread+0x24c/0x2d0
[   40.068908]  ret_from_fork+0x10/0x20
[   40.069993] 
[   40.070367] Allocated by task 250:
[   40.070896]  kasan_save_stack+0x3c/0x68
[   40.071523]  kasan_save_track+0x20/0x40
[   40.072114]  kasan_save_alloc_info+0x40/0x58
[   40.072701]  __kasan_kmalloc+0xd4/0xd8
[   40.073329]  __kmalloc_cache_noprof+0x15c/0x3c8
[   40.073991]  kasan_bitops_generic+0xa0/0x1c8
[   40.075036]  kunit_try_run_case+0x14c/0x3d0
[   40.075681]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.076392]  kthread+0x24c/0x2d0
[   40.076903]  ret_from_fork+0x10/0x20
[   40.077738] 
[   40.078607] The buggy address belongs to the object at fff00000c1bb3c00
[   40.078607]  which belongs to the cache kmalloc-16 of size 16
[   40.080241] The buggy address is located 8 bytes inside of
[   40.080241]  allocated 9-byte region [fff00000c1bb3c00, fff00000c1bb3c09)
[   40.081873] 
[   40.082308] The buggy address belongs to the physical page:
[   40.083197] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3
[   40.084097] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   40.084796] page_type: f5(slab)
[   40.085482] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   40.086488] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   40.087304] page dumped because: kasan: bad access detected
[   40.087907] 
[   40.088267] Memory state around the buggy address:
[   40.088933]  fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.090106]  fff00000c1bb3b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   40.091123] >fff00000c1bb3c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.091939]                       ^
[   40.092414]  fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.093319]  fff00000c1bb3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   40.094398] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen
[   39.919035] ==================================================================
[   39.919903] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88
[   39.920569] Read of size 1 at addr fff00000c65a90d0 by task kunit_try_catch/248
[   39.922502] 
[   39.922803] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   39.923916] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.924630] Hardware name: linux,dummy-virt (DT)
[   39.925301] Call trace:
[   39.925751]  show_stack+0x20/0x38 (C)
[   39.926365]  dump_stack_lvl+0x8c/0xd0
[   39.926962]  print_report+0x118/0x5e0
[   39.927565]  kasan_report+0xc8/0x118
[   39.928087]  __asan_report_load1_noabort+0x20/0x30
[   39.928820]  strnlen+0x80/0x88
[   39.929314]  kasan_strings+0x380/0x8f8
[   39.929850]  kunit_try_run_case+0x14c/0x3d0
[   39.930516]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.931227]  kthread+0x24c/0x2d0
[   39.931712]  ret_from_fork+0x10/0x20
[   39.932316] 
[   39.932673] Allocated by task 248:
[   39.933214]  kasan_save_stack+0x3c/0x68
[   39.933789]  kasan_save_track+0x20/0x40
[   39.934284]  kasan_save_alloc_info+0x40/0x58
[   39.934965]  __kasan_kmalloc+0xd4/0xd8
[   39.935566]  __kmalloc_cache_noprof+0x15c/0x3c8
[   39.936212]  kasan_strings+0xb4/0x8f8
[   39.936728]  kunit_try_run_case+0x14c/0x3d0
[   39.937351]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.938037]  kthread+0x24c/0x2d0
[   39.938584]  ret_from_fork+0x10/0x20
[   39.939132] 
[   39.939508] Freed by task 248:
[   39.939897]  kasan_save_stack+0x3c/0x68
[   39.940497]  kasan_save_track+0x20/0x40
[   39.941081]  kasan_save_free_info+0x4c/0x78
[   39.941633]  __kasan_slab_free+0x6c/0x98
[   39.942212]  kfree+0x114/0x3d0
[   39.942755]  kasan_strings+0x128/0x8f8
[   39.943320]  kunit_try_run_case+0x14c/0x3d0
[   39.943992]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.944856]  kthread+0x24c/0x2d0
[   39.945479]  ret_from_fork+0x10/0x20
[   39.945869] 
[   39.946233] The buggy address belongs to the object at fff00000c65a90c0
[   39.946233]  which belongs to the cache kmalloc-32 of size 32
[   39.947617] The buggy address is located 16 bytes inside of
[   39.947617]  freed 32-byte region [fff00000c65a90c0, fff00000c65a90e0)
[   39.948943] 
[   39.949376] The buggy address belongs to the physical page:
[   39.950158] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065a9
[   39.951145] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.951735] page_type: f5(slab)
[   39.952273] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   39.953248] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   39.954106] page dumped because: kasan: bad access detected
[   39.954943] 
[   39.955224] Memory state around the buggy address:
[   39.955958]  fff00000c65a8f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.956751]  fff00000c65a9000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   39.957480] >fff00000c65a9080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   39.958332]                                                  ^
[   39.958956]  fff00000c65a9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.959813]  fff00000c65a9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.960510] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen
[   39.872415] ==================================================================
[   39.873201] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   39.873935] Read of size 1 at addr fff00000c65a90d0 by task kunit_try_catch/248
[   39.874626] 
[   39.874959] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   39.876020] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.876493] Hardware name: linux,dummy-virt (DT)
[   39.877106] Call trace:
[   39.877491]  show_stack+0x20/0x38 (C)
[   39.878087]  dump_stack_lvl+0x8c/0xd0
[   39.878678]  print_report+0x118/0x5e0
[   39.879295]  kasan_report+0xc8/0x118
[   39.879826]  __asan_report_load1_noabort+0x20/0x30
[   39.880505]  strlen+0xa8/0xb0
[   39.881029]  kasan_strings+0x320/0x8f8
[   39.881808]  kunit_try_run_case+0x14c/0x3d0
[   39.882463]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.883201]  kthread+0x24c/0x2d0
[   39.883781]  ret_from_fork+0x10/0x20
[   39.884380] 
[   39.884708] Allocated by task 248:
[   39.885146]  kasan_save_stack+0x3c/0x68
[   39.885757]  kasan_save_track+0x20/0x40
[   39.886253]  kasan_save_alloc_info+0x40/0x58
[   39.886848]  __kasan_kmalloc+0xd4/0xd8
[   39.887413]  __kmalloc_cache_noprof+0x15c/0x3c8
[   39.888323]  kasan_strings+0xb4/0x8f8
[   39.888900]  kunit_try_run_case+0x14c/0x3d0
[   39.889792]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.890525]  kthread+0x24c/0x2d0
[   39.891019]  ret_from_fork+0x10/0x20
[   39.891462] 
[   39.891803] Freed by task 248:
[   39.892289]  kasan_save_stack+0x3c/0x68
[   39.892829]  kasan_save_track+0x20/0x40
[   39.894280]  kasan_save_free_info+0x4c/0x78
[   39.895383]  __kasan_slab_free+0x6c/0x98
[   39.895976]  kfree+0x114/0x3d0
[   39.896516]  kasan_strings+0x128/0x8f8
[   39.897047]  kunit_try_run_case+0x14c/0x3d0
[   39.897620]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.898330]  kthread+0x24c/0x2d0
[   39.899063]  ret_from_fork+0x10/0x20
[   39.899658] 
[   39.899974] The buggy address belongs to the object at fff00000c65a90c0
[   39.899974]  which belongs to the cache kmalloc-32 of size 32
[   39.901213] The buggy address is located 16 bytes inside of
[   39.901213]  freed 32-byte region [fff00000c65a90c0, fff00000c65a90e0)
[   39.902746] 
[   39.903127] The buggy address belongs to the physical page:
[   39.903715] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065a9
[   39.904688] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.905505] page_type: f5(slab)
[   39.905912] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   39.906934] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   39.907717] page dumped because: kasan: bad access detected
[   39.908327] 
[   39.908717] Memory state around the buggy address:
[   39.909390]  fff00000c65a8f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.910489]  fff00000c65a9000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   39.911479] >fff00000c65a9080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   39.912356]                                                  ^
[   39.913136]  fff00000c65a9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.914630]  fff00000c65a9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.915741] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[   39.827006] ==================================================================
[   39.827987] BUG: KASAN: slab-use-after-free in kasan_strings+0x858/0x8f8
[   39.828795] Read of size 1 at addr fff00000c65a90d0 by task kunit_try_catch/248
[   39.829938] 
[   39.830304] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   39.831399] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.832038] Hardware name: linux,dummy-virt (DT)
[   39.832701] Call trace:
[   39.833175]  show_stack+0x20/0x38 (C)
[   39.833870]  dump_stack_lvl+0x8c/0xd0
[   39.834565]  print_report+0x118/0x5e0
[   39.835259]  kasan_report+0xc8/0x118
[   39.835859]  __asan_report_load1_noabort+0x20/0x30
[   39.836550]  kasan_strings+0x858/0x8f8
[   39.837204]  kunit_try_run_case+0x14c/0x3d0
[   39.838176]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.838928]  kthread+0x24c/0x2d0
[   39.839511]  ret_from_fork+0x10/0x20
[   39.840085] 
[   39.840472] Allocated by task 248:
[   39.841042]  kasan_save_stack+0x3c/0x68
[   39.841791]  kasan_save_track+0x20/0x40
[   39.842636]  kasan_save_alloc_info+0x40/0x58
[   39.843190]  __kasan_kmalloc+0xd4/0xd8
[   39.843780]  __kmalloc_cache_noprof+0x15c/0x3c8
[   39.844362]  kasan_strings+0xb4/0x8f8
[   39.844875]  kunit_try_run_case+0x14c/0x3d0
[   39.845955]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.846474]  kthread+0x24c/0x2d0
[   39.846939]  ret_from_fork+0x10/0x20
[   39.847509] 
[   39.847862] Freed by task 248:
[   39.848363]  kasan_save_stack+0x3c/0x68
[   39.848980]  kasan_save_track+0x20/0x40
[   39.849935]  kasan_save_free_info+0x4c/0x78
[   39.850567]  __kasan_slab_free+0x6c/0x98
[   39.851165]  kfree+0x114/0x3d0
[   39.851599]  kasan_strings+0x128/0x8f8
[   39.852170]  kunit_try_run_case+0x14c/0x3d0
[   39.852704]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.853764]  kthread+0x24c/0x2d0
[   39.854262]  ret_from_fork+0x10/0x20
[   39.854737] 
[   39.855072] The buggy address belongs to the object at fff00000c65a90c0
[   39.855072]  which belongs to the cache kmalloc-32 of size 32
[   39.856339] The buggy address is located 16 bytes inside of
[   39.856339]  freed 32-byte region [fff00000c65a90c0, fff00000c65a90e0)
[   39.857436] 
[   39.857798] The buggy address belongs to the physical page:
[   39.858492] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065a9
[   39.859264] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.860395] page_type: f5(slab)
[   39.860925] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   39.862092] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   39.862886] page dumped because: kasan: bad access detected
[   39.863517] 
[   39.863828] Memory state around the buggy address:
[   39.864463]  fff00000c65a8f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.865102]  fff00000c65a9000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   39.867063] >fff00000c65a9080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   39.868332]                                                  ^
[   39.868931]  fff00000c65a9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.869870]  fff00000c65a9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.870681] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
[   39.780969] ==================================================================
[   39.781874] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   39.782925] Read of size 1 at addr fff00000c65a90d0 by task kunit_try_catch/248
[   39.784557] 
[   39.784935] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   39.786137] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.786690] Hardware name: linux,dummy-virt (DT)
[   39.787340] Call trace:
[   39.787935]  show_stack+0x20/0x38 (C)
[   39.788467]  dump_stack_lvl+0x8c/0xd0
[   39.789121]  print_report+0x118/0x5e0
[   39.790078]  kasan_report+0xc8/0x118
[   39.790684]  __asan_report_load1_noabort+0x20/0x30
[   39.791398]  strcmp+0xc0/0xc8
[   39.791891]  kasan_strings+0x248/0x8f8
[   39.792537]  kunit_try_run_case+0x14c/0x3d0
[   39.793169]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.794204]  kthread+0x24c/0x2d0
[   39.794789]  ret_from_fork+0x10/0x20
[   39.795313] 
[   39.795713] Allocated by task 248:
[   39.796290]  kasan_save_stack+0x3c/0x68
[   39.796889]  kasan_save_track+0x20/0x40
[   39.797867]  kasan_save_alloc_info+0x40/0x58
[   39.798435]  __kasan_kmalloc+0xd4/0xd8
[   39.799066]  __kmalloc_cache_noprof+0x15c/0x3c8
[   39.799677]  kasan_strings+0xb4/0x8f8
[   39.800286]  kunit_try_run_case+0x14c/0x3d0
[   39.800898]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.801899]  kthread+0x24c/0x2d0
[   39.802277]  ret_from_fork+0x10/0x20
[   39.802689] 
[   39.803068] Freed by task 248:
[   39.803924]  kasan_save_stack+0x3c/0x68
[   39.804499]  kasan_save_track+0x20/0x40
[   39.805895]  kasan_save_free_info+0x4c/0x78
[   39.806533]  __kasan_slab_free+0x6c/0x98
[   39.807106]  kfree+0x114/0x3d0
[   39.807641]  kasan_strings+0x128/0x8f8
[   39.808221]  kunit_try_run_case+0x14c/0x3d0
[   39.808904]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.809882]  kthread+0x24c/0x2d0
[   39.810230]  ret_from_fork+0x10/0x20
[   39.810851] 
[   39.811245] The buggy address belongs to the object at fff00000c65a90c0
[   39.811245]  which belongs to the cache kmalloc-32 of size 32
[   39.812489] The buggy address is located 16 bytes inside of
[   39.812489]  freed 32-byte region [fff00000c65a90c0, fff00000c65a90e0)
[   39.813828] 
[   39.814167] The buggy address belongs to the physical page:
[   39.814852] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065a9
[   39.815863] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.816538] page_type: f5(slab)
[   39.817070] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   39.818299] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   39.819102] page dumped because: kasan: bad access detected
[   39.819921] 
[   39.820286] Memory state around the buggy address:
[   39.820875]  fff00000c65a8f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.822194]  fff00000c65a9000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   39.823368] >fff00000c65a9080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   39.823784]                                                  ^
[   39.824088]  fff00000c65a9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.824464]  fff00000c65a9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.825165] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strrchr
[   39.731603] ==================================================================
[   39.732366] BUG: KASAN: slab-use-after-free in strrchr+0x6c/0x78
[   39.733187] Read of size 1 at addr fff00000c65a90d0 by task kunit_try_catch/248
[   39.734816] 
[   39.735139] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   39.736352] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.736885] Hardware name: linux,dummy-virt (DT)
[   39.737166] Call trace:
[   39.738191]  show_stack+0x20/0x38 (C)
[   39.738991]  dump_stack_lvl+0x8c/0xd0
[   39.739687]  print_report+0x118/0x5e0
[   39.740395]  kasan_report+0xc8/0x118
[   39.741130]  __asan_report_load1_noabort+0x20/0x30
[   39.742136]  strrchr+0x6c/0x78
[   39.742561]  kasan_strings+0x1e0/0x8f8
[   39.743100]  kunit_try_run_case+0x14c/0x3d0
[   39.744359]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.745070]  kthread+0x24c/0x2d0
[   39.745610]  ret_from_fork+0x10/0x20
[   39.746662] 
[   39.746974] Allocated by task 248:
[   39.747433]  kasan_save_stack+0x3c/0x68
[   39.747948]  kasan_save_track+0x20/0x40
[   39.748502]  kasan_save_alloc_info+0x40/0x58
[   39.749023]  __kasan_kmalloc+0xd4/0xd8
[   39.749675]  __kmalloc_cache_noprof+0x15c/0x3c8
[   39.751163]  kasan_strings+0xb4/0x8f8
[   39.751861]  kunit_try_run_case+0x14c/0x3d0
[   39.752591]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.753555]  kthread+0x24c/0x2d0
[   39.754182]  ret_from_fork+0x10/0x20
[   39.754689] 
[   39.755068] Freed by task 248:
[   39.755535]  kasan_save_stack+0x3c/0x68
[   39.756180]  kasan_save_track+0x20/0x40
[   39.756745]  kasan_save_free_info+0x4c/0x78
[   39.757518]  __kasan_slab_free+0x6c/0x98
[   39.758342]  kfree+0x114/0x3d0
[   39.758877]  kasan_strings+0x128/0x8f8
[   39.759473]  kunit_try_run_case+0x14c/0x3d0
[   39.760142]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.760864]  kthread+0x24c/0x2d0
[   39.761643]  ret_from_fork+0x10/0x20
[   39.762396] 
[   39.762904] The buggy address belongs to the object at fff00000c65a90c0
[   39.762904]  which belongs to the cache kmalloc-32 of size 32
[   39.764318] The buggy address is located 16 bytes inside of
[   39.764318]  freed 32-byte region [fff00000c65a90c0, fff00000c65a90e0)
[   39.766151] 
[   39.766505] The buggy address belongs to the physical page:
[   39.767111] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065a9
[   39.768290] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.769156] page_type: f5(slab)
[   39.769681] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   39.770259] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   39.771014] page dumped because: kasan: bad access detected
[   39.771721] 
[   39.772068] Memory state around the buggy address:
[   39.772771]  fff00000c65a8f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.773851]  fff00000c65a9000: fa fb fb fb fc fc fc fc 00 00 07 fc fc fc fc fc
[   39.774946] >fff00000c65a9080: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   39.775840]                                                  ^
[   39.776625]  fff00000c65a9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.777817]  fff00000c65a9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.778761] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strchr
[   39.684719] ==================================================================
[   39.686405] BUG: KASAN: slab-use-after-free in strchr+0xcc/0xd8
[   39.687249] Read of size 1 at addr fff00000c65a90d0 by task kunit_try_catch/248
[   39.688288] 
[   39.688716] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   39.690045] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.690552] Hardware name: linux,dummy-virt (DT)
[   39.691173] Call trace:
[   39.691543]  show_stack+0x20/0x38 (C)
[   39.692161]  dump_stack_lvl+0x8c/0xd0
[   39.692740]  print_report+0x118/0x5e0
[   39.693264]  kasan_report+0xc8/0x118
[   39.693796]  __asan_report_load1_noabort+0x20/0x30
[   39.694500]  strchr+0xcc/0xd8
[   39.695038]  kasan_strings+0x180/0x8f8
[   39.695954]  kunit_try_run_case+0x14c/0x3d0
[   39.696581]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.697202]  kthread+0x24c/0x2d0
[   39.698023]  ret_from_fork+0x10/0x20
[   39.698605] 
[   39.698961] Allocated by task 248:
[   39.699456]  kasan_save_stack+0x3c/0x68
[   39.700048]  kasan_save_track+0x20/0x40
[   39.700565]  kasan_save_alloc_info+0x40/0x58
[   39.701186]  __kasan_kmalloc+0xd4/0xd8
[   39.702000]  __kmalloc_cache_noprof+0x15c/0x3c8
[   39.702664]  kasan_strings+0xb4/0x8f8
[   39.703178]  kunit_try_run_case+0x14c/0x3d0
[   39.703788]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.704401]  kthread+0x24c/0x2d0
[   39.704987]  ret_from_fork+0x10/0x20
[   39.705998] 
[   39.706311] Freed by task 248:
[   39.706760]  kasan_save_stack+0x3c/0x68
[   39.707295]  kasan_save_track+0x20/0x40
[   39.707899]  kasan_save_free_info+0x4c/0x78
[   39.708547]  __kasan_slab_free+0x6c/0x98
[   39.709075]  kfree+0x114/0x3d0
[   39.710038]  kasan_strings+0x128/0x8f8
[   39.710655]  kunit_try_run_case+0x14c/0x3d0
[   39.711224]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.711803]  kthread+0x24c/0x2d0
[   39.712282]  ret_from_fork+0x10/0x20
[   39.712835] 
[   39.713134] The buggy address belongs to the object at fff00000c65a90c0
[   39.713134]  which belongs to the cache kmalloc-32 of size 32
[   39.714307] The buggy address is located 16 bytes inside of
[   39.714307]  freed 32-byte region [fff00000c65a90c0, fff00000c65a90e0)
[   39.715993] 
[   39.716317] The buggy address belongs to the physical page:
[   39.717022] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065a9
[   39.718488] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.719194] page_type: f5(slab)
[   39.719741] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   39.720641] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   39.721387] page dumped because: kasan: bad access detected
[   39.722276] 
[   39.722633] Memory state around the buggy address:
[   39.723210]  fff00000c65a8f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.724045]  fff00000c65a9000: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   39.724961] >fff00000c65a9080: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   39.726373]                                                  ^
[   39.727299]  fff00000c65a9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.728320]  fff00000c65a9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.729019] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[   39.635006] ==================================================================
[   39.636480] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   39.637161] Read of size 1 at addr fff00000c65bf858 by task kunit_try_catch/246
[   39.638593] 
[   39.638976] CPU: 1 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   39.639996] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.640662] Hardware name: linux,dummy-virt (DT)
[   39.641215] Call trace:
[   39.642009]  show_stack+0x20/0x38 (C)
[   39.642639]  dump_stack_lvl+0x8c/0xd0
[   39.643205]  print_report+0x118/0x5e0
[   39.643846]  kasan_report+0xc8/0x118
[   39.644423]  __asan_report_load1_noabort+0x20/0x30
[   39.645074]  memcmp+0x198/0x1d8
[   39.645722]  kasan_memcmp+0x16c/0x300
[   39.646705]  kunit_try_run_case+0x14c/0x3d0
[   39.647332]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.647897]  kthread+0x24c/0x2d0
[   39.648306]  ret_from_fork+0x10/0x20
[   39.648990] 
[   39.649674] Allocated by task 246:
[   39.650190]  kasan_save_stack+0x3c/0x68
[   39.650647]  kasan_save_track+0x20/0x40
[   39.651669]  kasan_save_alloc_info+0x40/0x58
[   39.652384]  __kasan_kmalloc+0xd4/0xd8
[   39.653020]  __kmalloc_cache_noprof+0x15c/0x3c8
[   39.653829]  kasan_memcmp+0xbc/0x300
[   39.654549]  kunit_try_run_case+0x14c/0x3d0
[   39.655304]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.656036]  kthread+0x24c/0x2d0
[   39.656385]  ret_from_fork+0x10/0x20
[   39.656793] 
[   39.657224] The buggy address belongs to the object at fff00000c65bf840
[   39.657224]  which belongs to the cache kmalloc-32 of size 32
[   39.659383] The buggy address is located 0 bytes to the right of
[   39.659383]  allocated 24-byte region [fff00000c65bf840, fff00000c65bf858)
[   39.661037] 
[   39.661580] The buggy address belongs to the physical page:
[   39.662573] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bf
[   39.663354] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.664228] page_type: f5(slab)
[   39.664702] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   39.666281] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   39.666941] page dumped because: kasan: bad access detected
[   39.667672] 
[   39.668055] Memory state around the buggy address:
[   39.668633]  fff00000c65bf700: fa fb fb fb fc fc fc fc 00 00 07 fc fc fc fc fc
[   39.669373]  fff00000c65bf780: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   39.670518] >fff00000c65bf800: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   39.671480]                                                     ^
[   39.672154]  fff00000c65bf880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.673164]  fff00000c65bf900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.674246] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memchr
[   39.582319] ==================================================================
[   39.583546] BUG: KASAN: slab-out-of-bounds in memchr+0x78/0x88
[   39.584274] Read of size 1 at addr fff00000c65bf718 by task kunit_try_catch/244
[   39.585466] 
[   39.585837] CPU: 1 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   39.587164] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.587636] Hardware name: linux,dummy-virt (DT)
[   39.588148] Call trace:
[   39.588607]  show_stack+0x20/0x38 (C)
[   39.589168]  dump_stack_lvl+0x8c/0xd0
[   39.589838]  print_report+0x118/0x5e0
[   39.590420]  kasan_report+0xc8/0x118
[   39.590997]  __asan_report_load1_noabort+0x20/0x30
[   39.591897]  memchr+0x78/0x88
[   39.592426]  kasan_memchr+0x148/0x2d8
[   39.593072]  kunit_try_run_case+0x14c/0x3d0
[   39.594046]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.594669]  kthread+0x24c/0x2d0
[   39.595269]  ret_from_fork+0x10/0x20
[   39.595804] 
[   39.596146] Allocated by task 244:
[   39.596689]  kasan_save_stack+0x3c/0x68
[   39.597274]  kasan_save_track+0x20/0x40
[   39.597780]  kasan_save_alloc_info+0x40/0x58
[   39.598401]  __kasan_kmalloc+0xd4/0xd8
[   39.599300]  __kmalloc_cache_noprof+0x15c/0x3c8
[   39.599884]  kasan_memchr+0xb0/0x2d8
[   39.600435]  kunit_try_run_case+0x14c/0x3d0
[   39.601522]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.602196]  kthread+0x24c/0x2d0
[   39.602681]  ret_from_fork+0x10/0x20
[   39.603248] 
[   39.604080] The buggy address belongs to the object at fff00000c65bf700
[   39.604080]  which belongs to the cache kmalloc-32 of size 32
[   39.605537] The buggy address is located 0 bytes to the right of
[   39.605537]  allocated 24-byte region [fff00000c65bf700, fff00000c65bf718)
[   39.606794] 
[   39.607163] The buggy address belongs to the physical page:
[   39.607780] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bf
[   39.608680] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.609878] page_type: f5(slab)
[   39.610772] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   39.611539] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   39.612409] page dumped because: kasan: bad access detected
[   39.613160] 
[   39.613535] Memory state around the buggy address:
[   39.614259]  fff00000c65bf600: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   39.614997]  fff00000c65bf680: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   39.615972] >fff00000c65bf700: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.616828]                             ^
[   39.617503]  fff00000c65bf780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.618281]  fff00000c65bf800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.619297] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[   39.539131] ==================================================================
[   39.540552] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2e4/0x348
[   39.541645] Read of size 1 at addr ffff8000809c7bea by task kunit_try_catch/242
[   39.543438] 
[   39.543905] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   39.545097] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.545677] Hardware name: linux,dummy-virt (DT)
[   39.546242] Call trace:
[   39.546691]  show_stack+0x20/0x38 (C)
[   39.547268]  dump_stack_lvl+0x8c/0xd0
[   39.548278]  print_report+0x2fc/0x5e0
[   39.548884]  kasan_report+0xc8/0x118
[   39.549563]  __asan_report_load1_noabort+0x20/0x30
[   39.550428]  kasan_alloca_oob_right+0x2e4/0x348
[   39.551635]  kunit_try_run_case+0x14c/0x3d0
[   39.552376]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.553150]  kthread+0x24c/0x2d0
[   39.553743]  ret_from_fork+0x10/0x20
[   39.554397] 
[   39.554767] The buggy address belongs to stack of task kunit_try_catch/242
[   39.555582] 
[   39.555894] The buggy address belongs to the virtual mapping at
[   39.555894]  [ffff8000809c0000, ffff8000809c9000) created by:
[   39.555894]  kernel_clone+0x140/0x790
[   39.557908] 
[   39.558256] The buggy address belongs to the physical page:
[   39.558923] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106589
[   39.560491] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.561283] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   39.562499] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   39.563435] page dumped because: kasan: bad access detected
[   39.564096] 
[   39.564487] Memory state around the buggy address:
[   39.565077]  ffff8000809c7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.566183]  ffff8000809c7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.567318] >ffff8000809c7b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   39.567992]                                                           ^
[   39.568738]  ffff8000809c7c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2
[   39.569641]  ffff8000809c7c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00
[   39.570420] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[   39.500345] ==================================================================
[   39.501653] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   39.502574] Read of size 1 at addr ffff800080ad7bdf by task kunit_try_catch/240
[   39.503202] 
[   39.503609] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   39.504766] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.505365] Hardware name: linux,dummy-virt (DT)
[   39.506396] Call trace:
[   39.506977]  show_stack+0x20/0x38 (C)
[   39.507926]  dump_stack_lvl+0x8c/0xd0
[   39.508638]  print_report+0x2fc/0x5e0
[   39.509656]  kasan_report+0xc8/0x118
[   39.510211]  __asan_report_load1_noabort+0x20/0x30
[   39.510820]  kasan_alloca_oob_left+0x2b8/0x310
[   39.511361]  kunit_try_run_case+0x14c/0x3d0
[   39.512044]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.512842]  kthread+0x24c/0x2d0
[   39.513373]  ret_from_fork+0x10/0x20
[   39.514158] 
[   39.514524] The buggy address belongs to stack of task kunit_try_catch/240
[   39.515327] 
[   39.515761] The buggy address belongs to the virtual mapping at
[   39.515761]  [ffff800080ad0000, ffff800080ad9000) created by:
[   39.515761]  kernel_clone+0x140/0x790
[   39.517163] 
[   39.518062] The buggy address belongs to the physical page:
[   39.518766] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10655d
[   39.519587] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.520305] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   39.521193] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   39.522249] page dumped because: kasan: bad access detected
[   39.522883] 
[   39.523220] Memory state around the buggy address:
[   39.523742]  ffff800080ad7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.524583]  ffff800080ad7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.525622] >ffff800080ad7b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   39.526245]                                                     ^
[   39.527017]  ffff800080ad7c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2
[   39.527806]  ffff800080ad7c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00
[   39.528619] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[   39.454783] ==================================================================
[   39.456158] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x230/0x268
[   39.456821] Read of size 1 at addr ffff800080a87cba by task kunit_try_catch/238
[   39.457498] 
[   39.457863] CPU: 0 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   39.459072] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.459548] Hardware name: linux,dummy-virt (DT)
[   39.460407] Call trace:
[   39.460854]  show_stack+0x20/0x38 (C)
[   39.462199]  dump_stack_lvl+0x8c/0xd0
[   39.462746]  print_report+0x2fc/0x5e0
[   39.463408]  kasan_report+0xc8/0x118
[   39.464121]  __asan_report_load1_noabort+0x20/0x30
[   39.464963]  kasan_stack_oob+0x230/0x268
[   39.465699]  kunit_try_run_case+0x14c/0x3d0
[   39.466209]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.467087]  kthread+0x24c/0x2d0
[   39.467613]  ret_from_fork+0x10/0x20
[   39.468279] 
[   39.468756] The buggy address belongs to stack of task kunit_try_catch/238
[   39.469974]  and is located at offset 138 in frame:
[   39.470539]  kasan_stack_oob+0x0/0x268
[   39.471327] 
[   39.471702] This frame has 4 objects:
[   39.472416]  [48, 49) '__assertion'
[   39.472612]  [64, 72) 'array'
[   39.473075]  [96, 112) '__assertion'
[   39.473840]  [128, 138) 'stack_array'
[   39.474304] 
[   39.475121] The buggy address belongs to the virtual mapping at
[   39.475121]  [ffff800080a80000, ffff800080a89000) created by:
[   39.475121]  kernel_clone+0x140/0x790
[   39.476664] 
[   39.476998] The buggy address belongs to the physical page:
[   39.478677] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10658c
[   39.479782] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.480754] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   39.482117] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   39.482908] page dumped because: kasan: bad access detected
[   39.483516] 
[   39.483821] Memory state around the buggy address:
[   39.484393]  ffff800080a87b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.485192]  ffff800080a87c00: 00 00 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2
[   39.486287] >ffff800080a87c80: f2 f2 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00
[   39.487370]                                         ^
[   39.488170]  ffff800080a87d00: 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00
[   39.489135]  ffff800080a87d80: f2 f2 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00
[   39.490143] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   39.402406] ==================================================================
[   39.403752] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   39.404686] Read of size 1 at addr ffffa2dae98da06d by task kunit_try_catch/234
[   39.405551] 
[   39.406633] CPU: 1 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   39.407802] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.408376] Hardware name: linux,dummy-virt (DT)
[   39.409273] Call trace:
[   39.409723]  show_stack+0x20/0x38 (C)
[   39.410894]  dump_stack_lvl+0x8c/0xd0
[   39.411566]  print_report+0x2fc/0x5e0
[   39.412148]  kasan_report+0xc8/0x118
[   39.412694]  __asan_report_load1_noabort+0x20/0x30
[   39.413633]  kasan_global_oob_right+0x230/0x270
[   39.414917]  kunit_try_run_case+0x14c/0x3d0
[   39.415605]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.416403]  kthread+0x24c/0x2d0
[   39.417052]  ret_from_fork+0x10/0x20
[   39.418132] 
[   39.418579] The buggy address belongs to the variable:
[   39.419230]  global_array+0xd/0x40
[   39.419745] 
[   39.420293] The buggy address belongs to the virtual mapping at
[   39.420293]  [ffffa2dae7c20000, ffffa2dae9991000) created by:
[   39.420293]  paging_init+0x668/0x7c8
[   39.422017] 
[   39.422691] The buggy address belongs to the physical page:
[   39.423372] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x478da
[   39.425055] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   39.426301] raw: 03fffe0000002000 ffffc1ffc01e3688 ffffc1ffc01e3688 0000000000000000
[   39.427136] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   39.427936] page dumped because: kasan: bad access detected
[   39.428564] 
[   39.428908] Memory state around the buggy address:
[   39.430195]  ffffa2dae98d9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.430925]  ffffa2dae98d9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.431746] >ffffa2dae98da000: 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9
[   39.432649]                                                           ^
[   39.433884]  ffffa2dae98da080: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9
[   39.434639]  ffffa2dae98da100: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9
[   39.435402] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[   39.298239] ==================================================================
[   39.299612] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[   39.300350] Free of addr fff00000c65ba801 by task kunit_try_catch/230
[   39.301226] 
[   39.301780] CPU: 0 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   39.303571] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.304152] Hardware name: linux,dummy-virt (DT)
[   39.305351] Call trace:
[   39.305771]  show_stack+0x20/0x38 (C)
[   39.306216]  dump_stack_lvl+0x8c/0xd0
[   39.306647]  print_report+0x118/0x5e0
[   39.307064]  kasan_report_invalid_free+0xb0/0xd8
[   39.308212]  check_slab_allocation+0xfc/0x108
[   39.311114]  __kasan_mempool_poison_object+0x78/0x150
[   39.311796]  mempool_free+0x28c/0x328
[   39.312341]  mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[   39.314705]  mempool_kmalloc_invalid_free+0xb8/0x110
[   39.315221]  kunit_try_run_case+0x14c/0x3d0
[   39.315705]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.316265]  kthread+0x24c/0x2d0
[   39.319176]  ret_from_fork+0x10/0x20
[   39.319827] 
[   39.320169] Allocated by task 230:
[   39.320951]  kasan_save_stack+0x3c/0x68
[   39.322133]  kasan_save_track+0x20/0x40
[   39.323162]  kasan_save_alloc_info+0x40/0x58
[   39.324269]  __kasan_mempool_unpoison_object+0x11c/0x180
[   39.324935]  remove_element+0x130/0x1f8
[   39.326676]  mempool_alloc_preallocated+0x58/0xc0
[   39.327332]  mempool_kmalloc_invalid_free_helper+0x94/0x2a0
[   39.328113]  mempool_kmalloc_invalid_free+0xb8/0x110
[   39.328895]  kunit_try_run_case+0x14c/0x3d0
[   39.329801]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.330725]  kthread+0x24c/0x2d0
[   39.331177]  ret_from_fork+0x10/0x20
[   39.331638] 
[   39.331916] The buggy address belongs to the object at fff00000c65ba800
[   39.331916]  which belongs to the cache kmalloc-128 of size 128
[   39.333206] The buggy address is located 1 bytes inside of
[   39.333206]  128-byte region [fff00000c65ba800, fff00000c65ba880)
[   39.335097] 
[   39.335432] The buggy address belongs to the physical page:
[   39.336056] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ba
[   39.336759] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.337985] page_type: f5(slab)
[   39.338833] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   39.339758] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   39.340576] page dumped because: kasan: bad access detected
[   39.341242] 
[   39.341586] Memory state around the buggy address:
[   39.342049]  fff00000c65ba700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   39.342925]  fff00000c65ba780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.344350] >fff00000c65ba800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.345702]                    ^
[   39.346186]  fff00000c65ba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.346833]  fff00000c65ba900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.347693] ==================================================================
[   39.359075] ==================================================================
[   39.360187] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[   39.361046] Free of addr fff00000c6c18001 by task kunit_try_catch/232
[   39.362284] 
[   39.363118] CPU: 0 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   39.364075] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.364633] Hardware name: linux,dummy-virt (DT)
[   39.365484] Call trace:
[   39.365861]  show_stack+0x20/0x38 (C)
[   39.366831]  dump_stack_lvl+0x8c/0xd0
[   39.367423]  print_report+0x118/0x5e0
[   39.368311]  kasan_report_invalid_free+0xb0/0xd8
[   39.369048]  __kasan_mempool_poison_object+0xfc/0x150
[   39.369613]  mempool_free+0x28c/0x328
[   39.370264]  mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[   39.371065]  mempool_kmalloc_large_invalid_free+0xb8/0x110
[   39.371927]  kunit_try_run_case+0x14c/0x3d0
[   39.372657]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.373495]  kthread+0x24c/0x2d0
[   39.373996]  ret_from_fork+0x10/0x20
[   39.374536] 
[   39.374929] The buggy address belongs to the physical page:
[   39.375619] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106c18
[   39.376342] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   39.377247] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   39.378052] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   39.378923] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   39.379783] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   39.380585] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   39.381383] head: 0bfffe0000000002 ffffc1ffc31b0601 ffffffffffffffff 0000000000000000
[   39.382149] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   39.383011] page dumped because: kasan: bad access detected
[   39.383638] 
[   39.383971] Memory state around the buggy address:
[   39.384594]  fff00000c6c17f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.385413]  fff00000c6c17f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.386156] >fff00000c6c18000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.386869]                    ^
[   39.387374]  fff00000c6c18080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.388182]  fff00000c6c18100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.388804] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[   39.259923] ==================================================================
[   39.260980] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   39.262887] Free of addr fff00000c6c18000 by task kunit_try_catch/228
[   39.263552] 
[   39.263934] CPU: 0 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   39.265015] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.265622] Hardware name: linux,dummy-virt (DT)
[   39.266113] Call trace:
[   39.266822]  show_stack+0x20/0x38 (C)
[   39.267516]  dump_stack_lvl+0x8c/0xd0
[   39.268054]  print_report+0x118/0x5e0
[   39.268707]  kasan_report_invalid_free+0xb0/0xd8
[   39.269376]  __kasan_mempool_poison_pages+0xe0/0xe8
[   39.270193]  mempool_free+0x24c/0x328
[   39.270704]  mempool_double_free_helper+0x150/0x2e0
[   39.271392]  mempool_page_alloc_double_free+0xb4/0x110
[   39.272111]  kunit_try_run_case+0x14c/0x3d0
[   39.272677]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.273378]  kthread+0x24c/0x2d0
[   39.274017]  ret_from_fork+0x10/0x20
[   39.274663] 
[   39.275333] The buggy address belongs to the physical page:
[   39.276302] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106c18
[   39.277156] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.278083] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   39.279313] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   39.280501] page dumped because: kasan: bad access detected
[   39.281185] 
[   39.281812] Memory state around the buggy address:
[   39.282730]  fff00000c6c17f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.283617]  fff00000c6c17f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.284395] >fff00000c6c18000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.285204]                    ^
[   39.285916]  fff00000c6c18080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.286538]  fff00000c6c18100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.287078] ==================================================================
[   39.216934] ==================================================================
[   39.218660] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   39.219416] Free of addr fff00000c6c18000 by task kunit_try_catch/226
[   39.220053] 
[   39.220501] CPU: 0 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   39.221725] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.222278] Hardware name: linux,dummy-virt (DT)
[   39.222952] Call trace:
[   39.223684]  show_stack+0x20/0x38 (C)
[   39.224166]  dump_stack_lvl+0x8c/0xd0
[   39.224754]  print_report+0x118/0x5e0
[   39.225396]  kasan_report_invalid_free+0xb0/0xd8
[   39.225987]  __kasan_mempool_poison_object+0x14c/0x150
[   39.226925]  mempool_free+0x28c/0x328
[   39.227499]  mempool_double_free_helper+0x150/0x2e0
[   39.228189]  mempool_kmalloc_large_double_free+0xb8/0x110
[   39.229425]  kunit_try_run_case+0x14c/0x3d0
[   39.230271]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.231103]  kthread+0x24c/0x2d0
[   39.231737]  ret_from_fork+0x10/0x20
[   39.232477] 
[   39.232968] The buggy address belongs to the physical page:
[   39.233972] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106c18
[   39.234607] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   39.235389] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   39.236314] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   39.236984] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   39.238062] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   39.238899] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   39.239547] head: 0bfffe0000000002 ffffc1ffc31b0601 ffffffffffffffff 0000000000000000
[   39.240472] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   39.241235] page dumped because: kasan: bad access detected
[   39.242187] 
[   39.242546] Memory state around the buggy address:
[   39.243200]  fff00000c6c17f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.243798]  fff00000c6c17f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.244650] >fff00000c6c18000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.245418]                    ^
[   39.246042]  fff00000c6c18080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.246991]  fff00000c6c18100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.247887] ==================================================================
[   39.156405] ==================================================================
[   39.157419] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   39.158241] Free of addr fff00000c6599a00 by task kunit_try_catch/224
[   39.158917] 
[   39.159263] CPU: 1 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   39.161539] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.162365] Hardware name: linux,dummy-virt (DT)
[   39.163424] Call trace:
[   39.163817]  show_stack+0x20/0x38 (C)
[   39.164369]  dump_stack_lvl+0x8c/0xd0
[   39.164948]  print_report+0x118/0x5e0
[   39.165581]  kasan_report_invalid_free+0xb0/0xd8
[   39.166494]  check_slab_allocation+0xd4/0x108
[   39.166891]  __kasan_mempool_poison_object+0x78/0x150
[   39.167600]  mempool_free+0x28c/0x328
[   39.168152]  mempool_double_free_helper+0x150/0x2e0
[   39.168845]  mempool_kmalloc_double_free+0xb8/0x110
[   39.169421]  kunit_try_run_case+0x14c/0x3d0
[   39.170092]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.170762]  kthread+0x24c/0x2d0
[   39.171256]  ret_from_fork+0x10/0x20
[   39.171825] 
[   39.172164] Allocated by task 224:
[   39.172692]  kasan_save_stack+0x3c/0x68
[   39.173314]  kasan_save_track+0x20/0x40
[   39.174199]  kasan_save_alloc_info+0x40/0x58
[   39.174704]  __kasan_mempool_unpoison_object+0x11c/0x180
[   39.175465]  remove_element+0x130/0x1f8
[   39.176050]  mempool_alloc_preallocated+0x58/0xc0
[   39.176715]  mempool_double_free_helper+0x94/0x2e0
[   39.177319]  mempool_kmalloc_double_free+0xb8/0x110
[   39.177985]  kunit_try_run_case+0x14c/0x3d0
[   39.178507]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.179223]  kthread+0x24c/0x2d0
[   39.179693]  ret_from_fork+0x10/0x20
[   39.180620] 
[   39.181429] Freed by task 224:
[   39.181975]  kasan_save_stack+0x3c/0x68
[   39.182642]  kasan_save_track+0x20/0x40
[   39.183399]  kasan_save_free_info+0x4c/0x78
[   39.184057]  __kasan_mempool_poison_object+0xc0/0x150
[   39.184710]  mempool_free+0x28c/0x328
[   39.185275]  mempool_double_free_helper+0x100/0x2e0
[   39.185912]  mempool_kmalloc_double_free+0xb8/0x110
[   39.186511]  kunit_try_run_case+0x14c/0x3d0
[   39.187053]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.188020]  kthread+0x24c/0x2d0
[   39.188610]  ret_from_fork+0x10/0x20
[   39.189117] 
[   39.189476] The buggy address belongs to the object at fff00000c6599a00
[   39.189476]  which belongs to the cache kmalloc-128 of size 128
[   39.191093] The buggy address is located 0 bytes inside of
[   39.191093]  128-byte region [fff00000c6599a00, fff00000c6599a80)
[   39.192232] 
[   39.192603] The buggy address belongs to the physical page:
[   39.193566] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106599
[   39.194426] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.195106] page_type: f5(slab)
[   39.195667] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   39.196510] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   39.197459] page dumped because: kasan: bad access detected
[   39.198203] 
[   39.198539] Memory state around the buggy address:
[   39.199618]  fff00000c6599900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   39.200706]  fff00000c6599980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.201781] >fff00000c6599a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   39.202762]                    ^
[   39.203341]  fff00000c6599a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.204129]  fff00000c6599b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.204928] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[   39.002076] ==================================================================
[   39.003137] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   39.004299] Read of size 1 at addr fff00000c674c000 by task kunit_try_catch/218
[   39.005008] 
[   39.005318] CPU: 1 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   39.007754] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.008300] Hardware name: linux,dummy-virt (DT)
[   39.008857] Call trace:
[   39.009536]  show_stack+0x20/0x38 (C)
[   39.010358]  dump_stack_lvl+0x8c/0xd0
[   39.010971]  print_report+0x118/0x5e0
[   39.011541]  kasan_report+0xc8/0x118
[   39.012714]  __asan_report_load1_noabort+0x20/0x30
[   39.013633]  mempool_uaf_helper+0x314/0x340
[   39.014517]  mempool_kmalloc_large_uaf+0xbc/0x118
[   39.015142]  kunit_try_run_case+0x14c/0x3d0
[   39.015744]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.016433]  kthread+0x24c/0x2d0
[   39.017007]  ret_from_fork+0x10/0x20
[   39.017965] 
[   39.018228] The buggy address belongs to the physical page:
[   39.018695] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10674c
[   39.019378] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   39.020279] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   39.021094] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   39.022484] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   39.023253] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   39.024248] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   39.025261] head: 0bfffe0000000002 ffffc1ffc319d301 ffffffffffffffff 0000000000000000
[   39.026350] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   39.027590] page dumped because: kasan: bad access detected
[   39.028501] 
[   39.028822] Memory state around the buggy address:
[   39.029619]  fff00000c674bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.030815]  fff00000c674bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.031706] >fff00000c674c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.032706]                    ^
[   39.033357]  fff00000c674c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.034511]  fff00000c674c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.035771] ==================================================================
[   39.119681] ==================================================================
[   39.120734] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   39.121521] Read of size 1 at addr fff00000c67f8000 by task kunit_try_catch/222
[   39.122323] 
[   39.122744] CPU: 1 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   39.124185] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.124777] Hardware name: linux,dummy-virt (DT)
[   39.126404] Call trace:
[   39.126818]  show_stack+0x20/0x38 (C)
[   39.127420]  dump_stack_lvl+0x8c/0xd0
[   39.128034]  print_report+0x118/0x5e0
[   39.128660]  kasan_report+0xc8/0x118
[   39.129158]  __asan_report_load1_noabort+0x20/0x30
[   39.129850]  mempool_uaf_helper+0x314/0x340
[   39.130355]  mempool_page_alloc_uaf+0xb8/0x118
[   39.131014]  kunit_try_run_case+0x14c/0x3d0
[   39.131665]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.132348]  kthread+0x24c/0x2d0
[   39.132856]  ret_from_fork+0x10/0x20
[   39.133324] 
[   39.133689] The buggy address belongs to the physical page:
[   39.134368] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1067f8
[   39.135187] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.136047] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   39.136896] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   39.137703] page dumped because: kasan: bad access detected
[   39.138237] 
[   39.138586] Memory state around the buggy address:
[   39.139173]  fff00000c67f7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.139954]  fff00000c67f7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.140686] >fff00000c67f8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.141473]                    ^
[   39.141952]  fff00000c67f8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.142735]  fff00000c67f8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   39.143553] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[   38.946196] ==================================================================
[   38.947332] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   38.948232] Read of size 1 at addr fff00000c652ee00 by task kunit_try_catch/216
[   38.948886] 
[   38.949340] CPU: 0 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   38.950429] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.951089] Hardware name: linux,dummy-virt (DT)
[   38.951836] Call trace:
[   38.952372]  show_stack+0x20/0x38 (C)
[   38.953025]  dump_stack_lvl+0x8c/0xd0
[   38.953624]  print_report+0x118/0x5e0
[   38.954206]  kasan_report+0xc8/0x118
[   38.954800]  __asan_report_load1_noabort+0x20/0x30
[   38.955433]  mempool_uaf_helper+0x314/0x340
[   38.956087]  mempool_kmalloc_uaf+0xbc/0x118
[   38.956717]  kunit_try_run_case+0x14c/0x3d0
[   38.957386]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.958117]  kthread+0x24c/0x2d0
[   38.958668]  ret_from_fork+0x10/0x20
[   38.959214] 
[   38.959533] Allocated by task 216:
[   38.960049]  kasan_save_stack+0x3c/0x68
[   38.960645]  kasan_save_track+0x20/0x40
[   38.961234]  kasan_save_alloc_info+0x40/0x58
[   38.961900]  __kasan_mempool_unpoison_object+0x11c/0x180
[   38.962540]  remove_element+0x130/0x1f8
[   38.963154]  mempool_alloc_preallocated+0x58/0xc0
[   38.963759]  mempool_uaf_helper+0xa4/0x340
[   38.964389]  mempool_kmalloc_uaf+0xbc/0x118
[   38.964954]  kunit_try_run_case+0x14c/0x3d0
[   38.965617]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.966256]  kthread+0x24c/0x2d0
[   38.966826]  ret_from_fork+0x10/0x20
[   38.967322] 
[   38.967706] Freed by task 216:
[   38.968210]  kasan_save_stack+0x3c/0x68
[   38.968757]  kasan_save_track+0x20/0x40
[   38.969368]  kasan_save_free_info+0x4c/0x78
[   38.969967]  __kasan_mempool_poison_object+0xc0/0x150
[   38.970689]  mempool_free+0x28c/0x328
[   38.971181]  mempool_uaf_helper+0x104/0x340
[   38.971827]  mempool_kmalloc_uaf+0xbc/0x118
[   38.972414]  kunit_try_run_case+0x14c/0x3d0
[   38.973023]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.973674]  kthread+0x24c/0x2d0
[   38.974233]  ret_from_fork+0x10/0x20
[   38.974760] 
[   38.975085] The buggy address belongs to the object at fff00000c652ee00
[   38.975085]  which belongs to the cache kmalloc-128 of size 128
[   38.976383] The buggy address is located 0 bytes inside of
[   38.976383]  freed 128-byte region [fff00000c652ee00, fff00000c652ee80)
[   38.977617] 
[   38.977975] The buggy address belongs to the physical page:
[   38.978701] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10652e
[   38.979628] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.980433] page_type: f5(slab)
[   38.980961] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   38.981863] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   38.982699] page dumped because: kasan: bad access detected
[   38.983325] 
[   38.983692] Memory state around the buggy address:
[   38.984346]  fff00000c652ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   38.985119]  fff00000c652ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.985886] >fff00000c652ee00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   38.986648]                    ^
[   38.987101]  fff00000c652ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.987919]  fff00000c652ef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.988806] ==================================================================
[   39.049087] ==================================================================
[   39.050278] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   39.051162] Read of size 1 at addr fff00000c1bed240 by task kunit_try_catch/220
[   39.051997] 
[   39.052384] CPU: 1 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   39.053652] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.055076] Hardware name: linux,dummy-virt (DT)
[   39.055571] Call trace:
[   39.055867]  show_stack+0x20/0x38 (C)
[   39.056355]  dump_stack_lvl+0x8c/0xd0
[   39.057055]  print_report+0x118/0x5e0
[   39.057627]  kasan_report+0xc8/0x118
[   39.058106]  __asan_report_load1_noabort+0x20/0x30
[   39.058833]  mempool_uaf_helper+0x314/0x340
[   39.059467]  mempool_slab_uaf+0xb8/0x110
[   39.060019]  kunit_try_run_case+0x14c/0x3d0
[   39.060986]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.061714]  kthread+0x24c/0x2d0
[   39.062190]  ret_from_fork+0x10/0x20
[   39.063110] 
[   39.063409] Allocated by task 220:
[   39.064162]  kasan_save_stack+0x3c/0x68
[   39.064779]  kasan_save_track+0x20/0x40
[   39.065412]  kasan_save_alloc_info+0x40/0x58
[   39.066857]  __kasan_mempool_unpoison_object+0xbc/0x180
[   39.067556]  remove_element+0x16c/0x1f8
[   39.068134]  mempool_alloc_preallocated+0x58/0xc0
[   39.068796]  mempool_uaf_helper+0xa4/0x340
[   39.069313]  mempool_slab_uaf+0xb8/0x110
[   39.070226]  kunit_try_run_case+0x14c/0x3d0
[   39.070732]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.071410]  kthread+0x24c/0x2d0
[   39.071849]  ret_from_fork+0x10/0x20
[   39.072847] 
[   39.073194] Freed by task 220:
[   39.073769]  kasan_save_stack+0x3c/0x68
[   39.074421]  kasan_save_track+0x20/0x40
[   39.075042]  kasan_save_free_info+0x4c/0x78
[   39.075712]  __kasan_mempool_poison_object+0xc0/0x150
[   39.076548]  mempool_free+0x28c/0x328
[   39.077199]  mempool_uaf_helper+0x104/0x340
[   39.078247]  mempool_slab_uaf+0xb8/0x110
[   39.078977]  kunit_try_run_case+0x14c/0x3d0
[   39.079585]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.080319]  kthread+0x24c/0x2d0
[   39.081210]  ret_from_fork+0x10/0x20
[   39.081816] 
[   39.082211] The buggy address belongs to the object at fff00000c1bed240
[   39.082211]  which belongs to the cache test_cache of size 123
[   39.083506] The buggy address is located 0 bytes inside of
[   39.083506]  freed 123-byte region [fff00000c1bed240, fff00000c1bed2bb)
[   39.084766] 
[   39.085226] The buggy address belongs to the physical page:
[   39.086266] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bed
[   39.088052] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.088935] page_type: f5(slab)
[   39.089588] raw: 0bfffe0000000000 fff00000c59d3a00 dead000000000122 0000000000000000
[   39.090609] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000
[   39.091585] page dumped because: kasan: bad access detected
[   39.092181] 
[   39.092489] Memory state around the buggy address:
[   39.093242]  fff00000c1bed100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.094464]  fff00000c1bed180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   39.095307] >fff00000c1bed200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   39.096588]                                            ^
[   39.097129]  fff00000c1bed280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.097800]  fff00000c1bed300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.098364] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[   38.785156] ==================================================================
[   38.786373] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   38.788182] Read of size 1 at addr fff00000c1bf0f73 by task kunit_try_catch/210
[   38.789454] 
[   38.790505] CPU: 1 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   38.792296] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.792858] Hardware name: linux,dummy-virt (DT)
[   38.793764] Call trace:
[   38.794305]  show_stack+0x20/0x38 (C)
[   38.794984]  dump_stack_lvl+0x8c/0xd0
[   38.795513]  print_report+0x118/0x5e0
[   38.796149]  kasan_report+0xc8/0x118
[   38.796785]  __asan_report_load1_noabort+0x20/0x30
[   38.797508]  mempool_oob_right_helper+0x2ac/0x2f0
[   38.797989]  mempool_kmalloc_oob_right+0xbc/0x118
[   38.798663]  kunit_try_run_case+0x14c/0x3d0
[   38.799200]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.799970]  kthread+0x24c/0x2d0
[   38.800551]  ret_from_fork+0x10/0x20
[   38.801146] 
[   38.801465] Allocated by task 210:
[   38.802192]  kasan_save_stack+0x3c/0x68
[   38.802723]  kasan_save_track+0x20/0x40
[   38.803171]  kasan_save_alloc_info+0x40/0x58
[   38.803795]  __kasan_mempool_unpoison_object+0x11c/0x180
[   38.804385]  remove_element+0x130/0x1f8
[   38.805016]  mempool_alloc_preallocated+0x58/0xc0
[   38.805541]  mempool_oob_right_helper+0x98/0x2f0
[   38.806551]  mempool_kmalloc_oob_right+0xbc/0x118
[   38.807198]  kunit_try_run_case+0x14c/0x3d0
[   38.807776]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.808396]  kthread+0x24c/0x2d0
[   38.808938]  ret_from_fork+0x10/0x20
[   38.809675] 
[   38.810057] The buggy address belongs to the object at fff00000c1bf0f00
[   38.810057]  which belongs to the cache kmalloc-128 of size 128
[   38.811738] The buggy address is located 0 bytes to the right of
[   38.811738]  allocated 115-byte region [fff00000c1bf0f00, fff00000c1bf0f73)
[   38.813039] 
[   38.813586] The buggy address belongs to the physical page:
[   38.814578] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bf0
[   38.815577] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.816257] page_type: f5(slab)
[   38.816795] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   38.817921] raw: 0000000000000000 0000000000100010 00000001f5000000 0000000000000000
[   38.818684] page dumped because: kasan: bad access detected
[   38.819294] 
[   38.820006] Memory state around the buggy address:
[   38.820527]  fff00000c1bf0e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   38.821909]  fff00000c1bf0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.822619] >fff00000c1bf0f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   38.823310]                                                              ^
[   38.824084]  fff00000c1bf0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.824876]  fff00000c1bf1000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   38.826211] ==================================================================
[   38.885066] ==================================================================
[   38.886552] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   38.887648] Read of size 1 at addr fff00000c65cd2bb by task kunit_try_catch/214
[   38.888795] 
[   38.889200] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   38.890633] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.891216] Hardware name: linux,dummy-virt (DT)
[   38.891765] Call trace:
[   38.892193]  show_stack+0x20/0x38 (C)
[   38.892795]  dump_stack_lvl+0x8c/0xd0
[   38.893675]  print_report+0x118/0x5e0
[   38.894139]  kasan_report+0xc8/0x118
[   38.894671]  __asan_report_load1_noabort+0x20/0x30
[   38.895335]  mempool_oob_right_helper+0x2ac/0x2f0
[   38.895946]  mempool_slab_oob_right+0xb8/0x110
[   38.896536]  kunit_try_run_case+0x14c/0x3d0
[   38.897098]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.898175]  kthread+0x24c/0x2d0
[   38.898657]  ret_from_fork+0x10/0x20
[   38.899239] 
[   38.899702] Allocated by task 214:
[   38.900109]  kasan_save_stack+0x3c/0x68
[   38.900725]  kasan_save_track+0x20/0x40
[   38.901615]  kasan_save_alloc_info+0x40/0x58
[   38.902237]  __kasan_mempool_unpoison_object+0xbc/0x180
[   38.902829]  remove_element+0x16c/0x1f8
[   38.903410]  mempool_alloc_preallocated+0x58/0xc0
[   38.904022]  mempool_oob_right_helper+0x98/0x2f0
[   38.904683]  mempool_slab_oob_right+0xb8/0x110
[   38.905888]  kunit_try_run_case+0x14c/0x3d0
[   38.906412]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.907069]  kthread+0x24c/0x2d0
[   38.907564]  ret_from_fork+0x10/0x20
[   38.908091] 
[   38.908435] The buggy address belongs to the object at fff00000c65cd240
[   38.908435]  which belongs to the cache test_cache of size 123
[   38.909570] The buggy address is located 0 bytes to the right of
[   38.909570]  allocated 123-byte region [fff00000c65cd240, fff00000c65cd2bb)
[   38.911405] 
[   38.911788] The buggy address belongs to the physical page:
[   38.912602] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065cd
[   38.913986] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.914772] page_type: f5(slab)
[   38.915147] raw: 0bfffe0000000000 fff00000c652d3c0 dead000000000122 0000000000000000
[   38.916058] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000
[   38.916765] page dumped because: kasan: bad access detected
[   38.917479] 
[   38.917820] Memory state around the buggy address:
[   38.918688]  fff00000c65cd180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   38.919647]  fff00000c65cd200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   38.920461] >fff00000c65cd280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   38.921231]                                         ^
[   38.921840]  fff00000c65cd300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.922621]  fff00000c65cd380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.923473] ==================================================================
[   38.839570] ==================================================================
[   38.840503] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   38.841293] Read of size 1 at addr fff00000c674e001 by task kunit_try_catch/212
[   38.841868] 
[   38.842187] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   38.843971] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.844586] Hardware name: linux,dummy-virt (DT)
[   38.845801] Call trace:
[   38.846266]  show_stack+0x20/0x38 (C)
[   38.847237]  dump_stack_lvl+0x8c/0xd0
[   38.848175]  print_report+0x118/0x5e0
[   38.848845]  kasan_report+0xc8/0x118
[   38.849491]  __asan_report_load1_noabort+0x20/0x30
[   38.850248]  mempool_oob_right_helper+0x2ac/0x2f0
[   38.851037]  mempool_kmalloc_large_oob_right+0xbc/0x118
[   38.851763]  kunit_try_run_case+0x14c/0x3d0
[   38.852333]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.853030]  kthread+0x24c/0x2d0
[   38.853869]  ret_from_fork+0x10/0x20
[   38.854274] 
[   38.854547] The buggy address belongs to the physical page:
[   38.855049] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10674c
[   38.855771] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   38.856667] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   38.857546] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   38.858757] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   38.859478] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   38.860389] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   38.861862] head: 0bfffe0000000002 ffffc1ffc319d301 ffffffffffffffff 0000000000000000
[   38.862463] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   38.863058] page dumped because: kasan: bad access detected
[   38.863966] 
[   38.864298] Memory state around the buggy address:
[   38.864929]  fff00000c674df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.865757]  fff00000c674df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.866851] >fff00000c674e000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   38.867819]                    ^
[   38.868511]  fff00000c674e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   38.869558]  fff00000c674e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   38.870605] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[   38.160045] ==================================================================
[   38.160965] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x17c/0x2f8
[   38.162818] Read of size 1 at addr fff00000c59d3780 by task kunit_try_catch/204
[   38.163772] 
[   38.164280] CPU: 1 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   38.165384] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.165822] Hardware name: linux,dummy-virt (DT)
[   38.166456] Call trace:
[   38.167007]  show_stack+0x20/0x38 (C)
[   38.167779]  dump_stack_lvl+0x8c/0xd0
[   38.168494]  print_report+0x118/0x5e0
[   38.168985]  kasan_report+0xc8/0x118
[   38.169594]  __kasan_check_byte+0x54/0x70
[   38.170146]  kmem_cache_destroy+0x34/0x218
[   38.170768]  kmem_cache_double_destroy+0x17c/0x2f8
[   38.171389]  kunit_try_run_case+0x14c/0x3d0
[   38.171934]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.172712]  kthread+0x24c/0x2d0
[   38.173930]  ret_from_fork+0x10/0x20
[   38.174639] 
[   38.174950] Allocated by task 204:
[   38.175480]  kasan_save_stack+0x3c/0x68
[   38.176057]  kasan_save_track+0x20/0x40
[   38.176913]  kasan_save_alloc_info+0x40/0x58
[   38.177499]  __kasan_slab_alloc+0xa8/0xb0
[   38.178025]  kmem_cache_alloc_noprof+0x108/0x3a0
[   38.179067]  __kmem_cache_create_args+0x18c/0x2b0
[   38.179732]  kmem_cache_double_destroy+0xc8/0x2f8
[   38.180369]  kunit_try_run_case+0x14c/0x3d0
[   38.181113]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.182311]  kthread+0x24c/0x2d0
[   38.182722]  ret_from_fork+0x10/0x20
[   38.183178] 
[   38.183545] Freed by task 204:
[   38.184024]  kasan_save_stack+0x3c/0x68
[   38.184619]  kasan_save_track+0x20/0x40
[   38.185183]  kasan_save_free_info+0x4c/0x78
[   38.186192]  __kasan_slab_free+0x6c/0x98
[   38.186786]  kmem_cache_free+0x118/0x470
[   38.187290]  slab_kmem_cache_release+0x38/0x50
[   38.188028]  kmem_cache_release+0x1c/0x30
[   38.188635]  kobject_put+0x17c/0x430
[   38.189192]  sysfs_slab_release+0x1c/0x30
[   38.190705]  kmem_cache_destroy+0x118/0x218
[   38.191217]  kmem_cache_double_destroy+0x130/0x2f8
[   38.191576]  kunit_try_run_case+0x14c/0x3d0
[   38.191837]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.192128]  kthread+0x24c/0x2d0
[   38.192353]  ret_from_fork+0x10/0x20
[   38.192844] 
[   38.193189] The buggy address belongs to the object at fff00000c59d3780
[   38.193189]  which belongs to the cache kmem_cache of size 208
[   38.195114] The buggy address is located 0 bytes inside of
[   38.195114]  freed 208-byte region [fff00000c59d3780, fff00000c59d3850)
[   38.196660] 
[   38.197035] The buggy address belongs to the physical page:
[   38.198180] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059d3
[   38.198835] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.199647] page_type: f5(slab)
[   38.200310] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000
[   38.201171] raw: 0000000000000000 00000000800c000c 00000001f5000000 0000000000000000
[   38.201950] page dumped because: kasan: bad access detected
[   38.203050] 
[   38.203364] Memory state around the buggy address:
[   38.203898]  fff00000c59d3680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   38.204726]  fff00000c59d3700: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.205837] >fff00000c59d3780: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   38.207083]                    ^
[   38.207618]  fff00000c59d3800: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   38.208691]  fff00000c59d3880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.209520] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[   38.058115] ==================================================================
[   38.059118] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x390/0x468
[   38.059913] Read of size 1 at addr fff00000c65c1000 by task kunit_try_catch/202
[   38.060754] 
[   38.061131] CPU: 0 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   38.062654] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.063075] Hardware name: linux,dummy-virt (DT)
[   38.063657] Call trace:
[   38.064080]  show_stack+0x20/0x38 (C)
[   38.064703]  dump_stack_lvl+0x8c/0xd0
[   38.065292]  print_report+0x118/0x5e0
[   38.066312]  kasan_report+0xc8/0x118
[   38.066884]  __asan_report_load1_noabort+0x20/0x30
[   38.067486]  kmem_cache_rcu_uaf+0x390/0x468
[   38.068101]  kunit_try_run_case+0x14c/0x3d0
[   38.068633]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.069554]  kthread+0x24c/0x2d0
[   38.070137]  ret_from_fork+0x10/0x20
[   38.070667] 
[   38.070977] Allocated by task 202:
[   38.071482]  kasan_save_stack+0x3c/0x68
[   38.072050]  kasan_save_track+0x20/0x40
[   38.072631]  kasan_save_alloc_info+0x40/0x58
[   38.073226]  __kasan_slab_alloc+0xa8/0xb0
[   38.074100]  kmem_cache_alloc_noprof+0x108/0x3a0
[   38.075037]  kmem_cache_rcu_uaf+0x12c/0x468
[   38.075622]  kunit_try_run_case+0x14c/0x3d0
[   38.076194]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.076899]  kthread+0x24c/0x2d0
[   38.077782]  ret_from_fork+0x10/0x20
[   38.078515] 
[   38.078866] Freed by task 0:
[   38.079285]  kasan_save_stack+0x3c/0x68
[   38.079884]  kasan_save_track+0x20/0x40
[   38.080566]  kasan_save_free_info+0x4c/0x78
[   38.081268]  __kasan_slab_free+0x6c/0x98
[   38.081920]  slab_free_after_rcu_debug+0xd4/0x2f8
[   38.082570]  rcu_core+0xa54/0x1df8
[   38.083560]  rcu_core_si+0x18/0x30
[   38.083957]  handle_softirqs+0x374/0xb20
[   38.084482]  __do_softirq+0x1c/0x28
[   38.085618] 
[   38.085907] Last potentially related work creation:
[   38.086768]  kasan_save_stack+0x3c/0x68
[   38.087274]  __kasan_record_aux_stack+0xbc/0xe8
[   38.087932]  kasan_record_aux_stack_noalloc+0x14/0x20
[   38.088523]  kmem_cache_free+0x28c/0x470
[   38.089104]  kmem_cache_rcu_uaf+0x16c/0x468
[   38.089685]  kunit_try_run_case+0x14c/0x3d0
[   38.090301]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.091034]  kthread+0x24c/0x2d0
[   38.091848]  ret_from_fork+0x10/0x20
[   38.092432] 
[   38.092784] The buggy address belongs to the object at fff00000c65c1000
[   38.092784]  which belongs to the cache test_cache of size 200
[   38.094373] The buggy address is located 0 bytes inside of
[   38.094373]  freed 200-byte region [fff00000c65c1000, fff00000c65c10c8)
[   38.095647] 
[   38.095972] The buggy address belongs to the physical page:
[   38.096592] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c1
[   38.097908] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.098775] page_type: f5(slab)
[   38.099248] raw: 0bfffe0000000000 fff00000c652d140 dead000000000122 0000000000000000
[   38.100010] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000
[   38.100879] page dumped because: kasan: bad access detected
[   38.102010] 
[   38.102618] Memory state around the buggy address:
[   38.103052]  fff00000c65c0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.103978]  fff00000c65c0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.104747] >fff00000c65c1000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   38.106207]                    ^
[   38.106804]  fff00000c65c1080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   38.107161]  fff00000c65c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.107576] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   37.936519] ==================================================================
[   37.937416] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3b8
[   37.938844] Free of addr fff00000c65af001 by task kunit_try_catch/200
[   37.940097] 
[   37.940492] CPU: 1 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   37.941694] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.942197] Hardware name: linux,dummy-virt (DT)
[   37.942755] Call trace:
[   37.943181]  show_stack+0x20/0x38 (C)
[   37.943693]  dump_stack_lvl+0x8c/0xd0
[   37.944294]  print_report+0x118/0x5e0
[   37.944909]  kasan_report_invalid_free+0xb0/0xd8
[   37.945765]  check_slab_allocation+0xfc/0x108
[   37.946331]  __kasan_slab_pre_free+0x2c/0x48
[   37.946846]  kmem_cache_free+0xf0/0x470
[   37.947308]  kmem_cache_invalid_free+0x184/0x3b8
[   37.947970]  kunit_try_run_case+0x14c/0x3d0
[   37.948504]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.949228]  kthread+0x24c/0x2d0
[   37.950154]  ret_from_fork+0x10/0x20
[   37.950695] 
[   37.951033] Allocated by task 200:
[   37.951533]  kasan_save_stack+0x3c/0x68
[   37.952115]  kasan_save_track+0x20/0x40
[   37.952704]  kasan_save_alloc_info+0x40/0x58
[   37.953309]  __kasan_slab_alloc+0xa8/0xb0
[   37.954087]  kmem_cache_alloc_noprof+0x108/0x3a0
[   37.954672]  kmem_cache_invalid_free+0x12c/0x3b8
[   37.955223]  kunit_try_run_case+0x14c/0x3d0
[   37.955938]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.956645]  kthread+0x24c/0x2d0
[   37.957137]  ret_from_fork+0x10/0x20
[   37.958285] 
[   37.958578] The buggy address belongs to the object at fff00000c65af000
[   37.958578]  which belongs to the cache test_cache of size 200
[   37.959843] The buggy address is located 1 bytes inside of
[   37.959843]  200-byte region [fff00000c65af000, fff00000c65af0c8)
[   37.961281] 
[   37.961671] The buggy address belongs to the physical page:
[   37.962622] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065af
[   37.963438] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.964247] page_type: f5(slab)
[   37.964722] raw: 0bfffe0000000000 fff00000c59d3640 dead000000000122 0000000000000000
[   37.965764] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000
[   37.966830] page dumped because: kasan: bad access detected
[   37.967483] 
[   37.967815] Memory state around the buggy address:
[   37.968452]  fff00000c65aef00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.969213]  fff00000c65aef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.970095] >fff00000c65af000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.970916]                    ^
[   37.971361]  fff00000c65af080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   37.972170]  fff00000c65af100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.973077] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   37.863277] ==================================================================
[   37.863930] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   37.864293] Free of addr fff00000c652a000 by task kunit_try_catch/198
[   37.864612] 
[   37.864818] CPU: 0 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   37.867014] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.867495] Hardware name: linux,dummy-virt (DT)
[   37.868099] Call trace:
[   37.868544]  show_stack+0x20/0x38 (C)
[   37.869102]  dump_stack_lvl+0x8c/0xd0
[   37.870694]  print_report+0x118/0x5e0
[   37.871431]  kasan_report_invalid_free+0xb0/0xd8
[   37.872001]  check_slab_allocation+0xd4/0x108
[   37.872573]  __kasan_slab_pre_free+0x2c/0x48
[   37.873204]  kmem_cache_free+0xf0/0x470
[   37.873752]  kmem_cache_double_free+0x190/0x3c8
[   37.874376]  kunit_try_run_case+0x14c/0x3d0
[   37.874893]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.876112]  kthread+0x24c/0x2d0
[   37.876572]  ret_from_fork+0x10/0x20
[   37.877070] 
[   37.877395] Allocated by task 198:
[   37.877894]  kasan_save_stack+0x3c/0x68
[   37.878340]  kasan_save_track+0x20/0x40
[   37.879628]  kasan_save_alloc_info+0x40/0x58
[   37.880165]  __kasan_slab_alloc+0xa8/0xb0
[   37.880744]  kmem_cache_alloc_noprof+0x108/0x3a0
[   37.881401]  kmem_cache_double_free+0x12c/0x3c8
[   37.882370]  kunit_try_run_case+0x14c/0x3d0
[   37.883106]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.883911]  kthread+0x24c/0x2d0
[   37.884625]  ret_from_fork+0x10/0x20
[   37.885178] 
[   37.885917] Freed by task 198:
[   37.886399]  kasan_save_stack+0x3c/0x68
[   37.886945]  kasan_save_track+0x20/0x40
[   37.887406]  kasan_save_free_info+0x4c/0x78
[   37.888014]  __kasan_slab_free+0x6c/0x98
[   37.888520]  kmem_cache_free+0x118/0x470
[   37.889103]  kmem_cache_double_free+0x140/0x3c8
[   37.889755]  kunit_try_run_case+0x14c/0x3d0
[   37.890571]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.891395]  kthread+0x24c/0x2d0
[   37.892403]  ret_from_fork+0x10/0x20
[   37.893045] 
[   37.893712] The buggy address belongs to the object at fff00000c652a000
[   37.893712]  which belongs to the cache test_cache of size 200
[   37.894861] The buggy address is located 0 bytes inside of
[   37.894861]  200-byte region [fff00000c652a000, fff00000c652a0c8)
[   37.895837] 
[   37.896180] The buggy address belongs to the physical page:
[   37.896877] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10652a
[   37.898059] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.899021] page_type: f5(slab)
[   37.900108] raw: 0bfffe0000000000 fff00000c652d000 dead000000000122 0000000000000000
[   37.901057] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000
[   37.901802] page dumped because: kasan: bad access detected
[   37.902891] 
[   37.903256] Memory state around the buggy address:
[   37.903821]  fff00000c6529f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.904578]  fff00000c6529f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.905539] >fff00000c652a000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.906579]                    ^
[   37.907263]  fff00000c652a080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   37.908543]  fff00000c652a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.909610] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   37.775874] ==================================================================
[   37.777892] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x33c/0x428
[   37.778811] Read of size 1 at addr fff00000c65a40c8 by task kunit_try_catch/196
[   37.779434] 
[   37.779827] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   37.780975] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.782147] Hardware name: linux,dummy-virt (DT)
[   37.782692] Call trace:
[   37.783104]  show_stack+0x20/0x38 (C)
[   37.783682]  dump_stack_lvl+0x8c/0xd0
[   37.784285]  print_report+0x118/0x5e0
[   37.784831]  kasan_report+0xc8/0x118
[   37.785751]  __asan_report_load1_noabort+0x20/0x30
[   37.786607]  kmem_cache_oob+0x33c/0x428
[   37.787124]  kunit_try_run_case+0x14c/0x3d0
[   37.787813]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.788539]  kthread+0x24c/0x2d0
[   37.788973]  ret_from_fork+0x10/0x20
[   37.789491] 
[   37.790033] Allocated by task 196:
[   37.790559]  kasan_save_stack+0x3c/0x68
[   37.791084]  kasan_save_track+0x20/0x40
[   37.791887]  kasan_save_alloc_info+0x40/0x58
[   37.792526]  __kasan_slab_alloc+0xa8/0xb0
[   37.793109]  kmem_cache_alloc_noprof+0x108/0x3a0
[   37.794213]  kmem_cache_oob+0x12c/0x428
[   37.794679]  kunit_try_run_case+0x14c/0x3d0
[   37.795274]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.795934]  kthread+0x24c/0x2d0
[   37.796477]  ret_from_fork+0x10/0x20
[   37.797010] 
[   37.797615] The buggy address belongs to the object at fff00000c65a4000
[   37.797615]  which belongs to the cache test_cache of size 200
[   37.798490] The buggy address is located 0 bytes to the right of
[   37.798490]  allocated 200-byte region [fff00000c65a4000, fff00000c65a40c8)
[   37.799835] 
[   37.800192] The buggy address belongs to the physical page:
[   37.800904] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065a4
[   37.802373] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.803209] page_type: f5(slab)
[   37.803775] raw: 0bfffe0000000000 fff00000c1b21dc0 dead000000000122 0000000000000000
[   37.804710] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000
[   37.805544] page dumped because: kasan: bad access detected
[   37.806640] 
[   37.807005] Memory state around the buggy address:
[   37.807506]  fff00000c65a3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.808352]  fff00000c65a4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.809176] >fff00000c65a4080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   37.810236]                                               ^
[   37.810926]  fff00000c65a4100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.811759]  fff00000c65a4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.812584] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
[   37.254926] ==================================================================
[   37.256002] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   37.256771] Free of addr fff00000c5a3bf20 by task kunit_try_catch/181
[   37.257419] 
[   37.257783] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   37.259279] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.260138] Hardware name: linux,dummy-virt (DT)
[   37.260735] Call trace:
[   37.261095]  show_stack+0x20/0x38 (C)
[   37.261685]  dump_stack_lvl+0x8c/0xd0
[   37.262293]  print_report+0x118/0x5e0
[   37.262892]  kasan_report_invalid_free+0xb0/0xd8
[   37.263521]  check_slab_allocation+0xd4/0x108
[   37.264100]  __kasan_slab_pre_free+0x2c/0x48
[   37.264715]  kfree+0xe8/0x3d0
[   37.265181]  kfree_sensitive+0x3c/0xb0
[   37.265838]  kmalloc_double_kzfree+0x168/0x308
[   37.266549]  kunit_try_run_case+0x14c/0x3d0
[   37.267222]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.267901]  kthread+0x24c/0x2d0
[   37.268618]  ret_from_fork+0x10/0x20
[   37.269090] 
[   37.269424] Allocated by task 181:
[   37.269951]  kasan_save_stack+0x3c/0x68
[   37.270460]  kasan_save_track+0x20/0x40
[   37.271037]  kasan_save_alloc_info+0x40/0x58
[   37.271586]  __kasan_kmalloc+0xd4/0xd8
[   37.272194]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.272909]  kmalloc_double_kzfree+0xb8/0x308
[   37.273540]  kunit_try_run_case+0x14c/0x3d0
[   37.274097]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.274812]  kthread+0x24c/0x2d0
[   37.275240]  ret_from_fork+0x10/0x20
[   37.275729] 
[   37.276083] Freed by task 181:
[   37.276499]  kasan_save_stack+0x3c/0x68
[   37.277068]  kasan_save_track+0x20/0x40
[   37.277648]  kasan_save_free_info+0x4c/0x78
[   37.278160]  __kasan_slab_free+0x6c/0x98
[   37.278759]  kfree+0x114/0x3d0
[   37.279273]  kfree_sensitive+0x80/0xb0
[   37.279853]  kmalloc_double_kzfree+0x11c/0x308
[   37.280367]  kunit_try_run_case+0x14c/0x3d0
[   37.280997]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.281663]  kthread+0x24c/0x2d0
[   37.282122]  ret_from_fork+0x10/0x20
[   37.282694] 
[   37.283065] The buggy address belongs to the object at fff00000c5a3bf20
[   37.283065]  which belongs to the cache kmalloc-16 of size 16
[   37.284257] The buggy address is located 0 bytes inside of
[   37.284257]  16-byte region [fff00000c5a3bf20, fff00000c5a3bf30)
[   37.285302] 
[   37.285665] The buggy address belongs to the physical page:
[   37.286358] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a3b
[   37.287212] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.287966] page_type: f5(slab)
[   37.288539] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   37.289324] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   37.290101] page dumped because: kasan: bad access detected
[   37.290814] 
[   37.291150] Memory state around the buggy address:
[   37.291750]  fff00000c5a3be00: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   37.292537]  fff00000c5a3be80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   37.293248] >fff00000c5a3bf00: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   37.294089]                                ^
[   37.294583]  fff00000c5a3bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.295366]  fff00000c5a3c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.296105] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[   37.210800] ==================================================================
[   37.212269] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   37.213321] Read of size 1 at addr fff00000c5a3bf20 by task kunit_try_catch/181
[   37.215004] 
[   37.215381] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   37.216432] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.217016] Hardware name: linux,dummy-virt (DT)
[   37.217557] Call trace:
[   37.217970]  show_stack+0x20/0x38 (C)
[   37.218614]  dump_stack_lvl+0x8c/0xd0
[   37.219152]  print_report+0x118/0x5e0
[   37.219766]  kasan_report+0xc8/0x118
[   37.220336]  __kasan_check_byte+0x54/0x70
[   37.220903]  kfree_sensitive+0x30/0xb0
[   37.221487]  kmalloc_double_kzfree+0x168/0x308
[   37.222078]  kunit_try_run_case+0x14c/0x3d0
[   37.222653]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.223323]  kthread+0x24c/0x2d0
[   37.223891]  ret_from_fork+0x10/0x20
[   37.224489] 
[   37.224780] Allocated by task 181:
[   37.225280]  kasan_save_stack+0x3c/0x68
[   37.225863]  kasan_save_track+0x20/0x40
[   37.226416]  kasan_save_alloc_info+0x40/0x58
[   37.226930]  __kasan_kmalloc+0xd4/0xd8
[   37.227505]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.228106]  kmalloc_double_kzfree+0xb8/0x308
[   37.228705]  kunit_try_run_case+0x14c/0x3d0
[   37.229318]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.229894]  kthread+0x24c/0x2d0
[   37.230406]  ret_from_fork+0x10/0x20
[   37.230942] 
[   37.231276] Freed by task 181:
[   37.231754]  kasan_save_stack+0x3c/0x68
[   37.232285]  kasan_save_track+0x20/0x40
[   37.232800]  kasan_save_free_info+0x4c/0x78
[   37.233396]  __kasan_slab_free+0x6c/0x98
[   37.234001]  kfree+0x114/0x3d0
[   37.234534]  kfree_sensitive+0x80/0xb0
[   37.235093]  kmalloc_double_kzfree+0x11c/0x308
[   37.235565]  kunit_try_run_case+0x14c/0x3d0
[   37.235843]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.236133]  kthread+0x24c/0x2d0
[   37.236360]  ret_from_fork+0x10/0x20
[   37.236969] 
[   37.237255] The buggy address belongs to the object at fff00000c5a3bf20
[   37.237255]  which belongs to the cache kmalloc-16 of size 16
[   37.238377] The buggy address is located 0 bytes inside of
[   37.238377]  freed 16-byte region [fff00000c5a3bf20, fff00000c5a3bf30)
[   37.239283] 
[   37.239590] The buggy address belongs to the physical page:
[   37.240289] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a3b
[   37.241222] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.242043] page_type: f5(slab)
[   37.242585] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   37.243505] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   37.244268] page dumped because: kasan: bad access detected
[   37.244894] 
[   37.245231] Memory state around the buggy address:
[   37.245875]  fff00000c5a3be00: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   37.246557]  fff00000c5a3be80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   37.247404] >fff00000c5a3bf00: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   37.248254]                                ^
[   37.248859]  fff00000c5a3bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.249725]  fff00000c5a3c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.250494] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[   37.087831] ==================================================================
[   37.088758] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   37.090806] Write of size 33 at addr fff00000c659f680 by task kunit_try_catch/175
[   37.091605] 
[   37.091986] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   37.092971] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.093593] Hardware name: linux,dummy-virt (DT)
[   37.094183] Call trace:
[   37.095059]  show_stack+0x20/0x38 (C)
[   37.095638]  dump_stack_lvl+0x8c/0xd0
[   37.096184]  print_report+0x118/0x5e0
[   37.096723]  kasan_report+0xc8/0x118
[   37.097813]  kasan_check_range+0x100/0x1a8
[   37.098320]  __asan_memset+0x34/0x78
[   37.098844]  kmalloc_uaf_memset+0x170/0x310
[   37.099364]  kunit_try_run_case+0x14c/0x3d0
[   37.100011]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.100681]  kthread+0x24c/0x2d0
[   37.101764]  ret_from_fork+0x10/0x20
[   37.102279] 
[   37.102635] Allocated by task 175:
[   37.103049]  kasan_save_stack+0x3c/0x68
[   37.103376]  kasan_save_track+0x20/0x40
[   37.103811]  kasan_save_alloc_info+0x40/0x58
[   37.104396]  __kasan_kmalloc+0xd4/0xd8
[   37.104871]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.105544]  kmalloc_uaf_memset+0xb8/0x310
[   37.106135]  kunit_try_run_case+0x14c/0x3d0
[   37.106811]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.107534]  kthread+0x24c/0x2d0
[   37.108060]  ret_from_fork+0x10/0x20
[   37.109180] 
[   37.109550] Freed by task 175:
[   37.109976]  kasan_save_stack+0x3c/0x68
[   37.110578]  kasan_save_track+0x20/0x40
[   37.111161]  kasan_save_free_info+0x4c/0x78
[   37.112196]  __kasan_slab_free+0x6c/0x98
[   37.112749]  kfree+0x114/0x3d0
[   37.113815]  kmalloc_uaf_memset+0x11c/0x310
[   37.114315]  kunit_try_run_case+0x14c/0x3d0
[   37.114933]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.115574]  kthread+0x24c/0x2d0
[   37.116097]  ret_from_fork+0x10/0x20
[   37.116650] 
[   37.116950] The buggy address belongs to the object at fff00000c659f680
[   37.116950]  which belongs to the cache kmalloc-64 of size 64
[   37.118659] The buggy address is located 0 bytes inside of
[   37.118659]  freed 64-byte region [fff00000c659f680, fff00000c659f6c0)
[   37.119775] 
[   37.120117] The buggy address belongs to the physical page:
[   37.120774] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659f
[   37.122259] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.123012] page_type: f5(slab)
[   37.123478] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.124242] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.125004] page dumped because: kasan: bad access detected
[   37.126257] 
[   37.126631] Memory state around the buggy address:
[   37.127244]  fff00000c659f580: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.128482]  fff00000c659f600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.129845] >fff00000c659f680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.130524]                    ^
[   37.130955]  fff00000c659f700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.131706]  fff00000c659f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.132407] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   36.986006] ==================================================================
[   36.987419] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e8
[   36.988183] Read of size 64 at addr fff00000c5bc9e84 by task kunit_try_catch/171
[   36.989035] 
[   36.989433] CPU: 1 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   36.990375] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.990945] Hardware name: linux,dummy-virt (DT)
[   36.991767] Call trace:
[   36.992210]  show_stack+0x20/0x38 (C)
[   36.994077]  dump_stack_lvl+0x8c/0xd0
[   36.994712]  print_report+0x118/0x5e0
[   36.995245]  kasan_report+0xc8/0x118
[   36.996045]  kasan_check_range+0x100/0x1a8
[   36.996592]  __asan_memmove+0x3c/0x98
[   36.997173]  kmalloc_memmove_invalid_size+0x154/0x2e8
[   36.998255]  kunit_try_run_case+0x14c/0x3d0
[   36.998827]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.999554]  kthread+0x24c/0x2d0
[   37.000054]  ret_from_fork+0x10/0x20
[   37.000682] 
[   37.001020] Allocated by task 171:
[   37.001815]  kasan_save_stack+0x3c/0x68
[   37.002394]  kasan_save_track+0x20/0x40
[   37.002970]  kasan_save_alloc_info+0x40/0x58
[   37.003594]  __kasan_kmalloc+0xd4/0xd8
[   37.004084]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.004727]  kmalloc_memmove_invalid_size+0xb0/0x2e8
[   37.005616]  kunit_try_run_case+0x14c/0x3d0
[   37.006249]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.006968]  kthread+0x24c/0x2d0
[   37.007476]  ret_from_fork+0x10/0x20
[   37.007946] 
[   37.008294] The buggy address belongs to the object at fff00000c5bc9e80
[   37.008294]  which belongs to the cache kmalloc-64 of size 64
[   37.010512] The buggy address is located 4 bytes inside of
[   37.010512]  allocated 64-byte region [fff00000c5bc9e80, fff00000c5bc9ec0)
[   37.011622] 
[   37.011968] The buggy address belongs to the physical page:
[   37.012642] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bc9
[   37.013921] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.014659] page_type: f5(slab)
[   37.015180] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.016011] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.016740] page dumped because: kasan: bad access detected
[   37.017716] 
[   37.017985] Memory state around the buggy address:
[   37.018815]  fff00000c5bc9d80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.019662]  fff00000c5bc9e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.020325] >fff00000c5bc9e80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.020962]                                            ^
[   37.021766]  fff00000c5bc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.022438]  fff00000c5bc9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.023257] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   36.937136] ==================================================================
[   36.938253] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   36.939159] Read of size 18446744073709551614 at addr fff00000c5bc9e04 by task kunit_try_catch/169
[   36.940333] 
[   36.940748] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   36.942922] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.943517] Hardware name: linux,dummy-virt (DT)
[   36.944081] Call trace:
[   36.944564]  show_stack+0x20/0x38 (C)
[   36.945148]  dump_stack_lvl+0x8c/0xd0
[   36.946109]  print_report+0x118/0x5e0
[   36.946758]  kasan_report+0xc8/0x118
[   36.947285]  kasan_check_range+0x100/0x1a8
[   36.947974]  __asan_memmove+0x3c/0x98
[   36.948589]  kmalloc_memmove_negative_size+0x154/0x2e0
[   36.949310]  kunit_try_run_case+0x14c/0x3d0
[   36.949950]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.950936]  kthread+0x24c/0x2d0
[   36.951489]  ret_from_fork+0x10/0x20
[   36.952094] 
[   36.952436] Allocated by task 169:
[   36.953006]  kasan_save_stack+0x3c/0x68
[   36.953887]  kasan_save_track+0x20/0x40
[   36.954412]  kasan_save_alloc_info+0x40/0x58
[   36.955004]  __kasan_kmalloc+0xd4/0xd8
[   36.955521]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.956146]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   36.956807]  kunit_try_run_case+0x14c/0x3d0
[   36.957775]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.958557]  kthread+0x24c/0x2d0
[   36.959248]  ret_from_fork+0x10/0x20
[   36.959613] 
[   36.959949] The buggy address belongs to the object at fff00000c5bc9e00
[   36.959949]  which belongs to the cache kmalloc-64 of size 64
[   36.961158] The buggy address is located 4 bytes inside of
[   36.961158]  64-byte region [fff00000c5bc9e00, fff00000c5bc9e40)
[   36.962691] 
[   36.963037] The buggy address belongs to the physical page:
[   36.963719] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bc9
[   36.964519] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.965296] page_type: f5(slab)
[   36.965773] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.967028] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.967888] page dumped because: kasan: bad access detected
[   36.968488] 
[   36.968819] Memory state around the buggy address:
[   36.969667]  fff00000c5bc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.970389]  fff00000c5bc9d80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.971146] >fff00000c5bc9e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.972079]                    ^
[   36.972529]  fff00000c5bc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.973659]  fff00000c5bc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.974368] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset
[   36.833158] ==================================================================
[   36.834378] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   36.835051] Write of size 8 at addr fff00000c657f971 by task kunit_try_catch/165
[   36.836221] 
[   36.836667] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   36.838437] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.839115] Hardware name: linux,dummy-virt (DT)
[   36.839833] Call trace:
[   36.840261]  show_stack+0x20/0x38 (C)
[   36.840805]  dump_stack_lvl+0x8c/0xd0
[   36.841388]  print_report+0x118/0x5e0
[   36.842343]  kasan_report+0xc8/0x118
[   36.842880]  kasan_check_range+0x100/0x1a8
[   36.843432]  __asan_memset+0x34/0x78
[   36.844328]  kmalloc_oob_memset_8+0x150/0x2f8
[   36.844866]  kunit_try_run_case+0x14c/0x3d0
[   36.845807]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.846659]  kthread+0x24c/0x2d0
[   36.847283]  ret_from_fork+0x10/0x20
[   36.847962] 
[   36.848268] Allocated by task 165:
[   36.848773]  kasan_save_stack+0x3c/0x68
[   36.849613]  kasan_save_track+0x20/0x40
[   36.850176]  kasan_save_alloc_info+0x40/0x58
[   36.850686]  __kasan_kmalloc+0xd4/0xd8
[   36.851242]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.851993]  kmalloc_oob_memset_8+0xb0/0x2f8
[   36.852603]  kunit_try_run_case+0x14c/0x3d0
[   36.853862]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.854476]  kthread+0x24c/0x2d0
[   36.854976]  ret_from_fork+0x10/0x20
[   36.855530] 
[   36.855849] The buggy address belongs to the object at fff00000c657f900
[   36.855849]  which belongs to the cache kmalloc-128 of size 128
[   36.856960] The buggy address is located 113 bytes inside of
[   36.856960]  allocated 120-byte region [fff00000c657f900, fff00000c657f978)
[   36.858165] 
[   36.858518] The buggy address belongs to the physical page:
[   36.859153] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10657f
[   36.860501] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.861621] page_type: f5(slab)
[   36.862114] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   36.862911] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   36.863687] page dumped because: kasan: bad access detected
[   36.864353] 
[   36.864702] Memory state around the buggy address:
[   36.865718]  fff00000c657f800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   36.866430]  fff00000c657f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.867216] >fff00000c657f900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   36.867876]                                                                 ^
[   36.868739]  fff00000c657f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.869742]  fff00000c657fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.870552] ==================================================================
[   36.730905] ==================================================================
[   36.731847] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   36.732673] Write of size 2 at addr fff00000c6575a77 by task kunit_try_catch/161
[   36.733322] 
[   36.733992] CPU: 0 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   36.735056] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.736747] Hardware name: linux,dummy-virt (DT)
[   36.737268] Call trace:
[   36.737797]  show_stack+0x20/0x38 (C)
[   36.738414]  dump_stack_lvl+0x8c/0xd0
[   36.738983]  print_report+0x118/0x5e0
[   36.739822]  kasan_report+0xc8/0x118
[   36.740381]  kasan_check_range+0x100/0x1a8
[   36.741029]  __asan_memset+0x34/0x78
[   36.741955]  kmalloc_oob_memset_2+0x150/0x2f8
[   36.742505]  kunit_try_run_case+0x14c/0x3d0
[   36.743225]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.744046]  kthread+0x24c/0x2d0
[   36.744688]  ret_from_fork+0x10/0x20
[   36.745463] 
[   36.745880] Allocated by task 161:
[   36.746482]  kasan_save_stack+0x3c/0x68
[   36.747008]  kasan_save_track+0x20/0x40
[   36.747606]  kasan_save_alloc_info+0x40/0x58
[   36.748266]  __kasan_kmalloc+0xd4/0xd8
[   36.748915]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.749666]  kmalloc_oob_memset_2+0xb0/0x2f8
[   36.750537]  kunit_try_run_case+0x14c/0x3d0
[   36.751001]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.751797]  kthread+0x24c/0x2d0
[   36.752264]  ret_from_fork+0x10/0x20
[   36.752818] 
[   36.753162] The buggy address belongs to the object at fff00000c6575a00
[   36.753162]  which belongs to the cache kmalloc-128 of size 128
[   36.755032] The buggy address is located 119 bytes inside of
[   36.755032]  allocated 120-byte region [fff00000c6575a00, fff00000c6575a78)
[   36.756219] 
[   36.756802] The buggy address belongs to the physical page:
[   36.757583] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106575
[   36.758398] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.758951] page_type: f5(slab)
[   36.759512] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   36.760789] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   36.762211] page dumped because: kasan: bad access detected
[   36.763024] 
[   36.763510] Memory state around the buggy address:
[   36.764039]  fff00000c6575900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   36.764827]  fff00000c6575980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.765756] >fff00000c6575a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   36.767010]                                                                 ^
[   36.767573]  fff00000c6575a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.767990]  fff00000c6575b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.768335] ==================================================================
[   36.884585] ==================================================================
[   36.885544] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   36.887665] Write of size 16 at addr fff00000c6575d69 by task kunit_try_catch/167
[   36.889060] 
[   36.889569] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   36.890819] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.891171] Hardware name: linux,dummy-virt (DT)
[   36.891779] Call trace:
[   36.892138]  show_stack+0x20/0x38 (C)
[   36.892772]  dump_stack_lvl+0x8c/0xd0
[   36.893346]  print_report+0x118/0x5e0
[   36.894500]  kasan_report+0xc8/0x118
[   36.895101]  kasan_check_range+0x100/0x1a8
[   36.895704]  __asan_memset+0x34/0x78
[   36.896194]  kmalloc_oob_memset_16+0x150/0x2f8
[   36.897653]  kunit_try_run_case+0x14c/0x3d0
[   36.898390]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.899174]  kthread+0x24c/0x2d0
[   36.899779]  ret_from_fork+0x10/0x20
[   36.900315] 
[   36.900671] Allocated by task 167:
[   36.901122]  kasan_save_stack+0x3c/0x68
[   36.902075]  kasan_save_track+0x20/0x40
[   36.902485]  kasan_save_alloc_info+0x40/0x58
[   36.902904]  __kasan_kmalloc+0xd4/0xd8
[   36.903660]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.904502]  kmalloc_oob_memset_16+0xb0/0x2f8
[   36.905211]  kunit_try_run_case+0x14c/0x3d0
[   36.905819]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.906891]  kthread+0x24c/0x2d0
[   36.907402]  ret_from_fork+0x10/0x20
[   36.907968] 
[   36.908309] The buggy address belongs to the object at fff00000c6575d00
[   36.908309]  which belongs to the cache kmalloc-128 of size 128
[   36.910222] The buggy address is located 105 bytes inside of
[   36.910222]  allocated 120-byte region [fff00000c6575d00, fff00000c6575d78)
[   36.911392] 
[   36.911754] The buggy address belongs to the physical page:
[   36.912410] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106575
[   36.914019] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.914809] page_type: f5(slab)
[   36.915365] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   36.916349] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   36.917346] page dumped because: kasan: bad access detected
[   36.917970] 
[   36.918290] Memory state around the buggy address:
[   36.919230]  fff00000c6575c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   36.920520]  fff00000c6575c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.921077] >fff00000c6575d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   36.922167]                                                                 ^
[   36.923132]  fff00000c6575d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.923874]  fff00000c6575e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.924622] ==================================================================
[   36.780346] ==================================================================
[   36.781864] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   36.783373] Write of size 4 at addr fff00000c6575b75 by task kunit_try_catch/163
[   36.784123] 
[   36.784523] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   36.786118] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.786898] Hardware name: linux,dummy-virt (DT)
[   36.787676] Call trace:
[   36.788018]  show_stack+0x20/0x38 (C)
[   36.788570]  dump_stack_lvl+0x8c/0xd0
[   36.789171]  print_report+0x118/0x5e0
[   36.790356]  kasan_report+0xc8/0x118
[   36.790932]  kasan_check_range+0x100/0x1a8
[   36.791476]  __asan_memset+0x34/0x78
[   36.791893]  kmalloc_oob_memset_4+0x150/0x300
[   36.792640]  kunit_try_run_case+0x14c/0x3d0
[   36.793688]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.794232]  kthread+0x24c/0x2d0
[   36.794829]  ret_from_fork+0x10/0x20
[   36.795500] 
[   36.795902] Allocated by task 163:
[   36.796479]  kasan_save_stack+0x3c/0x68
[   36.797087]  kasan_save_track+0x20/0x40
[   36.797948]  kasan_save_alloc_info+0x40/0x58
[   36.798979]  __kasan_kmalloc+0xd4/0xd8
[   36.799880]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.800606]  kmalloc_oob_memset_4+0xb0/0x300
[   36.801380]  kunit_try_run_case+0x14c/0x3d0
[   36.802051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.802665]  kthread+0x24c/0x2d0
[   36.803254]  ret_from_fork+0x10/0x20
[   36.804069] 
[   36.804400] The buggy address belongs to the object at fff00000c6575b00
[   36.804400]  which belongs to the cache kmalloc-128 of size 128
[   36.805680] The buggy address is located 117 bytes inside of
[   36.805680]  allocated 120-byte region [fff00000c6575b00, fff00000c6575b78)
[   36.807664] 
[   36.808257] The buggy address belongs to the physical page:
[   36.808874] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106575
[   36.810041] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.810714] page_type: f5(slab)
[   36.811180] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   36.812092] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   36.812911] page dumped because: kasan: bad access detected
[   36.813715] 
[   36.813955] Memory state around the buggy address:
[   36.814481]  fff00000c6575a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.815266]  fff00000c6575a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.816422] >fff00000c6575b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   36.817161]                                                                 ^
[   36.818047]  fff00000c6575b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.819207]  fff00000c6575c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.820206] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   36.682876] ==================================================================
[   36.683712] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   36.684556] Write of size 128 at addr fff00000c657f400 by task kunit_try_catch/159
[   36.685721] 
[   36.686069] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   36.687026] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.687858] Hardware name: linux,dummy-virt (DT)
[   36.688339] Call trace:
[   36.688900]  show_stack+0x20/0x38 (C)
[   36.689801]  dump_stack_lvl+0x8c/0xd0
[   36.690432]  print_report+0x118/0x5e0
[   36.691069]  kasan_report+0xc8/0x118
[   36.691570]  kasan_check_range+0x100/0x1a8
[   36.692213]  __asan_memset+0x34/0x78
[   36.692857]  kmalloc_oob_in_memset+0x144/0x2d0
[   36.693522]  kunit_try_run_case+0x14c/0x3d0
[   36.694504]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.695261]  kthread+0x24c/0x2d0
[   36.695680]  ret_from_fork+0x10/0x20
[   36.696321] 
[   36.696699] Allocated by task 159:
[   36.697180]  kasan_save_stack+0x3c/0x68
[   36.698279]  kasan_save_track+0x20/0x40
[   36.698854]  kasan_save_alloc_info+0x40/0x58
[   36.699428]  __kasan_kmalloc+0xd4/0xd8
[   36.699982]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.700600]  kmalloc_oob_in_memset+0xb0/0x2d0
[   36.701226]  kunit_try_run_case+0x14c/0x3d0
[   36.701968]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.702565]  kthread+0x24c/0x2d0
[   36.703114]  ret_from_fork+0x10/0x20
[   36.703725] 
[   36.704112] The buggy address belongs to the object at fff00000c657f400
[   36.704112]  which belongs to the cache kmalloc-128 of size 128
[   36.705560] The buggy address is located 0 bytes inside of
[   36.705560]  allocated 120-byte region [fff00000c657f400, fff00000c657f478)
[   36.706836] 
[   36.707212] The buggy address belongs to the physical page:
[   36.708407] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10657f
[   36.709142] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.709912] page_type: f5(slab)
[   36.710635] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   36.711417] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   36.712191] page dumped because: kasan: bad access detected
[   36.712889] 
[   36.713613] Memory state around the buggy address:
[   36.714212]  fff00000c657f300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   36.714928]  fff00000c657f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.715666] >fff00000c657f400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   36.716413]                                                                 ^
[   36.717180]  fff00000c657f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.718308]  fff00000c657f500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.719044] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[   36.628013] ==================================================================
[   36.628917] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   36.629821] Read of size 16 at addr fff00000c1bb3be0 by task kunit_try_catch/157
[   36.631624] 
[   36.631923] CPU: 0 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   36.633009] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.633751] Hardware name: linux,dummy-virt (DT)
[   36.634311] Call trace:
[   36.635152]  show_stack+0x20/0x38 (C)
[   36.635841]  dump_stack_lvl+0x8c/0xd0
[   36.636377]  print_report+0x118/0x5e0
[   36.636966]  kasan_report+0xc8/0x118
[   36.637826]  __asan_report_load16_noabort+0x20/0x30
[   36.638572]  kmalloc_uaf_16+0x3bc/0x438
[   36.639122]  kunit_try_run_case+0x14c/0x3d0
[   36.639851]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.640436]  kthread+0x24c/0x2d0
[   36.641020]  ret_from_fork+0x10/0x20
[   36.641737] 
[   36.642052] Allocated by task 157:
[   36.642583]  kasan_save_stack+0x3c/0x68
[   36.643155]  kasan_save_track+0x20/0x40
[   36.644016]  kasan_save_alloc_info+0x40/0x58
[   36.644640]  __kasan_kmalloc+0xd4/0xd8
[   36.645116]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.645818]  kmalloc_uaf_16+0x140/0x438
[   36.646866]  kunit_try_run_case+0x14c/0x3d0
[   36.647432]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.648075]  kthread+0x24c/0x2d0
[   36.648716]  ret_from_fork+0x10/0x20
[   36.649260] 
[   36.649582] Freed by task 157:
[   36.650003]  kasan_save_stack+0x3c/0x68
[   36.651176]  kasan_save_track+0x20/0x40
[   36.651671]  kasan_save_free_info+0x4c/0x78
[   36.652284]  __kasan_slab_free+0x6c/0x98
[   36.652772]  kfree+0x114/0x3d0
[   36.653798]  kmalloc_uaf_16+0x190/0x438
[   36.654306]  kunit_try_run_case+0x14c/0x3d0
[   36.654776]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.655497]  kthread+0x24c/0x2d0
[   36.656019]  ret_from_fork+0x10/0x20
[   36.656563] 
[   36.656899] The buggy address belongs to the object at fff00000c1bb3be0
[   36.656899]  which belongs to the cache kmalloc-16 of size 16
[   36.658426] The buggy address is located 0 bytes inside of
[   36.658426]  freed 16-byte region [fff00000c1bb3be0, fff00000c1bb3bf0)
[   36.659593] 
[   36.659892] The buggy address belongs to the physical page:
[   36.660609] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3
[   36.661340] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.662085] page_type: f5(slab)
[   36.662560] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   36.663509] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   36.664420] page dumped because: kasan: bad access detected
[   36.664894] 
[   36.665164] Memory state around the buggy address:
[   36.666212]  fff00000c1bb3a80: fa fb fc fc fa fb fc fc fa fb fc fc 00 02 fc fc
[   36.667090]  fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   36.667982] >fff00000c1bb3b80: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   36.668809]                                                        ^
[   36.669553]  fff00000c1bb3c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.670912]  fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.671691] ==================================================================
[   37.146333] ==================================================================
[   37.147262] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   37.148246] Read of size 1 at addr fff00000c65920a8 by task kunit_try_catch/177
[   37.149078] 
[   37.149540] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   37.150777] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.151345] Hardware name: linux,dummy-virt (DT)
[   37.152120] Call trace:
[   37.152915]  show_stack+0x20/0x38 (C)
[   37.153557]  dump_stack_lvl+0x8c/0xd0
[   37.154240]  print_report+0x118/0x5e0
[   37.154933]  kasan_report+0xc8/0x118
[   37.155606]  __asan_report_load1_noabort+0x20/0x30
[   37.156223]  kmalloc_uaf2+0x3f4/0x468
[   37.156726]  kunit_try_run_case+0x14c/0x3d0
[   37.157426]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.158296]  kthread+0x24c/0x2d0
[   37.158875]  ret_from_fork+0x10/0x20
[   37.159508] 
[   37.159889] Allocated by task 177:
[   37.160389]  kasan_save_stack+0x3c/0x68
[   37.161038]  kasan_save_track+0x20/0x40
[   37.161882]  kasan_save_alloc_info+0x40/0x58
[   37.162465]  __kasan_kmalloc+0xd4/0xd8
[   37.163015]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.163617]  kmalloc_uaf2+0xc4/0x468
[   37.164208]  kunit_try_run_case+0x14c/0x3d0
[   37.164866]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.165673]  kthread+0x24c/0x2d0
[   37.166136]  ret_from_fork+0x10/0x20
[   37.166908] 
[   37.167267] Freed by task 177:
[   37.167798]  kasan_save_stack+0x3c/0x68
[   37.168401]  kasan_save_track+0x20/0x40
[   37.169004]  kasan_save_free_info+0x4c/0x78
[   37.169760]  __kasan_slab_free+0x6c/0x98
[   37.170471]  kfree+0x114/0x3d0
[   37.170955]  kmalloc_uaf2+0x134/0x468
[   37.171700]  kunit_try_run_case+0x14c/0x3d0
[   37.172103]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.173455]  kthread+0x24c/0x2d0
[   37.174197]  ret_from_fork+0x10/0x20
[   37.174880] 
[   37.175205] The buggy address belongs to the object at fff00000c6592080
[   37.175205]  which belongs to the cache kmalloc-64 of size 64
[   37.176960] The buggy address is located 40 bytes inside of
[   37.176960]  freed 64-byte region [fff00000c6592080, fff00000c65920c0)
[   37.178549] 
[   37.179018] The buggy address belongs to the physical page:
[   37.179734] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106592
[   37.180591] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.181526] page_type: f5(slab)
[   37.181976] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.182623] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.183541] page dumped because: kasan: bad access detected
[   37.184148] 
[   37.184532] Memory state around the buggy address:
[   37.185096]  fff00000c6591f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   37.186420]  fff00000c6592000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.187070] >fff00000c6592080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.187816]                                   ^
[   37.188432]  fff00000c6592100: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   37.189269]  fff00000c6592180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.190295] ==================================================================
[   37.035536] ==================================================================
[   37.036717] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   37.037381] Read of size 1 at addr fff00000c5a3bf08 by task kunit_try_catch/173
[   37.038923] 
[   37.039353] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   37.040558] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.041080] Hardware name: linux,dummy-virt (DT)
[   37.041692] Call trace:
[   37.042136]  show_stack+0x20/0x38 (C)
[   37.042707]  dump_stack_lvl+0x8c/0xd0
[   37.043287]  print_report+0x118/0x5e0
[   37.043922]  kasan_report+0xc8/0x118
[   37.044548]  __asan_report_load1_noabort+0x20/0x30
[   37.045431]  kmalloc_uaf+0x300/0x338
[   37.045913]  kunit_try_run_case+0x14c/0x3d0
[   37.046561]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.047201]  kthread+0x24c/0x2d0
[   37.047742]  ret_from_fork+0x10/0x20
[   37.048230] 
[   37.048588] Allocated by task 173:
[   37.049072]  kasan_save_stack+0x3c/0x68
[   37.049967]  kasan_save_track+0x20/0x40
[   37.050920]  kasan_save_alloc_info+0x40/0x58
[   37.051384]  __kasan_kmalloc+0xd4/0xd8
[   37.051960]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.052608]  kmalloc_uaf+0xb8/0x338
[   37.053080]  kunit_try_run_case+0x14c/0x3d0
[   37.054117]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.055054]  kthread+0x24c/0x2d0
[   37.055841]  ret_from_fork+0x10/0x20
[   37.056387] 
[   37.056716] Freed by task 173:
[   37.058327]  kasan_save_stack+0x3c/0x68
[   37.058893]  kasan_save_track+0x20/0x40
[   37.059502]  kasan_save_free_info+0x4c/0x78
[   37.060202]  __kasan_slab_free+0x6c/0x98
[   37.060716]  kfree+0x114/0x3d0
[   37.060947]  kmalloc_uaf+0x11c/0x338
[   37.061171]  kunit_try_run_case+0x14c/0x3d0
[   37.061423]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.062094]  kthread+0x24c/0x2d0
[   37.062627]  ret_from_fork+0x10/0x20
[   37.063223] 
[   37.063626] The buggy address belongs to the object at fff00000c5a3bf00
[   37.063626]  which belongs to the cache kmalloc-16 of size 16
[   37.064777] The buggy address is located 8 bytes inside of
[   37.064777]  freed 16-byte region [fff00000c5a3bf00, fff00000c5a3bf10)
[   37.065876] 
[   37.066266] The buggy address belongs to the physical page:
[   37.066966] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a3b
[   37.067866] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.068684] page_type: f5(slab)
[   37.069216] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   37.070033] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   37.070870] page dumped because: kasan: bad access detected
[   37.071467] 
[   37.071795] Memory state around the buggy address:
[   37.072322]  fff00000c5a3be00: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   37.073175]  fff00000c5a3be80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   37.073832] >fff00000c5a3bf00: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.074656]                       ^
[   37.075153]  fff00000c5a3bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.075924]  fff00000c5a3c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.076617] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob
[   36.579032] ==================================================================
[   36.580256] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   36.581118] Write of size 16 at addr fff00000c1bb3b80 by task kunit_try_catch/155
[   36.582071] 
[   36.582436] CPU: 0 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   36.584322] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.584940] Hardware name: linux,dummy-virt (DT)
[   36.585614] Call trace:
[   36.586162]  show_stack+0x20/0x38 (C)
[   36.587172]  dump_stack_lvl+0x8c/0xd0
[   36.587674]  print_report+0x118/0x5e0
[   36.587946]  kasan_report+0xc8/0x118
[   36.588186]  __asan_report_store16_noabort+0x20/0x30
[   36.588535]  kmalloc_oob_16+0x3a0/0x3f8
[   36.589051]  kunit_try_run_case+0x14c/0x3d0
[   36.590015]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.590771]  kthread+0x24c/0x2d0
[   36.591249]  ret_from_fork+0x10/0x20
[   36.591847] 
[   36.592184] Allocated by task 155:
[   36.592755]  kasan_save_stack+0x3c/0x68
[   36.593283]  kasan_save_track+0x20/0x40
[   36.594287]  kasan_save_alloc_info+0x40/0x58
[   36.594974]  __kasan_kmalloc+0xd4/0xd8
[   36.595553]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.596175]  kmalloc_oob_16+0xb4/0x3f8
[   36.596758]  kunit_try_run_case+0x14c/0x3d0
[   36.597463]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.598478]  kthread+0x24c/0x2d0
[   36.598892]  ret_from_fork+0x10/0x20
[   36.599437] 
[   36.599796] The buggy address belongs to the object at fff00000c1bb3b80
[   36.599796]  which belongs to the cache kmalloc-16 of size 16
[   36.600894] The buggy address is located 0 bytes inside of
[   36.600894]  allocated 13-byte region [fff00000c1bb3b80, fff00000c1bb3b8d)
[   36.602370] 
[   36.603010] The buggy address belongs to the physical page:
[   36.603631] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3
[   36.604225] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.605064] page_type: f5(slab)
[   36.605606] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   36.606964] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   36.607736] page dumped because: kasan: bad access detected
[   36.608320] 
[   36.608944] Memory state around the buggy address:
[   36.609847]  fff00000c1bb3a80: fa fb fc fc fa fb fc fc fa fb fc fc 00 02 fc fc
[   36.610822]  fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   36.611596] >fff00000c1bb3b80: 00 05 fc fc 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.612229]                       ^
[   36.612785]  fff00000c1bb3c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.613849]  fff00000c1bb3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.614671] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[   36.462933] ==================================================================
[   36.463957] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   36.464720] Read of size 1 at addr fff00000c449b800 by task kunit_try_catch/153
[   36.465480] 
[   36.466984] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   36.468078] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.468534] Hardware name: linux,dummy-virt (DT)
[   36.469050] Call trace:
[   36.469956]  show_stack+0x20/0x38 (C)
[   36.470583]  dump_stack_lvl+0x8c/0xd0
[   36.471117]  print_report+0x118/0x5e0
[   36.471715]  kasan_report+0xc8/0x118
[   36.472245]  __kasan_check_byte+0x54/0x70
[   36.472802]  krealloc_noprof+0x44/0x360
[   36.473411]  krealloc_uaf+0x180/0x520
[   36.473874]  kunit_try_run_case+0x14c/0x3d0
[   36.474807]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.475498]  kthread+0x24c/0x2d0
[   36.476044]  ret_from_fork+0x10/0x20
[   36.476651] 
[   36.476948] Allocated by task 153:
[   36.477477]  kasan_save_stack+0x3c/0x68
[   36.477930]  kasan_save_track+0x20/0x40
[   36.479082]  kasan_save_alloc_info+0x40/0x58
[   36.479635]  __kasan_kmalloc+0xd4/0xd8
[   36.480193]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.480720]  krealloc_uaf+0xc8/0x520
[   36.481256]  kunit_try_run_case+0x14c/0x3d0
[   36.481901]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.482515]  kthread+0x24c/0x2d0
[   36.483032]  ret_from_fork+0x10/0x20
[   36.483859] 
[   36.484146] Freed by task 153:
[   36.484597]  kasan_save_stack+0x3c/0x68
[   36.485101]  kasan_save_track+0x20/0x40
[   36.486057]  kasan_save_free_info+0x4c/0x78
[   36.486651]  __kasan_slab_free+0x6c/0x98
[   36.487481]  kfree+0x114/0x3d0
[   36.488112]  krealloc_uaf+0x12c/0x520
[   36.488784]  kunit_try_run_case+0x14c/0x3d0
[   36.489512]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.490375]  kthread+0x24c/0x2d0
[   36.491061]  ret_from_fork+0x10/0x20
[   36.491646] 
[   36.491989] The buggy address belongs to the object at fff00000c449b800
[   36.491989]  which belongs to the cache kmalloc-256 of size 256
[   36.493676] The buggy address is located 0 bytes inside of
[   36.493676]  freed 256-byte region [fff00000c449b800, fff00000c449b900)
[   36.495155] 
[   36.495538] The buggy address belongs to the physical page:
[   36.496228] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10449a
[   36.497138] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.498095] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.499077] page_type: f5(slab)
[   36.499679] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   36.500642] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   36.501562] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   36.502844] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   36.503712] head: 0bfffe0000000001 ffffc1ffc3112681 ffffffffffffffff 0000000000000000
[   36.504589] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   36.505661] page dumped because: kasan: bad access detected
[   36.506403] 
[   36.506800] Memory state around the buggy address:
[   36.507419]  fff00000c449b700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.508295]  fff00000c449b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.509097] >fff00000c449b800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.509933]                    ^
[   36.510825]  fff00000c449b880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.511849]  fff00000c449b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.512733] ==================================================================
[   36.515378] ==================================================================
[   36.516652] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   36.517612] Read of size 1 at addr fff00000c449b800 by task kunit_try_catch/153
[   36.519290] 
[   36.519610] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   36.520970] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.521646] Hardware name: linux,dummy-virt (DT)
[   36.522666] Call trace:
[   36.523255]  show_stack+0x20/0x38 (C)
[   36.523805]  dump_stack_lvl+0x8c/0xd0
[   36.524550]  print_report+0x118/0x5e0
[   36.525151]  kasan_report+0xc8/0x118
[   36.526032]  __asan_report_load1_noabort+0x20/0x30
[   36.526692]  krealloc_uaf+0x4c8/0x520
[   36.527180]  kunit_try_run_case+0x14c/0x3d0
[   36.528064]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.528814]  kthread+0x24c/0x2d0
[   36.529842]  ret_from_fork+0x10/0x20
[   36.530322] 
[   36.530588] Allocated by task 153:
[   36.530964]  kasan_save_stack+0x3c/0x68
[   36.531966]  kasan_save_track+0x20/0x40
[   36.532465]  kasan_save_alloc_info+0x40/0x58
[   36.533119]  __kasan_kmalloc+0xd4/0xd8
[   36.533774]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.534643]  krealloc_uaf+0xc8/0x520
[   36.535174]  kunit_try_run_case+0x14c/0x3d0
[   36.535760]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.536563]  kthread+0x24c/0x2d0
[   36.537039]  ret_from_fork+0x10/0x20
[   36.537582] 
[   36.538371] Freed by task 153:
[   36.539010]  kasan_save_stack+0x3c/0x68
[   36.539620]  kasan_save_track+0x20/0x40
[   36.540396]  kasan_save_free_info+0x4c/0x78
[   36.540955]  __kasan_slab_free+0x6c/0x98
[   36.541724]  kfree+0x114/0x3d0
[   36.542125]  krealloc_uaf+0x12c/0x520
[   36.543036]  kunit_try_run_case+0x14c/0x3d0
[   36.543782]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.544504]  kthread+0x24c/0x2d0
[   36.545000]  ret_from_fork+0x10/0x20
[   36.545568] 
[   36.546223] The buggy address belongs to the object at fff00000c449b800
[   36.546223]  which belongs to the cache kmalloc-256 of size 256
[   36.547369] The buggy address is located 0 bytes inside of
[   36.547369]  freed 256-byte region [fff00000c449b800, fff00000c449b900)
[   36.549420] 
[   36.549782] The buggy address belongs to the physical page:
[   36.550370] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10449a
[   36.551436] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.552577] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.553494] page_type: f5(slab)
[   36.554033] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   36.555408] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   36.556540] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   36.557662] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   36.558601] head: 0bfffe0000000001 ffffc1ffc3112681 ffffffffffffffff 0000000000000000
[   36.559512] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   36.560393] page dumped because: kasan: bad access detected
[   36.561086] 
[   36.561750] Memory state around the buggy address:
[   36.562313]  fff00000c449b700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.562992]  fff00000c449b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.564609] >fff00000c449b800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.565888]                    ^
[   36.566382]  fff00000c449b880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.567078]  fff00000c449b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.567921] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   36.304907] ==================================================================
[   36.306034] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   36.307223] Write of size 1 at addr fff00000c67360c9 by task kunit_try_catch/151
[   36.308804] 
[   36.309735] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   36.310886] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.311598] Hardware name: linux,dummy-virt (DT)
[   36.312291] Call trace:
[   36.312676]  show_stack+0x20/0x38 (C)
[   36.312957]  dump_stack_lvl+0x8c/0xd0
[   36.313222]  print_report+0x118/0x5e0
[   36.313989]  kasan_report+0xc8/0x118
[   36.314596]  __asan_report_store1_noabort+0x20/0x30
[   36.315386]  krealloc_less_oob_helper+0xa48/0xc50
[   36.316105]  krealloc_large_less_oob+0x20/0x38
[   36.316803]  kunit_try_run_case+0x14c/0x3d0
[   36.317340]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.318167]  kthread+0x24c/0x2d0
[   36.318716]  ret_from_fork+0x10/0x20
[   36.319406] 
[   36.319816] The buggy address belongs to the physical page:
[   36.320575] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106734
[   36.321551] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.322512] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.323409] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.324413] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   36.325177] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.326219] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   36.327361] head: 0bfffe0000000002 ffffc1ffc319cd01 ffffffffffffffff 0000000000000000
[   36.328799] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   36.330191] page dumped because: kasan: bad access detected
[   36.330915] 
[   36.331079] Memory state around the buggy address:
[   36.331337]  fff00000c6735f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.332437]  fff00000c6736000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.333239] >fff00000c6736080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   36.334229]                                               ^
[   36.334633]  fff00000c6736100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   36.335384]  fff00000c6736180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   36.336088] ==================================================================
[   36.007581] ==================================================================
[   36.008713] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   36.009504] Write of size 1 at addr fff00000c449b6c9 by task kunit_try_catch/147
[   36.010350] 
[   36.011302] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   36.012649] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.013252] Hardware name: linux,dummy-virt (DT)
[   36.014046] Call trace:
[   36.014412]  show_stack+0x20/0x38 (C)
[   36.014979]  dump_stack_lvl+0x8c/0xd0
[   36.015911]  print_report+0x118/0x5e0
[   36.016460]  kasan_report+0xc8/0x118
[   36.017158]  __asan_report_store1_noabort+0x20/0x30
[   36.018089]  krealloc_less_oob_helper+0xa48/0xc50
[   36.018884]  krealloc_less_oob+0x20/0x38
[   36.019628]  kunit_try_run_case+0x14c/0x3d0
[   36.020293]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.021038]  kthread+0x24c/0x2d0
[   36.021820]  ret_from_fork+0x10/0x20
[   36.022561] 
[   36.022905] Allocated by task 147:
[   36.023405]  kasan_save_stack+0x3c/0x68
[   36.024364]  kasan_save_track+0x20/0x40
[   36.025104]  kasan_save_alloc_info+0x40/0x58
[   36.025966]  __kasan_krealloc+0x118/0x178
[   36.026693]  krealloc_noprof+0x128/0x360
[   36.027417]  krealloc_less_oob_helper+0x168/0xc50
[   36.028202]  krealloc_less_oob+0x20/0x38
[   36.028915]  kunit_try_run_case+0x14c/0x3d0
[   36.029996]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.031119]  kthread+0x24c/0x2d0
[   36.031564]  ret_from_fork+0x10/0x20
[   36.031901] 
[   36.032743] The buggy address belongs to the object at fff00000c449b600
[   36.032743]  which belongs to the cache kmalloc-256 of size 256
[   36.034245] The buggy address is located 0 bytes to the right of
[   36.034245]  allocated 201-byte region [fff00000c449b600, fff00000c449b6c9)
[   36.035432] 
[   36.035807] The buggy address belongs to the physical page:
[   36.036437] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10449a
[   36.037368] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.038346] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.039224] page_type: f5(slab)
[   36.039687] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   36.040594] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   36.041498] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   36.042418] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   36.043251] head: 0bfffe0000000001 ffffc1ffc3112681 ffffffffffffffff 0000000000000000
[   36.044101] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   36.044913] page dumped because: kasan: bad access detected
[   36.045837] 
[   36.046207] Memory state around the buggy address:
[   36.046839]  fff00000c449b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.047637]  fff00000c449b600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.048454] >fff00000c449b680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   36.049196]                                               ^
[   36.049948]  fff00000c449b700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.050989]  fff00000c449b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.052390] ==================================================================
[   36.339582] ==================================================================
[   36.340399] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   36.341047] Write of size 1 at addr fff00000c67360d0 by task kunit_try_catch/151
[   36.341922] 
[   36.342268] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   36.343343] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.343856] Hardware name: linux,dummy-virt (DT)
[   36.344358] Call trace:
[   36.344792]  show_stack+0x20/0x38 (C)
[   36.345276]  dump_stack_lvl+0x8c/0xd0
[   36.345882]  print_report+0x118/0x5e0
[   36.346425]  kasan_report+0xc8/0x118
[   36.347104]  __asan_report_store1_noabort+0x20/0x30
[   36.347798]  krealloc_less_oob_helper+0xb9c/0xc50
[   36.348345]  krealloc_large_less_oob+0x20/0x38
[   36.349006]  kunit_try_run_case+0x14c/0x3d0
[   36.349639]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.350380]  kthread+0x24c/0x2d0
[   36.350944]  ret_from_fork+0x10/0x20
[   36.351517] 
[   36.351860] The buggy address belongs to the physical page:
[   36.352417] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106734
[   36.353311] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.354137] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.354930] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.355827] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   36.356670] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.357543] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   36.358389] head: 0bfffe0000000002 ffffc1ffc319cd01 ffffffffffffffff 0000000000000000
[   36.359210] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   36.359993] page dumped because: kasan: bad access detected
[   36.360631] 
[   36.360965] Memory state around the buggy address:
[   36.361538]  fff00000c6735f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.362376]  fff00000c6736000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.363091] >fff00000c6736080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   36.363912]                                                  ^
[   36.364581]  fff00000c6736100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   36.365385]  fff00000c6736180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   36.366043] ==================================================================
[   36.368850] ==================================================================
[   36.369559] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   36.370384] Write of size 1 at addr fff00000c67360da by task kunit_try_catch/151
[   36.371011] 
[   36.371390] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   36.372551] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.373003] Hardware name: linux,dummy-virt (DT)
[   36.373618] Call trace:
[   36.374030]  show_stack+0x20/0x38 (C)
[   36.374566]  dump_stack_lvl+0x8c/0xd0
[   36.375150]  print_report+0x118/0x5e0
[   36.375712]  kasan_report+0xc8/0x118
[   36.376284]  __asan_report_store1_noabort+0x20/0x30
[   36.376850]  krealloc_less_oob_helper+0xa80/0xc50
[   36.377537]  krealloc_large_less_oob+0x20/0x38
[   36.378181]  kunit_try_run_case+0x14c/0x3d0
[   36.378805]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.379482]  kthread+0x24c/0x2d0
[   36.379934]  ret_from_fork+0x10/0x20
[   36.380531] 
[   36.380860] The buggy address belongs to the physical page:
[   36.381491] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106734
[   36.382401] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.383178] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.384097] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.384817] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   36.385721] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.386560] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   36.387463] head: 0bfffe0000000002 ffffc1ffc319cd01 ffffffffffffffff 0000000000000000
[   36.388216] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   36.389029] page dumped because: kasan: bad access detected
[   36.389592] 
[   36.389927] Memory state around the buggy address:
[   36.390520]  fff00000c6735f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.391273]  fff00000c6736000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.391897] >fff00000c6736080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   36.392731]                                                     ^
[   36.393333]  fff00000c6736100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   36.394208]  fff00000c6736180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   36.394915] ==================================================================
[   36.426334] ==================================================================
[   36.427071] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   36.427806] Write of size 1 at addr fff00000c67360eb by task kunit_try_catch/151
[   36.428529] 
[   36.428883] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   36.429902] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.430420] Hardware name: linux,dummy-virt (DT)
[   36.430986] Call trace:
[   36.431405]  show_stack+0x20/0x38 (C)
[   36.431905]  dump_stack_lvl+0x8c/0xd0
[   36.432522]  print_report+0x118/0x5e0
[   36.433092]  kasan_report+0xc8/0x118
[   36.433688]  __asan_report_store1_noabort+0x20/0x30
[   36.434251]  krealloc_less_oob_helper+0xa58/0xc50
[   36.434874]  krealloc_large_less_oob+0x20/0x38
[   36.435502]  kunit_try_run_case+0x14c/0x3d0
[   36.436130]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.436778]  kthread+0x24c/0x2d0
[   36.437315]  ret_from_fork+0x10/0x20
[   36.437907] 
[   36.438208] The buggy address belongs to the physical page:
[   36.438797] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106734
[   36.439724] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.440524] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.441218] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.442120] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   36.442885] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.443658] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   36.444515] head: 0bfffe0000000002 ffffc1ffc319cd01 ffffffffffffffff 0000000000000000
[   36.445276] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   36.446050] page dumped because: kasan: bad access detected
[   36.446688] 
[   36.447026] Memory state around the buggy address:
[   36.447667]  fff00000c6735f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.448387]  fff00000c6736000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.449130] >fff00000c6736080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   36.449762]                                                           ^
[   36.450547]  fff00000c6736100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   36.451253]  fff00000c6736180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   36.452052] ==================================================================
[   36.139849] ==================================================================
[   36.140901] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   36.141668] Write of size 1 at addr fff00000c449b6ea by task kunit_try_catch/147
[   36.142524] 
[   36.142900] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   36.144825] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.145502] Hardware name: linux,dummy-virt (DT)
[   36.146226] Call trace:
[   36.146789]  show_stack+0x20/0x38 (C)
[   36.147509]  dump_stack_lvl+0x8c/0xd0
[   36.148205]  print_report+0x118/0x5e0
[   36.148914]  kasan_report+0xc8/0x118
[   36.149600]  __asan_report_store1_noabort+0x20/0x30
[   36.150358]  krealloc_less_oob_helper+0xae4/0xc50
[   36.150892]  krealloc_less_oob+0x20/0x38
[   36.151405]  kunit_try_run_case+0x14c/0x3d0
[   36.152035]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.152772]  kthread+0x24c/0x2d0
[   36.153215]  ret_from_fork+0x10/0x20
[   36.153813] 
[   36.154136] Allocated by task 147:
[   36.154635]  kasan_save_stack+0x3c/0x68
[   36.155254]  kasan_save_track+0x20/0x40
[   36.155823]  kasan_save_alloc_info+0x40/0x58
[   36.156423]  __kasan_krealloc+0x118/0x178
[   36.157027]  krealloc_noprof+0x128/0x360
[   36.157575]  krealloc_less_oob_helper+0x168/0xc50
[   36.158154]  krealloc_less_oob+0x20/0x38
[   36.158633]  kunit_try_run_case+0x14c/0x3d0
[   36.159239]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.159819]  kthread+0x24c/0x2d0
[   36.160357]  ret_from_fork+0x10/0x20
[   36.160911] 
[   36.161250] The buggy address belongs to the object at fff00000c449b600
[   36.161250]  which belongs to the cache kmalloc-256 of size 256
[   36.162305] The buggy address is located 33 bytes to the right of
[   36.162305]  allocated 201-byte region [fff00000c449b600, fff00000c449b6c9)
[   36.163525] 
[   36.163860] The buggy address belongs to the physical page:
[   36.164569] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10449a
[   36.165457] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.166178] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.166988] page_type: f5(slab)
[   36.167428] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   36.168268] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   36.169037] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   36.169854] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   36.170745] head: 0bfffe0000000001 ffffc1ffc3112681 ffffffffffffffff 0000000000000000
[   36.171546] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   36.172257] page dumped because: kasan: bad access detected
[   36.172924] 
[   36.173263] Memory state around the buggy address:
[   36.173809]  fff00000c449b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.174609]  fff00000c449b600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.175356] >fff00000c449b680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   36.176097]                                                           ^
[   36.176890]  fff00000c449b700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.177600]  fff00000c449b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.178416] ==================================================================
[   36.054004] ==================================================================
[   36.054690] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   36.055414] Write of size 1 at addr fff00000c449b6d0 by task kunit_try_catch/147
[   36.057238] 
[   36.057818] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   36.059533] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.060211] Hardware name: linux,dummy-virt (DT)
[   36.061149] Call trace:
[   36.061538]  show_stack+0x20/0x38 (C)
[   36.062081]  dump_stack_lvl+0x8c/0xd0
[   36.062564]  print_report+0x118/0x5e0
[   36.063055]  kasan_report+0xc8/0x118
[   36.063656]  __asan_report_store1_noabort+0x20/0x30
[   36.064413]  krealloc_less_oob_helper+0xb9c/0xc50
[   36.065134]  krealloc_less_oob+0x20/0x38
[   36.065807]  kunit_try_run_case+0x14c/0x3d0
[   36.066365]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.067032]  kthread+0x24c/0x2d0
[   36.067577]  ret_from_fork+0x10/0x20
[   36.068088] 
[   36.068435] Allocated by task 147:
[   36.068938]  kasan_save_stack+0x3c/0x68
[   36.069542]  kasan_save_track+0x20/0x40
[   36.070111]  kasan_save_alloc_info+0x40/0x58
[   36.070686]  __kasan_krealloc+0x118/0x178
[   36.071236]  krealloc_noprof+0x128/0x360
[   36.071834]  krealloc_less_oob_helper+0x168/0xc50
[   36.072494]  krealloc_less_oob+0x20/0x38
[   36.073010]  kunit_try_run_case+0x14c/0x3d0
[   36.073571]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.074223]  kthread+0x24c/0x2d0
[   36.074709]  ret_from_fork+0x10/0x20
[   36.075166] 
[   36.075507] The buggy address belongs to the object at fff00000c449b600
[   36.075507]  which belongs to the cache kmalloc-256 of size 256
[   36.076666] The buggy address is located 7 bytes to the right of
[   36.076666]  allocated 201-byte region [fff00000c449b600, fff00000c449b6c9)
[   36.077920] 
[   36.078222] The buggy address belongs to the physical page:
[   36.078905] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10449a
[   36.079713] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.080592] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.081287] page_type: f5(slab)
[   36.081824] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   36.082670] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   36.083576] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   36.084305] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   36.085115] head: 0bfffe0000000001 ffffc1ffc3112681 ffffffffffffffff 0000000000000000
[   36.085893] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   36.086698] page dumped because: kasan: bad access detected
[   36.087372] 
[   36.087713] Memory state around the buggy address:
[   36.088272]  fff00000c449b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.089009]  fff00000c449b600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.089723] >fff00000c449b680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   36.090535]                                                  ^
[   36.091217]  fff00000c449b700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.092084]  fff00000c449b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.092775] ==================================================================
[   36.096761] ==================================================================
[   36.097488] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   36.098245] Write of size 1 at addr fff00000c449b6da by task kunit_try_catch/147
[   36.099002] 
[   36.099373] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   36.100877] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.101716] Hardware name: linux,dummy-virt (DT)
[   36.102291] Call trace:
[   36.102657]  show_stack+0x20/0x38 (C)
[   36.103212]  dump_stack_lvl+0x8c/0xd0
[   36.103759]  print_report+0x118/0x5e0
[   36.104260]  kasan_report+0xc8/0x118
[   36.104886]  __asan_report_store1_noabort+0x20/0x30
[   36.106041]  krealloc_less_oob_helper+0xa80/0xc50
[   36.106674]  krealloc_less_oob+0x20/0x38
[   36.107180]  kunit_try_run_case+0x14c/0x3d0
[   36.107835]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.108557]  kthread+0x24c/0x2d0
[   36.109080]  ret_from_fork+0x10/0x20
[   36.109948] 
[   36.110264] Allocated by task 147:
[   36.110819]  kasan_save_stack+0x3c/0x68
[   36.111418]  kasan_save_track+0x20/0x40
[   36.111938]  kasan_save_alloc_info+0x40/0x58
[   36.112587]  __kasan_krealloc+0x118/0x178
[   36.113160]  krealloc_noprof+0x128/0x360
[   36.113774]  krealloc_less_oob_helper+0x168/0xc50
[   36.114934]  krealloc_less_oob+0x20/0x38
[   36.115328]  kunit_try_run_case+0x14c/0x3d0
[   36.116300]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.117101]  kthread+0x24c/0x2d0
[   36.117521]  ret_from_fork+0x10/0x20
[   36.118139] 
[   36.118555] The buggy address belongs to the object at fff00000c449b600
[   36.118555]  which belongs to the cache kmalloc-256 of size 256
[   36.119853] The buggy address is located 17 bytes to the right of
[   36.119853]  allocated 201-byte region [fff00000c449b600, fff00000c449b6c9)
[   36.121212] 
[   36.121684] The buggy address belongs to the physical page:
[   36.122318] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10449a
[   36.123035] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.123947] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.124868] page_type: f5(slab)
[   36.125342] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   36.126119] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   36.127024] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   36.127869] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   36.128677] head: 0bfffe0000000001 ffffc1ffc3112681 ffffffffffffffff 0000000000000000
[   36.129561] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   36.130314] page dumped because: kasan: bad access detected
[   36.130919] 
[   36.131258] Memory state around the buggy address:
[   36.131791]  fff00000c449b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.132593]  fff00000c449b600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.133368] >fff00000c449b680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   36.134100]                                                     ^
[   36.134787]  fff00000c449b700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.135550]  fff00000c449b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.136296] ==================================================================
[   36.182322] ==================================================================
[   36.183552] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   36.184146] Write of size 1 at addr fff00000c449b6eb by task kunit_try_catch/147
[   36.185053] 
[   36.186118] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   36.187590] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.188273] Hardware name: linux,dummy-virt (DT)
[   36.188834] Call trace:
[   36.189206]  show_stack+0x20/0x38 (C)
[   36.189823]  dump_stack_lvl+0x8c/0xd0
[   36.190397]  print_report+0x118/0x5e0
[   36.191027]  kasan_report+0xc8/0x118
[   36.191643]  __asan_report_store1_noabort+0x20/0x30
[   36.192250]  krealloc_less_oob_helper+0xa58/0xc50
[   36.192957]  krealloc_less_oob+0x20/0x38
[   36.193523]  kunit_try_run_case+0x14c/0x3d0
[   36.194182]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.194818]  kthread+0x24c/0x2d0
[   36.195388]  ret_from_fork+0x10/0x20
[   36.195962] 
[   36.196344] Allocated by task 147:
[   36.196904]  kasan_save_stack+0x3c/0x68
[   36.197416]  kasan_save_track+0x20/0x40
[   36.198033]  kasan_save_alloc_info+0x40/0x58
[   36.198634]  __kasan_krealloc+0x118/0x178
[   36.199259]  krealloc_noprof+0x128/0x360
[   36.199805]  krealloc_less_oob_helper+0x168/0xc50
[   36.200551]  krealloc_less_oob+0x20/0x38
[   36.201090]  kunit_try_run_case+0x14c/0x3d0
[   36.201697]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.202391]  kthread+0x24c/0x2d0
[   36.202935]  ret_from_fork+0x10/0x20
[   36.203462] 
[   36.203840] The buggy address belongs to the object at fff00000c449b600
[   36.203840]  which belongs to the cache kmalloc-256 of size 256
[   36.204980] The buggy address is located 34 bytes to the right of
[   36.204980]  allocated 201-byte region [fff00000c449b600, fff00000c449b6c9)
[   36.206246] 
[   36.206627] The buggy address belongs to the physical page:
[   36.207274] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10449a
[   36.208124] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.209019] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.209852] page_type: f5(slab)
[   36.210296] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   36.211181] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   36.212079] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   36.212957] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   36.213737] head: 0bfffe0000000001 ffffc1ffc3112681 ffffffffffffffff 0000000000000000
[   36.214111] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   36.214477] page dumped because: kasan: bad access detected
[   36.215120] 
[   36.215479] Memory state around the buggy address:
[   36.216398]  fff00000c449b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.217162]  fff00000c449b600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.217590] >fff00000c449b680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   36.218530]                                                           ^
[   36.219385]  fff00000c449b700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.220281]  fff00000c449b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.221146] ==================================================================
[   36.396426] ==================================================================
[   36.397995] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   36.398855] Write of size 1 at addr fff00000c67360ea by task kunit_try_catch/151
[   36.399709] 
[   36.400070] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   36.402369] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.402847] Hardware name: linux,dummy-virt (DT)
[   36.403394] Call trace:
[   36.403825]  show_stack+0x20/0x38 (C)
[   36.404374]  dump_stack_lvl+0x8c/0xd0
[   36.404897]  print_report+0x118/0x5e0
[   36.405410]  kasan_report+0xc8/0x118
[   36.405995]  __asan_report_store1_noabort+0x20/0x30
[   36.406680]  krealloc_less_oob_helper+0xae4/0xc50
[   36.407337]  krealloc_large_less_oob+0x20/0x38
[   36.408005]  kunit_try_run_case+0x14c/0x3d0
[   36.408655]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.409341]  kthread+0x24c/0x2d0
[   36.409836]  ret_from_fork+0x10/0x20
[   36.410354] 
[   36.410687] The buggy address belongs to the physical page:
[   36.411354] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106734
[   36.412159] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.412966] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.413769] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.414518] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   36.415301] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.416036] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   36.416901] head: 0bfffe0000000002 ffffc1ffc319cd01 ffffffffffffffff 0000000000000000
[   36.417744] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   36.418606] page dumped because: kasan: bad access detected
[   36.419198] 
[   36.419528] Memory state around the buggy address:
[   36.420002]  fff00000c6735f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.420855]  fff00000c6736000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.421599] >fff00000c6736080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   36.422307]                                                           ^
[   36.423108]  fff00000c6736100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   36.423811]  fff00000c6736180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   36.424560] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   36.232513] ==================================================================
[   36.234292] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680
[   36.235171] Write of size 1 at addr fff00000c64d60eb by task kunit_try_catch/149
[   36.235911] 
[   36.236291] CPU: 0 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   36.238176] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.238601] Hardware name: linux,dummy-virt (DT)
[   36.239286] Call trace:
[   36.239819]  show_stack+0x20/0x38 (C)
[   36.240483]  dump_stack_lvl+0x8c/0xd0
[   36.241102]  print_report+0x118/0x5e0
[   36.241792]  kasan_report+0xc8/0x118
[   36.242484]  __asan_report_store1_noabort+0x20/0x30
[   36.243005]  krealloc_more_oob_helper+0x614/0x680
[   36.243537]  krealloc_large_more_oob+0x20/0x38
[   36.244621]  kunit_try_run_case+0x14c/0x3d0
[   36.245465]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.246153]  kthread+0x24c/0x2d0
[   36.246674]  ret_from_fork+0x10/0x20
[   36.247277] 
[   36.247647] The buggy address belongs to the physical page:
[   36.248263] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064d4
[   36.249018] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.250113] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.250714] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.251288] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   36.252184] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.253657] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   36.254890] head: 0bfffe0000000002 ffffc1ffc3193501 ffffffffffffffff 0000000000000000
[   36.255682] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   36.256673] page dumped because: kasan: bad access detected
[   36.257489] 
[   36.257734] Memory state around the buggy address:
[   36.258426]  fff00000c64d5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.259879]  fff00000c64d6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.260731] >fff00000c64d6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   36.261610]                                                           ^
[   36.262426]  fff00000c64d6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   36.263146]  fff00000c64d6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   36.264015] ==================================================================
[   35.906995] ==================================================================
[   35.908062] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680
[   35.908981] Write of size 1 at addr fff00000c449b4eb by task kunit_try_catch/145
[   35.910393] 
[   35.910820] CPU: 1 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   35.912068] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.912890] Hardware name: linux,dummy-virt (DT)
[   35.913930] Call trace:
[   35.914724]  show_stack+0x20/0x38 (C)
[   35.915240]  dump_stack_lvl+0x8c/0xd0
[   35.915797]  print_report+0x118/0x5e0
[   35.916376]  kasan_report+0xc8/0x118
[   35.916962]  __asan_report_store1_noabort+0x20/0x30
[   35.918040]  krealloc_more_oob_helper+0x614/0x680
[   35.918697]  krealloc_more_oob+0x20/0x38
[   35.919168]  kunit_try_run_case+0x14c/0x3d0
[   35.919802]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.920472]  kthread+0x24c/0x2d0
[   35.920967]  ret_from_fork+0x10/0x20
[   35.921642] 
[   35.921968] Allocated by task 145:
[   35.922387]  kasan_save_stack+0x3c/0x68
[   35.922988]  kasan_save_track+0x20/0x40
[   35.923461]  kasan_save_alloc_info+0x40/0x58
[   35.924085]  __kasan_krealloc+0x118/0x178
[   35.924682]  krealloc_noprof+0x128/0x360
[   35.925177]  krealloc_more_oob_helper+0x168/0x680
[   35.926794]  krealloc_more_oob+0x20/0x38
[   35.927333]  kunit_try_run_case+0x14c/0x3d0
[   35.927864]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.928521]  kthread+0x24c/0x2d0
[   35.928993]  ret_from_fork+0x10/0x20
[   35.929536] 
[   35.930112] The buggy address belongs to the object at fff00000c449b400
[   35.930112]  which belongs to the cache kmalloc-256 of size 256
[   35.931513] The buggy address is located 0 bytes to the right of
[   35.931513]  allocated 235-byte region [fff00000c449b400, fff00000c449b4eb)
[   35.932704] 
[   35.933116] The buggy address belongs to the physical page:
[   35.934503] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10449a
[   35.935146] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   35.936891] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   35.937585] page_type: f5(slab)
[   35.938084] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   35.938980] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   35.939807] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   35.940635] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   35.941527] head: 0bfffe0000000001 ffffc1ffc3112681 ffffffffffffffff 0000000000000000
[   35.942482] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   35.943231] page dumped because: kasan: bad access detected
[   35.944214] 
[   35.944699] Memory state around the buggy address:
[   35.945765]  fff00000c449b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.946767]  fff00000c449b400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.947854] >fff00000c449b480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   35.948782]                                                           ^
[   35.949691]  fff00000c449b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.950523]  fff00000c449b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.951180] ==================================================================
[   35.953922] ==================================================================
[   35.954532] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680
[   35.955168] Write of size 1 at addr fff00000c449b4f0 by task kunit_try_catch/145
[   35.956030] 
[   35.956392] CPU: 1 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   35.958254] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.958767] Hardware name: linux,dummy-virt (DT)
[   35.959237] Call trace:
[   35.959628]  show_stack+0x20/0x38 (C)
[   35.960190]  dump_stack_lvl+0x8c/0xd0
[   35.960801]  print_report+0x118/0x5e0
[   35.961627]  kasan_report+0xc8/0x118
[   35.962109]  __asan_report_store1_noabort+0x20/0x30
[   35.962749]  krealloc_more_oob_helper+0x5c8/0x680
[   35.963258]  krealloc_more_oob+0x20/0x38
[   35.963865]  kunit_try_run_case+0x14c/0x3d0
[   35.964499]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.965091]  kthread+0x24c/0x2d0
[   35.965938]  ret_from_fork+0x10/0x20
[   35.966524] 
[   35.966826] Allocated by task 145:
[   35.967538]  kasan_save_stack+0x3c/0x68
[   35.968082]  kasan_save_track+0x20/0x40
[   35.968655]  kasan_save_alloc_info+0x40/0x58
[   35.969232]  __kasan_krealloc+0x118/0x178
[   35.969795]  krealloc_noprof+0x128/0x360
[   35.970371]  krealloc_more_oob_helper+0x168/0x680
[   35.971002]  krealloc_more_oob+0x20/0x38
[   35.971597]  kunit_try_run_case+0x14c/0x3d0
[   35.972076]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.972765]  kthread+0x24c/0x2d0
[   35.973268]  ret_from_fork+0x10/0x20
[   35.974612] 
[   35.974967] The buggy address belongs to the object at fff00000c449b400
[   35.974967]  which belongs to the cache kmalloc-256 of size 256
[   35.976082] The buggy address is located 5 bytes to the right of
[   35.976082]  allocated 235-byte region [fff00000c449b400, fff00000c449b4eb)
[   35.978244] 
[   35.978601] The buggy address belongs to the physical page:
[   35.979210] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10449a
[   35.980463] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   35.981270] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   35.982352] page_type: f5(slab)
[   35.982830] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   35.983764] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   35.984635] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   35.985639] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   35.986475] head: 0bfffe0000000001 ffffc1ffc3112681 ffffffffffffffff 0000000000000000
[   35.987284] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   35.988136] page dumped because: kasan: bad access detected
[   35.988821] 
[   35.989103] Memory state around the buggy address:
[   35.990158]  fff00000c449b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.990885]  fff00000c449b400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.991689] >fff00000c449b480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   35.992475]                                                              ^
[   35.993276]  fff00000c449b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.994389]  fff00000c449b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.995136] ==================================================================
[   36.265744] ==================================================================
[   36.266545] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680
[   36.267507] Write of size 1 at addr fff00000c64d60f0 by task kunit_try_catch/149
[   36.268231] 
[   36.268588] CPU: 0 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   36.269696] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.270258] Hardware name: linux,dummy-virt (DT)
[   36.270941] Call trace:
[   36.271366]  show_stack+0x20/0x38 (C)
[   36.271815]  dump_stack_lvl+0x8c/0xd0
[   36.272412]  print_report+0x118/0x5e0
[   36.273050]  kasan_report+0xc8/0x118
[   36.273742]  __asan_report_store1_noabort+0x20/0x30
[   36.274491]  krealloc_more_oob_helper+0x5c8/0x680
[   36.275201]  krealloc_large_more_oob+0x20/0x38
[   36.275754]  kunit_try_run_case+0x14c/0x3d0
[   36.276456]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.277259]  kthread+0x24c/0x2d0
[   36.277913]  ret_from_fork+0x10/0x20
[   36.278530] 
[   36.278782] The buggy address belongs to the physical page:
[   36.279217] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064d4
[   36.280117] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.281065] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.282169] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.283042] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   36.283944] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.284860] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   36.285632] head: 0bfffe0000000002 ffffc1ffc3193501 ffffffffffffffff 0000000000000000
[   36.286558] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   36.287206] page dumped because: kasan: bad access detected
[   36.288008] 
[   36.288348] Memory state around the buggy address:
[   36.289022]  fff00000c64d5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.289930]  fff00000c64d6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.290753] >fff00000c64d6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   36.291535]                                                              ^
[   36.292419]  fff00000c64d6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   36.293113]  fff00000c64d6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   36.294112] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[   35.867518] ==================================================================
[   35.868827] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   35.869509] Read of size 1 at addr fff00000c6770000 by task kunit_try_catch/143
[   35.871189] 
[   35.871607] CPU: 1 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   35.873024] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.874248] Hardware name: linux,dummy-virt (DT)
[   35.874841] Call trace:
[   35.875325]  show_stack+0x20/0x38 (C)
[   35.875994]  dump_stack_lvl+0x8c/0xd0
[   35.876626]  print_report+0x118/0x5e0
[   35.877229]  kasan_report+0xc8/0x118
[   35.877782]  __asan_report_load1_noabort+0x20/0x30
[   35.878415]  page_alloc_uaf+0x328/0x350
[   35.879210]  kunit_try_run_case+0x14c/0x3d0
[   35.879951]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.880547]  kthread+0x24c/0x2d0
[   35.881060]  ret_from_fork+0x10/0x20
[   35.881649] 
[   35.881973] The buggy address belongs to the physical page:
[   35.883123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106770
[   35.884074] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.885487] page_type: f0(buddy)
[   35.886662] raw: 0bfffe0000000000 fff00000ff6150e0 fff00000ff6150e0 0000000000000000
[   35.888098] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000
[   35.889385] page dumped because: kasan: bad access detected
[   35.890177] 
[   35.890428] Memory state around the buggy address:
[   35.890866]  fff00000c676ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.892033]  fff00000c676ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.893009] >fff00000c6770000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.894128]                    ^
[   35.894619]  fff00000c6770080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.895500]  fff00000c6770100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.896273] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[   35.816090] ==================================================================
[   35.817224] BUG: KASAN: invalid-free in kfree+0x278/0x3d0
[   35.818372] Free of addr fff00000c6730001 by task kunit_try_catch/139
[   35.819801] 
[   35.820185] CPU: 1 UID: 0 PID: 139 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   35.821255] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.821987] Hardware name: linux,dummy-virt (DT)
[   35.822426] Call trace:
[   35.822833]  show_stack+0x20/0x38 (C)
[   35.823430]  dump_stack_lvl+0x8c/0xd0
[   35.824043]  print_report+0x118/0x5e0
[   35.824594]  kasan_report_invalid_free+0xb0/0xd8
[   35.825216]  __kasan_kfree_large+0x5c/0xa8
[   35.825835]  free_large_kmalloc+0x58/0x140
[   35.826464]  kfree+0x278/0x3d0
[   35.827006]  kmalloc_large_invalid_free+0x108/0x270
[   35.827792]  kunit_try_run_case+0x14c/0x3d0
[   35.828466]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.829137]  kthread+0x24c/0x2d0
[   35.829887]  ret_from_fork+0x10/0x20
[   35.830487] 
[   35.830820] The buggy address belongs to the physical page:
[   35.831344] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106730
[   35.832282] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   35.833023] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   35.834242] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   35.835104] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   35.836118] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   35.836943] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   35.837739] head: 0bfffe0000000002 ffffc1ffc319cc01 ffffffffffffffff 0000000000000000
[   35.838553] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   35.839312] page dumped because: kasan: bad access detected
[   35.840854] 
[   35.841266] Memory state around the buggy address:
[   35.842132]  fff00000c672ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.843147]  fff00000c672ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.843979] >fff00000c6730000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.844848]                    ^
[   35.845772]  fff00000c6730080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.846521]  fff00000c6730100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.847305] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[   35.779585] ==================================================================
[   35.780804] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   35.781613] Read of size 1 at addr fff00000c64d0000 by task kunit_try_catch/137
[   35.782209] 
[   35.782859] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   35.784176] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.785103] Hardware name: linux,dummy-virt (DT)
[   35.786057] Call trace:
[   35.786371]  show_stack+0x20/0x38 (C)
[   35.786854]  dump_stack_lvl+0x8c/0xd0
[   35.787268]  print_report+0x118/0x5e0
[   35.787649]  kasan_report+0xc8/0x118
[   35.789006]  __asan_report_load1_noabort+0x20/0x30
[   35.789660]  kmalloc_large_uaf+0x2cc/0x2f8
[   35.790519]  kunit_try_run_case+0x14c/0x3d0
[   35.791183]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.791719]  kthread+0x24c/0x2d0
[   35.792120]  ret_from_fork+0x10/0x20
[   35.792838] 
[   35.793623] The buggy address belongs to the physical page:
[   35.794954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064d0
[   35.796330] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.797113] raw: 0bfffe0000000000 ffffc1ffc3193508 fff00000da4e4f80 0000000000000000
[   35.798216] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   35.799173] page dumped because: kasan: bad access detected
[   35.799876] 
[   35.800201] Memory state around the buggy address:
[   35.801131]  fff00000c64cff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.801876]  fff00000c64cff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.803266] >fff00000c64d0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.803886]                    ^
[   35.804321]  fff00000c64d0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.805047]  fff00000c64d0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.805865] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   35.738825] ==================================================================
[   35.739782] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   35.740627] Write of size 1 at addr fff00000c673200a by task kunit_try_catch/135
[   35.741331] 
[   35.742438] CPU: 1 UID: 0 PID: 135 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   35.743398] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.743939] Hardware name: linux,dummy-virt (DT)
[   35.744581] Call trace:
[   35.745053]  show_stack+0x20/0x38 (C)
[   35.745970]  dump_stack_lvl+0x8c/0xd0
[   35.746694]  print_report+0x118/0x5e0
[   35.747405]  kasan_report+0xc8/0x118
[   35.747973]  __asan_report_store1_noabort+0x20/0x30
[   35.748545]  kmalloc_large_oob_right+0x278/0x2b8
[   35.749691]  kunit_try_run_case+0x14c/0x3d0
[   35.750235]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.751013]  kthread+0x24c/0x2d0
[   35.751806]  ret_from_fork+0x10/0x20
[   35.752301] 
[   35.752803] The buggy address belongs to the physical page:
[   35.753808] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106730
[   35.754477] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   35.755208] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   35.756107] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   35.756907] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   35.757784] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   35.758593] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   35.759468] head: 0bfffe0000000002 ffffc1ffc319cc01 ffffffffffffffff 0000000000000000
[   35.760319] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   35.761149] page dumped because: kasan: bad access detected
[   35.761875] 
[   35.762107] Memory state around the buggy address:
[   35.763094]  fff00000c6731f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.764483]  fff00000c6731f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.765489] >fff00000c6732000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   35.766136]                       ^
[   35.766670]  fff00000c6732080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   35.767293]  fff00000c6732100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   35.768129] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[   35.688146] ==================================================================
[   35.689337] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   35.690548] Write of size 1 at addr fff00000c6729f00 by task kunit_try_catch/133
[   35.691160] 
[   35.691546] CPU: 1 UID: 0 PID: 133 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   35.692674] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.693229] Hardware name: linux,dummy-virt (DT)
[   35.693798] Call trace:
[   35.694211]  show_stack+0x20/0x38 (C)
[   35.694854]  dump_stack_lvl+0x8c/0xd0
[   35.695423]  print_report+0x118/0x5e0
[   35.695910]  kasan_report+0xc8/0x118
[   35.696518]  __asan_report_store1_noabort+0x20/0x30
[   35.697203]  kmalloc_big_oob_right+0x2a4/0x2f0
[   35.697754]  kunit_try_run_case+0x14c/0x3d0
[   35.698638]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.699293]  kthread+0x24c/0x2d0
[   35.699950]  ret_from_fork+0x10/0x20
[   35.700513] 
[   35.700790] Allocated by task 133:
[   35.701641]  kasan_save_stack+0x3c/0x68
[   35.702199]  kasan_save_track+0x20/0x40
[   35.702746]  kasan_save_alloc_info+0x40/0x58
[   35.703304]  __kasan_kmalloc+0xd4/0xd8
[   35.703890]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.704534]  kmalloc_big_oob_right+0xb8/0x2f0
[   35.705182]  kunit_try_run_case+0x14c/0x3d0
[   35.706217]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.706818]  kthread+0x24c/0x2d0
[   35.707332]  ret_from_fork+0x10/0x20
[   35.707832] 
[   35.708142] The buggy address belongs to the object at fff00000c6728000
[   35.708142]  which belongs to the cache kmalloc-8k of size 8192
[   35.709342] The buggy address is located 0 bytes to the right of
[   35.709342]  allocated 7936-byte region [fff00000c6728000, fff00000c6729f00)
[   35.711293] 
[   35.711660] The buggy address belongs to the physical page:
[   35.712274] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106728
[   35.713932] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   35.714591] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   35.715362] page_type: f5(slab)
[   35.716027] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   35.716681] raw: 0000000000000000 0000000080020002 00000001f5000000 0000000000000000
[   35.717533] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   35.718310] head: 0000000000000000 0000000080020002 00000001f5000000 0000000000000000
[   35.719104] head: 0bfffe0000000003 ffffc1ffc319ca01 ffffffffffffffff 0000000000000000
[   35.719918] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000
[   35.720692] page dumped because: kasan: bad access detected
[   35.721315] 
[   35.721904] Memory state around the buggy address:
[   35.722469]  fff00000c6729e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.723377]  fff00000c6729e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.724140] >fff00000c6729f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.724988]                    ^
[   35.725662]  fff00000c6729f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.726392]  fff00000c672a000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.727168] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[   35.603762] ==================================================================
[   35.605480] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x414/0x490
[   35.606399] Write of size 1 at addr fff00000c653a678 by task kunit_try_catch/131
[   35.608097] 
[   35.608504] CPU: 0 UID: 0 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   35.609894] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.610515] Hardware name: linux,dummy-virt (DT)
[   35.611023] Call trace:
[   35.611497]  show_stack+0x20/0x38 (C)
[   35.612223]  dump_stack_lvl+0x8c/0xd0
[   35.612855]  print_report+0x118/0x5e0
[   35.613431]  kasan_report+0xc8/0x118
[   35.613993]  __asan_report_store1_noabort+0x20/0x30
[   35.614563]  kmalloc_track_caller_oob_right+0x414/0x490
[   35.615289]  kunit_try_run_case+0x14c/0x3d0
[   35.615938]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.617506]  kthread+0x24c/0x2d0
[   35.618564]  ret_from_fork+0x10/0x20
[   35.619167] 
[   35.619506] Allocated by task 131:
[   35.620050]  kasan_save_stack+0x3c/0x68
[   35.620702]  kasan_save_track+0x20/0x40
[   35.621383]  kasan_save_alloc_info+0x40/0x58
[   35.621944]  __kasan_kmalloc+0xd4/0xd8
[   35.622415]  __kmalloc_node_track_caller_noprof+0x184/0x4b8
[   35.623498]  kmalloc_track_caller_oob_right+0xa8/0x490
[   35.624982]  kunit_try_run_case+0x14c/0x3d0
[   35.625577]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.626093]  kthread+0x24c/0x2d0
[   35.626543]  ret_from_fork+0x10/0x20
[   35.627092] 
[   35.627437] The buggy address belongs to the object at fff00000c653a600
[   35.627437]  which belongs to the cache kmalloc-128 of size 128
[   35.628426] The buggy address is located 0 bytes to the right of
[   35.628426]  allocated 120-byte region [fff00000c653a600, fff00000c653a678)
[   35.629567] 
[   35.630232] The buggy address belongs to the physical page:
[   35.631273] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653a
[   35.631967] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.633218] page_type: f5(slab)
[   35.633970] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   35.635072] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   35.635972] page dumped because: kasan: bad access detected
[   35.636686] 
[   35.637017] Memory state around the buggy address:
[   35.637913]  fff00000c653a500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   35.638954]  fff00000c653a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.639863] >fff00000c653a600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   35.640640]                                                                 ^
[   35.641744]  fff00000c653a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.642472]  fff00000c653a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.643307] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[   35.550969] ==================================================================
[   35.552096] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   35.552978] Read of size 1 at addr fff00000c649d000 by task kunit_try_catch/129
[   35.553899] 
[   35.554285] CPU: 1 UID: 0 PID: 129 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   35.555677] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.556695] Hardware name: linux,dummy-virt (DT)
[   35.557195] Call trace:
[   35.558054]  show_stack+0x20/0x38 (C)
[   35.558654]  dump_stack_lvl+0x8c/0xd0
[   35.559359]  print_report+0x118/0x5e0
[   35.559911]  kasan_report+0xc8/0x118
[   35.560489]  __asan_report_load1_noabort+0x20/0x30
[   35.561276]  kmalloc_node_oob_right+0x2f4/0x330
[   35.562459]  kunit_try_run_case+0x14c/0x3d0
[   35.562975]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.563615]  kthread+0x24c/0x2d0
[   35.564143]  ret_from_fork+0x10/0x20
[   35.564696] 
[   35.564982] Allocated by task 129:
[   35.565807]  kasan_save_stack+0x3c/0x68
[   35.566474]  kasan_save_track+0x20/0x40
[   35.567006]  kasan_save_alloc_info+0x40/0x58
[   35.567632]  __kasan_kmalloc+0xd4/0xd8
[   35.568178]  __kmalloc_cache_node_noprof+0x164/0x3d0
[   35.568767]  kmalloc_node_oob_right+0xbc/0x330
[   35.569396]  kunit_try_run_case+0x14c/0x3d0
[   35.570380]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.571089]  kthread+0x24c/0x2d0
[   35.571578]  ret_from_fork+0x10/0x20
[   35.572041] 
[   35.572388] The buggy address belongs to the object at fff00000c649c000
[   35.572388]  which belongs to the cache kmalloc-4k of size 4096
[   35.573721] The buggy address is located 0 bytes to the right of
[   35.573721]  allocated 4096-byte region [fff00000c649c000, fff00000c649d000)
[   35.575559] 
[   35.575849] The buggy address belongs to the physical page:
[   35.576623] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106498
[   35.578023] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   35.578769] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   35.579650] page_type: f5(slab)
[   35.580169] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   35.580927] raw: 0000000000000000 0000000080040004 00000001f5000000 0000000000000000
[   35.581995] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   35.583006] head: 0000000000000000 0000000080040004 00000001f5000000 0000000000000000
[   35.583838] head: 0bfffe0000000003 ffffc1ffc3192601 ffffffffffffffff 0000000000000000
[   35.584614] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000
[   35.585645] page dumped because: kasan: bad access detected
[   35.586313] 
[   35.586760] Memory state around the buggy address:
[   35.587403]  fff00000c649cf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.588408]  fff00000c649cf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.589489] >fff00000c649d000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.590667]                    ^
[   35.591236]  fff00000c649d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.592124]  fff00000c649d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.592987] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   35.492967] ==================================================================
[   35.494287] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   35.495897] Read of size 1 at addr fff00000c1bb3b5f by task kunit_try_catch/127
[   35.496753] 
[   35.497272] CPU: 0 UID: 0 PID: 127 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   35.498653] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.499152] Hardware name: linux,dummy-virt (DT)
[   35.499763] Call trace:
[   35.500283]  show_stack+0x20/0x38 (C)
[   35.500893]  dump_stack_lvl+0x8c/0xd0
[   35.501428]  print_report+0x118/0x5e0
[   35.502026]  kasan_report+0xc8/0x118
[   35.502772]  __asan_report_load1_noabort+0x20/0x30
[   35.503243]  kmalloc_oob_left+0x2ec/0x320
[   35.503671]  kunit_try_run_case+0x14c/0x3d0
[   35.504184]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.504891]  kthread+0x24c/0x2d0
[   35.506031]  ret_from_fork+0x10/0x20
[   35.506613] 
[   35.506956] Allocated by task 28:
[   35.507470]  kasan_save_stack+0x3c/0x68
[   35.508066]  kasan_save_track+0x20/0x40
[   35.508657]  kasan_save_alloc_info+0x40/0x58
[   35.510230]  __kasan_kmalloc+0xd4/0xd8
[   35.510779]  __kmalloc_node_track_caller_noprof+0x184/0x4b8
[   35.511502]  kstrdup+0x54/0xc8
[   35.511942]  devtmpfs_work_loop+0x384/0x590
[   35.512520]  devtmpfsd+0x50/0x58
[   35.513017]  kthread+0x24c/0x2d0
[   35.513590]  ret_from_fork+0x10/0x20
[   35.514428] 
[   35.514805] Freed by task 28:
[   35.515312]  kasan_save_stack+0x3c/0x68
[   35.515860]  kasan_save_track+0x20/0x40
[   35.516776]  kasan_save_free_info+0x4c/0x78
[   35.517582]  __kasan_slab_free+0x6c/0x98
[   35.518159]  kfree+0x114/0x3d0
[   35.518647]  devtmpfs_work_loop+0x498/0x590
[   35.519165]  devtmpfsd+0x50/0x58
[   35.520371]  kthread+0x24c/0x2d0
[   35.521109]  ret_from_fork+0x10/0x20
[   35.522163] 
[   35.522606] The buggy address belongs to the object at fff00000c1bb3b40
[   35.522606]  which belongs to the cache kmalloc-16 of size 16
[   35.523802] The buggy address is located 15 bytes to the right of
[   35.523802]  allocated 16-byte region [fff00000c1bb3b40, fff00000c1bb3b50)
[   35.524946] 
[   35.525291] The buggy address belongs to the physical page:
[   35.526867] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bb3
[   35.528143] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.528676] page_type: f5(slab)
[   35.529176] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.530395] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   35.531235] page dumped because: kasan: bad access detected
[   35.531809] 
[   35.532119] Memory state around the buggy address:
[   35.532642]  fff00000c1bb3a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.533501]  fff00000c1bb3a80: fa fb fc fc fa fb fc fc fa fb fc fc 00 02 fc fc
[   35.534268] >fff00000c1bb3b00: 00 02 fc fc fa fb fc fc fa fb fc fc 00 07 fc fc
[   35.535018]                                                     ^
[   35.535955]  fff00000c1bb3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.537161]  fff00000c1bb3c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.538261] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   35.359921] ==================================================================
[   35.361524] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   35.363675] Write of size 1 at addr fff00000c1bea573 by task kunit_try_catch/125
[   35.364499] 
[   35.366419] CPU: 1 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G                 N 6.12.0-next-20241120 #1
[   35.367784] Tainted: [N]=TEST
[   35.368255] Hardware name: linux,dummy-virt (DT)
[   35.369497] Call trace:
[   35.370295]  show_stack+0x20/0x38 (C)
[   35.371148]  dump_stack_lvl+0x8c/0xd0
[   35.371705]  print_report+0x118/0x5e0
[   35.372339]  kasan_report+0xc8/0x118
[   35.372950]  __asan_report_store1_noabort+0x20/0x30
[   35.373888]  kmalloc_oob_right+0x5a4/0x660
[   35.374424]  kunit_try_run_case+0x14c/0x3d0
[   35.375068]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.375816]  kthread+0x24c/0x2d0
[   35.376371]  ret_from_fork+0x10/0x20
[   35.377462] 
[   35.377892] Allocated by task 125:
[   35.378748]  kasan_save_stack+0x3c/0x68
[   35.379460]  kasan_save_track+0x20/0x40
[   35.379896]  kasan_save_alloc_info+0x40/0x58
[   35.380326]  __kasan_kmalloc+0xd4/0xd8
[   35.380775]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.381452]  kmalloc_oob_right+0xb0/0x660
[   35.382144]  kunit_try_run_case+0x14c/0x3d0
[   35.382771]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.383494]  kthread+0x24c/0x2d0
[   35.384023]  ret_from_fork+0x10/0x20
[   35.384805] 
[   35.385389] The buggy address belongs to the object at fff00000c1bea500
[   35.385389]  which belongs to the cache kmalloc-128 of size 128
[   35.387195] The buggy address is located 0 bytes to the right of
[   35.387195]  allocated 115-byte region [fff00000c1bea500, fff00000c1bea573)
[   35.388531] 
[   35.389173] The buggy address belongs to the physical page:
[   35.390656] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bea
[   35.391841] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.393079] page_type: f5(slab)
[   35.394575] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   35.395321] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   35.396311] page dumped because: kasan: bad access detected
[   35.396967] 
[   35.397325] Memory state around the buggy address:
[   35.398430]  fff00000c1bea400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   35.399312]  fff00000c1bea480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.401657] >fff00000c1bea500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   35.402507]                                                              ^
[   35.403385]  fff00000c1bea580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.404112]  fff00000c1bea600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.404943] ==================================================================
[   35.409275] ==================================================================
[   35.410088] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   35.410862] Write of size 1 at addr fff00000c1bea578 by task kunit_try_catch/125
[   35.412724] 
[   35.412979] CPU: 1 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   35.414304] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.414750] Hardware name: linux,dummy-virt (DT)
[   35.415328] Call trace:
[   35.415766]  show_stack+0x20/0x38 (C)
[   35.416383]  dump_stack_lvl+0x8c/0xd0
[   35.416917]  print_report+0x118/0x5e0
[   35.417841]  kasan_report+0xc8/0x118
[   35.418338]  __asan_report_store1_noabort+0x20/0x30
[   35.418974]  kmalloc_oob_right+0x538/0x660
[   35.419461]  kunit_try_run_case+0x14c/0x3d0
[   35.420064]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.420794]  kthread+0x24c/0x2d0
[   35.421287]  ret_from_fork+0x10/0x20
[   35.421805] 
[   35.422118] Allocated by task 125:
[   35.422576]  kasan_save_stack+0x3c/0x68
[   35.423096]  kasan_save_track+0x20/0x40
[   35.424059]  kasan_save_alloc_info+0x40/0x58
[   35.424697]  __kasan_kmalloc+0xd4/0xd8
[   35.425135]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.426177]  kmalloc_oob_right+0xb0/0x660
[   35.426700]  kunit_try_run_case+0x14c/0x3d0
[   35.427261]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.427901]  kthread+0x24c/0x2d0
[   35.428426]  ret_from_fork+0x10/0x20
[   35.428929] 
[   35.429648] The buggy address belongs to the object at fff00000c1bea500
[   35.429648]  which belongs to the cache kmalloc-128 of size 128
[   35.430847] The buggy address is located 5 bytes to the right of
[   35.430847]  allocated 115-byte region [fff00000c1bea500, fff00000c1bea573)
[   35.432748] 
[   35.433086] The buggy address belongs to the physical page:
[   35.433813] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bea
[   35.434701] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.435598] page_type: f5(slab)
[   35.435967] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   35.436894] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   35.437604] page dumped because: kasan: bad access detected
[   35.438276] 
[   35.438644] Memory state around the buggy address:
[   35.439217]  fff00000c1bea400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   35.440097]  fff00000c1bea480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.440818] >fff00000c1bea500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   35.442000]                                                                 ^
[   35.442714]  fff00000c1bea580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.443554]  fff00000c1bea600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.444223] ==================================================================
[   35.447224] ==================================================================
[   35.447932] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   35.448648] Read of size 1 at addr fff00000c1bea580 by task kunit_try_catch/125
[   35.449852] 
[   35.450237] CPU: 1 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   35.451480] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.452106] Hardware name: linux,dummy-virt (DT)
[   35.452817] Call trace:
[   35.453295]  show_stack+0x20/0x38 (C)
[   35.454048]  dump_stack_lvl+0x8c/0xd0
[   35.454622]  print_report+0x118/0x5e0
[   35.455341]  kasan_report+0xc8/0x118
[   35.455978]  __asan_report_load1_noabort+0x20/0x30
[   35.456641]  kmalloc_oob_right+0x5d0/0x660
[   35.457181]  kunit_try_run_case+0x14c/0x3d0
[   35.458149]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.458806]  kthread+0x24c/0x2d0
[   35.459321]  ret_from_fork+0x10/0x20
[   35.459951] 
[   35.460268] Allocated by task 125:
[   35.460928]  kasan_save_stack+0x3c/0x68
[   35.461813]  kasan_save_track+0x20/0x40
[   35.462411]  kasan_save_alloc_info+0x40/0x58
[   35.463077]  __kasan_kmalloc+0xd4/0xd8
[   35.463590]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.464209]  kmalloc_oob_right+0xb0/0x660
[   35.464605]  kunit_try_run_case+0x14c/0x3d0
[   35.465196]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.466122]  kthread+0x24c/0x2d0
[   35.466604]  ret_from_fork+0x10/0x20
[   35.467152] 
[   35.467511] The buggy address belongs to the object at fff00000c1bea500
[   35.467511]  which belongs to the cache kmalloc-128 of size 128
[   35.468655] The buggy address is located 13 bytes to the right of
[   35.468655]  allocated 115-byte region [fff00000c1bea500, fff00000c1bea573)
[   35.469980] 
[   35.470629] The buggy address belongs to the physical page:
[   35.471311] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bea
[   35.471930] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.472528] page_type: f5(slab)
[   35.473822] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   35.474600] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   35.475354] page dumped because: kasan: bad access detected
[   35.476037] 
[   35.476371] Memory state around the buggy address:
[   35.476917]  fff00000c1bea480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.478200]  fff00000c1bea500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   35.479085] >fff00000c1bea580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.479714]                    ^
[   35.480204]  fff00000c1bea600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.481025]  fff00000c1bea680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.482174] ==================================================================
Failure - log-parser-boot - internal-error-oops-oops-preempt-smp KNOWN ISSUE - kunit_test_null_dereference internal oops on qemu-arm64 KUNIT KASAN
[  147.389904] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
[  147.390840] Modules linked in:
[  147.391685] CPU: 1 UID: 0 PID: 625 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[  147.393177] Tainted: [B]=BAD_PAGE, [N]=TEST
[  147.393746] Hardware name: linux,dummy-virt (DT)
[  147.394348] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  147.396534] pc : kunit_test_null_dereference+0x70/0x170
[  147.397510] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[  147.398435] sp : ffff800083377dc0
[  147.398960] x29: ffff800083377e20 x28: 0000000000000000 x27: 0000000000000000
[  147.400198] x26: 0000000000000000 x25: 0000000000000000 x24: fff00000cb1a4500
[  147.400982] x23: ffffa2dae33c90f0 x22: ffffa2dae33d1cb0 x21: fff00000cb1a4508
[  147.402357] x20: 1ffff0001066efb8 x19: ffff8000800879f0 x18: 000000005053a98d
[  147.403333] x17: 0000000000000001 x16: fff00000da502ca0 x15: fff00000ff615b48
[  147.404397] x14: 0000000086343cdf x13: fff00000da502c98 x12: fffd80001980e8b2
[  147.405437] x11: 1ffe00001980e8b1 x10: fffd80001980e8b1 x9 : ffffa2dae33c9178
[  147.406572] x8 : ffff800083377cb8 x7 : 0000000000000001 x6 : 0000000041b58ab3
[  147.407659] x5 : ffff70001066efb8 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[  147.408674] x2 : dfff800000000000 x1 : fff00000cc073cc0 x0 : ffff8000800879f0
[  147.409838] Call trace:
[  147.410215]  kunit_test_null_dereference+0x70/0x170 (P)
[  147.411074]  kunit_generic_run_threadfn_adapter+0x88/0x100 (L)
[  147.411723]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  147.412035]  kthread+0x24c/0x2d0
[  147.412289]  ret_from_fork+0x10/0x20
[  147.413186] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[  147.414849] ---[ end trace 0000000000000000 ]---