Hay
Date
Nov. 26, 2024, 6:09 a.m.
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[   32.291052] ==================================================================
[   32.292132] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   32.292952] Read of size 8 at addr fff00000c5e26fc0 by task kunit_try_catch/189
[   32.294001] 
[   32.294402] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   32.295716] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.296340] Hardware name: linux,dummy-virt (DT)
[   32.296982] Call trace:
[   32.297435]  show_stack+0x20/0x38 (C)
[   32.298805]  dump_stack_lvl+0x8c/0xd0
[   32.299516]  print_report+0x118/0x5e0
[   32.300186]  kasan_report+0xc8/0x118
[   32.300826]  __asan_report_load8_noabort+0x20/0x30
[   32.301556]  workqueue_uaf+0x480/0x4a8
[   32.302575]  kunit_try_run_case+0x14c/0x3d0
[   32.303340]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.304249]  kthread+0x24c/0x2d0
[   32.305065]  ret_from_fork+0x10/0x20
[   32.305831] 
[   32.306462] Allocated by task 189:
[   32.307047]  kasan_save_stack+0x3c/0x68
[   32.307609]  kasan_save_track+0x20/0x40
[   32.308320]  kasan_save_alloc_info+0x40/0x58
[   32.309063]  __kasan_kmalloc+0xd4/0xd8
[   32.309927]  __kmalloc_cache_noprof+0x15c/0x3c8
[   32.310522]  workqueue_uaf+0x13c/0x4a8
[   32.311306]  kunit_try_run_case+0x14c/0x3d0
[   32.312024]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.312889]  kthread+0x24c/0x2d0
[   32.313476]  ret_from_fork+0x10/0x20
[   32.314276] 
[   32.314992] Freed by task 73:
[   32.315684]  kasan_save_stack+0x3c/0x68
[   32.316336]  kasan_save_track+0x20/0x40
[   32.316847]  kasan_save_free_info+0x4c/0x78
[   32.317422]  __kasan_slab_free+0x6c/0x98
[   32.318493]  kfree+0x114/0x3d0
[   32.319083]  workqueue_uaf_work+0x18/0x30
[   32.319678]  process_one_work+0x530/0xfa8
[   32.320366]  worker_thread+0x614/0xf28
[   32.320989]  kthread+0x24c/0x2d0
[   32.321567]  ret_from_fork+0x10/0x20
[   32.322666] 
[   32.323069] Last potentially related work creation:
[   32.323696]  kasan_save_stack+0x3c/0x68
[   32.324316]  __kasan_record_aux_stack+0xbc/0xe8
[   32.325003]  kasan_record_aux_stack_noalloc+0x14/0x20
[   32.326249]  __queue_work+0x654/0xfe0
[   32.326776]  queue_work_on+0xbc/0xf8
[   32.327409]  workqueue_uaf+0x210/0x4a8
[   32.328043]  kunit_try_run_case+0x14c/0x3d0
[   32.328756]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.329599]  kthread+0x24c/0x2d0
[   32.330241]  ret_from_fork+0x10/0x20
[   32.331415] 
[   32.331821] The buggy address belongs to the object at fff00000c5e26fc0
[   32.331821]  which belongs to the cache kmalloc-32 of size 32
[   32.333159] The buggy address is located 0 bytes inside of
[   32.333159]  freed 32-byte region [fff00000c5e26fc0, fff00000c5e26fe0)
[   32.334499] 
[   32.334851] The buggy address belongs to the physical page:
[   32.336076] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e26
[   32.337040] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.338393] page_type: f5(slab)
[   32.338884] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   32.339896] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   32.340800] page dumped because: kasan: bad access detected
[   32.341494] 
[   32.342326] Memory state around the buggy address:
[   32.342909]  fff00000c5e26e80: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   32.343796]  fff00000c5e26f00: 00 00 03 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   32.344660] >fff00000c5e26f80: 00 00 00 07 fc fc fc fc fa fb fb fb fc fc fc fc
[   32.345513]                                            ^
[   32.346680]  fff00000c5e27000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.347616]  fff00000c5e27080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.348506] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[   32.202362] ==================================================================
[   32.203482] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   32.204229] Read of size 4 at addr fff00000c5e26e40 by task swapper/1/0
[   32.204994] 
[   32.205386] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G    B            N 6.12.0-next-20241126 #1
[   32.206417] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.207065] Hardware name: linux,dummy-virt (DT)
[   32.207982] Call trace:
[   32.208376]  show_stack+0x20/0x38 (C)
[   32.209015]  dump_stack_lvl+0x8c/0xd0
[   32.209626]  print_report+0x118/0x5e0
[   32.210451]  kasan_report+0xc8/0x118
[   32.211099]  __asan_report_load4_noabort+0x20/0x30
[   32.211859]  rcu_uaf_reclaim+0x64/0x70
[   32.212374]  rcu_core+0xa54/0x1df8
[   32.213005]  rcu_core_si+0x18/0x30
[   32.213551]  handle_softirqs+0x374/0xb20
[   32.214209]  __do_softirq+0x1c/0x28
[   32.214977]  ____do_softirq+0x18/0x30
[   32.215639]  call_on_irq_stack+0x24/0x58
[   32.216294]  do_softirq_own_stack+0x24/0x38
[   32.217007]  __irq_exit_rcu+0x1fc/0x318
[   32.217602]  irq_exit_rcu+0x1c/0x80
[   32.218454]  el1_interrupt+0x38/0x58
[   32.219084]  el1h_64_irq_handler+0x18/0x28
[   32.219769]  el1h_64_irq+0x6c/0x70
[   32.220455]  arch_local_irq_enable+0x4/0x8 (P)
[   32.221148]  default_idle_call+0x6c/0x78 (L)
[   32.221841]  do_idle+0x384/0x4e8
[   32.222599]  cpu_startup_entry+0x68/0x80
[   32.223229]  secondary_start_kernel+0x288/0x340
[   32.223918]  __secondary_switched+0xc0/0xc8
[   32.224496] 
[   32.224883] Allocated by task 187:
[   32.225441]  kasan_save_stack+0x3c/0x68
[   32.226218]  kasan_save_track+0x20/0x40
[   32.227511]  kasan_save_alloc_info+0x40/0x58
[   32.228218]  __kasan_kmalloc+0xd4/0xd8
[   32.228742]  __kmalloc_cache_noprof+0x15c/0x3c8
[   32.229347]  rcu_uaf+0xb0/0x2d0
[   32.230211]  kunit_try_run_case+0x14c/0x3d0
[   32.231023]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.231786]  kthread+0x24c/0x2d0
[   32.232337]  ret_from_fork+0x10/0x20
[   32.232967] 
[   32.233326] Freed by task 0:
[   32.234335]  kasan_save_stack+0x3c/0x68
[   32.234946]  kasan_save_track+0x20/0x40
[   32.235474]  kasan_save_free_info+0x4c/0x78
[   32.236057]  __kasan_slab_free+0x6c/0x98
[   32.237210]  kfree+0x114/0x3d0
[   32.238118]  rcu_uaf_reclaim+0x28/0x70
[   32.238650]  rcu_core+0xa54/0x1df8
[   32.239446]  rcu_core_si+0x18/0x30
[   32.240243]  handle_softirqs+0x374/0xb20
[   32.241056]  __do_softirq+0x1c/0x28
[   32.241567] 
[   32.242417] Last potentially related work creation:
[   32.243197]  kasan_save_stack+0x3c/0x68
[   32.243718]  __kasan_record_aux_stack+0xbc/0xe8
[   32.244420]  kasan_record_aux_stack_noalloc+0x14/0x20
[   32.245130]  __call_rcu_common.constprop.0+0x74/0xa18
[   32.246047]  call_rcu+0x18/0x30
[   32.246583]  rcu_uaf+0x14c/0x2d0
[   32.247099]  kunit_try_run_case+0x14c/0x3d0
[   32.248195]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.249323]  kthread+0x24c/0x2d0
[   32.249837]  ret_from_fork+0x10/0x20
[   32.250563] 
[   32.251316] The buggy address belongs to the object at fff00000c5e26e40
[   32.251316]  which belongs to the cache kmalloc-32 of size 32
[   32.252654] The buggy address is located 0 bytes inside of
[   32.252654]  freed 32-byte region [fff00000c5e26e40, fff00000c5e26e60)
[   32.254144] 
[   32.254634] The buggy address belongs to the physical page:
[   32.255470] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e26
[   32.256462] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.257403] page_type: f5(slab)
[   32.258208] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   32.258920] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   32.259940] page dumped because: kasan: bad access detected
[   32.260726] 
[   32.261096] Memory state around the buggy address:
[   32.261668]  fff00000c5e26d00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   32.262801]  fff00000c5e26d80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.263726] >fff00000c5e26e00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   32.264520]                                            ^
[   32.265328]  fff00000c5e26e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.266768]  fff00000c5e26f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.267838] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[   32.021508] ==================================================================
[   32.023192] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x600
[   32.023912] Read of size 1 at addr fff00000c5e72800 by task kunit_try_catch/185
[   32.024863] 
[   32.025296] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   32.026746] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.027348] Hardware name: linux,dummy-virt (DT)
[   32.028328] Call trace:
[   32.028737]  show_stack+0x20/0x38 (C)
[   32.029489]  dump_stack_lvl+0x8c/0xd0
[   32.030568]  print_report+0x118/0x5e0
[   32.031071]  kasan_report+0xc8/0x118
[   32.031711]  __kasan_check_byte+0x54/0x70
[   32.032347]  ksize+0x30/0x88
[   32.032931]  ksize_uaf+0x168/0x600
[   32.033560]  kunit_try_run_case+0x14c/0x3d0
[   32.034689]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.035385]  kthread+0x24c/0x2d0
[   32.035967]  ret_from_fork+0x10/0x20
[   32.036567] 
[   32.036907] Allocated by task 185:
[   32.037349]  kasan_save_stack+0x3c/0x68
[   32.038421]  kasan_save_track+0x20/0x40
[   32.039059]  kasan_save_alloc_info+0x40/0x58
[   32.039647]  __kasan_kmalloc+0xd4/0xd8
[   32.040264]  __kmalloc_cache_noprof+0x15c/0x3c8
[   32.040849]  ksize_uaf+0xb8/0x600
[   32.041430]  kunit_try_run_case+0x14c/0x3d0
[   32.042514]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.043217]  kthread+0x24c/0x2d0
[   32.043750]  ret_from_fork+0x10/0x20
[   32.044300] 
[   32.044684] Freed by task 185:
[   32.045187]  kasan_save_stack+0x3c/0x68
[   32.046248]  kasan_save_track+0x20/0x40
[   32.046780]  kasan_save_free_info+0x4c/0x78
[   32.047435]  __kasan_slab_free+0x6c/0x98
[   32.048388]  kfree+0x114/0x3d0
[   32.048875]  ksize_uaf+0x11c/0x600
[   32.049395]  kunit_try_run_case+0x14c/0x3d0
[   32.050556]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.051250]  kthread+0x24c/0x2d0
[   32.051749]  ret_from_fork+0x10/0x20
[   32.052271] 
[   32.053057] The buggy address belongs to the object at fff00000c5e72800
[   32.053057]  which belongs to the cache kmalloc-128 of size 128
[   32.054807] The buggy address is located 0 bytes inside of
[   32.054807]  freed 128-byte region [fff00000c5e72800, fff00000c5e72880)
[   32.056012] 
[   32.056387] The buggy address belongs to the physical page:
[   32.056941] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e72
[   32.058394] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.059239] page_type: f5(slab)
[   32.059753] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.060616] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   32.061544] page dumped because: kasan: bad access detected
[   32.062322] 
[   32.063105] Memory state around the buggy address:
[   32.063776]  fff00000c5e72700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   32.064618]  fff00000c5e72780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.065424] >fff00000c5e72800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.066753]                    ^
[   32.067294]  fff00000c5e72880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.068115]  fff00000c5e72900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.068895] ==================================================================
[   32.127164] ==================================================================
[   32.128057] BUG: KASAN: slab-use-after-free in ksize_uaf+0x548/0x600
[   32.128695] Read of size 1 at addr fff00000c5e72878 by task kunit_try_catch/185
[   32.129763] 
[   32.130163] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   32.132108] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.132638] Hardware name: linux,dummy-virt (DT)
[   32.133283] Call trace:
[   32.133821]  show_stack+0x20/0x38 (C)
[   32.134422]  dump_stack_lvl+0x8c/0xd0
[   32.135128]  print_report+0x118/0x5e0
[   32.135889]  kasan_report+0xc8/0x118
[   32.136595]  __asan_report_load1_noabort+0x20/0x30
[   32.137405]  ksize_uaf+0x548/0x600
[   32.138153]  kunit_try_run_case+0x14c/0x3d0
[   32.139148]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.139862]  kthread+0x24c/0x2d0
[   32.140786]  ret_from_fork+0x10/0x20
[   32.141494] 
[   32.142212] Allocated by task 185:
[   32.143325]  kasan_save_stack+0x3c/0x68
[   32.144142]  kasan_save_track+0x20/0x40
[   32.144792]  kasan_save_alloc_info+0x40/0x58
[   32.145487]  __kasan_kmalloc+0xd4/0xd8
[   32.146582]  __kmalloc_cache_noprof+0x15c/0x3c8
[   32.147100]  ksize_uaf+0xb8/0x600
[   32.147691]  kunit_try_run_case+0x14c/0x3d0
[   32.148364]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.149203]  kthread+0x24c/0x2d0
[   32.149868]  ret_from_fork+0x10/0x20
[   32.150948] 
[   32.151284] Freed by task 185:
[   32.151824]  kasan_save_stack+0x3c/0x68
[   32.152423]  kasan_save_track+0x20/0x40
[   32.153072]  kasan_save_free_info+0x4c/0x78
[   32.154140]  __kasan_slab_free+0x6c/0x98
[   32.155003]  kfree+0x114/0x3d0
[   32.155435]  ksize_uaf+0x11c/0x600
[   32.155876]  kunit_try_run_case+0x14c/0x3d0
[   32.156843]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.157580]  kthread+0x24c/0x2d0
[   32.158065]  ret_from_fork+0x10/0x20
[   32.159079] 
[   32.159601] The buggy address belongs to the object at fff00000c5e72800
[   32.159601]  which belongs to the cache kmalloc-128 of size 128
[   32.161249] The buggy address is located 120 bytes inside of
[   32.161249]  freed 128-byte region [fff00000c5e72800, fff00000c5e72880)
[   32.163491] 
[   32.163823] The buggy address belongs to the physical page:
[   32.164612] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e72
[   32.165643] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.166872] page_type: f5(slab)
[   32.167495] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.168578] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   32.169487] page dumped because: kasan: bad access detected
[   32.170110] 
[   32.170479] Memory state around the buggy address:
[   32.171187]  fff00000c5e72700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.172509]  fff00000c5e72780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.174086] >fff00000c5e72800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.175148]                                                                 ^
[   32.175961]  fff00000c5e72880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.176824]  fff00000c5e72900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.178028] ==================================================================
[   32.073268] ==================================================================
[   32.074169] BUG: KASAN: slab-use-after-free in ksize_uaf+0x59c/0x600
[   32.074861] Read of size 1 at addr fff00000c5e72800 by task kunit_try_catch/185
[   32.076942] 
[   32.077329] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   32.078598] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.079685] Hardware name: linux,dummy-virt (DT)
[   32.080634] Call trace:
[   32.081131]  show_stack+0x20/0x38 (C)
[   32.082502]  dump_stack_lvl+0x8c/0xd0
[   32.083452]  print_report+0x118/0x5e0
[   32.084110]  kasan_report+0xc8/0x118
[   32.084740]  __asan_report_load1_noabort+0x20/0x30
[   32.085519]  ksize_uaf+0x59c/0x600
[   32.086518]  kunit_try_run_case+0x14c/0x3d0
[   32.087252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.088108]  kthread+0x24c/0x2d0
[   32.088807]  ret_from_fork+0x10/0x20
[   32.089355] 
[   32.089736] Allocated by task 185:
[   32.090294]  kasan_save_stack+0x3c/0x68
[   32.090796]  kasan_save_track+0x20/0x40
[   32.091425]  kasan_save_alloc_info+0x40/0x58
[   32.092915]  __kasan_kmalloc+0xd4/0xd8
[   32.093290]  __kmalloc_cache_noprof+0x15c/0x3c8
[   32.094006]  ksize_uaf+0xb8/0x600
[   32.094458]  kunit_try_run_case+0x14c/0x3d0
[   32.095599]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.096375]  kthread+0x24c/0x2d0
[   32.096977]  ret_from_fork+0x10/0x20
[   32.097487] 
[   32.098687] Freed by task 185:
[   32.099340]  kasan_save_stack+0x3c/0x68
[   32.099870]  kasan_save_track+0x20/0x40
[   32.100506]  kasan_save_free_info+0x4c/0x78
[   32.101136]  __kasan_slab_free+0x6c/0x98
[   32.102062]  kfree+0x114/0x3d0
[   32.102675]  ksize_uaf+0x11c/0x600
[   32.103265]  kunit_try_run_case+0x14c/0x3d0
[   32.103923]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.104607]  kthread+0x24c/0x2d0
[   32.105181]  ret_from_fork+0x10/0x20
[   32.106553] 
[   32.106918] The buggy address belongs to the object at fff00000c5e72800
[   32.106918]  which belongs to the cache kmalloc-128 of size 128
[   32.108600] The buggy address is located 0 bytes inside of
[   32.108600]  freed 128-byte region [fff00000c5e72800, fff00000c5e72880)
[   32.110338] 
[   32.110777] The buggy address belongs to the physical page:
[   32.111465] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e72
[   32.112692] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.113436] page_type: f5(slab)
[   32.113987] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.115490] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   32.116370] page dumped because: kasan: bad access detected
[   32.117264] 
[   32.117743] Memory state around the buggy address:
[   32.118625]  fff00000c5e72700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.119937]  fff00000c5e72780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.120815] >fff00000c5e72800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.121641]                    ^
[   32.122294]  fff00000c5e72880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.123243]  fff00000c5e72900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.124713] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   31.930372] ==================================================================
[   31.931263] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x750
[   31.932274] Read of size 1 at addr fff00000c5e99178 by task kunit_try_catch/183
[   31.932992] 
[   31.933311] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   31.934975] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.935511] Hardware name: linux,dummy-virt (DT)
[   31.936197] Call trace:
[   31.936694]  show_stack+0x20/0x38 (C)
[   31.937353]  dump_stack_lvl+0x8c/0xd0
[   31.938287]  print_report+0x118/0x5e0
[   31.938852]  kasan_report+0xc8/0x118
[   31.939506]  __asan_report_load1_noabort+0x20/0x30
[   31.940187]  ksize_unpoisons_memory+0x628/0x750
[   31.940887]  kunit_try_run_case+0x14c/0x3d0
[   31.941496]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.942569]  kthread+0x24c/0x2d0
[   31.943037]  ret_from_fork+0x10/0x20
[   31.943669] 
[   31.944039] Allocated by task 183:
[   31.944486]  kasan_save_stack+0x3c/0x68
[   31.945135]  kasan_save_track+0x20/0x40
[   31.946014]  kasan_save_alloc_info+0x40/0x58
[   31.946638]  __kasan_kmalloc+0xd4/0xd8
[   31.947259]  __kmalloc_cache_noprof+0x15c/0x3c8
[   31.948275]  ksize_unpoisons_memory+0xc0/0x750
[   31.949136]  kunit_try_run_case+0x14c/0x3d0
[   31.949984]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.951138]  kthread+0x24c/0x2d0
[   31.952188]  ret_from_fork+0x10/0x20
[   31.952832] 
[   31.953254] The buggy address belongs to the object at fff00000c5e99100
[   31.953254]  which belongs to the cache kmalloc-128 of size 128
[   31.954877] The buggy address is located 5 bytes to the right of
[   31.954877]  allocated 115-byte region [fff00000c5e99100, fff00000c5e99173)
[   31.956377] 
[   31.956828] The buggy address belongs to the physical page:
[   31.957462] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e99
[   31.958863] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.959665] page_type: f5(slab)
[   31.960225] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.961027] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   31.961946] page dumped because: kasan: bad access detected
[   31.962637] 
[   31.963171] Memory state around the buggy address:
[   31.964012]  fff00000c5e99000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   31.964992]  fff00000c5e99080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.966138] >fff00000c5e99100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.966889]                                                                 ^
[   31.967437]  fff00000c5e99180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.968192]  fff00000c5e99200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.969051] ==================================================================
[   31.888836] ==================================================================
[   31.889930] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x638/0x750
[   31.890791] Read of size 1 at addr fff00000c5e99173 by task kunit_try_catch/183
[   31.891620] 
[   31.892246] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   31.893393] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.894958] Hardware name: linux,dummy-virt (DT)
[   31.895547] Call trace:
[   31.895997]  show_stack+0x20/0x38 (C)
[   31.896558]  dump_stack_lvl+0x8c/0xd0
[   31.897173]  print_report+0x118/0x5e0
[   31.898125]  kasan_report+0xc8/0x118
[   31.898761]  __asan_report_load1_noabort+0x20/0x30
[   31.899467]  ksize_unpoisons_memory+0x638/0x750
[   31.900139]  kunit_try_run_case+0x14c/0x3d0
[   31.900789]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.901544]  kthread+0x24c/0x2d0
[   31.902423]  ret_from_fork+0x10/0x20
[   31.903078] 
[   31.903389] Allocated by task 183:
[   31.903963]  kasan_save_stack+0x3c/0x68
[   31.904519]  kasan_save_track+0x20/0x40
[   31.905171]  kasan_save_alloc_info+0x40/0x58
[   31.906145]  __kasan_kmalloc+0xd4/0xd8
[   31.906748]  __kmalloc_cache_noprof+0x15c/0x3c8
[   31.907329]  ksize_unpoisons_memory+0xc0/0x750
[   31.908026]  kunit_try_run_case+0x14c/0x3d0
[   31.908700]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.909507]  kthread+0x24c/0x2d0
[   31.910562]  ret_from_fork+0x10/0x20
[   31.911113] 
[   31.911479] The buggy address belongs to the object at fff00000c5e99100
[   31.911479]  which belongs to the cache kmalloc-128 of size 128
[   31.912752] The buggy address is located 0 bytes to the right of
[   31.912752]  allocated 115-byte region [fff00000c5e99100, fff00000c5e99173)
[   31.914356] 
[   31.914752] The buggy address belongs to the physical page:
[   31.915416] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e99
[   31.916367] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.917294] page_type: f5(slab)
[   31.918193] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.919042] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   31.920053] page dumped because: kasan: bad access detected
[   31.920727] 
[   31.921134] Memory state around the buggy address:
[   31.922134]  fff00000c5e99000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   31.923043]  fff00000c5e99080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.923890] >fff00000c5e99100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.924775]                                                              ^
[   31.925949]  fff00000c5e99180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.926765]  fff00000c5e99200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.927603] ==================================================================
[   31.971222] ==================================================================
[   31.971862] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x6a0/0x750
[   31.972797] Read of size 1 at addr fff00000c5e9917f by task kunit_try_catch/183
[   31.973648] 
[   31.974257] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   31.975357] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.975899] Hardware name: linux,dummy-virt (DT)
[   31.976674] Call trace:
[   31.977073]  show_stack+0x20/0x38 (C)
[   31.978018]  dump_stack_lvl+0x8c/0xd0
[   31.978584]  print_report+0x118/0x5e0
[   31.979239]  kasan_report+0xc8/0x118
[   31.979880]  __asan_report_load1_noabort+0x20/0x30
[   31.980504]  ksize_unpoisons_memory+0x6a0/0x750
[   31.981317]  kunit_try_run_case+0x14c/0x3d0
[   31.982287]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.983127]  kthread+0x24c/0x2d0
[   31.983766]  ret_from_fork+0x10/0x20
[   31.984349] 
[   31.984741] Allocated by task 183:
[   31.985317]  kasan_save_stack+0x3c/0x68
[   31.986298]  kasan_save_track+0x20/0x40
[   31.986965]  kasan_save_alloc_info+0x40/0x58
[   31.987617]  __kasan_kmalloc+0xd4/0xd8
[   31.988285]  __kmalloc_cache_noprof+0x15c/0x3c8
[   31.989005]  ksize_unpoisons_memory+0xc0/0x750
[   31.990149]  kunit_try_run_case+0x14c/0x3d0
[   31.991040]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.991737]  kthread+0x24c/0x2d0
[   31.992312]  ret_from_fork+0x10/0x20
[   31.993077] 
[   31.993470] The buggy address belongs to the object at fff00000c5e99100
[   31.993470]  which belongs to the cache kmalloc-128 of size 128
[   31.995097] The buggy address is located 12 bytes to the right of
[   31.995097]  allocated 115-byte region [fff00000c5e99100, fff00000c5e99173)
[   31.996477] 
[   31.996873] The buggy address belongs to the physical page:
[   31.997509] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e99
[   31.998867] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.999741] page_type: f5(slab)
[   32.000208] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.001227] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   32.002473] page dumped because: kasan: bad access detected
[   32.003239] 
[   32.003666] Memory state around the buggy address:
[   32.004248]  fff00000c5e99000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   32.005235]  fff00000c5e99080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.006163] >fff00000c5e99100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.007232]                                                                 ^
[   32.008087]  fff00000c5e99180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.009025]  fff00000c5e99200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.010224] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[   67.575677] ==================================================================
[   67.576465] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[   67.576465] 
[   67.577336] Use-after-free read at 0x00000000128cef03 (in kfence-#219):
[   67.578500]  test_krealloc+0x51c/0x830
[   67.579055]  test_krealloc+0x458/0x830
[   67.579749]  kunit_try_run_case+0x14c/0x3d0
[   67.580464]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.581287]  kthread+0x24c/0x2d0
[   67.581915]  ret_from_fork+0x10/0x20
[   67.582618] 
[   67.583009] kfence-#219: 0x00000000128cef03-0x000000006592606b, size=32, cache=kmalloc-32
[   67.583009] 
[   67.584031] allocated by task 326 on cpu 0 at 67.574415s (0.009603s ago):
[   67.585071]  test_alloc+0x298/0x620
[   67.585680]  test_krealloc+0xc0/0x830
[   67.586224]  kunit_try_run_case+0x14c/0x3d0
[   67.586947]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.587721]  kthread+0x24c/0x2d0
[   67.588278]  ret_from_fork+0x10/0x20
[   67.588849] 
[   67.589272] freed by task 326 on cpu 0 at 67.574997s (0.014263s ago):
[   67.590157]  krealloc_noprof+0x148/0x360
[   67.590842]  test_krealloc+0x1dc/0x830
[   67.591504]  kunit_try_run_case+0x14c/0x3d0
[   67.592156]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.592957]  kthread+0x24c/0x2d0
[   67.593449]  ret_from_fork+0x10/0x20
[   67.594069] 
[   67.594427] CPU: 0 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   67.595574] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.596199] Hardware name: linux,dummy-virt (DT)
[   67.596896] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[   67.381990] ==================================================================
[   67.382753] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[   67.382753] 
[   67.383800] Use-after-free read at 0x0000000099a0a5e3 (in kfence-#217):
[   67.384762]  test_memcache_typesafe_by_rcu+0x280/0x560
[   67.385589]  test_memcache_typesafe_by_rcu+0x260/0x560
[   67.386468]  kunit_try_run_case+0x14c/0x3d0
[   67.387072]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.387909]  kthread+0x24c/0x2d0
[   67.388489]  ret_from_fork+0x10/0x20
[   67.389030] 
[   67.389482] kfence-#217: 0x0000000099a0a5e3-0x00000000543993aa, size=32, cache=test
[   67.389482] 
[   67.390546] allocated by task 324 on cpu 0 at 67.371512s (0.019002s ago):
[   67.391558]  test_alloc+0x22c/0x620
[   67.392203]  test_memcache_typesafe_by_rcu+0x15c/0x560
[   67.393012]  kunit_try_run_case+0x14c/0x3d0
[   67.393741]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.394416]  kthread+0x24c/0x2d0
[   67.395055]  ret_from_fork+0x10/0x20
[   67.395698] 
[   67.396069] freed by task 324 on cpu 0 at 67.371705s (0.024353s ago):
[   67.396965]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[   67.397746]  kunit_try_run_case+0x14c/0x3d0
[   67.398385]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.399220]  kthread+0x24c/0x2d0
[   67.399782]  ret_from_fork+0x10/0x20
[   67.400449] 
[   67.400892] CPU: 0 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   67.402083] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.402631] Hardware name: linux,dummy-virt (DT)
[   67.403363] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[   47.427597] ==================================================================
[   47.428909] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   47.428909] 
[   47.431012] Invalid read at 0x00000000dd8d9b8b:
[   47.431840]  test_invalid_access+0xdc/0x1f0
[   47.432664]  kunit_try_run_case+0x14c/0x3d0
[   47.433542]  kunit_try_run_case+0x14c/0x3d0
[   47.434913]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.435812]  kthread+0x24c/0x2d0
[   47.436624]  ret_from_fork+0x10/0x20
[   47.437496] 
[   47.438606] CPU: 1 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   47.440152] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.440940] Hardware name: linux,dummy-virt (DT)
[   47.441717] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[   47.186918] ==================================================================
[   47.187755] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   47.187755] 
[   47.188730] Corrupted memory at 0x0000000009adc881 [ ! . . . . . . . . . . . . . . . ] (in kfence-#212):
[   47.191472]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   47.191940]  kunit_try_run_case+0x14c/0x3d0
[   47.192237]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.192601]  kthread+0x24c/0x2d0
[   47.193101]  ret_from_fork+0x10/0x20
[   47.193793] 
[   47.194161] kfence-#212: 0x000000003674e3da-0x000000006cf92d23, size=73, cache=kmalloc-96
[   47.194161] 
[   47.195235] allocated by task 314 on cpu 0 at 47.186383s (0.008841s ago):
[   47.196102]  test_alloc+0x298/0x620
[   47.196633]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   47.197178]  kunit_try_run_case+0x14c/0x3d0
[   47.197879]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.198701]  kthread+0x24c/0x2d0
[   47.199270]  ret_from_fork+0x10/0x20
[   47.199900] 
[   47.200296] freed by task 314 on cpu 0 at 47.186665s (0.013619s ago):
[   47.201231]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   47.201897]  kunit_try_run_case+0x14c/0x3d0
[   47.202598]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.203173]  kthread+0x24c/0x2d0
[   47.203777]  ret_from_fork+0x10/0x20
[   47.204412] 
[   47.204821] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   47.206078] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.206710] Hardware name: linux,dummy-virt (DT)
[   47.207271] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[   46.562983] ==================================================================
[   46.563873] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   46.563873] 
[   46.564901] Out-of-bounds read at 0x000000007336a263 (105B right of kfence-#206):
[   46.565805]  test_kmalloc_aligned_oob_read+0x238/0x468
[   46.566461]  test_kmalloc_aligned_oob_read+0x100/0x468
[   46.567276]  kunit_try_run_case+0x14c/0x3d0
[   46.567957]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.568786]  kthread+0x24c/0x2d0
[   46.569372]  ret_from_fork+0x10/0x20
[   46.569921] 
[   46.570301] kfence-#206: 0x00000000a31be06a-0x00000000e3cc76c4, size=73, cache=kmalloc-96
[   46.570301] 
[   46.571279] allocated by task 312 on cpu 1 at 46.562481s (0.008787s ago):
[   46.572496]  test_alloc+0x298/0x620
[   46.573097]  test_kmalloc_aligned_oob_read+0x100/0x468
[   46.573818]  kunit_try_run_case+0x14c/0x3d0
[   46.574488]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.575611]  kthread+0x24c/0x2d0
[   46.576189]  ret_from_fork+0x10/0x20
[   46.576923] 
[   46.577351] CPU: 1 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   46.578397] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.578905] Hardware name: linux,dummy-virt (DT)
[   46.579574] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[   41.986587] ==================================================================
[   41.987440] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   41.987440] 
[   41.988279] Corrupted memory at 0x00000000b60b1ce3 [ ! ] (in kfence-#162):
[   41.989478]  test_corruption+0x1d8/0x378
[   41.990176]  kunit_try_run_case+0x14c/0x3d0
[   41.990759]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.991575]  kthread+0x24c/0x2d0
[   41.992174]  ret_from_fork+0x10/0x20
[   41.992741] 
[   41.993130] kfence-#162: 0x00000000ee010ae0-0x00000000fabec4f4, size=32, cache=test
[   41.993130] 
[   41.994113] allocated by task 302 on cpu 0 at 41.986315s (0.007788s ago):
[   41.994994]  test_alloc+0x22c/0x620
[   41.995483]  test_corruption+0x198/0x378
[   41.996140]  kunit_try_run_case+0x14c/0x3d0
[   41.996804]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.997559]  kthread+0x24c/0x2d0
[   41.998144]  ret_from_fork+0x10/0x20
[   41.998772] 
[   41.999157] freed by task 302 on cpu 0 at 41.986404s (0.012741s ago):
[   42.000029]  test_corruption+0x1d8/0x378
[   42.000647]  kunit_try_run_case+0x14c/0x3d0
[   42.001154]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.001961]  kthread+0x24c/0x2d0
[   42.002557]  ret_from_fork+0x10/0x20
[   42.003105] 
[   42.003492] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   42.004758] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.005356] Hardware name: linux,dummy-virt (DT)
[   42.006057] ==================================================================
[   41.466893] ==================================================================
[   41.467456] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   41.467456] 
[   41.468289] Corrupted memory at 0x000000002c8464b1 [ ! . . . . . . . . . . . . . . . ] (in kfence-#157):
[   41.472190]  test_corruption+0x278/0x378
[   41.472858]  kunit_try_run_case+0x14c/0x3d0
[   41.473513]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.474294]  kthread+0x24c/0x2d0
[   41.474896]  ret_from_fork+0x10/0x20
[   41.475499] 
[   41.475950] kfence-#157: 0x000000000606291a-0x00000000c88feb54, size=32, cache=kmalloc-32
[   41.475950] 
[   41.476989] allocated by task 300 on cpu 0 at 41.466342s (0.010635s ago):
[   41.477924]  test_alloc+0x298/0x620
[   41.478585]  test_corruption+0xdc/0x378
[   41.479240]  kunit_try_run_case+0x14c/0x3d0
[   41.479845]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.480681]  kthread+0x24c/0x2d0
[   41.481296]  ret_from_fork+0x10/0x20
[   41.481912] 
[   41.482309] freed by task 300 on cpu 0 at 41.466507s (0.015791s ago):
[   41.483299]  test_corruption+0x278/0x378
[   41.483962]  kunit_try_run_case+0x14c/0x3d0
[   41.484695]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.485471]  kthread+0x24c/0x2d0
[   41.485954]  ret_from_fork+0x10/0x20
[   41.486664] 
[   41.487121] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   41.488422] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.489007] Hardware name: linux,dummy-virt (DT)
[   41.489741] ==================================================================
[   41.674647] ==================================================================
[   41.675396] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   41.675396] 
[   41.676218] Corrupted memory at 0x0000000073f8a72c [ ! . . . . . . . . . . . . . . . ] (in kfence-#159):
[   41.678890]  test_corruption+0x120/0x378
[   41.679467]  kunit_try_run_case+0x14c/0x3d0
[   41.680179]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.680883]  kthread+0x24c/0x2d0
[   41.681448]  ret_from_fork+0x10/0x20
[   41.681961] 
[   41.682347] kfence-#159: 0x000000007222e0e2-0x00000000715f0f1d, size=32, cache=test
[   41.682347] 
[   41.683348] allocated by task 302 on cpu 0 at 41.674368s (0.008969s ago):
[   41.684190]  test_alloc+0x22c/0x620
[   41.684749]  test_corruption+0xdc/0x378
[   41.685334]  kunit_try_run_case+0x14c/0x3d0
[   41.685965]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.686762]  kthread+0x24c/0x2d0
[   41.687241]  ret_from_fork+0x10/0x20
[   41.687866] 
[   41.688212] freed by task 302 on cpu 0 at 41.674457s (0.013745s ago):
[   41.689141]  test_corruption+0x120/0x378
[   41.689765]  kunit_try_run_case+0x14c/0x3d0
[   41.690357]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.690980]  kthread+0x24c/0x2d0
[   41.691576]  ret_from_fork+0x10/0x20
[   41.692068] 
[   41.692451] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   41.693709] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.694318] Hardware name: linux,dummy-virt (DT)
[   41.695000] ==================================================================
[   41.572370] ==================================================================
[   41.573253] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   41.573253] 
[   41.573993] Corrupted memory at 0x000000001b25f17e [ ! ] (in kfence-#158):
[   41.575193]  test_corruption+0x284/0x378
[   41.575948]  kunit_try_run_case+0x14c/0x3d0
[   41.576705]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.577546]  kthread+0x24c/0x2d0
[   41.578184]  ret_from_fork+0x10/0x20
[   41.578840] 
[   41.579259] kfence-#158: 0x0000000076d1adfc-0x000000001eac2ac8, size=32, cache=kmalloc-32
[   41.579259] 
[   41.580363] allocated by task 300 on cpu 0 at 41.571872s (0.008480s ago):
[   41.581106]  test_alloc+0x298/0x620
[   41.581585]  test_corruption+0x198/0x378
[   41.582051]  kunit_try_run_case+0x14c/0x3d0
[   41.582780]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.583595]  kthread+0x24c/0x2d0
[   41.584197]  ret_from_fork+0x10/0x20
[   41.584858] 
[   41.585305] freed by task 300 on cpu 0 at 41.572022s (0.013272s ago):
[   41.586279]  test_corruption+0x284/0x378
[   41.586946]  kunit_try_run_case+0x14c/0x3d0
[   41.587680]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.588345]  kthread+0x24c/0x2d0
[   41.588977]  ret_from_fork+0x10/0x20
[   41.589550] 
[   41.590009] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   41.591182] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.591854] Hardware name: linux,dummy-virt (DT)
[   41.592507] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[   41.154551] ==================================================================
[   41.155333] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   41.155333] 
[   41.156381] Invalid free of 0x00000000c8c39cf8 (in kfence-#154):
[   41.157229]  test_invalid_addr_free+0xec/0x238
[   41.158337]  kunit_try_run_case+0x14c/0x3d0
[   41.158969]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.159667]  kthread+0x24c/0x2d0
[   41.160272]  ret_from_fork+0x10/0x20
[   41.160933] 
[   41.161340] kfence-#154: 0x0000000083af2e1f-0x00000000d65ddd59, size=32, cache=test
[   41.161340] 
[   41.162413] allocated by task 298 on cpu 0 at 41.154347s (0.008055s ago):
[   41.163343]  test_alloc+0x22c/0x620
[   41.163966]  test_invalid_addr_free+0xd4/0x238
[   41.164676]  kunit_try_run_case+0x14c/0x3d0
[   41.165277]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.165999]  kthread+0x24c/0x2d0
[   41.166609]  ret_from_fork+0x10/0x20
[   41.167212] 
[   41.167655] CPU: 0 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   41.168753] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.169297] Hardware name: linux,dummy-virt (DT)
[   41.169998] ==================================================================
[   41.050484] ==================================================================
[   41.051273] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   41.051273] 
[   41.052120] Invalid free of 0x0000000008804196 (in kfence-#153):
[   41.052950]  test_invalid_addr_free+0x1ac/0x238
[   41.053636]  kunit_try_run_case+0x14c/0x3d0
[   41.054222]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.054879]  kthread+0x24c/0x2d0
[   41.055467]  ret_from_fork+0x10/0x20
[   41.056144] 
[   41.056563] kfence-#153: 0x000000008254bcc0-0x00000000feda542f, size=32, cache=kmalloc-32
[   41.056563] 
[   41.057599] allocated by task 296 on cpu 1 at 41.050274s (0.007313s ago):
[   41.058550]  test_alloc+0x298/0x620
[   41.059097]  test_invalid_addr_free+0xd4/0x238
[   41.059732]  kunit_try_run_case+0x14c/0x3d0
[   41.060422]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.061232]  kthread+0x24c/0x2d0
[   41.061743]  ret_from_fork+0x10/0x20
[   41.062362] 
[   41.062742] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   41.063882] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.064428] Hardware name: linux,dummy-virt (DT)
[   41.065140] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[   40.842978] ==================================================================
[   40.843857] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   40.843857] 
[   40.844625] Invalid free of 0x000000000143a3fb (in kfence-#151):
[   40.845446]  test_double_free+0x1bc/0x238
[   40.845967]  kunit_try_run_case+0x14c/0x3d0
[   40.846668]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.847432]  kthread+0x24c/0x2d0
[   40.848081]  ret_from_fork+0x10/0x20
[   40.848740] 
[   40.849052] kfence-#151: 0x000000000143a3fb-0x000000008e8030b2, size=32, cache=kmalloc-32
[   40.849052] 
[   40.850180] allocated by task 292 on cpu 0 at 40.842370s (0.007798s ago):
[   40.851163]  test_alloc+0x298/0x620
[   40.851676]  test_double_free+0xd4/0x238
[   40.852337]  kunit_try_run_case+0x14c/0x3d0
[   40.852915]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.853679]  kthread+0x24c/0x2d0
[   40.854206]  ret_from_fork+0x10/0x20
[   40.854843] 
[   40.855219] freed by task 292 on cpu 0 at 40.842496s (0.012711s ago):
[   40.856050]  test_double_free+0x1ac/0x238
[   40.856732]  kunit_try_run_case+0x14c/0x3d0
[   40.857393]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.858133]  kthread+0x24c/0x2d0
[   40.858740]  ret_from_fork+0x10/0x20
[   40.859355] 
[   40.859759] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   40.860968] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.861617] Hardware name: linux,dummy-virt (DT)
[   40.862134] ==================================================================
[   40.946699] ==================================================================
[   40.947431] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   40.947431] 
[   40.948210] Invalid free of 0x00000000ab3df3e0 (in kfence-#152):
[   40.948955]  test_double_free+0x100/0x238
[   40.949595]  kunit_try_run_case+0x14c/0x3d0
[   40.950287]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.951038]  kthread+0x24c/0x2d0
[   40.951639]  ret_from_fork+0x10/0x20
[   40.952154] 
[   40.952564] kfence-#152: 0x00000000ab3df3e0-0x000000008cb938fa, size=32, cache=test
[   40.952564] 
[   40.953613] allocated by task 294 on cpu 0 at 40.946358s (0.007244s ago):
[   40.954556]  test_alloc+0x22c/0x620
[   40.955154]  test_double_free+0xd4/0x238
[   40.955821]  kunit_try_run_case+0x14c/0x3d0
[   40.956361]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.957170]  kthread+0x24c/0x2d0
[   40.957699]  ret_from_fork+0x10/0x20
[   40.958309] 
[   40.958691] freed by task 294 on cpu 0 at 40.946456s (0.012224s ago):
[   40.959608]  test_double_free+0xf0/0x238
[   40.960271]  kunit_try_run_case+0x14c/0x3d0
[   40.960796]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.961607]  kthread+0x24c/0x2d0
[   40.962061]  ret_from_fork+0x10/0x20
[   40.962691] 
[   40.963101] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   40.964214] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.964855] Hardware name: linux,dummy-virt (DT)
[   40.965495] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[   40.530810] ==================================================================
[   40.531645] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   40.531645] 
[   40.532433] Use-after-free read at 0x000000008b0bd4af (in kfence-#148):
[   40.533276]  test_use_after_free_read+0x114/0x248
[   40.534368]  test_use_after_free_read+0xf0/0x248
[   40.534931]  kunit_try_run_case+0x14c/0x3d0
[   40.535634]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.536301]  kthread+0x24c/0x2d0
[   40.536913]  ret_from_fork+0x10/0x20
[   40.537473] 
[   40.537811] kfence-#148: 0x000000008b0bd4af-0x000000006d9513e4, size=32, cache=test
[   40.537811] 
[   40.538806] allocated by task 286 on cpu 1 at 40.530422s (0.008372s ago):
[   40.539689]  test_alloc+0x22c/0x620
[   40.540301]  test_use_after_free_read+0xd0/0x248
[   40.541044]  kunit_try_run_case+0x14c/0x3d0
[   40.541666]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.542284]  kthread+0x24c/0x2d0
[   40.542880]  ret_from_fork+0x10/0x20
[   40.543428] 
[   40.543825] freed by task 286 on cpu 1 at 40.530557s (0.013257s ago):
[   40.544773]  test_use_after_free_read+0xf0/0x248
[   40.545484]  kunit_try_run_case+0x14c/0x3d0
[   40.546186]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.546873]  kthread+0x24c/0x2d0
[   40.547446]  ret_from_fork+0x10/0x20
[   40.548078] 
[   40.548505] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   40.549561] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.550197] Hardware name: linux,dummy-virt (DT)
[   40.550776] ==================================================================
[   40.426978] ==================================================================
[   40.427883] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   40.427883] 
[   40.428794] Use-after-free read at 0x000000003d7bdae2 (in kfence-#147):
[   40.429658]  test_use_after_free_read+0x114/0x248
[   40.430315]  test_use_after_free_read+0x1c0/0x248
[   40.431008]  kunit_try_run_case+0x14c/0x3d0
[   40.431713]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.432449]  kthread+0x24c/0x2d0
[   40.433064]  ret_from_fork+0x10/0x20
[   40.433612] 
[   40.433999] kfence-#147: 0x000000003d7bdae2-0x0000000050a744d0, size=32, cache=kmalloc-32
[   40.433999] 
[   40.435022] allocated by task 284 on cpu 0 at 40.426469s (0.008541s ago):
[   40.435835]  test_alloc+0x298/0x620
[   40.436449]  test_use_after_free_read+0xd0/0x248
[   40.437191]  kunit_try_run_case+0x14c/0x3d0
[   40.437859]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.438617]  kthread+0x24c/0x2d0
[   40.439232]  ret_from_fork+0x10/0x20
[   40.439869] 
[   40.440471] freed by task 284 on cpu 0 at 40.426635s (0.013631s ago):
[   40.441503]  test_use_after_free_read+0x1c0/0x248
[   40.442181]  kunit_try_run_case+0x14c/0x3d0
[   40.442869]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.443572]  kthread+0x24c/0x2d0
[   40.444158]  ret_from_fork+0x10/0x20
[   40.444837] 
[   40.445262] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   40.446379] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.446900] Hardware name: linux,dummy-virt (DT)
[   40.447600] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[   40.114838] ==================================================================
[   40.115908] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   40.115908] 
[   40.116907] Out-of-bounds write at 0x000000000b80381b (1B left of kfence-#144):
[   40.118052]  test_out_of_bounds_write+0x100/0x240
[   40.118827]  test_out_of_bounds_write+0xc8/0x240
[   40.119621]  kunit_try_run_case+0x14c/0x3d0
[   40.120392]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.121288]  kthread+0x24c/0x2d0
[   40.121993]  ret_from_fork+0x10/0x20
[   40.122702] 
[   40.122964] kfence-#144: 0x000000000d003ecb-0x0000000003cfdcc6, size=32, cache=kmalloc-32
[   40.122964] 
[   40.124049] allocated by task 280 on cpu 0 at 40.114557s (0.009480s ago):
[   40.125031]  test_alloc+0x298/0x620
[   40.125572]  test_out_of_bounds_write+0xc8/0x240
[   40.126275]  kunit_try_run_case+0x14c/0x3d0
[   40.126843]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.127636]  kthread+0x24c/0x2d0
[   40.128110]  ret_from_fork+0x10/0x20
[   40.128756] 
[   40.129170] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   40.130134] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.130788] Hardware name: linux,dummy-virt (DT)
[   40.131481] ==================================================================
[   40.322815] ==================================================================
[   40.323773] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   40.323773] 
[   40.324731] Out-of-bounds write at 0x000000001f3c44b5 (1B left of kfence-#146):
[   40.325459]  test_out_of_bounds_write+0x100/0x240
[   40.326332]  test_out_of_bounds_write+0xc8/0x240
[   40.327151]  kunit_try_run_case+0x14c/0x3d0
[   40.327982]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.328875]  kthread+0x24c/0x2d0
[   40.329644]  ret_from_fork+0x10/0x20
[   40.330213] 
[   40.330581] kfence-#146: 0x0000000003942c9a-0x000000008b74aa0a, size=32, cache=test
[   40.330581] 
[   40.331521] allocated by task 282 on cpu 0 at 40.322640s (0.008869s ago):
[   40.332476]  test_alloc+0x22c/0x620
[   40.332969]  test_out_of_bounds_write+0xc8/0x240
[   40.333687]  kunit_try_run_case+0x14c/0x3d0
[   40.334362]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.335177]  kthread+0x24c/0x2d0
[   40.335790]  ret_from_fork+0x10/0x20
[   40.336423] 
[   40.336827] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   40.337884] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.338452] Hardware name: linux,dummy-virt (DT)
[   40.338987] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[   39.490910] ==================================================================
[   39.491775] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   39.491775] 
[   39.492652] Out-of-bounds read at 0x0000000051c4866b (32B right of kfence-#138):
[   39.493575]  test_out_of_bounds_read+0x1c8/0x3e0
[   39.494163]  test_out_of_bounds_read+0x198/0x3e0
[   39.494894]  kunit_try_run_case+0x14c/0x3d0
[   39.495596]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.496295]  kthread+0x24c/0x2d0
[   39.496883]  ret_from_fork+0x10/0x20
[   39.497430] 
[   39.497825] kfence-#138: 0x00000000ee69e38b-0x00000000486e3628, size=32, cache=kmalloc-32
[   39.497825] 
[   39.498919] allocated by task 276 on cpu 0 at 39.490447s (0.008461s ago):
[   39.499884]  test_alloc+0x298/0x620
[   39.500462]  test_out_of_bounds_read+0x198/0x3e0
[   39.501111]  kunit_try_run_case+0x14c/0x3d0
[   39.501813]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.502620]  kthread+0x24c/0x2d0
[   39.503148]  ret_from_fork+0x10/0x20
[   39.503784] 
[   39.504199] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   39.505337] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.505992] Hardware name: linux,dummy-virt (DT)
[   39.506693] ==================================================================
[   39.698720] ==================================================================
[   39.699712] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   39.699712] 
[   39.700586] Out-of-bounds read at 0x000000000481efbc (32B right of kfence-#140):
[   39.701519]  test_out_of_bounds_read+0x1c8/0x3e0
[   39.702239]  test_out_of_bounds_read+0x198/0x3e0
[   39.702936]  kunit_try_run_case+0x14c/0x3d0
[   39.703643]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.704402]  kthread+0x24c/0x2d0
[   39.705009]  ret_from_fork+0x10/0x20
[   39.705673] 
[   39.706070] kfence-#140: 0x000000000cc9b0bd-0x00000000c33fc6f0, size=32, cache=test
[   39.706070] 
[   39.707288] allocated by task 278 on cpu 1 at 39.698553s (0.008724s ago):
[   39.708179]  test_alloc+0x22c/0x620
[   39.708727]  test_out_of_bounds_read+0x198/0x3e0
[   39.709374]  kunit_try_run_case+0x14c/0x3d0
[   39.709930]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.710730]  kthread+0x24c/0x2d0
[   39.711270]  ret_from_fork+0x10/0x20
[   39.711776] 
[   39.712190] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   39.713434] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.714068] Hardware name: linux,dummy-virt (DT)
[   39.714733] ==================================================================
[   39.594812] ==================================================================
[   39.595661] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   39.595661] 
[   39.596912] Out-of-bounds read at 0x0000000029d18e1d (1B left of kfence-#139):
[   39.598086]  test_out_of_bounds_read+0x114/0x3e0
[   39.598760]  test_out_of_bounds_read+0xdc/0x3e0
[   39.599305]  kunit_try_run_case+0x14c/0x3d0
[   39.600214]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.601013]  kthread+0x24c/0x2d0
[   39.601811]  ret_from_fork+0x10/0x20
[   39.602510] 
[   39.602977] kfence-#139: 0x00000000efebe175-0x00000000928b796a, size=32, cache=test
[   39.602977] 
[   39.604219] allocated by task 278 on cpu 1 at 39.594622s (0.009585s ago):
[   39.605198]  test_alloc+0x22c/0x620
[   39.605890]  test_out_of_bounds_read+0xdc/0x3e0
[   39.606674]  kunit_try_run_case+0x14c/0x3d0
[   39.607427]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.608209]  kthread+0x24c/0x2d0
[   39.608838]  ret_from_fork+0x10/0x20
[   39.609462] 
[   39.610031] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   39.611206] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.611921] Hardware name: linux,dummy-virt (DT)
[   39.612575] ==================================================================
[   38.867766] ==================================================================
[   38.868677] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   38.868677] 
[   38.869866] Out-of-bounds read at 0x000000000011e4e6 (1B left of kfence-#132):
[   38.871279]  test_out_of_bounds_read+0x114/0x3e0
[   38.872041]  test_out_of_bounds_read+0xdc/0x3e0
[   38.872642]  kunit_try_run_case+0x14c/0x3d0
[   38.873325]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.874001]  kthread+0x24c/0x2d0
[   38.874636]  ret_from_fork+0x10/0x20
[   38.875272] 
[   38.876050] kfence-#132: 0x0000000094619c01-0x00000000f12b38e3, size=32, cache=kmalloc-32
[   38.876050] 
[   38.877397] allocated by task 276 on cpu 0 at 38.866416s (0.010840s ago):
[   38.879075]  test_alloc+0x298/0x620
[   38.879667]  test_out_of_bounds_read+0xdc/0x3e0
[   38.880297]  kunit_try_run_case+0x14c/0x3d0
[   38.880852]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.881648]  kthread+0x24c/0x2d0
[   38.882184]  ret_from_fork+0x10/0x20
[   38.882877] 
[   38.883393] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   38.884455] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.885100] Hardware name: linux,dummy-virt (DT)
[   38.885759] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[   38.579969] ==================================================================
[   38.580794] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   38.582079] Write of size 121 at addr fff00000c5f1be00 by task kunit_try_catch/274
[   38.582976] 
[   38.583392] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   38.584704] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.585455] Hardware name: linux,dummy-virt (DT)
[   38.586091] Call trace:
[   38.586500]  show_stack+0x20/0x38 (C)
[   38.587481]  dump_stack_lvl+0x8c/0xd0
[   38.588342]  print_report+0x118/0x5e0
[   38.588888]  kasan_report+0xc8/0x118
[   38.589456]  kasan_check_range+0x100/0x1a8
[   38.590212]  __kasan_check_write+0x20/0x30
[   38.590899]  strncpy_from_user+0x3c/0x2a0
[   38.591562]  copy_user_test_oob+0x5c0/0xec0
[   38.592230]  kunit_try_run_case+0x14c/0x3d0
[   38.592925]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.593708]  kthread+0x24c/0x2d0
[   38.594284]  ret_from_fork+0x10/0x20
[   38.594875] 
[   38.595293] Allocated by task 274:
[   38.596010]  kasan_save_stack+0x3c/0x68
[   38.596729]  kasan_save_track+0x20/0x40
[   38.597417]  kasan_save_alloc_info+0x40/0x58
[   38.598074]  __kasan_kmalloc+0xd4/0xd8
[   38.598689]  __kmalloc_noprof+0x188/0x4c8
[   38.599294]  kunit_kmalloc_array+0x34/0x88
[   38.599940]  copy_user_test_oob+0xac/0xec0
[   38.600626]  kunit_try_run_case+0x14c/0x3d0
[   38.601227]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.601964]  kthread+0x24c/0x2d0
[   38.602429]  ret_from_fork+0x10/0x20
[   38.603132] 
[   38.603452] The buggy address belongs to the object at fff00000c5f1be00
[   38.603452]  which belongs to the cache kmalloc-128 of size 128
[   38.604738] The buggy address is located 0 bytes inside of
[   38.604738]  allocated 120-byte region [fff00000c5f1be00, fff00000c5f1be78)
[   38.606192] 
[   38.606548] The buggy address belongs to the physical page:
[   38.607321] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f1b
[   38.608332] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.609282] page_type: f5(slab)
[   38.609939] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   38.610842] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   38.611660] page dumped because: kasan: bad access detected
[   38.612470] 
[   38.612864] Memory state around the buggy address:
[   38.613487]  fff00000c5f1bd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   38.614518]  fff00000c5f1bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.615285] >fff00000c5f1be00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   38.616220]                                                                 ^
[   38.617064]  fff00000c5f1be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.617931]  fff00000c5f1bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.618797] ==================================================================
[   38.620791] ==================================================================
[   38.622372] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   38.623205] Write of size 1 at addr fff00000c5f1be78 by task kunit_try_catch/274
[   38.623929] 
[   38.624317] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   38.625389] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.626374] Hardware name: linux,dummy-virt (DT)
[   38.627122] Call trace:
[   38.627603]  show_stack+0x20/0x38 (C)
[   38.628183]  dump_stack_lvl+0x8c/0xd0
[   38.628855]  print_report+0x118/0x5e0
[   38.629381]  kasan_report+0xc8/0x118
[   38.630040]  __asan_report_store1_noabort+0x20/0x30
[   38.630684]  strncpy_from_user+0x270/0x2a0
[   38.631361]  copy_user_test_oob+0x5c0/0xec0
[   38.632004]  kunit_try_run_case+0x14c/0x3d0
[   38.632596]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.633420]  kthread+0x24c/0x2d0
[   38.633980]  ret_from_fork+0x10/0x20
[   38.634637] 
[   38.634996] Allocated by task 274:
[   38.635577]  kasan_save_stack+0x3c/0x68
[   38.636139]  kasan_save_track+0x20/0x40
[   38.636692]  kasan_save_alloc_info+0x40/0x58
[   38.637380]  __kasan_kmalloc+0xd4/0xd8
[   38.637871]  __kmalloc_noprof+0x188/0x4c8
[   38.638520]  kunit_kmalloc_array+0x34/0x88
[   38.639178]  copy_user_test_oob+0xac/0xec0
[   38.639854]  kunit_try_run_case+0x14c/0x3d0
[   38.640442]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.641257]  kthread+0x24c/0x2d0
[   38.641832]  ret_from_fork+0x10/0x20
[   38.642441] 
[   38.642791] The buggy address belongs to the object at fff00000c5f1be00
[   38.642791]  which belongs to the cache kmalloc-128 of size 128
[   38.644072] The buggy address is located 0 bytes to the right of
[   38.644072]  allocated 120-byte region [fff00000c5f1be00, fff00000c5f1be78)
[   38.645427] 
[   38.645830] The buggy address belongs to the physical page:
[   38.646594] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f1b
[   38.647434] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.648262] page_type: f5(slab)
[   38.648861] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   38.649692] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   38.650570] page dumped because: kasan: bad access detected
[   38.651166] 
[   38.651571] Memory state around the buggy address:
[   38.652270]  fff00000c5f1bd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   38.653143]  fff00000c5f1bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.654105] >fff00000c5f1be00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   38.654998]                                                                 ^
[   38.655949]  fff00000c5f1be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.656752]  fff00000c5f1bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.657679] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[   38.380597] ==================================================================
[   38.381344] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec0
[   38.382201] Read of size 121 at addr fff00000c5f1be00 by task kunit_try_catch/274
[   38.383097] 
[   38.383507] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   38.384485] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.385137] Hardware name: linux,dummy-virt (DT)
[   38.385823] Call trace:
[   38.386300]  show_stack+0x20/0x38 (C)
[   38.386969]  dump_stack_lvl+0x8c/0xd0
[   38.387596]  print_report+0x118/0x5e0
[   38.388227]  kasan_report+0xc8/0x118
[   38.388896]  kasan_check_range+0x100/0x1a8
[   38.389632]  __kasan_check_read+0x20/0x30
[   38.390300]  copy_user_test_oob+0x728/0xec0
[   38.390855]  kunit_try_run_case+0x14c/0x3d0
[   38.391582]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.392311]  kthread+0x24c/0x2d0
[   38.392952]  ret_from_fork+0x10/0x20
[   38.393622] 
[   38.393992] Allocated by task 274:
[   38.394512]  kasan_save_stack+0x3c/0x68
[   38.395050]  kasan_save_track+0x20/0x40
[   38.395710]  kasan_save_alloc_info+0x40/0x58
[   38.396391]  __kasan_kmalloc+0xd4/0xd8
[   38.397004]  __kmalloc_noprof+0x188/0x4c8
[   38.397585]  kunit_kmalloc_array+0x34/0x88
[   38.398163]  copy_user_test_oob+0xac/0xec0
[   38.398830]  kunit_try_run_case+0x14c/0x3d0
[   38.399436]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.400223]  kthread+0x24c/0x2d0
[   38.400793]  ret_from_fork+0x10/0x20
[   38.401396] 
[   38.401790] The buggy address belongs to the object at fff00000c5f1be00
[   38.401790]  which belongs to the cache kmalloc-128 of size 128
[   38.403001] The buggy address is located 0 bytes inside of
[   38.403001]  allocated 120-byte region [fff00000c5f1be00, fff00000c5f1be78)
[   38.404192] 
[   38.404621] The buggy address belongs to the physical page:
[   38.405362] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f1b
[   38.406139] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.407043] page_type: f5(slab)
[   38.407655] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   38.408449] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   38.409459] page dumped because: kasan: bad access detected
[   38.410237] 
[   38.410577] Memory state around the buggy address:
[   38.411268]  fff00000c5f1bd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   38.412042]  fff00000c5f1bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.413006] >fff00000c5f1be00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   38.413802]                                                                 ^
[   38.414730]  fff00000c5f1be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.415556]  fff00000c5f1bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.416413] ==================================================================
[   38.329216] ==================================================================
[   38.330824] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec0
[   38.331634] Write of size 121 at addr fff00000c5f1be00 by task kunit_try_catch/274
[   38.332545] 
[   38.332969] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   38.334019] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.334701] Hardware name: linux,dummy-virt (DT)
[   38.335361] Call trace:
[   38.335852]  show_stack+0x20/0x38 (C)
[   38.336547]  dump_stack_lvl+0x8c/0xd0
[   38.337227]  print_report+0x118/0x5e0
[   38.338374]  kasan_report+0xc8/0x118
[   38.339443]  kasan_check_range+0x100/0x1a8
[   38.340164]  __kasan_check_write+0x20/0x30
[   38.340884]  copy_user_test_oob+0x234/0xec0
[   38.341543]  kunit_try_run_case+0x14c/0x3d0
[   38.342191]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.342956]  kthread+0x24c/0x2d0
[   38.343855]  ret_from_fork+0x10/0x20
[   38.344488] 
[   38.344846] Allocated by task 274:
[   38.345326]  kasan_save_stack+0x3c/0x68
[   38.345947]  kasan_save_track+0x20/0x40
[   38.346602]  kasan_save_alloc_info+0x40/0x58
[   38.348055]  __kasan_kmalloc+0xd4/0xd8
[   38.348787]  __kmalloc_noprof+0x188/0x4c8
[   38.349479]  kunit_kmalloc_array+0x34/0x88
[   38.350205]  copy_user_test_oob+0xac/0xec0
[   38.351193]  kunit_try_run_case+0x14c/0x3d0
[   38.351870]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.352619]  kthread+0x24c/0x2d0
[   38.353100]  ret_from_fork+0x10/0x20
[   38.354228] 
[   38.354569] The buggy address belongs to the object at fff00000c5f1be00
[   38.354569]  which belongs to the cache kmalloc-128 of size 128
[   38.355769] The buggy address is located 0 bytes inside of
[   38.355769]  allocated 120-byte region [fff00000c5f1be00, fff00000c5f1be78)
[   38.357082] 
[   38.357460] The buggy address belongs to the physical page:
[   38.358279] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f1b
[   38.359440] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.360794] page_type: f5(slab)
[   38.361178] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   38.362396] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   38.363571] page dumped because: kasan: bad access detected
[   38.364345] 
[   38.364825] Memory state around the buggy address:
[   38.365736]  fff00000c5f1bd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   38.366764]  fff00000c5f1bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.367696] >fff00000c5f1be00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   38.368586]                                                                 ^
[   38.369460]  fff00000c5f1be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.370379]  fff00000c5f1bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.371217] ==================================================================
[   38.425923] ==================================================================
[   38.426740] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec0
[   38.427621] Write of size 121 at addr fff00000c5f1be00 by task kunit_try_catch/274
[   38.428275] 
[   38.428687] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   38.429864] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.430411] Hardware name: linux,dummy-virt (DT)
[   38.431143] Call trace:
[   38.431622]  show_stack+0x20/0x38 (C)
[   38.432282]  dump_stack_lvl+0x8c/0xd0
[   38.432944]  print_report+0x118/0x5e0
[   38.433510]  kasan_report+0xc8/0x118
[   38.434183]  kasan_check_range+0x100/0x1a8
[   38.434795]  __kasan_check_write+0x20/0x30
[   38.435490]  copy_user_test_oob+0x35c/0xec0
[   38.436206]  kunit_try_run_case+0x14c/0x3d0
[   38.436947]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.437734]  kthread+0x24c/0x2d0
[   38.438278]  ret_from_fork+0x10/0x20
[   38.438938] 
[   38.439335] Allocated by task 274:
[   38.439818]  kasan_save_stack+0x3c/0x68
[   38.440451]  kasan_save_track+0x20/0x40
[   38.441020]  kasan_save_alloc_info+0x40/0x58
[   38.441711]  __kasan_kmalloc+0xd4/0xd8
[   38.442248]  __kmalloc_noprof+0x188/0x4c8
[   38.442901]  kunit_kmalloc_array+0x34/0x88
[   38.443583]  copy_user_test_oob+0xac/0xec0
[   38.444231]  kunit_try_run_case+0x14c/0x3d0
[   38.444880]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.445517]  kthread+0x24c/0x2d0
[   38.446109]  ret_from_fork+0x10/0x20
[   38.446732] 
[   38.447116] The buggy address belongs to the object at fff00000c5f1be00
[   38.447116]  which belongs to the cache kmalloc-128 of size 128
[   38.448327] The buggy address is located 0 bytes inside of
[   38.448327]  allocated 120-byte region [fff00000c5f1be00, fff00000c5f1be78)
[   38.449803] 
[   38.450168] The buggy address belongs to the physical page:
[   38.450944] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f1b
[   38.451821] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.452677] page_type: f5(slab)
[   38.453221] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   38.453997] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   38.454976] page dumped because: kasan: bad access detected
[   38.455635] 
[   38.455941] Memory state around the buggy address:
[   38.456675]  fff00000c5f1bd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   38.457616]  fff00000c5f1bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.458511] >fff00000c5f1be00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   38.459388]                                                                 ^
[   38.460339]  fff00000c5f1be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.461173]  fff00000c5f1bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.462078] ==================================================================
[   38.542184] ==================================================================
[   38.542969] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec0
[   38.543704] Read of size 121 at addr fff00000c5f1be00 by task kunit_try_catch/274
[   38.544565] 
[   38.544949] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   38.546332] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.546984] Hardware name: linux,dummy-virt (DT)
[   38.547510] Call trace:
[   38.548005]  show_stack+0x20/0x38 (C)
[   38.548677]  dump_stack_lvl+0x8c/0xd0
[   38.549247]  print_report+0x118/0x5e0
[   38.549936]  kasan_report+0xc8/0x118
[   38.550831]  kasan_check_range+0x100/0x1a8
[   38.551514]  __kasan_check_read+0x20/0x30
[   38.552116]  copy_user_test_oob+0x4a0/0xec0
[   38.552833]  kunit_try_run_case+0x14c/0x3d0
[   38.553458]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.554178]  kthread+0x24c/0x2d0
[   38.554765]  ret_from_fork+0x10/0x20
[   38.555408] 
[   38.555814] Allocated by task 274:
[   38.556334]  kasan_save_stack+0x3c/0x68
[   38.556842]  kasan_save_track+0x20/0x40
[   38.557474]  kasan_save_alloc_info+0x40/0x58
[   38.558144]  __kasan_kmalloc+0xd4/0xd8
[   38.558669]  __kmalloc_noprof+0x188/0x4c8
[   38.559352]  kunit_kmalloc_array+0x34/0x88
[   38.560027]  copy_user_test_oob+0xac/0xec0
[   38.560636]  kunit_try_run_case+0x14c/0x3d0
[   38.561237]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.561992]  kthread+0x24c/0x2d0
[   38.562591]  ret_from_fork+0x10/0x20
[   38.563090] 
[   38.563473] The buggy address belongs to the object at fff00000c5f1be00
[   38.563473]  which belongs to the cache kmalloc-128 of size 128
[   38.564756] The buggy address is located 0 bytes inside of
[   38.564756]  allocated 120-byte region [fff00000c5f1be00, fff00000c5f1be78)
[   38.565812] 
[   38.566195] The buggy address belongs to the physical page:
[   38.566977] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f1b
[   38.567993] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.568756] page_type: f5(slab)
[   38.569368] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   38.570244] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   38.571142] page dumped because: kasan: bad access detected
[   38.571933] 
[   38.572319] Memory state around the buggy address:
[   38.572944]  fff00000c5f1bd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   38.573910]  fff00000c5f1bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.574835] >fff00000c5f1be00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   38.575602]                                                                 ^
[   38.576444]  fff00000c5f1be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.577335]  fff00000c5f1bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.578203] ==================================================================
[   38.464087] ==================================================================
[   38.464758] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec0
[   38.465750] Read of size 121 at addr fff00000c5f1be00 by task kunit_try_catch/274
[   38.466629] 
[   38.467042] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   38.468413] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.469004] Hardware name: linux,dummy-virt (DT)
[   38.469758] Call trace:
[   38.470231]  show_stack+0x20/0x38 (C)
[   38.470844]  dump_stack_lvl+0x8c/0xd0
[   38.471501]  print_report+0x118/0x5e0
[   38.472124]  kasan_report+0xc8/0x118
[   38.472742]  kasan_check_range+0x100/0x1a8
[   38.473335]  __kasan_check_read+0x20/0x30
[   38.473912]  copy_user_test_oob+0x3c8/0xec0
[   38.474617]  kunit_try_run_case+0x14c/0x3d0
[   38.475324]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.476150]  kthread+0x24c/0x2d0
[   38.476778]  ret_from_fork+0x10/0x20
[   38.477428] 
[   38.477784] Allocated by task 274:
[   38.478277]  kasan_save_stack+0x3c/0x68
[   38.478931]  kasan_save_track+0x20/0x40
[   38.479493]  kasan_save_alloc_info+0x40/0x58
[   38.480193]  __kasan_kmalloc+0xd4/0xd8
[   38.480750]  __kmalloc_noprof+0x188/0x4c8
[   38.481278]  kunit_kmalloc_array+0x34/0x88
[   38.481955]  copy_user_test_oob+0xac/0xec0
[   38.482638]  kunit_try_run_case+0x14c/0x3d0
[   38.483300]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.484074]  kthread+0x24c/0x2d0
[   38.484616]  ret_from_fork+0x10/0x20
[   38.485099] 
[   38.485413] The buggy address belongs to the object at fff00000c5f1be00
[   38.485413]  which belongs to the cache kmalloc-128 of size 128
[   38.486896] The buggy address is located 0 bytes inside of
[   38.486896]  allocated 120-byte region [fff00000c5f1be00, fff00000c5f1be78)
[   38.488310] 
[   38.489274] The buggy address belongs to the physical page:
[   38.490012] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f1b
[   38.490911] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.491805] page_type: f5(slab)
[   38.492429] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   38.493303] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   38.494278] page dumped because: kasan: bad access detected
[   38.495019] 
[   38.495396] Memory state around the buggy address:
[   38.495934]  fff00000c5f1bd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   38.496722]  fff00000c5f1bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.497493] >fff00000c5f1be00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   38.498297]                                                                 ^
[   38.499272]  fff00000c5f1be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.500138]  fff00000c5f1bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.500861] ==================================================================
[   38.502763] ==================================================================
[   38.503520] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec0
[   38.504287] Write of size 121 at addr fff00000c5f1be00 by task kunit_try_catch/274
[   38.505218] 
[   38.505653] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   38.506863] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.507490] Hardware name: linux,dummy-virt (DT)
[   38.508191] Call trace:
[   38.508609]  show_stack+0x20/0x38 (C)
[   38.509289]  dump_stack_lvl+0x8c/0xd0
[   38.509912]  print_report+0x118/0x5e0
[   38.510501]  kasan_report+0xc8/0x118
[   38.511161]  kasan_check_range+0x100/0x1a8
[   38.511745]  __kasan_check_write+0x20/0x30
[   38.512453]  copy_user_test_oob+0x434/0xec0
[   38.513038]  kunit_try_run_case+0x14c/0x3d0
[   38.513770]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.514412]  kthread+0x24c/0x2d0
[   38.515037]  ret_from_fork+0x10/0x20
[   38.515716] 
[   38.516104] Allocated by task 274:
[   38.516687]  kasan_save_stack+0x3c/0x68
[   38.517241]  kasan_save_track+0x20/0x40
[   38.517886]  kasan_save_alloc_info+0x40/0x58
[   38.518553]  __kasan_kmalloc+0xd4/0xd8
[   38.519185]  __kmalloc_noprof+0x188/0x4c8
[   38.520138]  kunit_kmalloc_array+0x34/0x88
[   38.520936]  copy_user_test_oob+0xac/0xec0
[   38.521589]  kunit_try_run_case+0x14c/0x3d0
[   38.522219]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.522932]  kthread+0x24c/0x2d0
[   38.523516]  ret_from_fork+0x10/0x20
[   38.524130] 
[   38.524520] The buggy address belongs to the object at fff00000c5f1be00
[   38.524520]  which belongs to the cache kmalloc-128 of size 128
[   38.525698] The buggy address is located 0 bytes inside of
[   38.525698]  allocated 120-byte region [fff00000c5f1be00, fff00000c5f1be78)
[   38.526956] 
[   38.527336] The buggy address belongs to the physical page:
[   38.528105] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f1b
[   38.528980] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.529857] page_type: f5(slab)
[   38.530352] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   38.531261] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   38.532091] page dumped because: kasan: bad access detected
[   38.532877] 
[   38.533191] Memory state around the buggy address:
[   38.533860]  fff00000c5f1bd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   38.534764]  fff00000c5f1bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.535559] >fff00000c5f1be00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   38.536382]                                                                 ^
[   38.537171]  fff00000c5f1be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.538001]  fff00000c5f1bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.538923] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[   38.208399] ==================================================================
[   38.209788] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   38.210617] Read of size 8 at addr fff00000c5efa578 by task kunit_try_catch/270
[   38.211387] 
[   38.211853] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   38.213038] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.213552] Hardware name: linux,dummy-virt (DT)
[   38.214507] Call trace:
[   38.215052]  show_stack+0x20/0x38 (C)
[   38.216149]  dump_stack_lvl+0x8c/0xd0
[   38.216845]  print_report+0x118/0x5e0
[   38.217787]  kasan_report+0xc8/0x118
[   38.218628]  __asan_report_load8_noabort+0x20/0x30
[   38.219347]  copy_to_kernel_nofault+0x204/0x250
[   38.220172]  copy_to_kernel_nofault_oob+0x158/0x418
[   38.220926]  kunit_try_run_case+0x14c/0x3d0
[   38.221569]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.222358]  kthread+0x24c/0x2d0
[   38.222890]  ret_from_fork+0x10/0x20
[   38.223505] 
[   38.223860] Allocated by task 270:
[   38.224435]  kasan_save_stack+0x3c/0x68
[   38.225007]  kasan_save_track+0x20/0x40
[   38.225941]  kasan_save_alloc_info+0x40/0x58
[   38.226515]  __kasan_kmalloc+0xd4/0xd8
[   38.227343]  __kmalloc_cache_noprof+0x15c/0x3c8
[   38.228114]  copy_to_kernel_nofault_oob+0xc8/0x418
[   38.228909]  kunit_try_run_case+0x14c/0x3d0
[   38.229569]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.230699]  kthread+0x24c/0x2d0
[   38.231261]  ret_from_fork+0x10/0x20
[   38.231850] 
[   38.232225] The buggy address belongs to the object at fff00000c5efa500
[   38.232225]  which belongs to the cache kmalloc-128 of size 128
[   38.233596] The buggy address is located 0 bytes to the right of
[   38.233596]  allocated 120-byte region [fff00000c5efa500, fff00000c5efa578)
[   38.235665] 
[   38.236050] The buggy address belongs to the physical page:
[   38.236720] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105efa
[   38.237577] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.238657] page_type: f5(slab)
[   38.239168] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   38.240049] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   38.241040] page dumped because: kasan: bad access detected
[   38.241996] 
[   38.242401] Memory state around the buggy address:
[   38.242990]  fff00000c5efa400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   38.243861]  fff00000c5efa480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.244653] >fff00000c5efa500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   38.245598]                                                                 ^
[   38.246615]  fff00000c5efa580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.247814]  fff00000c5efa600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.248675] ==================================================================
[   38.250511] ==================================================================
[   38.251301] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   38.252250] Write of size 8 at addr fff00000c5efa578 by task kunit_try_catch/270
[   38.254585] 
[   38.255586] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   38.257470] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.258402] Hardware name: linux,dummy-virt (DT)
[   38.258929] Call trace:
[   38.259319]  show_stack+0x20/0x38 (C)
[   38.260426]  dump_stack_lvl+0x8c/0xd0
[   38.261123]  print_report+0x118/0x5e0
[   38.262118]  kasan_report+0xc8/0x118
[   38.262841]  kasan_check_range+0x100/0x1a8
[   38.263653]  __kasan_check_write+0x20/0x30
[   38.264461]  copy_to_kernel_nofault+0x8c/0x250
[   38.265150]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   38.266149]  kunit_try_run_case+0x14c/0x3d0
[   38.266712]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.267357]  kthread+0x24c/0x2d0
[   38.267886]  ret_from_fork+0x10/0x20
[   38.268569] 
[   38.268956] Allocated by task 270:
[   38.269617]  kasan_save_stack+0x3c/0x68
[   38.270287]  kasan_save_track+0x20/0x40
[   38.271028]  kasan_save_alloc_info+0x40/0x58
[   38.271689]  __kasan_kmalloc+0xd4/0xd8
[   38.272350]  __kmalloc_cache_noprof+0x15c/0x3c8
[   38.273106]  copy_to_kernel_nofault_oob+0xc8/0x418
[   38.273724]  kunit_try_run_case+0x14c/0x3d0
[   38.274448]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.275303]  kthread+0x24c/0x2d0
[   38.275958]  ret_from_fork+0x10/0x20
[   38.276630] 
[   38.277014] The buggy address belongs to the object at fff00000c5efa500
[   38.277014]  which belongs to the cache kmalloc-128 of size 128
[   38.278563] The buggy address is located 0 bytes to the right of
[   38.278563]  allocated 120-byte region [fff00000c5efa500, fff00000c5efa578)
[   38.279927] 
[   38.280323] The buggy address belongs to the physical page:
[   38.280946] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105efa
[   38.281987] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.282900] page_type: f5(slab)
[   38.283356] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   38.284512] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   38.285342] page dumped because: kasan: bad access detected
[   38.286096] 
[   38.286513] Memory state around the buggy address:
[   38.287119]  fff00000c5efa400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   38.288070]  fff00000c5efa480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.288774] >fff00000c5efa500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   38.289773]                                                                 ^
[   38.290689]  fff00000c5efa580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.291661]  fff00000c5efa600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.292594] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[   30.276387] ==================================================================
[   30.278206] BUG: KASAN: invalid-free in kfree+0x278/0x3d0
[   30.279167] Free of addr fff00000c64b4001 by task kunit_try_catch/139
[   30.280046] 
[   30.280545] CPU: 0 UID: 0 PID: 139 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.281818] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.282499] Hardware name: linux,dummy-virt (DT)
[   30.283219] Call trace:
[   30.283834]  show_stack+0x20/0x38 (C)
[   30.284495]  dump_stack_lvl+0x8c/0xd0
[   30.285229]  print_report+0x118/0x5e0
[   30.286001]  kasan_report_invalid_free+0xb0/0xd8
[   30.286596]  __kasan_kfree_large+0x5c/0xa8
[   30.287271]  free_large_kmalloc+0x58/0x140
[   30.287998]  kfree+0x278/0x3d0
[   30.288636]  kmalloc_large_invalid_free+0x108/0x270
[   30.289338]  kunit_try_run_case+0x14c/0x3d0
[   30.290091]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.290796]  kthread+0x24c/0x2d0
[   30.291427]  ret_from_fork+0x10/0x20
[   30.292097] 
[   30.292515] The buggy address belongs to the physical page:
[   30.293169] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064b4
[   30.294210] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.295063] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.296019] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.296980] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.297914] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.298846] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.299802] head: 0bfffe0000000002 ffffc1ffc3192d01 ffffffffffffffff 0000000000000000
[   30.300741] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.301642] page dumped because: kasan: bad access detected
[   30.302337] 
[   30.302760] Memory state around the buggy address:
[   30.303354]  fff00000c64b3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.304335]  fff00000c64b3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.305136] >fff00000c64b4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.306048]                    ^
[   30.306604]  fff00000c64b4080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.307452]  fff00000c64b4100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.308371] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[   38.127232] ==================================================================
[   38.127991] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   38.128793] Read of size 1 at addr ffff80008010b7f8 by task kunit_try_catch/258
[   38.129601] 
[   38.130044] CPU: 1 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   38.131735] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.132273] Hardware name: linux,dummy-virt (DT)
[   38.132956] Call trace:
[   38.133335]  show_stack+0x20/0x38 (C)
[   38.133977]  dump_stack_lvl+0x8c/0xd0
[   38.134595]  print_report+0x2fc/0x5e0
[   38.135505]  kasan_report+0xc8/0x118
[   38.136060]  __asan_report_load1_noabort+0x20/0x30
[   38.136844]  vmalloc_oob+0x51c/0x5d0
[   38.137476]  kunit_try_run_case+0x14c/0x3d0
[   38.138350]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.139156]  kthread+0x24c/0x2d0
[   38.139800]  ret_from_fork+0x10/0x20
[   38.140435] 
[   38.140822] The buggy address belongs to the virtual mapping at
[   38.140822]  [ffff80008010b000, ffff80008010d000) created by:
[   38.140822]  vmalloc_oob+0x98/0x5d0
[   38.142563] 
[   38.142946] The buggy address belongs to the physical page:
[   38.143586] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f26
[   38.144464] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.145383] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   38.146511] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   38.147438] page dumped because: kasan: bad access detected
[   38.148224] 
[   38.148667] Memory state around the buggy address:
[   38.149357]  ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.150863]  ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.151848] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   38.152624]                                                                 ^
[   38.153664]  ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   38.154599]  ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   38.155421] ==================================================================
[   38.094795] ==================================================================
[   38.096339] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   38.097316] Read of size 1 at addr ffff80008010b7f3 by task kunit_try_catch/258
[   38.098234] 
[   38.099422] CPU: 1 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   38.100909] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.101808] Hardware name: linux,dummy-virt (DT)
[   38.102666] Call trace:
[   38.103047]  show_stack+0x20/0x38 (C)
[   38.103886]  dump_stack_lvl+0x8c/0xd0
[   38.104558]  print_report+0x2fc/0x5e0
[   38.105204]  kasan_report+0xc8/0x118
[   38.106096]  __asan_report_load1_noabort+0x20/0x30
[   38.106983]  vmalloc_oob+0x578/0x5d0
[   38.107624]  kunit_try_run_case+0x14c/0x3d0
[   38.107945]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.108288]  kthread+0x24c/0x2d0
[   38.108576]  ret_from_fork+0x10/0x20
[   38.109152] 
[   38.109571] The buggy address belongs to the virtual mapping at
[   38.109571]  [ffff80008010b000, ffff80008010d000) created by:
[   38.109571]  vmalloc_oob+0x98/0x5d0
[   38.111988] 
[   38.112453] The buggy address belongs to the physical page:
[   38.112879] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f26
[   38.113281] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.113850] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   38.115043] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   38.115828] page dumped because: kasan: bad access detected
[   38.116847] 
[   38.117279] Memory state around the buggy address:
[   38.118019]  ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.119270]  ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   38.120246] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   38.121116]                                                              ^
[   38.122318]  ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   38.123227]  ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   38.124122] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   36.417095] ==================================================================
[   36.418032] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   36.418925] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   36.419830] 
[   36.420221] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.421501] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.421985] Hardware name: linux,dummy-virt (DT)
[   36.422677] Call trace:
[   36.423088]  show_stack+0x20/0x38 (C)
[   36.423667]  dump_stack_lvl+0x8c/0xd0
[   36.424340]  print_report+0x118/0x5e0
[   36.424893]  kasan_report+0xc8/0x118
[   36.425544]  kasan_check_range+0x100/0x1a8
[   36.426138]  __kasan_check_write+0x20/0x30
[   36.426744]  kasan_atomics_helper+0xa04/0x4858
[   36.427468]  kasan_atomics+0x198/0x2e8
[   36.428082]  kunit_try_run_case+0x14c/0x3d0
[   36.428787]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.429600]  kthread+0x24c/0x2d0
[   36.430208]  ret_from_fork+0x10/0x20
[   36.430803] 
[   36.431178] Allocated by task 254:
[   36.431742]  kasan_save_stack+0x3c/0x68
[   36.432317]  kasan_save_track+0x20/0x40
[   36.432862]  kasan_save_alloc_info+0x40/0x58
[   36.433561]  __kasan_kmalloc+0xd4/0xd8
[   36.434182]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.434749]  kasan_atomics+0xb8/0x2e8
[   36.435370]  kunit_try_run_case+0x14c/0x3d0
[   36.436305]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.437011]  kthread+0x24c/0x2d0
[   36.437518]  ret_from_fork+0x10/0x20
[   36.438072] 
[   36.438442] The buggy address belongs to the object at fff00000c5f10100
[   36.438442]  which belongs to the cache kmalloc-64 of size 64
[   36.439621] The buggy address is located 0 bytes to the right of
[   36.439621]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   36.440970] 
[   36.441356] The buggy address belongs to the physical page:
[   36.442010] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   36.442944] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.443744] page_type: f5(slab)
[   36.444333] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.445207] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.446029] page dumped because: kasan: bad access detected
[   36.446770] 
[   36.447140] Memory state around the buggy address:
[   36.447853]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.448667]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.449568] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.450253]                                      ^
[   36.450967]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.451767]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.452660] ==================================================================
[   37.575032] ==================================================================
[   37.575720] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   37.576592] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   37.577512] 
[   37.577984] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.579030] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.579677] Hardware name: linux,dummy-virt (DT)
[   37.580207] Call trace:
[   37.580777]  show_stack+0x20/0x38 (C)
[   37.581885]  dump_stack_lvl+0x8c/0xd0
[   37.582591]  print_report+0x118/0x5e0
[   37.583103]  kasan_report+0xc8/0x118
[   37.583769]  kasan_check_range+0x100/0x1a8
[   37.584376]  __kasan_check_write+0x20/0x30
[   37.585078]  kasan_atomics_helper+0x1414/0x4858
[   37.585738]  kasan_atomics+0x198/0x2e8
[   37.586374]  kunit_try_run_case+0x14c/0x3d0
[   37.586979]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.587802]  kthread+0x24c/0x2d0
[   37.588408]  ret_from_fork+0x10/0x20
[   37.588995] 
[   37.589351] Allocated by task 254:
[   37.589938]  kasan_save_stack+0x3c/0x68
[   37.590469]  kasan_save_track+0x20/0x40
[   37.591135]  kasan_save_alloc_info+0x40/0x58
[   37.591749]  __kasan_kmalloc+0xd4/0xd8
[   37.592251]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.592975]  kasan_atomics+0xb8/0x2e8
[   37.593486]  kunit_try_run_case+0x14c/0x3d0
[   37.594170]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.594843]  kthread+0x24c/0x2d0
[   37.595419]  ret_from_fork+0x10/0x20
[   37.595979] 
[   37.596360] The buggy address belongs to the object at fff00000c5f10100
[   37.596360]  which belongs to the cache kmalloc-64 of size 64
[   37.597556] The buggy address is located 0 bytes to the right of
[   37.597556]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   37.598895] 
[   37.599314] The buggy address belongs to the physical page:
[   37.600306] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   37.601146] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.601979] page_type: f5(slab)
[   37.602571] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.603399] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.604286] page dumped because: kasan: bad access detected
[   37.605002] 
[   37.605375] Memory state around the buggy address:
[   37.606037]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.606994]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.607741] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.608676]                                      ^
[   37.609295]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.610131]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.610955] ==================================================================
[   36.301031] ==================================================================
[   36.303034] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   36.303860] Read of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   36.304687] 
[   36.305087] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.306181] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.306819] Hardware name: linux,dummy-virt (DT)
[   36.307418] Call trace:
[   36.307853]  show_stack+0x20/0x38 (C)
[   36.308425]  dump_stack_lvl+0x8c/0xd0
[   36.309123]  print_report+0x118/0x5e0
[   36.309718]  kasan_report+0xc8/0x118
[   36.310238]  __asan_report_load4_noabort+0x20/0x30
[   36.311014]  kasan_atomics_helper+0x42d8/0x4858
[   36.311758]  kasan_atomics+0x198/0x2e8
[   36.312338]  kunit_try_run_case+0x14c/0x3d0
[   36.313053]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.313847]  kthread+0x24c/0x2d0
[   36.314365]  ret_from_fork+0x10/0x20
[   36.315022] 
[   36.315339] Allocated by task 254:
[   36.315918]  kasan_save_stack+0x3c/0x68
[   36.316591]  kasan_save_track+0x20/0x40
[   36.317095]  kasan_save_alloc_info+0x40/0x58
[   36.317794]  __kasan_kmalloc+0xd4/0xd8
[   36.318416]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.318960]  kasan_atomics+0xb8/0x2e8
[   36.319640]  kunit_try_run_case+0x14c/0x3d0
[   36.320331]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.320988]  kthread+0x24c/0x2d0
[   36.321597]  ret_from_fork+0x10/0x20
[   36.322212] 
[   36.322608] The buggy address belongs to the object at fff00000c5f10100
[   36.322608]  which belongs to the cache kmalloc-64 of size 64
[   36.323893] The buggy address is located 0 bytes to the right of
[   36.323893]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   36.325171] 
[   36.325573] The buggy address belongs to the physical page:
[   36.326259] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   36.327246] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.328112] page_type: f5(slab)
[   36.328707] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.329619] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.330461] page dumped because: kasan: bad access detected
[   36.331052] 
[   36.331475] Memory state around the buggy address:
[   36.332147]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.332967]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.333832] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.334659]                                      ^
[   36.335256]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.336067]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.336932] ==================================================================
[   37.918835] ==================================================================
[   37.920195] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   37.921224] Read of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   37.923002] 
[   37.923504] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.924805] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.925339] Hardware name: linux,dummy-virt (DT)
[   37.925920] Call trace:
[   37.926329]  show_stack+0x20/0x38 (C)
[   37.926892]  dump_stack_lvl+0x8c/0xd0
[   37.927399]  print_report+0x118/0x5e0
[   37.928138]  kasan_report+0xc8/0x118
[   37.928841]  __asan_report_load8_noabort+0x20/0x30
[   37.929769]  kasan_atomics_helper+0x3e10/0x4858
[   37.930586]  kasan_atomics+0x198/0x2e8
[   37.931272]  kunit_try_run_case+0x14c/0x3d0
[   37.931971]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.932841]  kthread+0x24c/0x2d0
[   37.933423]  ret_from_fork+0x10/0x20
[   37.934117] 
[   37.934549] Allocated by task 254:
[   37.934985]  kasan_save_stack+0x3c/0x68
[   37.935686]  kasan_save_track+0x20/0x40
[   37.936300]  kasan_save_alloc_info+0x40/0x58
[   37.937059]  __kasan_kmalloc+0xd4/0xd8
[   37.937763]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.938429]  kasan_atomics+0xb8/0x2e8
[   37.939136]  kunit_try_run_case+0x14c/0x3d0
[   37.939874]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.940628]  kthread+0x24c/0x2d0
[   37.941184]  ret_from_fork+0x10/0x20
[   37.941861] 
[   37.942278] The buggy address belongs to the object at fff00000c5f10100
[   37.942278]  which belongs to the cache kmalloc-64 of size 64
[   37.943590] The buggy address is located 0 bytes to the right of
[   37.943590]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   37.945001] 
[   37.945424] The buggy address belongs to the physical page:
[   37.946100] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   37.947115] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.947998] page_type: f5(slab)
[   37.948514] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.949607] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.950455] page dumped because: kasan: bad access detected
[   37.951215] 
[   37.951649] Memory state around the buggy address:
[   37.952362]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.953223]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.954199] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.955018]                                      ^
[   37.955754]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.956591]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.957559] ==================================================================
[   35.822962] ==================================================================
[   35.823788] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[   35.824566] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   35.825497] 
[   35.825956] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.826918] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.827556] Hardware name: linux,dummy-virt (DT)
[   35.828236] Call trace:
[   35.828698]  show_stack+0x20/0x38 (C)
[   35.829276]  dump_stack_lvl+0x8c/0xd0
[   35.829943]  print_report+0x118/0x5e0
[   35.830555]  kasan_report+0xc8/0x118
[   35.831193]  kasan_check_range+0x100/0x1a8
[   35.832181]  __kasan_check_write+0x20/0x30
[   35.832507]  kasan_atomics_helper+0x3ac/0x4858
[   35.832834]  kasan_atomics+0x198/0x2e8
[   35.833103]  kunit_try_run_case+0x14c/0x3d0
[   35.833385]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.834612]  kthread+0x24c/0x2d0
[   35.835725]  ret_from_fork+0x10/0x20
[   35.836475] 
[   35.836882] Allocated by task 254:
[   35.837841]  kasan_save_stack+0x3c/0x68
[   35.838866]  kasan_save_track+0x20/0x40
[   35.839668]  kasan_save_alloc_info+0x40/0x58
[   35.840290]  __kasan_kmalloc+0xd4/0xd8
[   35.840965]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.841658]  kasan_atomics+0xb8/0x2e8
[   35.842173]  kunit_try_run_case+0x14c/0x3d0
[   35.842775]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.843403]  kthread+0x24c/0x2d0
[   35.844013]  ret_from_fork+0x10/0x20
[   35.844669] 
[   35.845043] The buggy address belongs to the object at fff00000c5f10100
[   35.845043]  which belongs to the cache kmalloc-64 of size 64
[   35.846464] The buggy address is located 0 bytes to the right of
[   35.846464]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   35.847850] 
[   35.848152] The buggy address belongs to the physical page:
[   35.848938] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   35.849786] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.850637] page_type: f5(slab)
[   35.851108] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.852177] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.853183] page dumped because: kasan: bad access detected
[   35.853895] 
[   35.854277] Memory state around the buggy address:
[   35.854889]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   35.855866]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   35.856771] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.857726]                                      ^
[   35.858247]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.859209]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.860187] ==================================================================
[   36.966061] ==================================================================
[   36.966704] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   36.967669] Read of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   36.968679] 
[   36.969079] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.970108] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.970784] Hardware name: linux,dummy-virt (DT)
[   36.971468] Call trace:
[   36.971964]  show_stack+0x20/0x38 (C)
[   36.972637]  dump_stack_lvl+0x8c/0xd0
[   36.973271]  print_report+0x118/0x5e0
[   36.973809]  kasan_report+0xc8/0x118
[   36.974432]  __asan_report_load8_noabort+0x20/0x30
[   36.975128]  kasan_atomics_helper+0x3f58/0x4858
[   36.975738]  kasan_atomics+0x198/0x2e8
[   36.976397]  kunit_try_run_case+0x14c/0x3d0
[   36.976981]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.977717]  kthread+0x24c/0x2d0
[   36.978311]  ret_from_fork+0x10/0x20
[   36.978966] 
[   36.979331] Allocated by task 254:
[   36.979917]  kasan_save_stack+0x3c/0x68
[   36.980583]  kasan_save_track+0x20/0x40
[   36.981219]  kasan_save_alloc_info+0x40/0x58
[   36.981880]  __kasan_kmalloc+0xd4/0xd8
[   36.982499]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.983181]  kasan_atomics+0xb8/0x2e8
[   36.983817]  kunit_try_run_case+0x14c/0x3d0
[   36.984388]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.985200]  kthread+0x24c/0x2d0
[   36.985809]  ret_from_fork+0x10/0x20
[   36.986316] 
[   36.986708] The buggy address belongs to the object at fff00000c5f10100
[   36.986708]  which belongs to the cache kmalloc-64 of size 64
[   36.987957] The buggy address is located 0 bytes to the right of
[   36.987957]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   36.989269] 
[   36.989663] The buggy address belongs to the physical page:
[   36.990424] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   36.991235] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.992130] page_type: f5(slab)
[   36.992738] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.993611] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.994456] page dumped because: kasan: bad access detected
[   36.995247] 
[   36.995652] Memory state around the buggy address:
[   36.996212]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.997150]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.997986] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.998834]                                      ^
[   36.999568]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.000413]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.001244] ==================================================================
[   38.036895] ==================================================================
[   38.038396] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   38.039194] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   38.041174] 
[   38.041566] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   38.042701] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.043319] Hardware name: linux,dummy-virt (DT)
[   38.043946] Call trace:
[   38.044370]  show_stack+0x20/0x38 (C)
[   38.044990]  dump_stack_lvl+0x8c/0xd0
[   38.045616]  print_report+0x118/0x5e0
[   38.046264]  kasan_report+0xc8/0x118
[   38.046798]  kasan_check_range+0x100/0x1a8
[   38.047486]  __kasan_check_write+0x20/0x30
[   38.048113]  kasan_atomics_helper+0x17ec/0x4858
[   38.048886]  kasan_atomics+0x198/0x2e8
[   38.049559]  kunit_try_run_case+0x14c/0x3d0
[   38.050268]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.051003]  kthread+0x24c/0x2d0
[   38.051575]  ret_from_fork+0x10/0x20
[   38.052100] 
[   38.052485] Allocated by task 254:
[   38.053066]  kasan_save_stack+0x3c/0x68
[   38.053720]  kasan_save_track+0x20/0x40
[   38.054283]  kasan_save_alloc_info+0x40/0x58
[   38.054842]  __kasan_kmalloc+0xd4/0xd8
[   38.055474]  __kmalloc_cache_noprof+0x15c/0x3c8
[   38.056103]  kasan_atomics+0xb8/0x2e8
[   38.056701]  kunit_try_run_case+0x14c/0x3d0
[   38.057366]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.058168]  kthread+0x24c/0x2d0
[   38.058713]  ret_from_fork+0x10/0x20
[   38.059309] 
[   38.059705] The buggy address belongs to the object at fff00000c5f10100
[   38.059705]  which belongs to the cache kmalloc-64 of size 64
[   38.060994] The buggy address is located 0 bytes to the right of
[   38.060994]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   38.062251] 
[   38.062653] The buggy address belongs to the physical page:
[   38.063336] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   38.064375] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.065061] page_type: f5(slab)
[   38.065573] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.066581] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   38.067558] page dumped because: kasan: bad access detected
[   38.068292] 
[   38.068682] Memory state around the buggy address:
[   38.069337]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   38.070167]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   38.071078] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.072020]                                      ^
[   38.072734]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.073551]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.074355] ==================================================================
[   37.880515] ==================================================================
[   37.881174] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   37.882778] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   37.883752] 
[   37.884113] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.885095] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.885746] Hardware name: linux,dummy-virt (DT)
[   37.886411] Call trace:
[   37.886903]  show_stack+0x20/0x38 (C)
[   37.887572]  dump_stack_lvl+0x8c/0xd0
[   37.888145]  print_report+0x118/0x5e0
[   37.888789]  kasan_report+0xc8/0x118
[   37.889317]  kasan_check_range+0x100/0x1a8
[   37.890008]  __kasan_check_write+0x20/0x30
[   37.890734]  kasan_atomics_helper+0x16d0/0x4858
[   37.891452]  kasan_atomics+0x198/0x2e8
[   37.892049]  kunit_try_run_case+0x14c/0x3d0
[   37.892793]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.893586]  kthread+0x24c/0x2d0
[   37.894189]  ret_from_fork+0x10/0x20
[   37.894864] 
[   37.895191] Allocated by task 254:
[   37.895640]  kasan_save_stack+0x3c/0x68
[   37.896278]  kasan_save_track+0x20/0x40
[   37.896928]  kasan_save_alloc_info+0x40/0x58
[   37.897909]  __kasan_kmalloc+0xd4/0xd8
[   37.898543]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.899183]  kasan_atomics+0xb8/0x2e8
[   37.899730]  kunit_try_run_case+0x14c/0x3d0
[   37.900394]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.901128]  kthread+0x24c/0x2d0
[   37.901715]  ret_from_fork+0x10/0x20
[   37.902213] 
[   37.902544] The buggy address belongs to the object at fff00000c5f10100
[   37.902544]  which belongs to the cache kmalloc-64 of size 64
[   37.903979] The buggy address is located 0 bytes to the right of
[   37.903979]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   37.905110] 
[   37.905486] The buggy address belongs to the physical page:
[   37.906254] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   37.907285] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.907960] page_type: f5(slab)
[   37.908570] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.909496] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.910398] page dumped because: kasan: bad access detected
[   37.911126] 
[   37.911501] Memory state around the buggy address:
[   37.912206]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.913054]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.913865] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.914663]                                      ^
[   37.915362]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.916172]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.917116] ==================================================================
[   36.454096] ==================================================================
[   36.454910] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   36.455767] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   36.456603] 
[   36.456999] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.458138] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.458774] Hardware name: linux,dummy-virt (DT)
[   36.459332] Call trace:
[   36.459828]  show_stack+0x20/0x38 (C)
[   36.460495]  dump_stack_lvl+0x8c/0xd0
[   36.461043]  print_report+0x118/0x5e0
[   36.461708]  kasan_report+0xc8/0x118
[   36.462348]  kasan_check_range+0x100/0x1a8
[   36.463076]  __kasan_check_write+0x20/0x30
[   36.463709]  kasan_atomics_helper+0xa6c/0x4858
[   36.464365]  kasan_atomics+0x198/0x2e8
[   36.465041]  kunit_try_run_case+0x14c/0x3d0
[   36.465678]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.466494]  kthread+0x24c/0x2d0
[   36.468249]  ret_from_fork+0x10/0x20
[   36.469156] 
[   36.469870] Allocated by task 254:
[   36.470895]  kasan_save_stack+0x3c/0x68
[   36.472273]  kasan_save_track+0x20/0x40
[   36.473185]  kasan_save_alloc_info+0x40/0x58
[   36.474279]  __kasan_kmalloc+0xd4/0xd8
[   36.475293]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.476014]  kasan_atomics+0xb8/0x2e8
[   36.476665]  kunit_try_run_case+0x14c/0x3d0
[   36.477238]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.477970]  kthread+0x24c/0x2d0
[   36.478505]  ret_from_fork+0x10/0x20
[   36.479144] 
[   36.479513] The buggy address belongs to the object at fff00000c5f10100
[   36.479513]  which belongs to the cache kmalloc-64 of size 64
[   36.480609] The buggy address is located 0 bytes to the right of
[   36.480609]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   36.482064] 
[   36.482384] The buggy address belongs to the physical page:
[   36.483069] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   36.484102] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.484967] page_type: f5(slab)
[   36.485413] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.486383] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.487187] page dumped because: kasan: bad access detected
[   36.487916] 
[   36.488220] Memory state around the buggy address:
[   36.488938]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.489883]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.490828] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.491715]                                      ^
[   36.492433]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.493305]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.494237] ==================================================================
[   35.699515] ==================================================================
[   35.700410] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   35.701337] Read of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   35.702833] 
[   35.703149] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.703959] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.704627] Hardware name: linux,dummy-virt (DT)
[   35.705230] Call trace:
[   35.706192]  show_stack+0x20/0x38 (C)
[   35.706825]  dump_stack_lvl+0x8c/0xd0
[   35.707670]  print_report+0x118/0x5e0
[   35.708232]  kasan_report+0xc8/0x118
[   35.708850]  __asan_report_load4_noabort+0x20/0x30
[   35.709567]  kasan_atomics_helper+0x40fc/0x4858
[   35.710201]  kasan_atomics+0x198/0x2e8
[   35.711155]  kunit_try_run_case+0x14c/0x3d0
[   35.711870]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.712582]  kthread+0x24c/0x2d0
[   35.713185]  ret_from_fork+0x10/0x20
[   35.714138] 
[   35.714511] Allocated by task 254:
[   35.715026]  kasan_save_stack+0x3c/0x68
[   35.715518]  kasan_save_track+0x20/0x40
[   35.716178]  kasan_save_alloc_info+0x40/0x58
[   35.716841]  __kasan_kmalloc+0xd4/0xd8
[   35.717381]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.718361]  kasan_atomics+0xb8/0x2e8
[   35.719028]  kunit_try_run_case+0x14c/0x3d0
[   35.719667]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.720380]  kthread+0x24c/0x2d0
[   35.720921]  ret_from_fork+0x10/0x20
[   35.721562] 
[   35.722761] The buggy address belongs to the object at fff00000c5f10100
[   35.722761]  which belongs to the cache kmalloc-64 of size 64
[   35.724313] The buggy address is located 0 bytes to the right of
[   35.724313]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   35.725625] 
[   35.726008] The buggy address belongs to the physical page:
[   35.726732] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   35.727448] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.728761] page_type: f5(slab)
[   35.729299] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.730591] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.731408] page dumped because: kasan: bad access detected
[   35.732111] 
[   35.732490] Memory state around the buggy address:
[   35.733070]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   35.734313]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   35.735179] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.735947]                                      ^
[   35.736672]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.737493]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.738719] ==================================================================
[   37.233424] ==================================================================
[   37.234389] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   37.235401] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   37.236335] 
[   37.236757] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.237867] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.238334] Hardware name: linux,dummy-virt (DT)
[   37.239057] Call trace:
[   37.239432]  show_stack+0x20/0x38 (C)
[   37.240108]  dump_stack_lvl+0x8c/0xd0
[   37.240714]  print_report+0x118/0x5e0
[   37.241359]  kasan_report+0xc8/0x118
[   37.241914]  kasan_check_range+0x100/0x1a8
[   37.242635]  __kasan_check_write+0x20/0x30
[   37.243206]  kasan_atomics_helper+0x1058/0x4858
[   37.243943]  kasan_atomics+0x198/0x2e8
[   37.244598]  kunit_try_run_case+0x14c/0x3d0
[   37.245288]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.246055]  kthread+0x24c/0x2d0
[   37.246599]  ret_from_fork+0x10/0x20
[   37.247246] 
[   37.247607] Allocated by task 254:
[   37.248174]  kasan_save_stack+0x3c/0x68
[   37.248781]  kasan_save_track+0x20/0x40
[   37.249359]  kasan_save_alloc_info+0x40/0x58
[   37.250052]  __kasan_kmalloc+0xd4/0xd8
[   37.250632]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.251198]  kasan_atomics+0xb8/0x2e8
[   37.251836]  kunit_try_run_case+0x14c/0x3d0
[   37.252516]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.253331]  kthread+0x24c/0x2d0
[   37.253813]  ret_from_fork+0x10/0x20
[   37.254424] 
[   37.254815] The buggy address belongs to the object at fff00000c5f10100
[   37.254815]  which belongs to the cache kmalloc-64 of size 64
[   37.256020] The buggy address is located 0 bytes to the right of
[   37.256020]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   37.257210] 
[   37.257618] The buggy address belongs to the physical page:
[   37.258370] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   37.259284] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.260047] page_type: f5(slab)
[   37.260623] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.261547] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.262393] page dumped because: kasan: bad access detected
[   37.263064] 
[   37.263432] Memory state around the buggy address:
[   37.264038]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.264980]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.266021] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.266848]                                      ^
[   37.267372]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.268137]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.268987] ==================================================================
[   37.308069] ==================================================================
[   37.308978] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   37.309830] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   37.310732] 
[   37.311142] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.312232] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.312800] Hardware name: linux,dummy-virt (DT)
[   37.313424] Call trace:
[   37.313911]  show_stack+0x20/0x38 (C)
[   37.314481]  dump_stack_lvl+0x8c/0xd0
[   37.315170]  print_report+0x118/0x5e0
[   37.315849]  kasan_report+0xc8/0x118
[   37.316425]  kasan_check_range+0x100/0x1a8
[   37.317135]  __kasan_check_write+0x20/0x30
[   37.317814]  kasan_atomics_helper+0x1128/0x4858
[   37.318464]  kasan_atomics+0x198/0x2e8
[   37.319088]  kunit_try_run_case+0x14c/0x3d0
[   37.319814]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.320476]  kthread+0x24c/0x2d0
[   37.321099]  ret_from_fork+0x10/0x20
[   37.321679] 
[   37.322055] Allocated by task 254:
[   37.322626]  kasan_save_stack+0x3c/0x68
[   37.323255]  kasan_save_track+0x20/0x40
[   37.323827]  kasan_save_alloc_info+0x40/0x58
[   37.324468]  __kasan_kmalloc+0xd4/0xd8
[   37.325119]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.325835]  kasan_atomics+0xb8/0x2e8
[   37.326382]  kunit_try_run_case+0x14c/0x3d0
[   37.327382]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.328383]  kthread+0x24c/0x2d0
[   37.328914]  ret_from_fork+0x10/0x20
[   37.329469] 
[   37.329864] The buggy address belongs to the object at fff00000c5f10100
[   37.329864]  which belongs to the cache kmalloc-64 of size 64
[   37.331129] The buggy address is located 0 bytes to the right of
[   37.331129]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   37.332473] 
[   37.332880] The buggy address belongs to the physical page:
[   37.333653] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   37.334476] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.335339] page_type: f5(slab)
[   37.335933] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.336752] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.337679] page dumped because: kasan: bad access detected
[   37.338327] 
[   37.338726] Memory state around the buggy address:
[   37.339398]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.340280]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.341138] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.341844]                                      ^
[   37.342565]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.343447]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.344302] ==================================================================
[   36.062479] ==================================================================
[   36.064194] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   36.064977] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   36.066209] 
[   36.066645] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.068040] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.068804] Hardware name: linux,dummy-virt (DT)
[   36.069426] Call trace:
[   36.069855]  show_stack+0x20/0x38 (C)
[   36.070451]  dump_stack_lvl+0x8c/0xd0
[   36.070997]  print_report+0x118/0x5e0
[   36.071711]  kasan_report+0xc8/0x118
[   36.072384]  kasan_check_range+0x100/0x1a8
[   36.073131]  __kasan_check_write+0x20/0x30
[   36.073900]  kasan_atomics_helper+0x61c/0x4858
[   36.074632]  kasan_atomics+0x198/0x2e8
[   36.075324]  kunit_try_run_case+0x14c/0x3d0
[   36.076010]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.076829]  kthread+0x24c/0x2d0
[   36.077480]  ret_from_fork+0x10/0x20
[   36.078111] 
[   36.078551] Allocated by task 254:
[   36.079088]  kasan_save_stack+0x3c/0x68
[   36.079809]  kasan_save_track+0x20/0x40
[   36.080349]  kasan_save_alloc_info+0x40/0x58
[   36.081077]  __kasan_kmalloc+0xd4/0xd8
[   36.081719]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.082416]  kasan_atomics+0xb8/0x2e8
[   36.082982]  kunit_try_run_case+0x14c/0x3d0
[   36.083719]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.084422]  kthread+0x24c/0x2d0
[   36.085061]  ret_from_fork+0x10/0x20
[   36.085703] 
[   36.086041] The buggy address belongs to the object at fff00000c5f10100
[   36.086041]  which belongs to the cache kmalloc-64 of size 64
[   36.087336] The buggy address is located 0 bytes to the right of
[   36.087336]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   36.088755] 
[   36.089198] The buggy address belongs to the physical page:
[   36.089978] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   36.090988] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.091809] page_type: f5(slab)
[   36.092429] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.093343] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.094328] page dumped because: kasan: bad access detected
[   36.095011] 
[   36.095427] Memory state around the buggy address:
[   36.096102]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.096897]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.097813] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.098679]                                      ^
[   36.099344]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.100206]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.101119] ==================================================================
[   36.850087] ==================================================================
[   36.851674] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   36.852505] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   36.853499] 
[   36.854042] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.855219] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.855832] Hardware name: linux,dummy-virt (DT)
[   36.856583] Call trace:
[   36.857042]  show_stack+0x20/0x38 (C)
[   36.857684]  dump_stack_lvl+0x8c/0xd0
[   36.858386]  print_report+0x118/0x5e0
[   36.858976]  kasan_report+0xc8/0x118
[   36.859697]  kasan_check_range+0x100/0x1a8
[   36.860405]  __kasan_check_write+0x20/0x30
[   36.861150]  kasan_atomics_helper+0xd3c/0x4858
[   36.861855]  kasan_atomics+0x198/0x2e8
[   36.862568]  kunit_try_run_case+0x14c/0x3d0
[   36.863239]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.864089]  kthread+0x24c/0x2d0
[   36.864685]  ret_from_fork+0x10/0x20
[   36.865371] 
[   36.865792] Allocated by task 254:
[   36.866216]  kasan_save_stack+0x3c/0x68
[   36.866910]  kasan_save_track+0x20/0x40
[   36.867493]  kasan_save_alloc_info+0x40/0x58
[   36.868210]  __kasan_kmalloc+0xd4/0xd8
[   36.868906]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.869599]  kasan_atomics+0xb8/0x2e8
[   36.870257]  kunit_try_run_case+0x14c/0x3d0
[   36.871040]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.871898]  kthread+0x24c/0x2d0
[   36.872620]  ret_from_fork+0x10/0x20
[   36.873175] 
[   36.873616] The buggy address belongs to the object at fff00000c5f10100
[   36.873616]  which belongs to the cache kmalloc-64 of size 64
[   36.875214] The buggy address is located 0 bytes to the right of
[   36.875214]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   36.876098] 
[   36.876291] The buggy address belongs to the physical page:
[   36.876672] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   36.877738] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.878661] page_type: f5(slab)
[   36.879261] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.880144] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.880975] page dumped because: kasan: bad access detected
[   36.881699] 
[   36.882069] Memory state around the buggy address:
[   36.882781]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.883664]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.884561] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.885466]                                      ^
[   36.886082]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.886911]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.887769] ==================================================================
[   36.928565] ==================================================================
[   36.929412] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   36.930359] Read of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   36.931095] 
[   36.931507] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.932809] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.933434] Hardware name: linux,dummy-virt (DT)
[   36.934401] Call trace:
[   36.934822]  show_stack+0x20/0x38 (C)
[   36.935425]  dump_stack_lvl+0x8c/0xd0
[   36.936043]  print_report+0x118/0x5e0
[   36.936719]  kasan_report+0xc8/0x118
[   36.937282]  kasan_check_range+0x100/0x1a8
[   36.937982]  __kasan_check_read+0x20/0x30
[   36.938693]  kasan_atomics_helper+0xdd4/0x4858
[   36.939309]  kasan_atomics+0x198/0x2e8
[   36.939985]  kunit_try_run_case+0x14c/0x3d0
[   36.940633]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.941289]  kthread+0x24c/0x2d0
[   36.941925]  ret_from_fork+0x10/0x20
[   36.942552] 
[   36.942929] Allocated by task 254:
[   36.943492]  kasan_save_stack+0x3c/0x68
[   36.944068]  kasan_save_track+0x20/0x40
[   36.944726]  kasan_save_alloc_info+0x40/0x58
[   36.945302]  __kasan_kmalloc+0xd4/0xd8
[   36.945954]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.946484]  kasan_atomics+0xb8/0x2e8
[   36.947120]  kunit_try_run_case+0x14c/0x3d0
[   36.947814]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.948508]  kthread+0x24c/0x2d0
[   36.949043]  ret_from_fork+0x10/0x20
[   36.949515] 
[   36.949909] The buggy address belongs to the object at fff00000c5f10100
[   36.949909]  which belongs to the cache kmalloc-64 of size 64
[   36.951342] The buggy address is located 0 bytes to the right of
[   36.951342]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   36.952742] 
[   36.953124] The buggy address belongs to the physical page:
[   36.953682] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   36.954710] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.955392] page_type: f5(slab)
[   36.955982] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.956892] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.957791] page dumped because: kasan: bad access detected
[   36.958490] 
[   36.958859] Memory state around the buggy address:
[   36.959377]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.960332]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.961033] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.961964]                                      ^
[   36.962682]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.963476]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.964241] ==================================================================
[   37.612323] ==================================================================
[   37.613168] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   37.614011] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   37.614868] 
[   37.615270] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.616400] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.617040] Hardware name: linux,dummy-virt (DT)
[   37.617644] Call trace:
[   37.618038]  show_stack+0x20/0x38 (C)
[   37.618717]  dump_stack_lvl+0x8c/0xd0
[   37.619413]  print_report+0x118/0x5e0
[   37.620079]  kasan_report+0xc8/0x118
[   37.620766]  kasan_check_range+0x100/0x1a8
[   37.621382]  __kasan_check_write+0x20/0x30
[   37.622050]  kasan_atomics_helper+0x147c/0x4858
[   37.622722]  kasan_atomics+0x198/0x2e8
[   37.623310]  kunit_try_run_case+0x14c/0x3d0
[   37.623905]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.624756]  kthread+0x24c/0x2d0
[   37.625361]  ret_from_fork+0x10/0x20
[   37.625956] 
[   37.626262] Allocated by task 254:
[   37.626850]  kasan_save_stack+0x3c/0x68
[   37.627493]  kasan_save_track+0x20/0x40
[   37.628150]  kasan_save_alloc_info+0x40/0x58
[   37.628797]  __kasan_kmalloc+0xd4/0xd8
[   37.629340]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.630751]  kasan_atomics+0xb8/0x2e8
[   37.631363]  kunit_try_run_case+0x14c/0x3d0
[   37.631946]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.632715]  kthread+0x24c/0x2d0
[   37.633234]  ret_from_fork+0x10/0x20
[   37.633794] 
[   37.634130] The buggy address belongs to the object at fff00000c5f10100
[   37.634130]  which belongs to the cache kmalloc-64 of size 64
[   37.635352] The buggy address is located 0 bytes to the right of
[   37.635352]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   37.636645] 
[   37.637031] The buggy address belongs to the physical page:
[   37.637710] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   37.638712] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.639589] page_type: f5(slab)
[   37.640169] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.641126] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.641854] page dumped because: kasan: bad access detected
[   37.642623] 
[   37.642998] Memory state around the buggy address:
[   37.643567]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.644453]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.645159] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.646099]                                      ^
[   37.646770]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.647726]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.648445] ==================================================================
[   36.698151] ==================================================================
[   36.699229] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   36.700002] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   36.701693] 
[   36.702066] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.703296] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.703899] Hardware name: linux,dummy-virt (DT)
[   36.704670] Call trace:
[   36.705572]  show_stack+0x20/0x38 (C)
[   36.706292]  dump_stack_lvl+0x8c/0xd0
[   36.706819]  print_report+0x118/0x5e0
[   36.707417]  kasan_report+0xc8/0x118
[   36.708026]  kasan_check_range+0x100/0x1a8
[   36.708676]  __kasan_check_write+0x20/0x30
[   36.709291]  kasan_atomics_helper+0xc08/0x4858
[   36.710032]  kasan_atomics+0x198/0x2e8
[   36.710650]  kunit_try_run_case+0x14c/0x3d0
[   36.711284]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.711954]  kthread+0x24c/0x2d0
[   36.712583]  ret_from_fork+0x10/0x20
[   36.713233] 
[   36.713573] Allocated by task 254:
[   36.714134]  kasan_save_stack+0x3c/0x68
[   36.714728]  kasan_save_track+0x20/0x40
[   36.715358]  kasan_save_alloc_info+0x40/0x58
[   36.716062]  __kasan_kmalloc+0xd4/0xd8
[   36.716647]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.717424]  kasan_atomics+0xb8/0x2e8
[   36.718002]  kunit_try_run_case+0x14c/0x3d0
[   36.718735]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.719556]  kthread+0x24c/0x2d0
[   36.720139]  ret_from_fork+0x10/0x20
[   36.720748] 
[   36.721060] The buggy address belongs to the object at fff00000c5f10100
[   36.721060]  which belongs to the cache kmalloc-64 of size 64
[   36.722471] The buggy address is located 0 bytes to the right of
[   36.722471]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   36.723788] 
[   36.724136] The buggy address belongs to the physical page:
[   36.724911] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   36.725897] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.726719] page_type: f5(slab)
[   36.727286] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.728222] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.729073] page dumped because: kasan: bad access detected
[   36.729844] 
[   36.730187] Memory state around the buggy address:
[   36.730893]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.731700]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.732521] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.733343]                                      ^
[   36.734046]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.734852]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.735702] ==================================================================
[   36.495831] ==================================================================
[   36.496758] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   36.497493] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   36.498830] 
[   36.499785] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.501077] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.501765] Hardware name: linux,dummy-virt (DT)
[   36.502309] Call trace:
[   36.502738]  show_stack+0x20/0x38 (C)
[   36.503437]  dump_stack_lvl+0x8c/0xd0
[   36.504169]  print_report+0x118/0x5e0
[   36.504930]  kasan_report+0xc8/0x118
[   36.505624]  kasan_check_range+0x100/0x1a8
[   36.506287]  __kasan_check_write+0x20/0x30
[   36.507033]  kasan_atomics_helper+0xad4/0x4858
[   36.507752]  kasan_atomics+0x198/0x2e8
[   36.508341]  kunit_try_run_case+0x14c/0x3d0
[   36.509132]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.510159]  kthread+0x24c/0x2d0
[   36.510646]  ret_from_fork+0x10/0x20
[   36.511131] 
[   36.511423] Allocated by task 254:
[   36.512558]  kasan_save_stack+0x3c/0x68
[   36.513196]  kasan_save_track+0x20/0x40
[   36.513867]  kasan_save_alloc_info+0x40/0x58
[   36.514561]  __kasan_kmalloc+0xd4/0xd8
[   36.515199]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.515914]  kasan_atomics+0xb8/0x2e8
[   36.516558]  kunit_try_run_case+0x14c/0x3d0
[   36.517229]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.518027]  kthread+0x24c/0x2d0
[   36.518637]  ret_from_fork+0x10/0x20
[   36.519966] 
[   36.520366] The buggy address belongs to the object at fff00000c5f10100
[   36.520366]  which belongs to the cache kmalloc-64 of size 64
[   36.521354] The buggy address is located 0 bytes to the right of
[   36.521354]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   36.522869] 
[   36.523248] The buggy address belongs to the physical page:
[   36.524038] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   36.524978] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.525752] page_type: f5(slab)
[   36.526320] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.527205] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.527933] page dumped because: kasan: bad access detected
[   36.528886] 
[   36.529341] Memory state around the buggy address:
[   36.529867]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.530809]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.531625] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.532486]                                      ^
[   36.533109]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.533937]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.534706] ==================================================================
[   36.102465] ==================================================================
[   36.103278] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   36.104078] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   36.105092] 
[   36.105497] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.106748] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.107416] Hardware name: linux,dummy-virt (DT)
[   36.107956] Call trace:
[   36.108488]  show_stack+0x20/0x38 (C)
[   36.109233]  dump_stack_lvl+0x8c/0xd0
[   36.109957]  print_report+0x118/0x5e0
[   36.110661]  kasan_report+0xc8/0x118
[   36.111316]  kasan_check_range+0x100/0x1a8
[   36.112073]  __kasan_check_write+0x20/0x30
[   36.112718]  kasan_atomics_helper+0x684/0x4858
[   36.113542]  kasan_atomics+0x198/0x2e8
[   36.114135]  kunit_try_run_case+0x14c/0x3d0
[   36.114869]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.115746]  kthread+0x24c/0x2d0
[   36.116320]  ret_from_fork+0x10/0x20
[   36.117026] 
[   36.117405] Allocated by task 254:
[   36.117919]  kasan_save_stack+0x3c/0x68
[   36.118612]  kasan_save_track+0x20/0x40
[   36.119317]  kasan_save_alloc_info+0x40/0x58
[   36.119905]  __kasan_kmalloc+0xd4/0xd8
[   36.120592]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.121262]  kasan_atomics+0xb8/0x2e8
[   36.121941]  kunit_try_run_case+0x14c/0x3d0
[   36.122519]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.123352]  kthread+0x24c/0x2d0
[   36.123875]  ret_from_fork+0x10/0x20
[   36.124579] 
[   36.124952] The buggy address belongs to the object at fff00000c5f10100
[   36.124952]  which belongs to the cache kmalloc-64 of size 64
[   36.126061] The buggy address is located 0 bytes to the right of
[   36.126061]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   36.127378] 
[   36.127805] The buggy address belongs to the physical page:
[   36.128514] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   36.129553] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.130364] page_type: f5(slab)
[   36.130993] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.131920] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.132851] page dumped because: kasan: bad access detected
[   36.133572] 
[   36.133921] Memory state around the buggy address:
[   36.134660]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.135556]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.136464] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.137310]                                      ^
[   36.137952]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.138866]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.139745] ==================================================================
[   36.737040] ==================================================================
[   36.738754] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   36.739463] Read of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   36.740413] 
[   36.740799] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.741914] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.742436] Hardware name: linux,dummy-virt (DT)
[   36.743001] Call trace:
[   36.743474]  show_stack+0x20/0x38 (C)
[   36.744047]  dump_stack_lvl+0x8c/0xd0
[   36.744723]  print_report+0x118/0x5e0
[   36.745260]  kasan_report+0xc8/0x118
[   36.745905]  __asan_report_load4_noabort+0x20/0x30
[   36.746653]  kasan_atomics_helper+0x3de4/0x4858
[   36.747370]  kasan_atomics+0x198/0x2e8
[   36.748046]  kunit_try_run_case+0x14c/0x3d0
[   36.748651]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.749487]  kthread+0x24c/0x2d0
[   36.749997]  ret_from_fork+0x10/0x20
[   36.750659] 
[   36.751033] Allocated by task 254:
[   36.751548]  kasan_save_stack+0x3c/0x68
[   36.752149]  kasan_save_track+0x20/0x40
[   36.752677]  kasan_save_alloc_info+0x40/0x58
[   36.753372]  __kasan_kmalloc+0xd4/0xd8
[   36.753939]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.754663]  kasan_atomics+0xb8/0x2e8
[   36.755262]  kunit_try_run_case+0x14c/0x3d0
[   36.755836]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.756663]  kthread+0x24c/0x2d0
[   36.757121]  ret_from_fork+0x10/0x20
[   36.757760] 
[   36.758139] The buggy address belongs to the object at fff00000c5f10100
[   36.758139]  which belongs to the cache kmalloc-64 of size 64
[   36.759386] The buggy address is located 0 bytes to the right of
[   36.759386]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   36.760709] 
[   36.761077] The buggy address belongs to the physical page:
[   36.761853] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   36.762706] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.763617] page_type: f5(slab)
[   36.764079] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.765109] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.765973] page dumped because: kasan: bad access detected
[   36.766692] 
[   36.767056] Memory state around the buggy address:
[   36.767583]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.768518]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.769344] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.770184]                                      ^
[   36.770909]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.771719]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.772650] ==================================================================
[   37.194286] ==================================================================
[   37.195563] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   37.196373] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   37.197061] 
[   37.197477] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.198739] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.199245] Hardware name: linux,dummy-virt (DT)
[   37.199938] Call trace:
[   37.200423]  show_stack+0x20/0x38 (C)
[   37.201031]  dump_stack_lvl+0x8c/0xd0
[   37.201714]  print_report+0x118/0x5e0
[   37.202248]  kasan_report+0xc8/0x118
[   37.202916]  kasan_check_range+0x100/0x1a8
[   37.203505]  __kasan_check_write+0x20/0x30
[   37.204218]  kasan_atomics_helper+0xff0/0x4858
[   37.204899]  kasan_atomics+0x198/0x2e8
[   37.205416]  kunit_try_run_case+0x14c/0x3d0
[   37.206131]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.206964]  kthread+0x24c/0x2d0
[   37.207587]  ret_from_fork+0x10/0x20
[   37.208188] 
[   37.208566] Allocated by task 254:
[   37.209072]  kasan_save_stack+0x3c/0x68
[   37.209724]  kasan_save_track+0x20/0x40
[   37.210242]  kasan_save_alloc_info+0x40/0x58
[   37.210938]  __kasan_kmalloc+0xd4/0xd8
[   37.211505]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.212096]  kasan_atomics+0xb8/0x2e8
[   37.212734]  kunit_try_run_case+0x14c/0x3d0
[   37.213351]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.214144]  kthread+0x24c/0x2d0
[   37.214739]  ret_from_fork+0x10/0x20
[   37.215322] 
[   37.215659] The buggy address belongs to the object at fff00000c5f10100
[   37.215659]  which belongs to the cache kmalloc-64 of size 64
[   37.216935] The buggy address is located 0 bytes to the right of
[   37.216935]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   37.218198] 
[   37.218603] The buggy address belongs to the physical page:
[   37.219374] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   37.220277] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.221043] page_type: f5(slab)
[   37.221629] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.222360] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.223342] page dumped because: kasan: bad access detected
[   37.224062] 
[   37.224457] Memory state around the buggy address:
[   37.225101]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.225953]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.226819] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.227621]                                      ^
[   37.228328]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.229190]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.230112] ==================================================================
[   37.422147] ==================================================================
[   37.422918] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   37.423668] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   37.424639] 
[   37.425025] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.426237] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.426746] Hardware name: linux,dummy-virt (DT)
[   37.427423] Call trace:
[   37.427909]  show_stack+0x20/0x38 (C)
[   37.428590]  dump_stack_lvl+0x8c/0xd0
[   37.429289]  print_report+0x118/0x5e0
[   37.429886]  kasan_report+0xc8/0x118
[   37.430458]  kasan_check_range+0x100/0x1a8
[   37.431170]  __kasan_check_write+0x20/0x30
[   37.431836]  kasan_atomics_helper+0x126c/0x4858
[   37.432400]  kasan_atomics+0x198/0x2e8
[   37.433087]  kunit_try_run_case+0x14c/0x3d0
[   37.433732]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.434485]  kthread+0x24c/0x2d0
[   37.435120]  ret_from_fork+0x10/0x20
[   37.435653] 
[   37.436026] Allocated by task 254:
[   37.436627]  kasan_save_stack+0x3c/0x68
[   37.437256]  kasan_save_track+0x20/0x40
[   37.437825]  kasan_save_alloc_info+0x40/0x58
[   37.438505]  __kasan_kmalloc+0xd4/0xd8
[   37.439161]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.439821]  kasan_atomics+0xb8/0x2e8
[   37.440361]  kunit_try_run_case+0x14c/0x3d0
[   37.441058]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.441847]  kthread+0x24c/0x2d0
[   37.442419]  ret_from_fork+0x10/0x20
[   37.443037] 
[   37.443382] The buggy address belongs to the object at fff00000c5f10100
[   37.443382]  which belongs to the cache kmalloc-64 of size 64
[   37.444667] The buggy address is located 0 bytes to the right of
[   37.444667]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   37.446001] 
[   37.446383] The buggy address belongs to the physical page:
[   37.447149] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   37.447986] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.448883] page_type: f5(slab)
[   37.449463] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.450385] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.451394] page dumped because: kasan: bad access detected
[   37.452062] 
[   37.452517] Memory state around the buggy address:
[   37.453235]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.454124]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.455054] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.455943]                                      ^
[   37.456664]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.457396]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.458293] ==================================================================
[   36.023629] ==================================================================
[   36.024276] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   36.025496] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   36.027147] 
[   36.027568] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.028708] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.029343] Hardware name: linux,dummy-virt (DT)
[   36.029983] Call trace:
[   36.030357]  show_stack+0x20/0x38 (C)
[   36.031031]  dump_stack_lvl+0x8c/0xd0
[   36.031713]  print_report+0x118/0x5e0
[   36.032413]  kasan_report+0xc8/0x118
[   36.033011]  kasan_check_range+0x100/0x1a8
[   36.033717]  __kasan_check_write+0x20/0x30
[   36.034359]  kasan_atomics_helper+0x5b4/0x4858
[   36.035046]  kasan_atomics+0x198/0x2e8
[   36.035605]  kunit_try_run_case+0x14c/0x3d0
[   36.036321]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.037099]  kthread+0x24c/0x2d0
[   36.037719]  ret_from_fork+0x10/0x20
[   36.038338] 
[   36.038700] Allocated by task 254:
[   36.039234]  kasan_save_stack+0x3c/0x68
[   36.039890]  kasan_save_track+0x20/0x40
[   36.040455]  kasan_save_alloc_info+0x40/0x58
[   36.041151]  __kasan_kmalloc+0xd4/0xd8
[   36.041695]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.042387]  kasan_atomics+0xb8/0x2e8
[   36.043021]  kunit_try_run_case+0x14c/0x3d0
[   36.043708]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.044376]  kthread+0x24c/0x2d0
[   36.044974]  ret_from_fork+0x10/0x20
[   36.045548] 
[   36.045920] The buggy address belongs to the object at fff00000c5f10100
[   36.045920]  which belongs to the cache kmalloc-64 of size 64
[   36.047238] The buggy address is located 0 bytes to the right of
[   36.047238]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   36.048502] 
[   36.048908] The buggy address belongs to the physical page:
[   36.049723] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   36.050615] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.051382] page_type: f5(slab)
[   36.051891] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.052840] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.053680] page dumped because: kasan: bad access detected
[   36.054431] 
[   36.054793] Memory state around the buggy address:
[   36.055422]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.056274]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.057113] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.057905]                                      ^
[   36.058588]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.059406]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.060213] ==================================================================
[   37.536827] ==================================================================
[   37.537641] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   37.538488] Read of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   37.540204] 
[   37.540624] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.541505] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.542147] Hardware name: linux,dummy-virt (DT)
[   37.542834] Call trace:
[   37.543310]  show_stack+0x20/0x38 (C)
[   37.543900]  dump_stack_lvl+0x8c/0xd0
[   37.544584]  print_report+0x118/0x5e0
[   37.545144]  kasan_report+0xc8/0x118
[   37.545712]  __asan_report_load8_noabort+0x20/0x30
[   37.546454]  kasan_atomics_helper+0x3f04/0x4858
[   37.547041]  kasan_atomics+0x198/0x2e8
[   37.547710]  kunit_try_run_case+0x14c/0x3d0
[   37.548349]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.549029]  kthread+0x24c/0x2d0
[   37.549655]  ret_from_fork+0x10/0x20
[   37.550250] 
[   37.550634] Allocated by task 254:
[   37.551208]  kasan_save_stack+0x3c/0x68
[   37.551724]  kasan_save_track+0x20/0x40
[   37.552380]  kasan_save_alloc_info+0x40/0x58
[   37.552987]  __kasan_kmalloc+0xd4/0xd8
[   37.553638]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.554284]  kasan_atomics+0xb8/0x2e8
[   37.554875]  kunit_try_run_case+0x14c/0x3d0
[   37.555565]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.556201]  kthread+0x24c/0x2d0
[   37.556823]  ret_from_fork+0x10/0x20
[   37.557395] 
[   37.557795] The buggy address belongs to the object at fff00000c5f10100
[   37.557795]  which belongs to the cache kmalloc-64 of size 64
[   37.558988] The buggy address is located 0 bytes to the right of
[   37.558988]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   37.560456] 
[   37.560856] The buggy address belongs to the physical page:
[   37.561520] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   37.562488] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.563397] page_type: f5(slab)
[   37.563976] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.564756] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.565751] page dumped because: kasan: bad access detected
[   37.566514] 
[   37.566914] Memory state around the buggy address:
[   37.567521]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.568369]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.569263] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.570091]                                      ^
[   37.570720]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.571668]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.572331] ==================================================================
[   37.498718] ==================================================================
[   37.500316] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   37.501133] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   37.502079] 
[   37.502496] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.503669] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.504299] Hardware name: linux,dummy-virt (DT)
[   37.504921] Call trace:
[   37.505381]  show_stack+0x20/0x38 (C)
[   37.505959]  dump_stack_lvl+0x8c/0xd0
[   37.506517]  print_report+0x118/0x5e0
[   37.507188]  kasan_report+0xc8/0x118
[   37.507841]  kasan_check_range+0x100/0x1a8
[   37.508576]  __kasan_check_write+0x20/0x30
[   37.509296]  kasan_atomics_helper+0x1384/0x4858
[   37.509913]  kasan_atomics+0x198/0x2e8
[   37.510582]  kunit_try_run_case+0x14c/0x3d0
[   37.511189]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.511974]  kthread+0x24c/0x2d0
[   37.512610]  ret_from_fork+0x10/0x20
[   37.513231] 
[   37.513573] Allocated by task 254:
[   37.514138]  kasan_save_stack+0x3c/0x68
[   37.514786]  kasan_save_track+0x20/0x40
[   37.515401]  kasan_save_alloc_info+0x40/0x58
[   37.515966]  __kasan_kmalloc+0xd4/0xd8
[   37.516620]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.517316]  kasan_atomics+0xb8/0x2e8
[   37.517827]  kunit_try_run_case+0x14c/0x3d0
[   37.518472]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.519313]  kthread+0x24c/0x2d0
[   37.519847]  ret_from_fork+0x10/0x20
[   37.520470] 
[   37.520864] The buggy address belongs to the object at fff00000c5f10100
[   37.520864]  which belongs to the cache kmalloc-64 of size 64
[   37.522042] The buggy address is located 0 bytes to the right of
[   37.522042]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   37.523370] 
[   37.523766] The buggy address belongs to the physical page:
[   37.524549] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   37.525399] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.526210] page_type: f5(slab)
[   37.526700] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.527676] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.528615] page dumped because: kasan: bad access detected
[   37.529339] 
[   37.529729] Memory state around the buggy address:
[   37.530297]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.531184]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.532036] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.532851]                                      ^
[   37.533441]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.534291]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.535134] ==================================================================
[   36.536926] ==================================================================
[   36.537797] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   36.538955] Read of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   36.539871] 
[   36.540289] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.541564] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.542067] Hardware name: linux,dummy-virt (DT)
[   36.543425] Call trace:
[   36.543814]  show_stack+0x20/0x38 (C)
[   36.544385]  dump_stack_lvl+0x8c/0xd0
[   36.544964]  print_report+0x118/0x5e0
[   36.545620]  kasan_report+0xc8/0x118
[   36.546134]  __asan_report_load4_noabort+0x20/0x30
[   36.546895]  kasan_atomics_helper+0x3dcc/0x4858
[   36.547508]  kasan_atomics+0x198/0x2e8
[   36.548138]  kunit_try_run_case+0x14c/0x3d0
[   36.548782]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.549559]  kthread+0x24c/0x2d0
[   36.550066]  ret_from_fork+0x10/0x20
[   36.550682] 
[   36.551059] Allocated by task 254:
[   36.551570]  kasan_save_stack+0x3c/0x68
[   36.552218]  kasan_save_track+0x20/0x40
[   36.552798]  kasan_save_alloc_info+0x40/0x58
[   36.553488]  __kasan_kmalloc+0xd4/0xd8
[   36.554082]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.554801]  kasan_atomics+0xb8/0x2e8
[   36.555351]  kunit_try_run_case+0x14c/0x3d0
[   36.555915]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.556731]  kthread+0x24c/0x2d0
[   36.557317]  ret_from_fork+0x10/0x20
[   36.557954] 
[   36.558333] The buggy address belongs to the object at fff00000c5f10100
[   36.558333]  which belongs to the cache kmalloc-64 of size 64
[   36.559580] The buggy address is located 0 bytes to the right of
[   36.559580]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   36.560983] 
[   36.561361] The buggy address belongs to the physical page:
[   36.562042] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   36.562919] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.563720] page_type: f5(slab)
[   36.564301] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.565127] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.565971] page dumped because: kasan: bad access detected
[   36.566736] 
[   36.567113] Memory state around the buggy address:
[   36.567788]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.568614]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.569458] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.570287]                                      ^
[   36.570896]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.571755]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.572544] ==================================================================
[   37.999006] ==================================================================
[   38.000360] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   38.001021] Read of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   38.002129] 
[   38.002511] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   38.003577] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.004036] Hardware name: linux,dummy-virt (DT)
[   38.004733] Call trace:
[   38.005199]  show_stack+0x20/0x38 (C)
[   38.005859]  dump_stack_lvl+0x8c/0xd0
[   38.006542]  print_report+0x118/0x5e0
[   38.007186]  kasan_report+0xc8/0x118
[   38.007838]  __asan_report_load8_noabort+0x20/0x30
[   38.008507]  kasan_atomics_helper+0x3e20/0x4858
[   38.009148]  kasan_atomics+0x198/0x2e8
[   38.009671]  kunit_try_run_case+0x14c/0x3d0
[   38.010371]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.011195]  kthread+0x24c/0x2d0
[   38.011821]  ret_from_fork+0x10/0x20
[   38.012471] 
[   38.012872] Allocated by task 254:
[   38.013413]  kasan_save_stack+0x3c/0x68
[   38.014082]  kasan_save_track+0x20/0x40
[   38.014731]  kasan_save_alloc_info+0x40/0x58
[   38.015278]  __kasan_kmalloc+0xd4/0xd8
[   38.015929]  __kmalloc_cache_noprof+0x15c/0x3c8
[   38.016671]  kasan_atomics+0xb8/0x2e8
[   38.017233]  kunit_try_run_case+0x14c/0x3d0
[   38.017833]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.018641]  kthread+0x24c/0x2d0
[   38.019143]  ret_from_fork+0x10/0x20
[   38.019645] 
[   38.020013] The buggy address belongs to the object at fff00000c5f10100
[   38.020013]  which belongs to the cache kmalloc-64 of size 64
[   38.021448] The buggy address is located 0 bytes to the right of
[   38.021448]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   38.022808] 
[   38.023188] The buggy address belongs to the physical page:
[   38.023884] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   38.024937] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.025758] page_type: f5(slab)
[   38.026264] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.027265] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   38.028063] page dumped because: kasan: bad access detected
[   38.028797] 
[   38.029150] Memory state around the buggy address:
[   38.030158]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   38.031218]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   38.031960] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.032846]                                      ^
[   38.033554]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.034314]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.035163] ==================================================================
[   36.262120] ==================================================================
[   36.263367] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   36.264359] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   36.265000] 
[   36.265903] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.267067] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.267751] Hardware name: linux,dummy-virt (DT)
[   36.268418] Call trace:
[   36.268942]  show_stack+0x20/0x38 (C)
[   36.269622]  dump_stack_lvl+0x8c/0xd0
[   36.270323]  print_report+0x118/0x5e0
[   36.270954]  kasan_report+0xc8/0x118
[   36.271617]  kasan_check_range+0x100/0x1a8
[   36.272215]  __kasan_check_write+0x20/0x30
[   36.272976]  kasan_atomics_helper+0x894/0x4858
[   36.273626]  kasan_atomics+0x198/0x2e8
[   36.274314]  kunit_try_run_case+0x14c/0x3d0
[   36.275016]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.275753]  kthread+0x24c/0x2d0
[   36.276364]  ret_from_fork+0x10/0x20
[   36.276988] 
[   36.277412] Allocated by task 254:
[   36.277955]  kasan_save_stack+0x3c/0x68
[   36.278611]  kasan_save_track+0x20/0x40
[   36.279179]  kasan_save_alloc_info+0x40/0x58
[   36.279911]  __kasan_kmalloc+0xd4/0xd8
[   36.280506]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.281260]  kasan_atomics+0xb8/0x2e8
[   36.281861]  kunit_try_run_case+0x14c/0x3d0
[   36.282546]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.283227]  kthread+0x24c/0x2d0
[   36.283851]  ret_from_fork+0x10/0x20
[   36.284544] 
[   36.285008] The buggy address belongs to the object at fff00000c5f10100
[   36.285008]  which belongs to the cache kmalloc-64 of size 64
[   36.286342] The buggy address is located 0 bytes to the right of
[   36.286342]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   36.287862] 
[   36.288357] The buggy address belongs to the physical page:
[   36.289149] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   36.290385] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.290979] page_type: f5(slab)
[   36.291237] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.291739] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.292721] page dumped because: kasan: bad access detected
[   36.293413] 
[   36.293813] Memory state around the buggy address:
[   36.294396]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.295252]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.296206] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.296960]                                      ^
[   36.297684]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.298516]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.299467] ==================================================================
[   37.804729] ==================================================================
[   37.805561] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   37.806753] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   37.808244] 
[   37.808690] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.810303] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.810844] Hardware name: linux,dummy-virt (DT)
[   37.811450] Call trace:
[   37.811967]  show_stack+0x20/0x38 (C)
[   37.812621]  dump_stack_lvl+0x8c/0xd0
[   37.813323]  print_report+0x118/0x5e0
[   37.813958]  kasan_report+0xc8/0x118
[   37.814600]  kasan_check_range+0x100/0x1a8
[   37.815323]  __kasan_check_write+0x20/0x30
[   37.815978]  kasan_atomics_helper+0x1644/0x4858
[   37.816767]  kasan_atomics+0x198/0x2e8
[   37.817369]  kunit_try_run_case+0x14c/0x3d0
[   37.818135]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.818936]  kthread+0x24c/0x2d0
[   37.819478]  ret_from_fork+0x10/0x20
[   37.820158] 
[   37.820561] Allocated by task 254:
[   37.821117]  kasan_save_stack+0x3c/0x68
[   37.821716]  kasan_save_track+0x20/0x40
[   37.822199]  kasan_save_alloc_info+0x40/0x58
[   37.822880]  __kasan_kmalloc+0xd4/0xd8
[   37.823505]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.824169]  kasan_atomics+0xb8/0x2e8
[   37.824716]  kunit_try_run_case+0x14c/0x3d0
[   37.825390]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.826196]  kthread+0x24c/0x2d0
[   37.826779]  ret_from_fork+0x10/0x20
[   37.827256] 
[   37.827654] The buggy address belongs to the object at fff00000c5f10100
[   37.827654]  which belongs to the cache kmalloc-64 of size 64
[   37.828930] The buggy address is located 0 bytes to the right of
[   37.828930]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   37.830441] 
[   37.830795] The buggy address belongs to the physical page:
[   37.831466] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   37.832506] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.833268] page_type: f5(slab)
[   37.833856] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.834636] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.835508] page dumped because: kasan: bad access detected
[   37.836295] 
[   37.836682] Memory state around the buggy address:
[   37.837383]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.838260]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.839090] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.839969]                                      ^
[   37.840704]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.841439]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.842264] ==================================================================
[   36.377250] ==================================================================
[   36.378078] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   36.378894] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   36.379915] 
[   36.380324] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.381260] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.381913] Hardware name: linux,dummy-virt (DT)
[   36.382619] Call trace:
[   36.383085]  show_stack+0x20/0x38 (C)
[   36.383626]  dump_stack_lvl+0x8c/0xd0
[   36.384326]  print_report+0x118/0x5e0
[   36.384960]  kasan_report+0xc8/0x118
[   36.385657]  kasan_check_range+0x100/0x1a8
[   36.386258]  __kasan_check_write+0x20/0x30
[   36.386988]  kasan_atomics_helper+0x99c/0x4858
[   36.388111]  kasan_atomics+0x198/0x2e8
[   36.388798]  kunit_try_run_case+0x14c/0x3d0
[   36.389559]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.390270]  kthread+0x24c/0x2d0
[   36.390872]  ret_from_fork+0x10/0x20
[   36.391542] 
[   36.391911] Allocated by task 254:
[   36.392440]  kasan_save_stack+0x3c/0x68
[   36.392989]  kasan_save_track+0x20/0x40
[   36.393621]  kasan_save_alloc_info+0x40/0x58
[   36.394298]  __kasan_kmalloc+0xd4/0xd8
[   36.394955]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.395625]  kasan_atomics+0xb8/0x2e8
[   36.396170]  kunit_try_run_case+0x14c/0x3d0
[   36.396735]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.397546]  kthread+0x24c/0x2d0
[   36.398132]  ret_from_fork+0x10/0x20
[   36.398744] 
[   36.399153] The buggy address belongs to the object at fff00000c5f10100
[   36.399153]  which belongs to the cache kmalloc-64 of size 64
[   36.400376] The buggy address is located 0 bytes to the right of
[   36.400376]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   36.401628] 
[   36.402004] The buggy address belongs to the physical page:
[   36.402773] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   36.403663] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.404470] page_type: f5(slab)
[   36.405438] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.406472] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.407246] page dumped because: kasan: bad access detected
[   36.408010] 
[   36.408340] Memory state around the buggy address:
[   36.409037]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.409838]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.410704] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.411508]                                      ^
[   36.412242]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.413114]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.414049] ==================================================================
[   37.155991] ==================================================================
[   37.156900] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   37.157706] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   37.159230] 
[   37.159603] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.160812] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.161306] Hardware name: linux,dummy-virt (DT)
[   37.161997] Call trace:
[   37.162374]  show_stack+0x20/0x38 (C)
[   37.163045]  dump_stack_lvl+0x8c/0xd0
[   37.163637]  print_report+0x118/0x5e0
[   37.164278]  kasan_report+0xc8/0x118
[   37.164933]  kasan_check_range+0x100/0x1a8
[   37.165576]  __kasan_check_write+0x20/0x30
[   37.166268]  kasan_atomics_helper+0xf88/0x4858
[   37.166963]  kasan_atomics+0x198/0x2e8
[   37.167463]  kunit_try_run_case+0x14c/0x3d0
[   37.168208]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.168910]  kthread+0x24c/0x2d0
[   37.169516]  ret_from_fork+0x10/0x20
[   37.170113] 
[   37.170421] Allocated by task 254:
[   37.170994]  kasan_save_stack+0x3c/0x68
[   37.171645]  kasan_save_track+0x20/0x40
[   37.172283]  kasan_save_alloc_info+0x40/0x58
[   37.172874]  __kasan_kmalloc+0xd4/0xd8
[   37.173502]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.174159]  kasan_atomics+0xb8/0x2e8
[   37.174793]  kunit_try_run_case+0x14c/0x3d0
[   37.175438]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.176099]  kthread+0x24c/0x2d0
[   37.176718]  ret_from_fork+0x10/0x20
[   37.177224] 
[   37.177623] The buggy address belongs to the object at fff00000c5f10100
[   37.177623]  which belongs to the cache kmalloc-64 of size 64
[   37.178835] The buggy address is located 0 bytes to the right of
[   37.178835]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   37.180142] 
[   37.180558] The buggy address belongs to the physical page:
[   37.181114] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   37.182148] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.183216] page_type: f5(slab)
[   37.183832] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.184775] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.185702] page dumped because: kasan: bad access detected
[   37.186437] 
[   37.186735] Memory state around the buggy address:
[   37.187421]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.188202]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.189096] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.189929]                                      ^
[   37.190511]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.191470]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.192315] ==================================================================
[   36.889376] ==================================================================
[   36.890056] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   36.891942] Read of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   36.893667] 
[   36.894085] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.895201] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.895848] Hardware name: linux,dummy-virt (DT)
[   36.896589] Call trace:
[   36.896997]  show_stack+0x20/0x38 (C)
[   36.897702]  dump_stack_lvl+0x8c/0xd0
[   36.898332]  print_report+0x118/0x5e0
[   36.898940]  kasan_report+0xc8/0x118
[   36.899632]  __asan_report_load4_noabort+0x20/0x30
[   36.900382]  kasan_atomics_helper+0x3e04/0x4858
[   36.901106]  kasan_atomics+0x198/0x2e8
[   36.901752]  kunit_try_run_case+0x14c/0x3d0
[   36.902489]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.903572]  kthread+0x24c/0x2d0
[   36.904141]  ret_from_fork+0x10/0x20
[   36.905021] 
[   36.905356] Allocated by task 254:
[   36.906209]  kasan_save_stack+0x3c/0x68
[   36.906821]  kasan_save_track+0x20/0x40
[   36.907276]  kasan_save_alloc_info+0x40/0x58
[   36.907981]  __kasan_kmalloc+0xd4/0xd8
[   36.908576]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.909238]  kasan_atomics+0xb8/0x2e8
[   36.909890]  kunit_try_run_case+0x14c/0x3d0
[   36.910569]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.911258]  kthread+0x24c/0x2d0
[   36.911858]  ret_from_fork+0x10/0x20
[   36.912394] 
[   36.912793] The buggy address belongs to the object at fff00000c5f10100
[   36.912793]  which belongs to the cache kmalloc-64 of size 64
[   36.913967] The buggy address is located 0 bytes to the right of
[   36.913967]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   36.915432] 
[   36.915803] The buggy address belongs to the physical page:
[   36.916572] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   36.917606] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.918474] page_type: f5(slab)
[   36.919076] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.919946] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.920925] page dumped because: kasan: bad access detected
[   36.921515] 
[   36.921915] Memory state around the buggy address:
[   36.922572]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.923357]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.924237] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.925048]                                      ^
[   36.925765]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.926544]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.927360] ==================================================================
[   37.118030] ==================================================================
[   37.119353] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   37.120570] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   37.121602] 
[   37.121932] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.123211] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.123697] Hardware name: linux,dummy-virt (DT)
[   37.124374] Call trace:
[   37.124797]  show_stack+0x20/0x38 (C)
[   37.125439]  dump_stack_lvl+0x8c/0xd0
[   37.126109]  print_report+0x118/0x5e0
[   37.126727]  kasan_report+0xc8/0x118
[   37.127367]  kasan_check_range+0x100/0x1a8
[   37.128014]  __kasan_check_write+0x20/0x30
[   37.128738]  kasan_atomics_helper+0xf20/0x4858
[   37.129377]  kasan_atomics+0x198/0x2e8
[   37.130049]  kunit_try_run_case+0x14c/0x3d0
[   37.130673]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.131471]  kthread+0x24c/0x2d0
[   37.132099]  ret_from_fork+0x10/0x20
[   37.132737] 
[   37.133051] Allocated by task 254:
[   37.133584]  kasan_save_stack+0x3c/0x68
[   37.134151]  kasan_save_track+0x20/0x40
[   37.134724]  kasan_save_alloc_info+0x40/0x58
[   37.135233]  __kasan_kmalloc+0xd4/0xd8
[   37.135882]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.136600]  kasan_atomics+0xb8/0x2e8
[   37.137208]  kunit_try_run_case+0x14c/0x3d0
[   37.137802]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.138610]  kthread+0x24c/0x2d0
[   37.139178]  ret_from_fork+0x10/0x20
[   37.139768] 
[   37.140135] The buggy address belongs to the object at fff00000c5f10100
[   37.140135]  which belongs to the cache kmalloc-64 of size 64
[   37.141339] The buggy address is located 0 bytes to the right of
[   37.141339]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   37.142653] 
[   37.143042] The buggy address belongs to the physical page:
[   37.143707] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   37.144668] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.145450] page_type: f5(slab)
[   37.145940] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.146953] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.147817] page dumped because: kasan: bad access detected
[   37.148603] 
[   37.148924] Memory state around the buggy address:
[   37.149614]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.150629]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.151563] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.152347]                                      ^
[   37.153065]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.153896]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.154699] ==================================================================
[   37.270405] ==================================================================
[   37.271278] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   37.272556] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   37.273262] 
[   37.273710] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.274962] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.275513] Hardware name: linux,dummy-virt (DT)
[   37.276203] Call trace:
[   37.276671]  show_stack+0x20/0x38 (C)
[   37.277200]  dump_stack_lvl+0x8c/0xd0
[   37.277878]  print_report+0x118/0x5e0
[   37.278543]  kasan_report+0xc8/0x118
[   37.279228]  kasan_check_range+0x100/0x1a8
[   37.279814]  __kasan_check_write+0x20/0x30
[   37.280478]  kasan_atomics_helper+0x10c0/0x4858
[   37.281229]  kasan_atomics+0x198/0x2e8
[   37.281914]  kunit_try_run_case+0x14c/0x3d0
[   37.282621]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.283294]  kthread+0x24c/0x2d0
[   37.283912]  ret_from_fork+0x10/0x20
[   37.284466] 
[   37.284866] Allocated by task 254:
[   37.285439]  kasan_save_stack+0x3c/0x68
[   37.286084]  kasan_save_track+0x20/0x40
[   37.286608]  kasan_save_alloc_info+0x40/0x58
[   37.287269]  __kasan_kmalloc+0xd4/0xd8
[   37.287909]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.288512]  kasan_atomics+0xb8/0x2e8
[   37.289180]  kunit_try_run_case+0x14c/0x3d0
[   37.289859]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.290490]  kthread+0x24c/0x2d0
[   37.291090]  ret_from_fork+0x10/0x20
[   37.291711] 
[   37.292086] The buggy address belongs to the object at fff00000c5f10100
[   37.292086]  which belongs to the cache kmalloc-64 of size 64
[   37.293320] The buggy address is located 0 bytes to the right of
[   37.293320]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   37.294590] 
[   37.294974] The buggy address belongs to the physical page:
[   37.295747] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   37.296637] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.297394] page_type: f5(slab)
[   37.297989] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.298824] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.299730] page dumped because: kasan: bad access detected
[   37.300400] 
[   37.300792] Memory state around the buggy address:
[   37.301375]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.302264]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.303207] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.304081]                                      ^
[   37.304768]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.305635]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.306494] ==================================================================
[   37.346383] ==================================================================
[   37.347100] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   37.347958] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   37.348910] 
[   37.349333] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.350315] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.351615] Hardware name: linux,dummy-virt (DT)
[   37.352306] Call trace:
[   37.352723]  show_stack+0x20/0x38 (C)
[   37.353381]  dump_stack_lvl+0x8c/0xd0
[   37.353951]  print_report+0x118/0x5e0
[   37.354621]  kasan_report+0xc8/0x118
[   37.355273]  kasan_check_range+0x100/0x1a8
[   37.355904]  __kasan_check_write+0x20/0x30
[   37.356548]  kasan_atomics_helper+0x1190/0x4858
[   37.357278]  kasan_atomics+0x198/0x2e8
[   37.358218]  kunit_try_run_case+0x14c/0x3d0
[   37.358876]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.359820]  kthread+0x24c/0x2d0
[   37.360318]  ret_from_fork+0x10/0x20
[   37.360901] 
[   37.361274] Allocated by task 254:
[   37.361793]  kasan_save_stack+0x3c/0x68
[   37.362351]  kasan_save_track+0x20/0x40
[   37.363003]  kasan_save_alloc_info+0x40/0x58
[   37.363627]  __kasan_kmalloc+0xd4/0xd8
[   37.364134]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.364858]  kasan_atomics+0xb8/0x2e8
[   37.365441]  kunit_try_run_case+0x14c/0x3d0
[   37.365989]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.366796]  kthread+0x24c/0x2d0
[   37.367337]  ret_from_fork+0x10/0x20
[   37.367952] 
[   37.368336] The buggy address belongs to the object at fff00000c5f10100
[   37.368336]  which belongs to the cache kmalloc-64 of size 64
[   37.369595] The buggy address is located 0 bytes to the right of
[   37.369595]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   37.370876] 
[   37.371199] The buggy address belongs to the physical page:
[   37.371969] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   37.372906] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.373803] page_type: f5(slab)
[   37.374369] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.375272] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.376190] page dumped because: kasan: bad access detected
[   37.376951] 
[   37.377327] Memory state around the buggy address:
[   37.377988]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.378780]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.379688] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.380581]                                      ^
[   37.381277]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.382052]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.383000] ==================================================================
[   35.943178] ==================================================================
[   35.943960] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   35.944946] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   35.947571] 
[   35.947909] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.949239] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.949949] Hardware name: linux,dummy-virt (DT)
[   35.950639] Call trace:
[   35.951126]  show_stack+0x20/0x38 (C)
[   35.951879]  dump_stack_lvl+0x8c/0xd0
[   35.952905]  print_report+0x118/0x5e0
[   35.953596]  kasan_report+0xc8/0x118
[   35.954448]  kasan_check_range+0x100/0x1a8
[   35.955107]  __kasan_check_write+0x20/0x30
[   35.955961]  kasan_atomics_helper+0x4e4/0x4858
[   35.956622]  kasan_atomics+0x198/0x2e8
[   35.957160]  kunit_try_run_case+0x14c/0x3d0
[   35.957828]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.958793]  kthread+0x24c/0x2d0
[   35.959429]  ret_from_fork+0x10/0x20
[   35.960108] 
[   35.960439] Allocated by task 254:
[   35.961023]  kasan_save_stack+0x3c/0x68
[   35.961885]  kasan_save_track+0x20/0x40
[   35.962549]  kasan_save_alloc_info+0x40/0x58
[   35.963200]  __kasan_kmalloc+0xd4/0xd8
[   35.963764]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.964410]  kasan_atomics+0xb8/0x2e8
[   35.965038]  kunit_try_run_case+0x14c/0x3d0
[   35.965883]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.966647]  kthread+0x24c/0x2d0
[   35.967230]  ret_from_fork+0x10/0x20
[   35.968464] 
[   35.968993] The buggy address belongs to the object at fff00000c5f10100
[   35.968993]  which belongs to the cache kmalloc-64 of size 64
[   35.970711] The buggy address is located 0 bytes to the right of
[   35.970711]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   35.972153] 
[   35.972574] The buggy address belongs to the physical page:
[   35.973359] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   35.974440] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.975444] page_type: f5(slab)
[   35.975969] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.976788] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.977680] page dumped because: kasan: bad access detected
[   35.978598] 
[   35.978945] Memory state around the buggy address:
[   35.979610]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   35.980425]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   35.981152] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.982097]                                      ^
[   35.982735]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.983571]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.984370] ==================================================================
[   35.484035] ==================================================================
[   35.485410] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   35.486564] Read of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   35.487343] 
[   35.487766] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.488781] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.489408] Hardware name: linux,dummy-virt (DT)
[   35.490337] Call trace:
[   35.490783]  show_stack+0x20/0x38 (C)
[   35.491437]  dump_stack_lvl+0x8c/0xd0
[   35.492116]  print_report+0x118/0x5e0
[   35.492730]  kasan_report+0xc8/0x118
[   35.493345]  __asan_report_load4_noabort+0x20/0x30
[   35.494663]  kasan_atomics_helper+0x40a8/0x4858
[   35.495312]  kasan_atomics+0x198/0x2e8
[   35.495910]  kunit_try_run_case+0x14c/0x3d0
[   35.496567]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.497271]  kthread+0x24c/0x2d0
[   35.498224]  ret_from_fork+0x10/0x20
[   35.498909] 
[   35.499286] Allocated by task 254:
[   35.499753]  kasan_save_stack+0x3c/0x68
[   35.500399]  kasan_save_track+0x20/0x40
[   35.500978]  kasan_save_alloc_info+0x40/0x58
[   35.502016]  __kasan_kmalloc+0xd4/0xd8
[   35.502542]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.503236]  kasan_atomics+0xb8/0x2e8
[   35.503880]  kunit_try_run_case+0x14c/0x3d0
[   35.504476]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.505127]  kthread+0x24c/0x2d0
[   35.505940]  ret_from_fork+0x10/0x20
[   35.506576] 
[   35.506944] The buggy address belongs to the object at fff00000c5f10100
[   35.506944]  which belongs to the cache kmalloc-64 of size 64
[   35.508652] The buggy address is located 0 bytes to the right of
[   35.508652]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   35.510586] 
[   35.511139] The buggy address belongs to the physical page:
[   35.511970] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   35.513042] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.513984] page_type: f5(slab)
[   35.514765] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.515713] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.516494] page dumped because: kasan: bad access detected
[   35.517268] 
[   35.517641] Memory state around the buggy address:
[   35.518162]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   35.519100]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   35.519866] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.520832]                                      ^
[   35.521545]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.522796]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.523584] ==================================================================
[   36.811448] ==================================================================
[   36.812293] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   36.813169] Read of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   36.814150] 
[   36.814612] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.815591] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.816279] Hardware name: linux,dummy-virt (DT)
[   36.817005] Call trace:
[   36.817480]  show_stack+0x20/0x38 (C)
[   36.818152]  dump_stack_lvl+0x8c/0xd0
[   36.818744]  print_report+0x118/0x5e0
[   36.819457]  kasan_report+0xc8/0x118
[   36.820011]  __asan_report_load4_noabort+0x20/0x30
[   36.820829]  kasan_atomics_helper+0x3dd8/0x4858
[   36.821508]  kasan_atomics+0x198/0x2e8
[   36.822176]  kunit_try_run_case+0x14c/0x3d0
[   36.822918]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.823622]  kthread+0x24c/0x2d0
[   36.824277]  ret_from_fork+0x10/0x20
[   36.824912] 
[   36.825330] Allocated by task 254:
[   36.825917]  kasan_save_stack+0x3c/0x68
[   36.826555]  kasan_save_track+0x20/0x40
[   36.827235]  kasan_save_alloc_info+0x40/0x58
[   36.827934]  __kasan_kmalloc+0xd4/0xd8
[   36.828488]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.829302]  kasan_atomics+0xb8/0x2e8
[   36.829976]  kunit_try_run_case+0x14c/0x3d0
[   36.830751]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.831414]  kthread+0x24c/0x2d0
[   36.832051]  ret_from_fork+0x10/0x20
[   36.832706] 
[   36.833025] The buggy address belongs to the object at fff00000c5f10100
[   36.833025]  which belongs to the cache kmalloc-64 of size 64
[   36.834374] The buggy address is located 0 bytes to the right of
[   36.834374]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   36.835765] 
[   36.836158] The buggy address belongs to the physical page:
[   36.836880] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   36.837882] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.838860] page_type: f5(slab)
[   36.839407] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.840422] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.841370] page dumped because: kasan: bad access detected
[   36.842202] 
[   36.842615] Memory state around the buggy address:
[   36.843371]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.844327]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.845249] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.846177]                                      ^
[   36.846908]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.847833]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.848690] ==================================================================
[   35.525495] ==================================================================
[   35.527080] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   35.528326] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   35.529458] 
[   35.529897] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.530970] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.531701] Hardware name: linux,dummy-virt (DT)
[   35.532365] Call trace:
[   35.532923]  show_stack+0x20/0x38 (C)
[   35.533991]  dump_stack_lvl+0x8c/0xd0
[   35.534641]  print_report+0x118/0x5e0
[   35.535306]  kasan_report+0xc8/0x118
[   35.535973]  __asan_report_store4_noabort+0x20/0x30
[   35.536772]  kasan_atomics_helper+0x3f7c/0x4858
[   35.537501]  kasan_atomics+0x198/0x2e8
[   35.538440]  kunit_try_run_case+0x14c/0x3d0
[   35.539140]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.539895]  kthread+0x24c/0x2d0
[   35.540572]  ret_from_fork+0x10/0x20
[   35.541178] 
[   35.541511] Allocated by task 254:
[   35.542044]  kasan_save_stack+0x3c/0x68
[   35.542942]  kasan_save_track+0x20/0x40
[   35.543550]  kasan_save_alloc_info+0x40/0x58
[   35.544187]  __kasan_kmalloc+0xd4/0xd8
[   35.544891]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.546608]  kasan_atomics+0xb8/0x2e8
[   35.547114]  kunit_try_run_case+0x14c/0x3d0
[   35.547871]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.548716]  kthread+0x24c/0x2d0
[   35.549309]  ret_from_fork+0x10/0x20
[   35.550199] 
[   35.550503] The buggy address belongs to the object at fff00000c5f10100
[   35.550503]  which belongs to the cache kmalloc-64 of size 64
[   35.551668] The buggy address is located 0 bytes to the right of
[   35.551668]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   35.553100] 
[   35.553544] The buggy address belongs to the physical page:
[   35.554580] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   35.555417] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.556342] page_type: f5(slab)
[   35.556818] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.557975] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.559016] page dumped because: kasan: bad access detected
[   35.559720] 
[   35.560084] Memory state around the buggy address:
[   35.560859]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   35.561906]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   35.562904] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.563766]                                      ^
[   35.564438]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.565338]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.566588] ==================================================================
[   36.221519] ==================================================================
[   36.222440] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   36.223663] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   36.224461] 
[   36.224956] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.226301] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.226982] Hardware name: linux,dummy-virt (DT)
[   36.227519] Call trace:
[   36.228008]  show_stack+0x20/0x38 (C)
[   36.228771]  dump_stack_lvl+0x8c/0xd0
[   36.229371]  print_report+0x118/0x5e0
[   36.230081]  kasan_report+0xc8/0x118
[   36.230774]  kasan_check_range+0x100/0x1a8
[   36.231501]  __kasan_check_write+0x20/0x30
[   36.232195]  kasan_atomics_helper+0x7cc/0x4858
[   36.233000]  kasan_atomics+0x198/0x2e8
[   36.233711]  kunit_try_run_case+0x14c/0x3d0
[   36.234454]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.235232]  kthread+0x24c/0x2d0
[   36.235910]  ret_from_fork+0x10/0x20
[   36.236625] 
[   36.237037] Allocated by task 254:
[   36.237544]  kasan_save_stack+0x3c/0x68
[   36.238179]  kasan_save_track+0x20/0x40
[   36.238834]  kasan_save_alloc_info+0x40/0x58
[   36.239609]  __kasan_kmalloc+0xd4/0xd8
[   36.240217]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.240938]  kasan_atomics+0xb8/0x2e8
[   36.241551]  kunit_try_run_case+0x14c/0x3d0
[   36.242172]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.242997]  kthread+0x24c/0x2d0
[   36.243578]  ret_from_fork+0x10/0x20
[   36.244067] 
[   36.244457] The buggy address belongs to the object at fff00000c5f10100
[   36.244457]  which belongs to the cache kmalloc-64 of size 64
[   36.245765] The buggy address is located 0 bytes to the right of
[   36.245765]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   36.247138] 
[   36.247509] The buggy address belongs to the physical page:
[   36.248299] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   36.249807] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.250484] page_type: f5(slab)
[   36.251152] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.252251] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.253344] page dumped because: kasan: bad access detected
[   36.254251] 
[   36.254806] Memory state around the buggy address:
[   36.255482]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.256394]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.257297] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.258067]                                      ^
[   36.258696]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.259641]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.260395] ==================================================================
[   36.141219] ==================================================================
[   36.142034] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   36.142965] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   36.143969] 
[   36.144420] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.145627] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.146173] Hardware name: linux,dummy-virt (DT)
[   36.146907] Call trace:
[   36.147324]  show_stack+0x20/0x38 (C)
[   36.148013]  dump_stack_lvl+0x8c/0xd0
[   36.148739]  print_report+0x118/0x5e0
[   36.149380]  kasan_report+0xc8/0x118
[   36.150021]  kasan_check_range+0x100/0x1a8
[   36.150703]  __kasan_check_write+0x20/0x30
[   36.151442]  kasan_atomics_helper+0x6ec/0x4858
[   36.152215]  kasan_atomics+0x198/0x2e8
[   36.152920]  kunit_try_run_case+0x14c/0x3d0
[   36.153682]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.154348]  kthread+0x24c/0x2d0
[   36.155019]  ret_from_fork+0x10/0x20
[   36.155744] 
[   36.156059] Allocated by task 254:
[   36.156673]  kasan_save_stack+0x3c/0x68
[   36.157389]  kasan_save_track+0x20/0x40
[   36.158072]  kasan_save_alloc_info+0x40/0x58
[   36.158749]  __kasan_kmalloc+0xd4/0xd8
[   36.159397]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.160124]  kasan_atomics+0xb8/0x2e8
[   36.160788]  kunit_try_run_case+0x14c/0x3d0
[   36.161497]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.162205]  kthread+0x24c/0x2d0
[   36.162841]  ret_from_fork+0x10/0x20
[   36.163430] 
[   36.163833] The buggy address belongs to the object at fff00000c5f10100
[   36.163833]  which belongs to the cache kmalloc-64 of size 64
[   36.165196] The buggy address is located 0 bytes to the right of
[   36.165196]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   36.166561] 
[   36.166952] The buggy address belongs to the physical page:
[   36.167739] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   36.168747] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.169614] page_type: f5(slab)
[   36.170212] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.171146] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.172079] page dumped because: kasan: bad access detected
[   36.172806] 
[   36.173162] Memory state around the buggy address:
[   36.173873]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.174796]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.175680] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.176545]                                      ^
[   36.177194]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.178096]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.178956] ==================================================================
[   37.080502] ==================================================================
[   37.081313] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   37.082345] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   37.083226] 
[   37.083687] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.084897] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.085446] Hardware name: linux,dummy-virt (DT)
[   37.086128] Call trace:
[   37.086698]  show_stack+0x20/0x38 (C)
[   37.087401]  dump_stack_lvl+0x8c/0xd0
[   37.088007]  print_report+0x118/0x5e0
[   37.088699]  kasan_report+0xc8/0x118
[   37.089284]  kasan_check_range+0x100/0x1a8
[   37.089915]  __kasan_check_write+0x20/0x30
[   37.090456]  kasan_atomics_helper+0xeb8/0x4858
[   37.091190]  kasan_atomics+0x198/0x2e8
[   37.091856]  kunit_try_run_case+0x14c/0x3d0
[   37.092598]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.093412]  kthread+0x24c/0x2d0
[   37.094050]  ret_from_fork+0x10/0x20
[   37.094663] 
[   37.095009] Allocated by task 254:
[   37.095435]  kasan_save_stack+0x3c/0x68
[   37.096093]  kasan_save_track+0x20/0x40
[   37.096756]  kasan_save_alloc_info+0x40/0x58
[   37.097427]  __kasan_kmalloc+0xd4/0xd8
[   37.098017]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.098724]  kasan_atomics+0xb8/0x2e8
[   37.099205]  kunit_try_run_case+0x14c/0x3d0
[   37.099894]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.100545]  kthread+0x24c/0x2d0
[   37.101067]  ret_from_fork+0x10/0x20
[   37.101692] 
[   37.102060] The buggy address belongs to the object at fff00000c5f10100
[   37.102060]  which belongs to the cache kmalloc-64 of size 64
[   37.103371] The buggy address is located 0 bytes to the right of
[   37.103371]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   37.104672] 
[   37.105063] The buggy address belongs to the physical page:
[   37.105684] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   37.106707] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.107608] page_type: f5(slab)
[   37.108193] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.109091] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.109945] page dumped because: kasan: bad access detected
[   37.110577] 
[   37.110956] Memory state around the buggy address:
[   37.111669]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.112352]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.113289] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.114073]                                      ^
[   37.114671]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.115608]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.116450] ==================================================================
[   37.689468] ==================================================================
[   37.690702] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   37.692393] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   37.693682] 
[   37.694403] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.695635] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.696304] Hardware name: linux,dummy-virt (DT)
[   37.696914] Call trace:
[   37.697424]  show_stack+0x20/0x38 (C)
[   37.698127]  dump_stack_lvl+0x8c/0xd0
[   37.698719]  print_report+0x118/0x5e0
[   37.699400]  kasan_report+0xc8/0x118
[   37.700003]  kasan_check_range+0x100/0x1a8
[   37.700754]  __kasan_check_write+0x20/0x30
[   37.701352]  kasan_atomics_helper+0x154c/0x4858
[   37.702157]  kasan_atomics+0x198/0x2e8
[   37.702780]  kunit_try_run_case+0x14c/0x3d0
[   37.703542]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.704242]  kthread+0x24c/0x2d0
[   37.704920]  ret_from_fork+0x10/0x20
[   37.705513] 
[   37.705944] Allocated by task 254:
[   37.706445]  kasan_save_stack+0x3c/0x68
[   37.707127]  kasan_save_track+0x20/0x40
[   37.707761]  kasan_save_alloc_info+0x40/0x58
[   37.708374]  __kasan_kmalloc+0xd4/0xd8
[   37.709042]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.709699]  kasan_atomics+0xb8/0x2e8
[   37.710311]  kunit_try_run_case+0x14c/0x3d0
[   37.711033]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.711713]  kthread+0x24c/0x2d0
[   37.712337]  ret_from_fork+0x10/0x20
[   37.712937] 
[   37.713333] The buggy address belongs to the object at fff00000c5f10100
[   37.713333]  which belongs to the cache kmalloc-64 of size 64
[   37.714626] The buggy address is located 0 bytes to the right of
[   37.714626]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   37.716077] 
[   37.716513] The buggy address belongs to the physical page:
[   37.717244] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   37.718158] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.718893] page_type: f5(slab)
[   37.719474] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.720414] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.721364] page dumped because: kasan: bad access detected
[   37.722019] 
[   37.722434] Memory state around the buggy address:
[   37.723091]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.724058]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.724940] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.725805]                                      ^
[   37.726454]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.727346]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.728230] ==================================================================
[   35.740046] ==================================================================
[   35.740878] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   35.742723] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   35.743407] 
[   35.743840] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.745103] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.745839] Hardware name: linux,dummy-virt (DT)
[   35.746547] Call trace:
[   35.747003]  show_stack+0x20/0x38 (C)
[   35.747751]  dump_stack_lvl+0x8c/0xd0
[   35.748302]  print_report+0x118/0x5e0
[   35.749012]  kasan_report+0xc8/0x118
[   35.749939]  kasan_check_range+0x100/0x1a8
[   35.750652]  __kasan_check_write+0x20/0x30
[   35.751234]  kasan_atomics_helper+0x32c/0x4858
[   35.751965]  kasan_atomics+0x198/0x2e8
[   35.752612]  kunit_try_run_case+0x14c/0x3d0
[   35.753245]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.754278]  kthread+0x24c/0x2d0
[   35.754802]  ret_from_fork+0x10/0x20
[   35.755444] 
[   35.755830] Allocated by task 254:
[   35.756323]  kasan_save_stack+0x3c/0x68
[   35.756956]  kasan_save_track+0x20/0x40
[   35.757436]  kasan_save_alloc_info+0x40/0x58
[   35.758396]  __kasan_kmalloc+0xd4/0xd8
[   35.759033]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.759734]  kasan_atomics+0xb8/0x2e8
[   35.760306]  kunit_try_run_case+0x14c/0x3d0
[   35.761042]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.762192]  kthread+0x24c/0x2d0
[   35.762671]  ret_from_fork+0x10/0x20
[   35.763136] 
[   35.763728] The buggy address belongs to the object at fff00000c5f10100
[   35.763728]  which belongs to the cache kmalloc-64 of size 64
[   35.765278] The buggy address is located 0 bytes to the right of
[   35.765278]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   35.767065] 
[   35.767452] The buggy address belongs to the physical page:
[   35.768297] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   35.769191] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.769903] page_type: f5(slab)
[   35.770544] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.771471] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.772379] page dumped because: kasan: bad access detected
[   35.773041] 
[   35.773454] Memory state around the buggy address:
[   35.774255]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   35.775345]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   35.776199] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.777088]                                      ^
[   35.777807]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.778831]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.779898] ==================================================================
[   37.729926] ==================================================================
[   37.730874] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   37.731757] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   37.732600] 
[   37.733046] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.734311] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.734849] Hardware name: linux,dummy-virt (DT)
[   37.735578] Call trace:
[   37.736032]  show_stack+0x20/0x38 (C)
[   37.736761]  dump_stack_lvl+0x8c/0xd0
[   37.737392]  print_report+0x118/0x5e0
[   37.738071]  kasan_report+0xc8/0x118
[   37.738775]  kasan_check_range+0x100/0x1a8
[   37.739514]  __kasan_check_write+0x20/0x30
[   37.740436]  kasan_atomics_helper+0x15b4/0x4858
[   37.741327]  kasan_atomics+0x198/0x2e8
[   37.741934]  kunit_try_run_case+0x14c/0x3d0
[   37.742968]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.743690]  kthread+0x24c/0x2d0
[   37.744209]  ret_from_fork+0x10/0x20
[   37.744808] 
[   37.745188] Allocated by task 254:
[   37.745654]  kasan_save_stack+0x3c/0x68
[   37.746290]  kasan_save_track+0x20/0x40
[   37.746934]  kasan_save_alloc_info+0x40/0x58
[   37.747633]  __kasan_kmalloc+0xd4/0xd8
[   37.748186]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.748917]  kasan_atomics+0xb8/0x2e8
[   37.749439]  kunit_try_run_case+0x14c/0x3d0
[   37.750167]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.750999]  kthread+0x24c/0x2d0
[   37.751612]  ret_from_fork+0x10/0x20
[   37.752249] 
[   37.752674] The buggy address belongs to the object at fff00000c5f10100
[   37.752674]  which belongs to the cache kmalloc-64 of size 64
[   37.753979] The buggy address is located 0 bytes to the right of
[   37.753979]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   37.755231] 
[   37.755597] The buggy address belongs to the physical page:
[   37.756210] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   37.757176] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.757947] page_type: f5(slab)
[   37.758467] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.759390] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.760263] page dumped because: kasan: bad access detected
[   37.760879] 
[   37.761260] Memory state around the buggy address:
[   37.761970]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.762799]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.763514] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.764465]                                      ^
[   37.765038]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.765845]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.766636] ==================================================================
[   36.574003] ==================================================================
[   36.574729] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   36.575520] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   36.576314] 
[   36.576735] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.579769] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.580572] Hardware name: linux,dummy-virt (DT)
[   36.581126] Call trace:
[   36.581964]  show_stack+0x20/0x38 (C)
[   36.582608]  dump_stack_lvl+0x8c/0xd0
[   36.583223]  print_report+0x118/0x5e0
[   36.583780]  kasan_report+0xc8/0x118
[   36.584335]  kasan_check_range+0x100/0x1a8
[   36.586274]  __kasan_check_write+0x20/0x30
[   36.588139]  kasan_atomics_helper+0xb70/0x4858
[   36.589785]  kasan_atomics+0x198/0x2e8
[   36.590678]  kunit_try_run_case+0x14c/0x3d0
[   36.592429]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.594094]  kthread+0x24c/0x2d0
[   36.595499]  ret_from_fork+0x10/0x20
[   36.597064] 
[   36.598090] Allocated by task 254:
[   36.599518]  kasan_save_stack+0x3c/0x68
[   36.600926]  kasan_save_track+0x20/0x40
[   36.601426]  kasan_save_alloc_info+0x40/0x58
[   36.603470]  __kasan_kmalloc+0xd4/0xd8
[   36.605027]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.606558]  kasan_atomics+0xb8/0x2e8
[   36.608109]  kunit_try_run_case+0x14c/0x3d0
[   36.609721]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.611489]  kthread+0x24c/0x2d0
[   36.612928]  ret_from_fork+0x10/0x20
[   36.613428] 
[   36.613770] The buggy address belongs to the object at fff00000c5f10100
[   36.613770]  which belongs to the cache kmalloc-64 of size 64
[   36.616588] The buggy address is located 0 bytes to the right of
[   36.616588]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   36.620036] 
[   36.620888] The buggy address belongs to the physical page:
[   36.622834] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   36.624925] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.626949] page_type: f5(slab)
[   36.628415] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.630550] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.632698] page dumped because: kasan: bad access detected
[   36.634519] 
[   36.635450] Memory state around the buggy address:
[   36.635999]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.638472]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.640174] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.642213]                                      ^
[   36.643792]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.645772]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.647746] ==================================================================
[   36.651640] ==================================================================
[   36.654800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   36.655472] Read of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   36.656191] 
[   36.658635] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.660465] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.661660] Hardware name: linux,dummy-virt (DT)
[   36.662176] Call trace:
[   36.663686]  show_stack+0x20/0x38 (C)
[   36.665096]  dump_stack_lvl+0x8c/0xd0
[   36.666567]  print_report+0x118/0x5e0
[   36.667364]  kasan_report+0xc8/0x118
[   36.668222]  __asan_report_load4_noabort+0x20/0x30
[   36.669066]  kasan_atomics_helper+0x3dbc/0x4858
[   36.669758]  kasan_atomics+0x198/0x2e8
[   36.670410]  kunit_try_run_case+0x14c/0x3d0
[   36.671080]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.671880]  kthread+0x24c/0x2d0
[   36.672389]  ret_from_fork+0x10/0x20
[   36.672923] 
[   36.673228] Allocated by task 254:
[   36.673676]  kasan_save_stack+0x3c/0x68
[   36.674156]  kasan_save_track+0x20/0x40
[   36.674828]  kasan_save_alloc_info+0x40/0x58
[   36.675553]  __kasan_kmalloc+0xd4/0xd8
[   36.676178]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.676915]  kasan_atomics+0xb8/0x2e8
[   36.677575]  kunit_try_run_case+0x14c/0x3d0
[   36.678253]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.678839]  kthread+0x24c/0x2d0
[   36.679438]  ret_from_fork+0x10/0x20
[   36.680066] 
[   36.680470] The buggy address belongs to the object at fff00000c5f10100
[   36.680470]  which belongs to the cache kmalloc-64 of size 64
[   36.681494] The buggy address is located 0 bytes to the right of
[   36.681494]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   36.683044] 
[   36.683430] The buggy address belongs to the physical page:
[   36.684181] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   36.684943] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.685834] page_type: f5(slab)
[   36.686414] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.687419] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.688810] page dumped because: kasan: bad access detected
[   36.690145] 
[   36.690734] Memory state around the buggy address:
[   36.691564]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.692610]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.693406] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.694310]                                      ^
[   36.694950]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.695722]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.696573] ==================================================================
[   35.862695] ==================================================================
[   35.863967] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   35.865377] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   35.866621] 
[   35.867030] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.868294] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.868865] Hardware name: linux,dummy-virt (DT)
[   35.869504] Call trace:
[   35.869997]  show_stack+0x20/0x38 (C)
[   35.870620]  dump_stack_lvl+0x8c/0xd0
[   35.871152]  print_report+0x118/0x5e0
[   35.871823]  kasan_report+0xc8/0x118
[   35.872375]  kasan_check_range+0x100/0x1a8
[   35.873066]  __kasan_check_write+0x20/0x30
[   35.873780]  kasan_atomics_helper+0x414/0x4858
[   35.874496]  kasan_atomics+0x198/0x2e8
[   35.875056]  kunit_try_run_case+0x14c/0x3d0
[   35.875774]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.876620]  kthread+0x24c/0x2d0
[   35.877209]  ret_from_fork+0x10/0x20
[   35.877882] 
[   35.878255] Allocated by task 254:
[   35.878811]  kasan_save_stack+0x3c/0x68
[   35.879479]  kasan_save_track+0x20/0x40
[   35.880115]  kasan_save_alloc_info+0x40/0x58
[   35.880769]  __kasan_kmalloc+0xd4/0xd8
[   35.881388]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.882004]  kasan_atomics+0xb8/0x2e8
[   35.882655]  kunit_try_run_case+0x14c/0x3d0
[   35.883183]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.884408]  kthread+0x24c/0x2d0
[   35.885141]  ret_from_fork+0x10/0x20
[   35.885849] 
[   35.886262] The buggy address belongs to the object at fff00000c5f10100
[   35.886262]  which belongs to the cache kmalloc-64 of size 64
[   35.887654] The buggy address is located 0 bytes to the right of
[   35.887654]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   35.889217] 
[   35.889681] The buggy address belongs to the physical page:
[   35.890316] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   35.891409] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.892297] page_type: f5(slab)
[   35.892882] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.893900] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.894862] page dumped because: kasan: bad access detected
[   35.895679] 
[   35.896072] Memory state around the buggy address:
[   35.896870]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   35.897831]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   35.898764] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.899761]                                      ^
[   35.900474]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.901414]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.902358] ==================================================================
[   37.959057] ==================================================================
[   37.959974] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   37.961208] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   37.962271] 
[   37.962704] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.964081] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.964726] Hardware name: linux,dummy-virt (DT)
[   37.965557] Call trace:
[   37.966194]  show_stack+0x20/0x38 (C)
[   37.966959]  dump_stack_lvl+0x8c/0xd0
[   37.967752]  print_report+0x118/0x5e0
[   37.968385]  kasan_report+0xc8/0x118
[   37.969228]  kasan_check_range+0x100/0x1a8
[   37.969680]  __kasan_check_write+0x20/0x30
[   37.970367]  kasan_atomics_helper+0x175c/0x4858
[   37.971226]  kasan_atomics+0x198/0x2e8
[   37.971853]  kunit_try_run_case+0x14c/0x3d0
[   37.972613]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.973406]  kthread+0x24c/0x2d0
[   37.974064]  ret_from_fork+0x10/0x20
[   37.974716] 
[   37.975093] Allocated by task 254:
[   37.975729]  kasan_save_stack+0x3c/0x68
[   37.976304]  kasan_save_track+0x20/0x40
[   37.976997]  kasan_save_alloc_info+0x40/0x58
[   37.977737]  __kasan_kmalloc+0xd4/0xd8
[   37.978385]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.979174]  kasan_atomics+0xb8/0x2e8
[   37.979797]  kunit_try_run_case+0x14c/0x3d0
[   37.980409]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.981248]  kthread+0x24c/0x2d0
[   37.981834]  ret_from_fork+0x10/0x20
[   37.982481] 
[   37.982880] The buggy address belongs to the object at fff00000c5f10100
[   37.982880]  which belongs to the cache kmalloc-64 of size 64
[   37.984212] The buggy address is located 0 bytes to the right of
[   37.984212]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   37.985605] 
[   37.986026] The buggy address belongs to the physical page:
[   37.986652] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   37.987765] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.988486] page_type: f5(slab)
[   37.989111] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.989940] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.990996] page dumped because: kasan: bad access detected
[   37.991804] 
[   37.992188] Memory state around the buggy address:
[   37.992721]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.993663]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.994448] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.995207]                                      ^
[   37.995933]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.996812]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.997698] ==================================================================
[   36.774802] ==================================================================
[   36.775747] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   36.776463] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   36.777406] 
[   36.777843] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.779014] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.779658] Hardware name: linux,dummy-virt (DT)
[   36.780267] Call trace:
[   36.780664]  show_stack+0x20/0x38 (C)
[   36.781313]  dump_stack_lvl+0x8c/0xd0
[   36.781985]  print_report+0x118/0x5e0
[   36.782483]  kasan_report+0xc8/0x118
[   36.783162]  kasan_check_range+0x100/0x1a8
[   36.783817]  __kasan_check_write+0x20/0x30
[   36.784499]  kasan_atomics_helper+0xca0/0x4858
[   36.785233]  kasan_atomics+0x198/0x2e8
[   36.785945]  kunit_try_run_case+0x14c/0x3d0
[   36.786518]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.787311]  kthread+0x24c/0x2d0
[   36.787903]  ret_from_fork+0x10/0x20
[   36.788493] 
[   36.788888] Allocated by task 254:
[   36.789406]  kasan_save_stack+0x3c/0x68
[   36.789981]  kasan_save_track+0x20/0x40
[   36.790642]  kasan_save_alloc_info+0x40/0x58
[   36.791293]  __kasan_kmalloc+0xd4/0xd8
[   36.791942]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.792614]  kasan_atomics+0xb8/0x2e8
[   36.793172]  kunit_try_run_case+0x14c/0x3d0
[   36.793902]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.794631]  kthread+0x24c/0x2d0
[   36.795210]  ret_from_fork+0x10/0x20
[   36.795715] 
[   36.796096] The buggy address belongs to the object at fff00000c5f10100
[   36.796096]  which belongs to the cache kmalloc-64 of size 64
[   36.797287] The buggy address is located 0 bytes to the right of
[   36.797287]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   36.798645] 
[   36.799024] The buggy address belongs to the physical page:
[   36.799778] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   36.800645] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.801437] page_type: f5(slab)
[   36.802031] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.803005] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.803841] page dumped because: kasan: bad access detected
[   36.804614] 
[   36.804993] Memory state around the buggy address:
[   36.805696]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.806494]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.807264] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.808190]                                      ^
[   36.808825]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.809358]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.810040] ==================================================================
[   35.655480] ==================================================================
[   35.656402] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   35.657176] Read of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   35.658996] 
[   35.659404] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.660499] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.661139] Hardware name: linux,dummy-virt (DT)
[   35.662204] Call trace:
[   35.662667]  show_stack+0x20/0x38 (C)
[   35.663209]  dump_stack_lvl+0x8c/0xd0
[   35.663887]  print_report+0x118/0x5e0
[   35.664549]  kasan_report+0xc8/0x118
[   35.665082]  kasan_check_range+0x100/0x1a8
[   35.665785]  __kasan_check_read+0x20/0x30
[   35.666373]  kasan_atomics_helper+0x2b0/0x4858
[   35.667358]  kasan_atomics+0x198/0x2e8
[   35.667972]  kunit_try_run_case+0x14c/0x3d0
[   35.668626]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.669275]  kthread+0x24c/0x2d0
[   35.670184]  ret_from_fork+0x10/0x20
[   35.670858] 
[   35.671214] Allocated by task 254:
[   35.671808]  kasan_save_stack+0x3c/0x68
[   35.672412]  kasan_save_track+0x20/0x40
[   35.672969]  kasan_save_alloc_info+0x40/0x58
[   35.674732]  __kasan_kmalloc+0xd4/0xd8
[   35.675323]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.675913]  kasan_atomics+0xb8/0x2e8
[   35.676867]  kunit_try_run_case+0x14c/0x3d0
[   35.677447]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.678389]  kthread+0x24c/0x2d0
[   35.679170]  ret_from_fork+0x10/0x20
[   35.679917] 
[   35.680341] The buggy address belongs to the object at fff00000c5f10100
[   35.680341]  which belongs to the cache kmalloc-64 of size 64
[   35.681729] The buggy address is located 0 bytes to the right of
[   35.681729]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   35.683361] 
[   35.683777] The buggy address belongs to the physical page:
[   35.684684] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   35.685962] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.686727] page_type: f5(slab)
[   35.687299] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.688127] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.689156] page dumped because: kasan: bad access detected
[   35.690146] 
[   35.690510] Memory state around the buggy address:
[   35.691116]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   35.692036]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   35.692840] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.693987]                                      ^
[   35.694713]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.695514]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.696840] ==================================================================
[   37.843561] ==================================================================
[   37.844353] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   37.844990] Read of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   37.845925] 
[   37.846752] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.848031] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.848603] Hardware name: linux,dummy-virt (DT)
[   37.849271] Call trace:
[   37.849763]  show_stack+0x20/0x38 (C)
[   37.850377]  dump_stack_lvl+0x8c/0xd0
[   37.851048]  print_report+0x118/0x5e0
[   37.851705]  kasan_report+0xc8/0x118
[   37.852265]  __asan_report_load8_noabort+0x20/0x30
[   37.853023]  kasan_atomics_helper+0x3df4/0x4858
[   37.853689]  kasan_atomics+0x198/0x2e8
[   37.854335]  kunit_try_run_case+0x14c/0x3d0
[   37.855037]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.855679]  kthread+0x24c/0x2d0
[   37.856277]  ret_from_fork+0x10/0x20
[   37.856931] 
[   37.857273] Allocated by task 254:
[   37.857855]  kasan_save_stack+0x3c/0x68
[   37.858492]  kasan_save_track+0x20/0x40
[   37.859093]  kasan_save_alloc_info+0x40/0x58
[   37.859796]  __kasan_kmalloc+0xd4/0xd8
[   37.860368]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.861091]  kasan_atomics+0xb8/0x2e8
[   37.861742]  kunit_try_run_case+0x14c/0x3d0
[   37.862298]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.863105]  kthread+0x24c/0x2d0
[   37.863715]  ret_from_fork+0x10/0x20
[   37.864243] 
[   37.864603] The buggy address belongs to the object at fff00000c5f10100
[   37.864603]  which belongs to the cache kmalloc-64 of size 64
[   37.865892] The buggy address is located 0 bytes to the right of
[   37.865892]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   37.867238] 
[   37.867579] The buggy address belongs to the physical page:
[   37.868346] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   37.869319] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.870059] page_type: f5(slab)
[   37.870650] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.871497] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.872389] page dumped because: kasan: bad access detected
[   37.872974] 
[   37.873345] Memory state around the buggy address:
[   37.874037]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.874935]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.875771] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.876619]                                      ^
[   37.877315]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.878129]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.878958] ==================================================================
[   37.043863] ==================================================================
[   37.045328] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   37.046411] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   37.047102] 
[   37.047515] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.048683] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.049232] Hardware name: linux,dummy-virt (DT)
[   37.049745] Call trace:
[   37.050211]  show_stack+0x20/0x38 (C)
[   37.050842]  dump_stack_lvl+0x8c/0xd0
[   37.051492]  print_report+0x118/0x5e0
[   37.052008]  kasan_report+0xc8/0x118
[   37.052663]  __asan_report_store8_noabort+0x20/0x30
[   37.053378]  kasan_atomics_helper+0x3e5c/0x4858
[   37.054119]  kasan_atomics+0x198/0x2e8
[   37.054779]  kunit_try_run_case+0x14c/0x3d0
[   37.055336]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.056162]  kthread+0x24c/0x2d0
[   37.056758]  ret_from_fork+0x10/0x20
[   37.057336] 
[   37.057728] Allocated by task 254:
[   37.058285]  kasan_save_stack+0x3c/0x68
[   37.058802]  kasan_save_track+0x20/0x40
[   37.059431]  kasan_save_alloc_info+0x40/0x58
[   37.060140]  __kasan_kmalloc+0xd4/0xd8
[   37.060661]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.061369]  kasan_atomics+0xb8/0x2e8
[   37.062000]  kunit_try_run_case+0x14c/0x3d0
[   37.062628]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.063362]  kthread+0x24c/0x2d0
[   37.063874]  ret_from_fork+0x10/0x20
[   37.064495] 
[   37.064836] The buggy address belongs to the object at fff00000c5f10100
[   37.064836]  which belongs to the cache kmalloc-64 of size 64
[   37.066175] The buggy address is located 0 bytes to the right of
[   37.066175]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   37.067425] 
[   37.067833] The buggy address belongs to the physical page:
[   37.068582] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   37.069482] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.070395] page_type: f5(slab)
[   37.070927] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.071763] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.072606] page dumped because: kasan: bad access detected
[   37.073338] 
[   37.073732] Memory state around the buggy address:
[   37.074325]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.075200]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.076047] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.076919]                                      ^
[   37.077630]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.078414]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.079152] ==================================================================
[   37.002833] ==================================================================
[   37.003643] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   37.004337] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   37.005387] 
[   37.005821] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.008012] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.008869] Hardware name: linux,dummy-virt (DT)
[   37.009590] Call trace:
[   37.010040]  show_stack+0x20/0x38 (C)
[   37.010940]  dump_stack_lvl+0x8c/0xd0
[   37.011562]  print_report+0x118/0x5e0
[   37.012210]  kasan_report+0xc8/0x118
[   37.012815]  kasan_check_range+0x100/0x1a8
[   37.013519]  __kasan_check_write+0x20/0x30
[   37.014602]  kasan_atomics_helper+0xe44/0x4858
[   37.015267]  kasan_atomics+0x198/0x2e8
[   37.015935]  kunit_try_run_case+0x14c/0x3d0
[   37.016645]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.017382]  kthread+0x24c/0x2d0
[   37.017904]  ret_from_fork+0x10/0x20
[   37.018875] 
[   37.019163] Allocated by task 254:
[   37.019782]  kasan_save_stack+0x3c/0x68
[   37.020434]  kasan_save_track+0x20/0x40
[   37.021060]  kasan_save_alloc_info+0x40/0x58
[   37.021595]  __kasan_kmalloc+0xd4/0xd8
[   37.022217]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.022803]  kasan_atomics+0xb8/0x2e8
[   37.023408]  kunit_try_run_case+0x14c/0x3d0
[   37.024085]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.024760]  kthread+0x24c/0x2d0
[   37.025333]  ret_from_fork+0x10/0x20
[   37.026141] 
[   37.027072] The buggy address belongs to the object at fff00000c5f10100
[   37.027072]  which belongs to the cache kmalloc-64 of size 64
[   37.029186] The buggy address is located 0 bytes to the right of
[   37.029186]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   37.030743] 
[   37.030991] The buggy address belongs to the physical page:
[   37.031708] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   37.032753] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.033478] page_type: f5(slab)
[   37.034067] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.034978] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.035968] page dumped because: kasan: bad access detected
[   37.036625] 
[   37.037006] Memory state around the buggy address:
[   37.037714]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.038491]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.039439] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.040211]                                      ^
[   37.040942]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.041889]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.042703] ==================================================================
[   35.904505] ==================================================================
[   35.905169] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   35.906121] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   35.907036] 
[   35.907488] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.908621] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.909311] Hardware name: linux,dummy-virt (DT)
[   35.910063] Call trace:
[   35.910491]  show_stack+0x20/0x38 (C)
[   35.911165]  dump_stack_lvl+0x8c/0xd0
[   35.911865]  print_report+0x118/0x5e0
[   35.912490]  kasan_report+0xc8/0x118
[   35.913192]  kasan_check_range+0x100/0x1a8
[   35.913835]  __kasan_check_write+0x20/0x30
[   35.914588]  kasan_atomics_helper+0x47c/0x4858
[   35.915211]  kasan_atomics+0x198/0x2e8
[   35.915929]  kunit_try_run_case+0x14c/0x3d0
[   35.916579]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.917388]  kthread+0x24c/0x2d0
[   35.918009]  ret_from_fork+0x10/0x20
[   35.918677] 
[   35.919093] Allocated by task 254:
[   35.919607]  kasan_save_stack+0x3c/0x68
[   35.920288]  kasan_save_track+0x20/0x40
[   35.920884]  kasan_save_alloc_info+0x40/0x58
[   35.921558]  __kasan_kmalloc+0xd4/0xd8
[   35.922216]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.922831]  kasan_atomics+0xb8/0x2e8
[   35.923478]  kunit_try_run_case+0x14c/0x3d0
[   35.924140]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.924938]  kthread+0x24c/0x2d0
[   35.925568]  ret_from_fork+0x10/0x20
[   35.926136] 
[   35.926514] The buggy address belongs to the object at fff00000c5f10100
[   35.926514]  which belongs to the cache kmalloc-64 of size 64
[   35.927802] The buggy address is located 0 bytes to the right of
[   35.927802]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   35.929237] 
[   35.929674] The buggy address belongs to the physical page:
[   35.930393] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   35.931480] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.932373] page_type: f5(slab)
[   35.933001] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.933978] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.934954] page dumped because: kasan: bad access detected
[   35.935641] 
[   35.936061] Memory state around the buggy address:
[   35.936727]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   35.937557]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   35.938501] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.939331]                                      ^
[   35.940028]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.940907]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.941802] ==================================================================
[   37.768216] ==================================================================
[   37.769083] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   37.770791] Read of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   37.771666] 
[   37.772142] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.773321] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.773617] Hardware name: linux,dummy-virt (DT)
[   37.773886] Call trace:
[   37.774078]  show_stack+0x20/0x38 (C)
[   37.774346]  dump_stack_lvl+0x8c/0xd0
[   37.774720]  print_report+0x118/0x5e0
[   37.775653]  kasan_report+0xc8/0x118
[   37.776313]  __asan_report_load8_noabort+0x20/0x30
[   37.776983]  kasan_atomics_helper+0x3db0/0x4858
[   37.777556]  kasan_atomics+0x198/0x2e8
[   37.778207]  kunit_try_run_case+0x14c/0x3d0
[   37.778922]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.779753]  kthread+0x24c/0x2d0
[   37.780380]  ret_from_fork+0x10/0x20
[   37.781036] 
[   37.781405] Allocated by task 254:
[   37.782000]  kasan_save_stack+0x3c/0x68
[   37.782648]  kasan_save_track+0x20/0x40
[   37.783179]  kasan_save_alloc_info+0x40/0x58
[   37.783797]  __kasan_kmalloc+0xd4/0xd8
[   37.784432]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.785155]  kasan_atomics+0xb8/0x2e8
[   37.785792]  kunit_try_run_case+0x14c/0x3d0
[   37.786358]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.787162]  kthread+0x24c/0x2d0
[   37.787645]  ret_from_fork+0x10/0x20
[   37.788266] 
[   37.788650] The buggy address belongs to the object at fff00000c5f10100
[   37.788650]  which belongs to the cache kmalloc-64 of size 64
[   37.789889] The buggy address is located 0 bytes to the right of
[   37.789889]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   37.791077] 
[   37.791463] The buggy address belongs to the physical page:
[   37.792244] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   37.793196] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.794098] page_type: f5(slab)
[   37.794687] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.795451] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.796435] page dumped because: kasan: bad access detected
[   37.797104] 
[   37.797479] Memory state around the buggy address:
[   37.798014]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.798889]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.799760] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.800616]                                      ^
[   37.801273]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.802162]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.803008] ==================================================================
[   35.611308] ==================================================================
[   35.612244] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   35.613170] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   35.614828] 
[   35.615171] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.616889] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.617548] Hardware name: linux,dummy-virt (DT)
[   35.618446] Call trace:
[   35.619040]  show_stack+0x20/0x38 (C)
[   35.619735]  dump_stack_lvl+0x8c/0xd0
[   35.620437]  print_report+0x118/0x5e0
[   35.621114]  kasan_report+0xc8/0x118
[   35.621850]  kasan_check_range+0x100/0x1a8
[   35.622724]  __kasan_check_write+0x20/0x30
[   35.623380]  kasan_atomics_helper+0x24c/0x4858
[   35.624158]  kasan_atomics+0x198/0x2e8
[   35.624828]  kunit_try_run_case+0x14c/0x3d0
[   35.625883]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.626713]  kthread+0x24c/0x2d0
[   35.627190]  ret_from_fork+0x10/0x20
[   35.627850] 
[   35.628191] Allocated by task 254:
[   35.628781]  kasan_save_stack+0x3c/0x68
[   35.629385]  kasan_save_track+0x20/0x40
[   35.630021]  kasan_save_alloc_info+0x40/0x58
[   35.631098]  __kasan_kmalloc+0xd4/0xd8
[   35.631731]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.632449]  kasan_atomics+0xb8/0x2e8
[   35.633131]  kunit_try_run_case+0x14c/0x3d0
[   35.633471]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.634375]  kthread+0x24c/0x2d0
[   35.635839]  ret_from_fork+0x10/0x20
[   35.636428] 
[   35.636830] The buggy address belongs to the object at fff00000c5f10100
[   35.636830]  which belongs to the cache kmalloc-64 of size 64
[   35.638447] The buggy address is located 0 bytes to the right of
[   35.638447]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   35.639685] 
[   35.640116] The buggy address belongs to the physical page:
[   35.640975] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   35.642294] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.643214] page_type: f5(slab)
[   35.643604] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.644802] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.645654] page dumped because: kasan: bad access detected
[   35.646224] 
[   35.646861] Memory state around the buggy address:
[   35.647576]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   35.648391]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   35.649280] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.650458]                                      ^
[   35.651047]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.651918]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.652817] ==================================================================
[   35.985927] ==================================================================
[   35.986840] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   35.987666] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   35.988485] 
[   35.988898] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.990045] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.990680] Hardware name: linux,dummy-virt (DT)
[   35.991190] Call trace:
[   35.991681]  show_stack+0x20/0x38 (C)
[   35.992356]  dump_stack_lvl+0x8c/0xd0
[   35.992938]  print_report+0x118/0x5e0
[   35.993610]  kasan_report+0xc8/0x118
[   35.994246]  kasan_check_range+0x100/0x1a8
[   35.994807]  __kasan_check_write+0x20/0x30
[   35.995496]  kasan_atomics_helper+0x54c/0x4858
[   35.996243]  kasan_atomics+0x198/0x2e8
[   35.996803]  kunit_try_run_case+0x14c/0x3d0
[   35.997433]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.998274]  kthread+0x24c/0x2d0
[   35.998904]  ret_from_fork+0x10/0x20
[   35.999619] 
[   35.999996] Allocated by task 254:
[   36.000463]  kasan_save_stack+0x3c/0x68
[   36.001708]  kasan_save_track+0x20/0x40
[   36.002350]  kasan_save_alloc_info+0x40/0x58
[   36.002941]  __kasan_kmalloc+0xd4/0xd8
[   36.003588]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.004152]  kasan_atomics+0xb8/0x2e8
[   36.004784]  kunit_try_run_case+0x14c/0x3d0
[   36.005446]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.006206]  kthread+0x24c/0x2d0
[   36.006803]  ret_from_fork+0x10/0x20
[   36.007368] 
[   36.007763] The buggy address belongs to the object at fff00000c5f10100
[   36.007763]  which belongs to the cache kmalloc-64 of size 64
[   36.009061] The buggy address is located 0 bytes to the right of
[   36.009061]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   36.010360] 
[   36.010730] The buggy address belongs to the physical page:
[   36.011449] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   36.012481] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.013385] page_type: f5(slab)
[   36.013918] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.014806] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.015632] page dumped because: kasan: bad access detected
[   36.016396] 
[   36.016786] Memory state around the buggy address:
[   36.017341]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.018233]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.018898] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.019863]                                      ^
[   36.020593]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.021344]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.022222] ==================================================================
[   36.181374] ==================================================================
[   36.182156] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[   36.183155] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   36.184140] 
[   36.184514] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.185634] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.186265] Hardware name: linux,dummy-virt (DT)
[   36.187052] Call trace:
[   36.187546]  show_stack+0x20/0x38 (C)
[   36.188212]  dump_stack_lvl+0x8c/0xd0
[   36.189099]  print_report+0x118/0x5e0
[   36.189785]  kasan_report+0xc8/0x118
[   36.190459]  kasan_check_range+0x100/0x1a8
[   36.191157]  __kasan_check_write+0x20/0x30
[   36.192017]  kasan_atomics_helper+0x760/0x4858
[   36.192848]  kasan_atomics+0x198/0x2e8
[   36.193870]  kunit_try_run_case+0x14c/0x3d0
[   36.194729]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.195608]  kthread+0x24c/0x2d0
[   36.196132]  ret_from_fork+0x10/0x20
[   36.196974] 
[   36.197291] Allocated by task 254:
[   36.197889]  kasan_save_stack+0x3c/0x68
[   36.198517]  kasan_save_track+0x20/0x40
[   36.199242]  kasan_save_alloc_info+0x40/0x58
[   36.199974]  __kasan_kmalloc+0xd4/0xd8
[   36.200618]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.201239]  kasan_atomics+0xb8/0x2e8
[   36.201899]  kunit_try_run_case+0x14c/0x3d0
[   36.202629]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.203323]  kthread+0x24c/0x2d0
[   36.203948]  ret_from_fork+0x10/0x20
[   36.204596] 
[   36.204976] The buggy address belongs to the object at fff00000c5f10100
[   36.204976]  which belongs to the cache kmalloc-64 of size 64
[   36.206196] The buggy address is located 0 bytes to the right of
[   36.206196]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   36.207689] 
[   36.208118] The buggy address belongs to the physical page:
[   36.208858] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   36.209995] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.210859] page_type: f5(slab)
[   36.211416] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.212376] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.213275] page dumped because: kasan: bad access detected
[   36.213905] 
[   36.214319] Memory state around the buggy address:
[   36.215058]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.215876]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.216793] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.217722]                                      ^
[   36.218304]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.219261]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.220104] ==================================================================
[   37.384627] ==================================================================
[   37.385394] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   37.386272] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   37.387139] 
[   37.387564] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.388678] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.389310] Hardware name: linux,dummy-virt (DT)
[   37.389955] Call trace:
[   37.390427]  show_stack+0x20/0x38 (C)
[   37.391099]  dump_stack_lvl+0x8c/0xd0
[   37.391776]  print_report+0x118/0x5e0
[   37.392308]  kasan_report+0xc8/0x118
[   37.392972]  kasan_check_range+0x100/0x1a8
[   37.393576]  __kasan_check_write+0x20/0x30
[   37.394278]  kasan_atomics_helper+0x11f8/0x4858
[   37.395023]  kasan_atomics+0x198/0x2e8
[   37.395705]  kunit_try_run_case+0x14c/0x3d0
[   37.396246]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.397094]  kthread+0x24c/0x2d0
[   37.397736]  ret_from_fork+0x10/0x20
[   37.398296] 
[   37.398695] Allocated by task 254:
[   37.399288]  kasan_save_stack+0x3c/0x68
[   37.399796]  kasan_save_track+0x20/0x40
[   37.400438]  kasan_save_alloc_info+0x40/0x58
[   37.401019]  __kasan_kmalloc+0xd4/0xd8
[   37.401669]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.402212]  kasan_atomics+0xb8/0x2e8
[   37.402850]  kunit_try_run_case+0x14c/0x3d0
[   37.403516]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.404226]  kthread+0x24c/0x2d0
[   37.404833]  ret_from_fork+0x10/0x20
[   37.405398] 
[   37.405788] The buggy address belongs to the object at fff00000c5f10100
[   37.405788]  which belongs to the cache kmalloc-64 of size 64
[   37.407059] The buggy address is located 0 bytes to the right of
[   37.407059]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   37.408362] 
[   37.408768] The buggy address belongs to the physical page:
[   37.409380] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   37.410318] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.411177] page_type: f5(slab)
[   37.411771] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.412643] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.413496] page dumped because: kasan: bad access detected
[   37.414273] 
[   37.414637] Memory state around the buggy address:
[   37.415163]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.416050]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.416958] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.417819]                                      ^
[   37.418507]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.419357]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.420322] ==================================================================
[   37.650170] ==================================================================
[   37.650850] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   37.651770] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   37.652577] 
[   37.652973] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.654154] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.654793] Hardware name: linux,dummy-virt (DT)
[   37.655463] Call trace:
[   37.655953]  show_stack+0x20/0x38 (C)
[   37.656496]  dump_stack_lvl+0x8c/0xd0
[   37.657177]  print_report+0x118/0x5e0
[   37.657750]  kasan_report+0xc8/0x118
[   37.658390]  kasan_check_range+0x100/0x1a8
[   37.659144]  __kasan_check_write+0x20/0x30
[   37.659716]  kasan_atomics_helper+0x14e4/0x4858
[   37.660471]  kasan_atomics+0x198/0x2e8
[   37.661942]  kunit_try_run_case+0x14c/0x3d0
[   37.662725]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.663615]  kthread+0x24c/0x2d0
[   37.664199]  ret_from_fork+0x10/0x20
[   37.664860] 
[   37.665266] Allocated by task 254:
[   37.665768]  kasan_save_stack+0x3c/0x68
[   37.666440]  kasan_save_track+0x20/0x40
[   37.667143]  kasan_save_alloc_info+0x40/0x58
[   37.667888]  __kasan_kmalloc+0xd4/0xd8
[   37.668478]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.669118]  kasan_atomics+0xb8/0x2e8
[   37.669673]  kunit_try_run_case+0x14c/0x3d0
[   37.670390]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.671187]  kthread+0x24c/0x2d0
[   37.671830]  ret_from_fork+0x10/0x20
[   37.672398] 
[   37.672795] The buggy address belongs to the object at fff00000c5f10100
[   37.672795]  which belongs to the cache kmalloc-64 of size 64
[   37.674112] The buggy address is located 0 bytes to the right of
[   37.674112]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   37.675479] 
[   37.675924] The buggy address belongs to the physical page:
[   37.676621] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   37.677585] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.678347] page_type: f5(slab)
[   37.678953] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.679823] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.680805] page dumped because: kasan: bad access detected
[   37.681486] 
[   37.681920] Memory state around the buggy address:
[   37.682591]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.683575]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.684371] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.685288]                                      ^
[   37.685942]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.686846]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.687712] ==================================================================
[   36.338609] ==================================================================
[   36.339746] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   36.340461] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   36.341960] 
[   36.342332] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   36.343664] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.344222] Hardware name: linux,dummy-virt (DT)
[   36.344890] Call trace:
[   36.345392]  show_stack+0x20/0x38 (C)
[   36.346072]  dump_stack_lvl+0x8c/0xd0
[   36.346701]  print_report+0x118/0x5e0
[   36.347404]  kasan_report+0xc8/0x118
[   36.348048]  kasan_check_range+0x100/0x1a8
[   36.348797]  __kasan_check_write+0x20/0x30
[   36.349484]  kasan_atomics_helper+0x934/0x4858
[   36.350253]  kasan_atomics+0x198/0x2e8
[   36.350916]  kunit_try_run_case+0x14c/0x3d0
[   36.351444]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.352330]  kthread+0x24c/0x2d0
[   36.352940]  ret_from_fork+0x10/0x20
[   36.353573] 
[   36.353903] Allocated by task 254:
[   36.354405]  kasan_save_stack+0x3c/0x68
[   36.355011]  kasan_save_track+0x20/0x40
[   36.355584]  kasan_save_alloc_info+0x40/0x58
[   36.356174]  __kasan_kmalloc+0xd4/0xd8
[   36.356825]  __kmalloc_cache_noprof+0x15c/0x3c8
[   36.357353]  kasan_atomics+0xb8/0x2e8
[   36.357988]  kunit_try_run_case+0x14c/0x3d0
[   36.358683]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.359489]  kthread+0x24c/0x2d0
[   36.360081]  ret_from_fork+0x10/0x20
[   36.360649] 
[   36.361030] The buggy address belongs to the object at fff00000c5f10100
[   36.361030]  which belongs to the cache kmalloc-64 of size 64
[   36.362329] The buggy address is located 0 bytes to the right of
[   36.362329]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   36.363688] 
[   36.364075] The buggy address belongs to the physical page:
[   36.364867] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   36.365759] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.366650] page_type: f5(slab)
[   36.367195] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.368168] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.368948] page dumped because: kasan: bad access detected
[   36.369770] 
[   36.370147] Memory state around the buggy address:
[   36.370858]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.371707]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   36.372552] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.373357]                                      ^
[   36.374093]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.374910]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.375739] ==================================================================
[   35.568148] ==================================================================
[   35.569101] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   35.569926] Read of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   35.570948] 
[   35.571398] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.572732] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.573362] Hardware name: linux,dummy-virt (DT)
[   35.574331] Call trace:
[   35.574878]  show_stack+0x20/0x38 (C)
[   35.575618]  dump_stack_lvl+0x8c/0xd0
[   35.576388]  print_report+0x118/0x5e0
[   35.577046]  kasan_report+0xc8/0x118
[   35.578160]  kasan_check_range+0x100/0x1a8
[   35.579009]  __kasan_check_read+0x20/0x30
[   35.579612]  kasan_atomics_helper+0x1ec/0x4858
[   35.580215]  kasan_atomics+0x198/0x2e8
[   35.580907]  kunit_try_run_case+0x14c/0x3d0
[   35.582003]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.582864]  kthread+0x24c/0x2d0
[   35.583378]  ret_from_fork+0x10/0x20
[   35.584030] 
[   35.584404] Allocated by task 254:
[   35.584986]  kasan_save_stack+0x3c/0x68
[   35.585554]  kasan_save_track+0x20/0x40
[   35.586618]  kasan_save_alloc_info+0x40/0x58
[   35.588008]  __kasan_kmalloc+0xd4/0xd8
[   35.588625]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.589457]  kasan_atomics+0xb8/0x2e8
[   35.590335]  kunit_try_run_case+0x14c/0x3d0
[   35.590989]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.591846]  kthread+0x24c/0x2d0
[   35.592432]  ret_from_fork+0x10/0x20
[   35.593095] 
[   35.593521] The buggy address belongs to the object at fff00000c5f10100
[   35.593521]  which belongs to the cache kmalloc-64 of size 64
[   35.595185] The buggy address is located 0 bytes to the right of
[   35.595185]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   35.596464] 
[   35.597037] The buggy address belongs to the physical page:
[   35.598152] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   35.599120] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.600030] page_type: f5(slab)
[   35.600581] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.601401] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.602490] page dumped because: kasan: bad access detected
[   35.603129] 
[   35.603502] Memory state around the buggy address:
[   35.604191]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   35.605026]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   35.606548] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.607331]                                      ^
[   35.608115]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.609071]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.609948] ==================================================================
[   37.460519] ==================================================================
[   37.461263] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   37.462209] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254
[   37.463056] 
[   37.463465] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   37.464546] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.465218] Hardware name: linux,dummy-virt (DT)
[   37.466577] Call trace:
[   37.467016]  show_stack+0x20/0x38 (C)
[   37.467592]  dump_stack_lvl+0x8c/0xd0
[   37.468262]  print_report+0x118/0x5e0
[   37.469221]  kasan_report+0xc8/0x118
[   37.469964]  kasan_check_range+0x100/0x1a8
[   37.470554]  __kasan_check_write+0x20/0x30
[   37.471202]  kasan_atomics_helper+0x12d8/0x4858
[   37.471919]  kasan_atomics+0x198/0x2e8
[   37.472643]  kunit_try_run_case+0x14c/0x3d0
[   37.473340]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.474128]  kthread+0x24c/0x2d0
[   37.474758]  ret_from_fork+0x10/0x20
[   37.475329] 
[   37.475717] Allocated by task 254:
[   37.476293]  kasan_save_stack+0x3c/0x68
[   37.476874]  kasan_save_track+0x20/0x40
[   37.477419]  kasan_save_alloc_info+0x40/0x58
[   37.478118]  __kasan_kmalloc+0xd4/0xd8
[   37.478669]  __kmalloc_cache_noprof+0x15c/0x3c8
[   37.479397]  kasan_atomics+0xb8/0x2e8
[   37.479923]  kunit_try_run_case+0x14c/0x3d0
[   37.480613]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.481306]  kthread+0x24c/0x2d0
[   37.481889]  ret_from_fork+0x10/0x20
[   37.482429] 
[   37.482823] The buggy address belongs to the object at fff00000c5f10100
[   37.482823]  which belongs to the cache kmalloc-64 of size 64
[   37.483952] The buggy address is located 0 bytes to the right of
[   37.483952]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   37.485342] 
[   37.485746] The buggy address belongs to the physical page:
[   37.486358] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   37.487392] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.488118] page_type: f5(slab)
[   37.488706] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.489565] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   37.490547] page dumped because: kasan: bad access detected
[   37.491200] 
[   37.491587] Memory state around the buggy address:
[   37.492206]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.492986]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   37.493950] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.494851]                                      ^
[   37.495583]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.496434]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.497258] ==================================================================
[   35.781222] ==================================================================
[   35.782457] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   35.784324] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254
[   35.785392] 
[   35.785894] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.787155] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.787861] Hardware name: linux,dummy-virt (DT)
[   35.788477] Call trace:
[   35.789090]  show_stack+0x20/0x38 (C)
[   35.789895]  dump_stack_lvl+0x8c/0xd0
[   35.790820]  print_report+0x118/0x5e0
[   35.791575]  kasan_report+0xc8/0x118
[   35.792307]  __asan_report_store4_noabort+0x20/0x30
[   35.793002]  kasan_atomics_helper+0x3f94/0x4858
[   35.793693]  kasan_atomics+0x198/0x2e8
[   35.794253]  kunit_try_run_case+0x14c/0x3d0
[   35.795159]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.795838]  kthread+0x24c/0x2d0
[   35.796425]  ret_from_fork+0x10/0x20
[   35.797017] 
[   35.797348] Allocated by task 254:
[   35.797941]  kasan_save_stack+0x3c/0x68
[   35.798455]  kasan_save_track+0x20/0x40
[   35.799150]  kasan_save_alloc_info+0x40/0x58
[   35.799773]  __kasan_kmalloc+0xd4/0xd8
[   35.800445]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.801485]  kasan_atomics+0xb8/0x2e8
[   35.802103]  kunit_try_run_case+0x14c/0x3d0
[   35.803134]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.804319]  kthread+0x24c/0x2d0
[   35.804956]  ret_from_fork+0x10/0x20
[   35.805355] 
[   35.805788] The buggy address belongs to the object at fff00000c5f10100
[   35.805788]  which belongs to the cache kmalloc-64 of size 64
[   35.807223] The buggy address is located 0 bytes to the right of
[   35.807223]  allocated 48-byte region [fff00000c5f10100, fff00000c5f10130)
[   35.808576] 
[   35.808954] The buggy address belongs to the physical page:
[   35.809763] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10
[   35.810972] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.811782] page_type: f5(slab)
[   35.812395] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.813439] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.814371] page dumped because: kasan: bad access detected
[   35.815193] 
[   35.815618] Memory state around the buggy address:
[   35.816198]  fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   35.817169]  fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   35.817975] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.818914]                                      ^
[   35.819682]  fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.820500]  fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.821405] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   35.117252] ==================================================================
[   35.117975] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[   35.119403] Write of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250
[   35.120657] 
[   35.121083] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.122163] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.122435] Hardware name: linux,dummy-virt (DT)
[   35.122914] Call trace:
[   35.123431]  show_stack+0x20/0x38 (C)
[   35.124201]  dump_stack_lvl+0x8c/0xd0
[   35.124959]  print_report+0x118/0x5e0
[   35.125681]  kasan_report+0xc8/0x118
[   35.126351]  kasan_check_range+0x100/0x1a8
[   35.127190]  __kasan_check_write+0x20/0x30
[   35.128067]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[   35.128888]  kasan_bitops_generic+0x11c/0x1c8
[   35.129762]  kunit_try_run_case+0x14c/0x3d0
[   35.130598]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.131298]  kthread+0x24c/0x2d0
[   35.131877]  ret_from_fork+0x10/0x20
[   35.132601] 
[   35.132906] Allocated by task 250:
[   35.133385]  kasan_save_stack+0x3c/0x68
[   35.134053]  kasan_save_track+0x20/0x40
[   35.134706]  kasan_save_alloc_info+0x40/0x58
[   35.135357]  __kasan_kmalloc+0xd4/0xd8
[   35.135909]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.136579]  kasan_bitops_generic+0xa0/0x1c8
[   35.137198]  kunit_try_run_case+0x14c/0x3d0
[   35.137823]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.138571]  kthread+0x24c/0x2d0
[   35.139125]  ret_from_fork+0x10/0x20
[   35.139787] 
[   35.140175] The buggy address belongs to the object at fff00000c5e082a0
[   35.140175]  which belongs to the cache kmalloc-16 of size 16
[   35.141170] The buggy address is located 8 bytes inside of
[   35.141170]  allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9)
[   35.142489] 
[   35.142893] The buggy address belongs to the physical page:
[   35.143638] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08
[   35.144615] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.145295] page_type: f5(slab)
[   35.145888] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.146785] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   35.147751] page dumped because: kasan: bad access detected
[   35.148394] 
[   35.148791] Memory state around the buggy address:
[   35.149454]  fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.150307]  fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.151222] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   35.152097]                                   ^
[   35.152806]  fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.153611]  fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.154386] ==================================================================
[   35.238410] ==================================================================
[   35.239196] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8
[   35.240159] Read of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250
[   35.241021] 
[   35.241410] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.242632] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.243262] Hardware name: linux,dummy-virt (DT)
[   35.243961] Call trace:
[   35.244341]  show_stack+0x20/0x38 (C)
[   35.245069]  dump_stack_lvl+0x8c/0xd0
[   35.245720]  print_report+0x118/0x5e0
[   35.246400]  kasan_report+0xc8/0x118
[   35.246991]  __asan_report_load8_noabort+0x20/0x30
[   35.247791]  kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8
[   35.248758]  kasan_bitops_generic+0x11c/0x1c8
[   35.249508]  kunit_try_run_case+0x14c/0x3d0
[   35.250110]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.250985]  kthread+0x24c/0x2d0
[   35.251560]  ret_from_fork+0x10/0x20
[   35.252223] 
[   35.252625] Allocated by task 250:
[   35.253240]  kasan_save_stack+0x3c/0x68
[   35.253869]  kasan_save_track+0x20/0x40
[   35.254510]  kasan_save_alloc_info+0x40/0x58
[   35.255251]  __kasan_kmalloc+0xd4/0xd8
[   35.255857]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.256618]  kasan_bitops_generic+0xa0/0x1c8
[   35.257229]  kunit_try_run_case+0x14c/0x3d0
[   35.257959]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.258658]  kthread+0x24c/0x2d0
[   35.259268]  ret_from_fork+0x10/0x20
[   35.259877] 
[   35.260298] The buggy address belongs to the object at fff00000c5e082a0
[   35.260298]  which belongs to the cache kmalloc-16 of size 16
[   35.261509] The buggy address is located 8 bytes inside of
[   35.261509]  allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9)
[   35.262849] 
[   35.263271] The buggy address belongs to the physical page:
[   35.264011] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08
[   35.265032] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.265928] page_type: f5(slab)
[   35.266484] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.267638] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   35.268479] page dumped because: kasan: bad access detected
[   35.269248] 
[   35.269678] Memory state around the buggy address:
[   35.270303]  fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.271161]  fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.272042] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   35.272962]                                   ^
[   35.273564]  fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.274447]  fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.275328] ==================================================================
[   35.428598] ==================================================================
[   35.429350] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8
[   35.430397] Read of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250
[   35.431698] 
[   35.432058] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.433100] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.434165] Hardware name: linux,dummy-virt (DT)
[   35.434821] Call trace:
[   35.435194]  show_stack+0x20/0x38 (C)
[   35.435848]  dump_stack_lvl+0x8c/0xd0
[   35.436435]  print_report+0x118/0x5e0
[   35.437406]  kasan_report+0xc8/0x118
[   35.437928]  __asan_report_load8_noabort+0x20/0x30
[   35.438701]  kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8
[   35.439365]  kasan_bitops_generic+0x11c/0x1c8
[   35.440088]  kunit_try_run_case+0x14c/0x3d0
[   35.440775]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.441403]  kthread+0x24c/0x2d0
[   35.442016]  ret_from_fork+0x10/0x20
[   35.442666] 
[   35.442983] Allocated by task 250:
[   35.443564]  kasan_save_stack+0x3c/0x68
[   35.444174]  kasan_save_track+0x20/0x40
[   35.444773]  kasan_save_alloc_info+0x40/0x58
[   35.445462]  __kasan_kmalloc+0xd4/0xd8
[   35.446008]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.446677]  kasan_bitops_generic+0xa0/0x1c8
[   35.447271]  kunit_try_run_case+0x14c/0x3d0
[   35.447952]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.448683]  kthread+0x24c/0x2d0
[   35.449303]  ret_from_fork+0x10/0x20
[   35.449936] 
[   35.450307] The buggy address belongs to the object at fff00000c5e082a0
[   35.450307]  which belongs to the cache kmalloc-16 of size 16
[   35.451486] The buggy address is located 8 bytes inside of
[   35.451486]  allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9)
[   35.452944] 
[   35.453310] The buggy address belongs to the physical page:
[   35.453987] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08
[   35.454802] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.455703] page_type: f5(slab)
[   35.456213] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.457164] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   35.458049] page dumped because: kasan: bad access detected
[   35.458766] 
[   35.459124] Memory state around the buggy address:
[   35.459742]  fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.460698]  fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.461436] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   35.462305]                                   ^
[   35.462903]  fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.463723]  fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.464609] ==================================================================
[   35.196426] ==================================================================
[   35.197781] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[   35.199102] Write of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250
[   35.199950] 
[   35.200357] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.202622] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.203131] Hardware name: linux,dummy-virt (DT)
[   35.203816] Call trace:
[   35.204251]  show_stack+0x20/0x38 (C)
[   35.204871]  dump_stack_lvl+0x8c/0xd0
[   35.205508]  print_report+0x118/0x5e0
[   35.206192]  kasan_report+0xc8/0x118
[   35.206846]  kasan_check_range+0x100/0x1a8
[   35.207447]  __kasan_check_write+0x20/0x30
[   35.208158]  kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[   35.209051]  kasan_bitops_generic+0x11c/0x1c8
[   35.209694]  kunit_try_run_case+0x14c/0x3d0
[   35.210257]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.211078]  kthread+0x24c/0x2d0
[   35.211704]  ret_from_fork+0x10/0x20
[   35.212243] 
[   35.212653] Allocated by task 250:
[   35.213196]  kasan_save_stack+0x3c/0x68
[   35.213736]  kasan_save_track+0x20/0x40
[   35.214357]  kasan_save_alloc_info+0x40/0x58
[   35.214968]  __kasan_kmalloc+0xd4/0xd8
[   35.215568]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.216278]  kasan_bitops_generic+0xa0/0x1c8
[   35.216932]  kunit_try_run_case+0x14c/0x3d0
[   35.217511]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.218316]  kthread+0x24c/0x2d0
[   35.218861]  ret_from_fork+0x10/0x20
[   35.219468] 
[   35.219856] The buggy address belongs to the object at fff00000c5e082a0
[   35.219856]  which belongs to the cache kmalloc-16 of size 16
[   35.221130] The buggy address is located 8 bytes inside of
[   35.221130]  allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9)
[   35.222651] 
[   35.223114] The buggy address belongs to the physical page:
[   35.224017] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08
[   35.225032] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.225900] page_type: f5(slab)
[   35.226492] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.227505] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   35.228479] page dumped because: kasan: bad access detected
[   35.229215] 
[   35.229650] Memory state around the buggy address:
[   35.230391]  fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.231424]  fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.232333] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   35.233125]                                   ^
[   35.233861]  fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.234663]  fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.235681] ==================================================================
[   35.276980] ==================================================================
[   35.278135] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[   35.279131] Write of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250
[   35.280165] 
[   35.280851] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.282656] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.283225] Hardware name: linux,dummy-virt (DT)
[   35.283862] Call trace:
[   35.284289]  show_stack+0x20/0x38 (C)
[   35.285079]  dump_stack_lvl+0x8c/0xd0
[   35.285651]  print_report+0x118/0x5e0
[   35.286232]  kasan_report+0xc8/0x118
[   35.286842]  kasan_check_range+0x100/0x1a8
[   35.287465]  __kasan_check_write+0x20/0x30
[   35.288104]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[   35.288876]  kasan_bitops_generic+0x11c/0x1c8
[   35.289607]  kunit_try_run_case+0x14c/0x3d0
[   35.290229]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.291062]  kthread+0x24c/0x2d0
[   35.291626]  ret_from_fork+0x10/0x20
[   35.292214] 
[   35.292575] Allocated by task 250:
[   35.293143]  kasan_save_stack+0x3c/0x68
[   35.293744]  kasan_save_track+0x20/0x40
[   35.294379]  kasan_save_alloc_info+0x40/0x58
[   35.294996]  __kasan_kmalloc+0xd4/0xd8
[   35.295481]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.296214]  kasan_bitops_generic+0xa0/0x1c8
[   35.296763]  kunit_try_run_case+0x14c/0x3d0
[   35.297430]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.298075]  kthread+0x24c/0x2d0
[   35.298669]  ret_from_fork+0x10/0x20
[   35.299185] 
[   35.299584] The buggy address belongs to the object at fff00000c5e082a0
[   35.299584]  which belongs to the cache kmalloc-16 of size 16
[   35.300745] The buggy address is located 8 bytes inside of
[   35.300745]  allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9)
[   35.302183] 
[   35.302550] The buggy address belongs to the physical page:
[   35.303313] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08
[   35.304173] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.305053] page_type: f5(slab)
[   35.305651] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.306594] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   35.307391] page dumped because: kasan: bad access detected
[   35.308106] 
[   35.308485] Memory state around the buggy address:
[   35.309119]  fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.310001]  fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.310895] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   35.311697]                                   ^
[   35.312376]  fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.313153]  fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.313981] ==================================================================
[   35.315457] ==================================================================
[   35.316132] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8
[   35.317120] Read of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250
[   35.318118] 
[   35.318496] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.319593] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.320144] Hardware name: linux,dummy-virt (DT)
[   35.320770] Call trace:
[   35.321244]  show_stack+0x20/0x38 (C)
[   35.321915]  dump_stack_lvl+0x8c/0xd0
[   35.322478]  print_report+0x118/0x5e0
[   35.323138]  kasan_report+0xc8/0x118
[   35.323726]  __asan_report_load8_noabort+0x20/0x30
[   35.324399]  kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8
[   35.325287]  kasan_bitops_generic+0x11c/0x1c8
[   35.326017]  kunit_try_run_case+0x14c/0x3d0
[   35.326718]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.327547]  kthread+0x24c/0x2d0
[   35.328140]  ret_from_fork+0x10/0x20
[   35.328803] 
[   35.329163] Allocated by task 250:
[   35.329677]  kasan_save_stack+0x3c/0x68
[   35.330301]  kasan_save_track+0x20/0x40
[   35.330810]  kasan_save_alloc_info+0x40/0x58
[   35.331476]  __kasan_kmalloc+0xd4/0xd8
[   35.332157]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.332795]  kasan_bitops_generic+0xa0/0x1c8
[   35.333393]  kunit_try_run_case+0x14c/0x3d0
[   35.334096]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.334894]  kthread+0x24c/0x2d0
[   35.335483]  ret_from_fork+0x10/0x20
[   35.336120] 
[   35.336448] The buggy address belongs to the object at fff00000c5e082a0
[   35.336448]  which belongs to the cache kmalloc-16 of size 16
[   35.337643] The buggy address is located 8 bytes inside of
[   35.337643]  allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9)
[   35.338952] 
[   35.339273] The buggy address belongs to the physical page:
[   35.340056] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08
[   35.341095] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.341898] page_type: f5(slab)
[   35.342433] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.343339] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   35.344323] page dumped because: kasan: bad access detected
[   35.344897] 
[   35.345274] Memory state around the buggy address:
[   35.345995]  fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.346798]  fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.347726] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   35.348453]                                   ^
[   35.349175]  fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.350026]  fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.350778] ==================================================================
[   35.352073] ==================================================================
[   35.353661] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[   35.354556] Write of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250
[   35.355443] 
[   35.355806] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.356939] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.357577] Hardware name: linux,dummy-virt (DT)
[   35.358152] Call trace:
[   35.358646]  show_stack+0x20/0x38 (C)
[   35.359289]  dump_stack_lvl+0x8c/0xd0
[   35.359887]  print_report+0x118/0x5e0
[   35.360555]  kasan_report+0xc8/0x118
[   35.361147]  kasan_check_range+0x100/0x1a8
[   35.361852]  __kasan_check_write+0x20/0x30
[   35.362394]  kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[   35.363256]  kasan_bitops_generic+0x11c/0x1c8
[   35.363988]  kunit_try_run_case+0x14c/0x3d0
[   35.364565]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.365381]  kthread+0x24c/0x2d0
[   35.365906]  ret_from_fork+0x10/0x20
[   35.366586] 
[   35.366958] Allocated by task 250:
[   35.367544]  kasan_save_stack+0x3c/0x68
[   35.368189]  kasan_save_track+0x20/0x40
[   35.368718]  kasan_save_alloc_info+0x40/0x58
[   35.369390]  __kasan_kmalloc+0xd4/0xd8
[   35.369944]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.370662]  kasan_bitops_generic+0xa0/0x1c8
[   35.371249]  kunit_try_run_case+0x14c/0x3d0
[   35.371943]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.372605]  kthread+0x24c/0x2d0
[   35.373181]  ret_from_fork+0x10/0x20
[   35.373769] 
[   35.374136] The buggy address belongs to the object at fff00000c5e082a0
[   35.374136]  which belongs to the cache kmalloc-16 of size 16
[   35.375371] The buggy address is located 8 bytes inside of
[   35.375371]  allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9)
[   35.376597] 
[   35.376990] The buggy address belongs to the physical page:
[   35.377611] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08
[   35.378644] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.379287] page_type: f5(slab)
[   35.379886] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.380901] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   35.381626] page dumped because: kasan: bad access detected
[   35.382380] 
[   35.382775] Memory state around the buggy address:
[   35.383300]  fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.384240]  fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.384923] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   35.385850]                                   ^
[   35.386481]  fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.387450]  fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.388283] ==================================================================
[   35.390696] ==================================================================
[   35.391598] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8
[   35.392516] Read of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250
[   35.393269] 
[   35.393668] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.394967] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.395587] Hardware name: linux,dummy-virt (DT)
[   35.396286] Call trace:
[   35.396754]  show_stack+0x20/0x38 (C)
[   35.397396]  dump_stack_lvl+0x8c/0xd0
[   35.397922]  print_report+0x118/0x5e0
[   35.398579]  kasan_report+0xc8/0x118
[   35.399167]  __asan_report_load8_noabort+0x20/0x30
[   35.399830]  kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8
[   35.400723]  kasan_bitops_generic+0x11c/0x1c8
[   35.401405]  kunit_try_run_case+0x14c/0x3d0
[   35.402002]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.402830]  kthread+0x24c/0x2d0
[   35.403448]  ret_from_fork+0x10/0x20
[   35.404113] 
[   35.404492] Allocated by task 250:
[   35.405048]  kasan_save_stack+0x3c/0x68
[   35.405666]  kasan_save_track+0x20/0x40
[   35.406313]  kasan_save_alloc_info+0x40/0x58
[   35.407010]  __kasan_kmalloc+0xd4/0xd8
[   35.407612]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.408229]  kasan_bitops_generic+0xa0/0x1c8
[   35.408941]  kunit_try_run_case+0x14c/0x3d0
[   35.409635]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.410335]  kthread+0x24c/0x2d0
[   35.410942]  ret_from_fork+0x10/0x20
[   35.411574] 
[   35.411916] The buggy address belongs to the object at fff00000c5e082a0
[   35.411916]  which belongs to the cache kmalloc-16 of size 16
[   35.413084] The buggy address is located 8 bytes inside of
[   35.413084]  allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9)
[   35.414364] 
[   35.414744] The buggy address belongs to the physical page:
[   35.415508] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08
[   35.417043] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.417839] page_type: f5(slab)
[   35.418400] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.419211] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   35.420062] page dumped because: kasan: bad access detected
[   35.420847] 
[   35.421162] Memory state around the buggy address:
[   35.421821]  fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.422635]  fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.423474] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   35.424322]                                   ^
[   35.424847]  fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.425778]  fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.426624] ==================================================================
[   35.157714] ==================================================================
[   35.158773] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8
[   35.159823] Read of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250
[   35.160584] 
[   35.161088] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.162485] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.163134] Hardware name: linux,dummy-virt (DT)
[   35.163848] Call trace:
[   35.165338]  show_stack+0x20/0x38 (C)
[   35.165874]  dump_stack_lvl+0x8c/0xd0
[   35.166378]  print_report+0x118/0x5e0
[   35.167036]  kasan_report+0xc8/0x118
[   35.167615]  __asan_report_load8_noabort+0x20/0x30
[   35.168304]  kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8
[   35.169173]  kasan_bitops_generic+0x11c/0x1c8
[   35.169878]  kunit_try_run_case+0x14c/0x3d0
[   35.170478]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.171160]  kthread+0x24c/0x2d0
[   35.171772]  ret_from_fork+0x10/0x20
[   35.172412] 
[   35.172749] Allocated by task 250:
[   35.173310]  kasan_save_stack+0x3c/0x68
[   35.173966]  kasan_save_track+0x20/0x40
[   35.174562]  kasan_save_alloc_info+0x40/0x58
[   35.175091]  __kasan_kmalloc+0xd4/0xd8
[   35.175732]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.176441]  kasan_bitops_generic+0xa0/0x1c8
[   35.177058]  kunit_try_run_case+0x14c/0x3d0
[   35.177591]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.178375]  kthread+0x24c/0x2d0
[   35.178973]  ret_from_fork+0x10/0x20
[   35.179457] 
[   35.179858] The buggy address belongs to the object at fff00000c5e082a0
[   35.179858]  which belongs to the cache kmalloc-16 of size 16
[   35.181102] The buggy address is located 8 bytes inside of
[   35.181102]  allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9)
[   35.182401] 
[   35.182803] The buggy address belongs to the physical page:
[   35.183579] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08
[   35.184412] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.185270] page_type: f5(slab)
[   35.185849] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.186721] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   35.187723] page dumped because: kasan: bad access detected
[   35.188486] 
[   35.188845] Memory state around the buggy address:
[   35.189890]  fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.190773]  fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.191575] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   35.192387]                                   ^
[   35.193015]  fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.193957]  fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.194672] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[   34.750583] ==================================================================
[   34.751343] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[   34.752164] Write of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250
[   34.753041] 
[   34.753450] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   34.754563] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.755108] Hardware name: linux,dummy-virt (DT)
[   34.757245] Call trace:
[   34.757716]  show_stack+0x20/0x38 (C)
[   34.758602]  dump_stack_lvl+0x8c/0xd0
[   34.759180]  print_report+0x118/0x5e0
[   34.759856]  kasan_report+0xc8/0x118
[   34.760496]  kasan_check_range+0x100/0x1a8
[   34.761384]  __kasan_check_write+0x20/0x30
[   34.763031]  kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[   34.763761]  kasan_bitops_generic+0x110/0x1c8
[   34.764610]  kunit_try_run_case+0x14c/0x3d0
[   34.765257]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.766024]  kthread+0x24c/0x2d0
[   34.766644]  ret_from_fork+0x10/0x20
[   34.767268] 
[   34.768271] Allocated by task 250:
[   34.768864]  kasan_save_stack+0x3c/0x68
[   34.769435]  kasan_save_track+0x20/0x40
[   34.771081]  kasan_save_alloc_info+0x40/0x58
[   34.771634]  __kasan_kmalloc+0xd4/0xd8
[   34.772267]  __kmalloc_cache_noprof+0x15c/0x3c8
[   34.773042]  kasan_bitops_generic+0xa0/0x1c8
[   34.773859]  kunit_try_run_case+0x14c/0x3d0
[   34.774442]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.775227]  kthread+0x24c/0x2d0
[   34.775773]  ret_from_fork+0x10/0x20
[   34.776273] 
[   34.777194] The buggy address belongs to the object at fff00000c5e082a0
[   34.777194]  which belongs to the cache kmalloc-16 of size 16
[   34.779069] The buggy address is located 8 bytes inside of
[   34.779069]  allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9)
[   34.780012] 
[   34.780236] The buggy address belongs to the physical page:
[   34.780594] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08
[   34.781331] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.782845] page_type: f5(slab)
[   34.783429] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.784346] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.785274] page dumped because: kasan: bad access detected
[   34.786038] 
[   34.786365] Memory state around the buggy address:
[   34.787916]  fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.789237]  fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.790088] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.791016]                                   ^
[   34.791717]  fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.792712]  fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.793705] ==================================================================
[   34.795596] ==================================================================
[   34.796306] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8
[   34.797309] Read of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250
[   34.799103] 
[   34.799448] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   34.800671] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.801297] Hardware name: linux,dummy-virt (DT)
[   34.801918] Call trace:
[   34.803111]  show_stack+0x20/0x38 (C)
[   34.803777]  dump_stack_lvl+0x8c/0xd0
[   34.804276]  print_report+0x118/0x5e0
[   34.804805]  kasan_report+0xc8/0x118
[   34.805456]  __asan_report_load8_noabort+0x20/0x30
[   34.806193]  kasan_bitops_modify.constprop.0+0xa88/0xbc8
[   34.807047]  kasan_bitops_generic+0x110/0x1c8
[   34.807799]  kunit_try_run_case+0x14c/0x3d0
[   34.808565]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.809336]  kthread+0x24c/0x2d0
[   34.810188]  ret_from_fork+0x10/0x20
[   34.811732] 
[   34.812546] Allocated by task 250:
[   34.813020]  kasan_save_stack+0x3c/0x68
[   34.813638]  kasan_save_track+0x20/0x40
[   34.814691]  kasan_save_alloc_info+0x40/0x58
[   34.815263]  __kasan_kmalloc+0xd4/0xd8
[   34.815958]  __kmalloc_cache_noprof+0x15c/0x3c8
[   34.816651]  kasan_bitops_generic+0xa0/0x1c8
[   34.817268]  kunit_try_run_case+0x14c/0x3d0
[   34.818091]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.819026]  kthread+0x24c/0x2d0
[   34.819461]  ret_from_fork+0x10/0x20
[   34.820471] 
[   34.820876] The buggy address belongs to the object at fff00000c5e082a0
[   34.820876]  which belongs to the cache kmalloc-16 of size 16
[   34.822670] The buggy address is located 8 bytes inside of
[   34.822670]  allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9)
[   34.823980] 
[   34.824409] The buggy address belongs to the physical page:
[   34.825049] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08
[   34.826594] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.827204] page_type: f5(slab)
[   34.827787] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.828812] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.829905] page dumped because: kasan: bad access detected
[   34.830728] 
[   34.831112] Memory state around the buggy address:
[   34.831831]  fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.833322]  fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.834644] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.835267]                                   ^
[   34.835982]  fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.837161]  fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.837952] ==================================================================
[   34.704954] ==================================================================
[   34.705678] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[   34.707820] Read of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250
[   34.708699] 
[   34.709152] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   34.710825] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.711491] Hardware name: linux,dummy-virt (DT)
[   34.712225] Call trace:
[   34.712716]  show_stack+0x20/0x38 (C)
[   34.713304]  dump_stack_lvl+0x8c/0xd0
[   34.714107]  print_report+0x118/0x5e0
[   34.714582]  kasan_report+0xc8/0x118
[   34.715045]  __asan_report_load8_noabort+0x20/0x30
[   34.716457]  kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[   34.717242]  kasan_bitops_generic+0x110/0x1c8
[   34.717971]  kunit_try_run_case+0x14c/0x3d0
[   34.718691]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.719591]  kthread+0x24c/0x2d0
[   34.720748]  ret_from_fork+0x10/0x20
[   34.721278] 
[   34.721674] Allocated by task 250:
[   34.722244]  kasan_save_stack+0x3c/0x68
[   34.722921]  kasan_save_track+0x20/0x40
[   34.723467]  kasan_save_alloc_info+0x40/0x58
[   34.724163]  __kasan_kmalloc+0xd4/0xd8
[   34.725746]  __kmalloc_cache_noprof+0x15c/0x3c8
[   34.726364]  kasan_bitops_generic+0xa0/0x1c8
[   34.726950]  kunit_try_run_case+0x14c/0x3d0
[   34.728043]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.729164]  kthread+0x24c/0x2d0
[   34.730353]  ret_from_fork+0x10/0x20
[   34.730935] 
[   34.731228] The buggy address belongs to the object at fff00000c5e082a0
[   34.731228]  which belongs to the cache kmalloc-16 of size 16
[   34.732736] The buggy address is located 8 bytes inside of
[   34.732736]  allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9)
[   34.733898] 
[   34.734799] The buggy address belongs to the physical page:
[   34.735616] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08
[   34.736731] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.737760] page_type: f5(slab)
[   34.738670] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.739685] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.740944] page dumped because: kasan: bad access detected
[   34.741261] 
[   34.741423] Memory state around the buggy address:
[   34.741872]  fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.743215]  fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.744188] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.745215]                                   ^
[   34.746393]  fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.747922]  fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.748790] ==================================================================
[   34.890004] ==================================================================
[   34.890867] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc8
[   34.891784] Write of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250
[   34.893249] 
[   34.894787] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   34.895870] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.896734] Hardware name: linux,dummy-virt (DT)
[   34.897413] Call trace:
[   34.898203]  show_stack+0x20/0x38 (C)
[   34.898844]  dump_stack_lvl+0x8c/0xd0
[   34.899434]  print_report+0x118/0x5e0
[   34.900213]  kasan_report+0xc8/0x118
[   34.900839]  kasan_check_range+0x100/0x1a8
[   34.901483]  __kasan_check_write+0x20/0x30
[   34.902900]  kasan_bitops_modify.constprop.0+0x320/0xbc8
[   34.903889]  kasan_bitops_generic+0x110/0x1c8
[   34.904626]  kunit_try_run_case+0x14c/0x3d0
[   34.905337]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.906410]  kthread+0x24c/0x2d0
[   34.907268]  ret_from_fork+0x10/0x20
[   34.907913] 
[   34.908321] Allocated by task 250:
[   34.908858]  kasan_save_stack+0x3c/0x68
[   34.909491]  kasan_save_track+0x20/0x40
[   34.910092]  kasan_save_alloc_info+0x40/0x58
[   34.911777]  __kasan_kmalloc+0xd4/0xd8
[   34.912346]  __kmalloc_cache_noprof+0x15c/0x3c8
[   34.913090]  kasan_bitops_generic+0xa0/0x1c8
[   34.914366]  kunit_try_run_case+0x14c/0x3d0
[   34.915284]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.916175]  kthread+0x24c/0x2d0
[   34.916843]  ret_from_fork+0x10/0x20
[   34.917497] 
[   34.917948] The buggy address belongs to the object at fff00000c5e082a0
[   34.917948]  which belongs to the cache kmalloc-16 of size 16
[   34.919488] The buggy address is located 8 bytes inside of
[   34.919488]  allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9)
[   34.921490] 
[   34.921906] The buggy address belongs to the physical page:
[   34.922644] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08
[   34.923835] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.925099] page_type: f5(slab)
[   34.925924] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.927463] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.928558] page dumped because: kasan: bad access detected
[   34.929255] 
[   34.929685] Memory state around the buggy address:
[   34.930337]  fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.931032]  fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.932389] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.933225]                                   ^
[   34.934072]  fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.934908]  fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.935797] ==================================================================
[   34.937736] ==================================================================
[   34.938663] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[   34.940163] Read of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250
[   34.941216] 
[   34.941919] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   34.944050] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.944718] Hardware name: linux,dummy-virt (DT)
[   34.945264] Call trace:
[   34.945837]  show_stack+0x20/0x38 (C)
[   34.946556]  dump_stack_lvl+0x8c/0xd0
[   34.947617]  print_report+0x118/0x5e0
[   34.948185]  kasan_report+0xc8/0x118
[   34.948894]  __asan_report_load8_noabort+0x20/0x30
[   34.949975]  kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[   34.951198]  kasan_bitops_generic+0x110/0x1c8
[   34.951910]  kunit_try_run_case+0x14c/0x3d0
[   34.952719]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.953768]  kthread+0x24c/0x2d0
[   34.954513]  ret_from_fork+0x10/0x20
[   34.955120] 
[   34.955556] Allocated by task 250:
[   34.956084]  kasan_save_stack+0x3c/0x68
[   34.956794]  kasan_save_track+0x20/0x40
[   34.957450]  kasan_save_alloc_info+0x40/0x58
[   34.958381]  __kasan_kmalloc+0xd4/0xd8
[   34.959096]  __kmalloc_cache_noprof+0x15c/0x3c8
[   34.960862]  kasan_bitops_generic+0xa0/0x1c8
[   34.961395]  kunit_try_run_case+0x14c/0x3d0
[   34.962412]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.963215]  kthread+0x24c/0x2d0
[   34.963798]  ret_from_fork+0x10/0x20
[   34.964423] 
[   34.964866] The buggy address belongs to the object at fff00000c5e082a0
[   34.964866]  which belongs to the cache kmalloc-16 of size 16
[   34.966325] The buggy address is located 8 bytes inside of
[   34.966325]  allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9)
[   34.968135] 
[   34.969033] The buggy address belongs to the physical page:
[   34.970111] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08
[   34.971133] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.972050] page_type: f5(slab)
[   34.972618] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.973550] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.974347] page dumped because: kasan: bad access detected
[   34.975804] 
[   34.976177] Memory state around the buggy address:
[   34.976903]  fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.978714]  fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.979444] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.980295]                                   ^
[   34.981022]  fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.982039]  fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.983045] ==================================================================
[   34.984377] ==================================================================
[   34.985304] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc8
[   34.986878] Write of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250
[   34.987517] 
[   34.987908] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   34.988842] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.989479] Hardware name: linux,dummy-virt (DT)
[   34.990860] Call trace:
[   34.991431]  show_stack+0x20/0x38 (C)
[   34.992234]  dump_stack_lvl+0x8c/0xd0
[   34.993088]  print_report+0x118/0x5e0
[   34.994104]  kasan_report+0xc8/0x118
[   34.995468]  kasan_check_range+0x100/0x1a8
[   34.996336]  __kasan_check_write+0x20/0x30
[   34.997064]  kasan_bitops_modify.constprop.0+0x344/0xbc8
[   34.998309]  kasan_bitops_generic+0x110/0x1c8
[   34.999094]  kunit_try_run_case+0x14c/0x3d0
[   34.999836]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.000632]  kthread+0x24c/0x2d0
[   35.001159]  ret_from_fork+0x10/0x20
[   35.002779] 
[   35.003134] Allocated by task 250:
[   35.003547]  kasan_save_stack+0x3c/0x68
[   35.004272]  kasan_save_track+0x20/0x40
[   35.004978]  kasan_save_alloc_info+0x40/0x58
[   35.005553]  __kasan_kmalloc+0xd4/0xd8
[   35.006178]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.007371]  kasan_bitops_generic+0xa0/0x1c8
[   35.008097]  kunit_try_run_case+0x14c/0x3d0
[   35.008710]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.009594]  kthread+0x24c/0x2d0
[   35.010241]  ret_from_fork+0x10/0x20
[   35.010884] 
[   35.011663] The buggy address belongs to the object at fff00000c5e082a0
[   35.011663]  which belongs to the cache kmalloc-16 of size 16
[   35.013286] The buggy address is located 8 bytes inside of
[   35.013286]  allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9)
[   35.014980] 
[   35.015293] The buggy address belongs to the physical page:
[   35.016064] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08
[   35.017134] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.018279] page_type: f5(slab)
[   35.018845] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.019750] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   35.021308] page dumped because: kasan: bad access detected
[   35.022691] 
[   35.023060] Memory state around the buggy address:
[   35.023841]  fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.024880]  fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.025853] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   35.026461]                                   ^
[   35.027030]  fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.028318]  fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.029871] ==================================================================
[   35.031608] ==================================================================
[   35.032623] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[   35.033712] Write of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250
[   35.034982] 
[   35.035642] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.036590] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.037273] Hardware name: linux,dummy-virt (DT)
[   35.038044] Call trace:
[   35.038517]  show_stack+0x20/0x38 (C)
[   35.039274]  dump_stack_lvl+0x8c/0xd0
[   35.039653]  print_report+0x118/0x5e0
[   35.040039]  kasan_report+0xc8/0x118
[   35.040727]  kasan_check_range+0x100/0x1a8
[   35.041506]  __kasan_check_write+0x20/0x30
[   35.042243]  kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[   35.043792]  kasan_bitops_generic+0x110/0x1c8
[   35.044415]  kunit_try_run_case+0x14c/0x3d0
[   35.045183]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.046334]  kthread+0x24c/0x2d0
[   35.046880]  ret_from_fork+0x10/0x20
[   35.047597] 
[   35.047968] Allocated by task 250:
[   35.048491]  kasan_save_stack+0x3c/0x68
[   35.049173]  kasan_save_track+0x20/0x40
[   35.050478]  kasan_save_alloc_info+0x40/0x58
[   35.051089]  __kasan_kmalloc+0xd4/0xd8
[   35.051563]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.052277]  kasan_bitops_generic+0xa0/0x1c8
[   35.053364]  kunit_try_run_case+0x14c/0x3d0
[   35.054547]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.055440]  kthread+0x24c/0x2d0
[   35.055949]  ret_from_fork+0x10/0x20
[   35.056471] 
[   35.056929] The buggy address belongs to the object at fff00000c5e082a0
[   35.056929]  which belongs to the cache kmalloc-16 of size 16
[   35.058210] The buggy address is located 8 bytes inside of
[   35.058210]  allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9)
[   35.060646] 
[   35.061041] The buggy address belongs to the physical page:
[   35.062109] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08
[   35.063209] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.064160] page_type: f5(slab)
[   35.064731] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.065680] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   35.067016] page dumped because: kasan: bad access detected
[   35.067796] 
[   35.068173] Memory state around the buggy address:
[   35.068805]  fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.069734]  fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.070564] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   35.071325]                                   ^
[   35.072104]  fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.073015]  fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.073982] ==================================================================
[   35.076094] ==================================================================
[   35.078183] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8
[   35.079275] Read of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250
[   35.080704] 
[   35.081115] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   35.082890] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.083440] Hardware name: linux,dummy-virt (DT)
[   35.084512] Call trace:
[   35.085240]  show_stack+0x20/0x38 (C)
[   35.085866]  dump_stack_lvl+0x8c/0xd0
[   35.086635]  print_report+0x118/0x5e0
[   35.087392]  kasan_report+0xc8/0x118
[   35.088139]  __asan_report_load8_noabort+0x20/0x30
[   35.089083]  kasan_bitops_modify.constprop.0+0xa28/0xbc8
[   35.089885]  kasan_bitops_generic+0x110/0x1c8
[   35.090632]  kunit_try_run_case+0x14c/0x3d0
[   35.091309]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.092050]  kthread+0x24c/0x2d0
[   35.092600]  ret_from_fork+0x10/0x20
[   35.093176] 
[   35.093572] Allocated by task 250:
[   35.094105]  kasan_save_stack+0x3c/0x68
[   35.094757]  kasan_save_track+0x20/0x40
[   35.095393]  kasan_save_alloc_info+0x40/0x58
[   35.096096]  __kasan_kmalloc+0xd4/0xd8
[   35.096695]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.097262]  kasan_bitops_generic+0xa0/0x1c8
[   35.097951]  kunit_try_run_case+0x14c/0x3d0
[   35.098628]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.099396]  kthread+0x24c/0x2d0
[   35.099998]  ret_from_fork+0x10/0x20
[   35.100629] 
[   35.101013] The buggy address belongs to the object at fff00000c5e082a0
[   35.101013]  which belongs to the cache kmalloc-16 of size 16
[   35.102233] The buggy address is located 8 bytes inside of
[   35.102233]  allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9)
[   35.103449] 
[   35.103858] The buggy address belongs to the physical page:
[   35.104633] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08
[   35.105415] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.106335] page_type: f5(slab)
[   35.106868] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.107790] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   35.108615] page dumped because: kasan: bad access detected
[   35.109354] 
[   35.109758] Memory state around the buggy address:
[   35.110452]  fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.111159]  fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.112102] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   35.112915]                                   ^
[   35.113594]  fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.114391]  fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.115315] ==================================================================
[   34.840451] ==================================================================
[   34.841798] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[   34.843016] Write of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250
[   34.843757] 
[   34.844077] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   34.845267] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.846902] Hardware name: linux,dummy-virt (DT)
[   34.847727] Call trace:
[   34.848219]  show_stack+0x20/0x38 (C)
[   34.848943]  dump_stack_lvl+0x8c/0xd0
[   34.849788]  print_report+0x118/0x5e0
[   34.850412]  kasan_report+0xc8/0x118
[   34.851080]  kasan_check_range+0x100/0x1a8
[   34.851772]  __kasan_check_write+0x20/0x30
[   34.852484]  kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[   34.853419]  kasan_bitops_generic+0x110/0x1c8
[   34.854628]  kunit_try_run_case+0x14c/0x3d0
[   34.855157]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.855931]  kthread+0x24c/0x2d0
[   34.856463]  ret_from_fork+0x10/0x20
[   34.857091] 
[   34.857412] Allocated by task 250:
[   34.858567]  kasan_save_stack+0x3c/0x68
[   34.859202]  kasan_save_track+0x20/0x40
[   34.859794]  kasan_save_alloc_info+0x40/0x58
[   34.860421]  __kasan_kmalloc+0xd4/0xd8
[   34.861412]  __kmalloc_cache_noprof+0x15c/0x3c8
[   34.862457]  kasan_bitops_generic+0xa0/0x1c8
[   34.863450]  kunit_try_run_case+0x14c/0x3d0
[   34.864323]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.865356]  kthread+0x24c/0x2d0
[   34.866381]  ret_from_fork+0x10/0x20
[   34.866938] 
[   34.867316] The buggy address belongs to the object at fff00000c5e082a0
[   34.867316]  which belongs to the cache kmalloc-16 of size 16
[   34.868593] The buggy address is located 8 bytes inside of
[   34.868593]  allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9)
[   34.869862] 
[   34.870671] The buggy address belongs to the physical page:
[   34.871613] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08
[   34.872289] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.873025] page_type: f5(slab)
[   34.873624] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.875099] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.876007] page dumped because: kasan: bad access detected
[   34.876694] 
[   34.877057] Memory state around the buggy address:
[   34.877766]  fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.878704]  fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.880449] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.881264]                                   ^
[   34.881904]  fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.882699]  fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.884158] ==================================================================
[   34.660042] ==================================================================
[   34.661140] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8
[   34.662108] Write of size 8 at addr fff00000c5e082a8 by task kunit_try_catch/250
[   34.662703] 
[   34.663121] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   34.664446] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.665934] Hardware name: linux,dummy-virt (DT)
[   34.666752] Call trace:
[   34.667349]  show_stack+0x20/0x38 (C)
[   34.668085]  dump_stack_lvl+0x8c/0xd0
[   34.668861]  print_report+0x118/0x5e0
[   34.669619]  kasan_report+0xc8/0x118
[   34.670640]  kasan_check_range+0x100/0x1a8
[   34.671486]  __kasan_check_write+0x20/0x30
[   34.672035]  kasan_bitops_modify.constprop.0+0x100/0xbc8
[   34.672916]  kasan_bitops_generic+0x110/0x1c8
[   34.673763]  kunit_try_run_case+0x14c/0x3d0
[   34.674950]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.675801]  kthread+0x24c/0x2d0
[   34.676177]  ret_from_fork+0x10/0x20
[   34.676752] 
[   34.677137] Allocated by task 250:
[   34.678189]  kasan_save_stack+0x3c/0x68
[   34.678746]  kasan_save_track+0x20/0x40
[   34.679326]  kasan_save_alloc_info+0x40/0x58
[   34.679947]  __kasan_kmalloc+0xd4/0xd8
[   34.680492]  __kmalloc_cache_noprof+0x15c/0x3c8
[   34.681141]  kasan_bitops_generic+0xa0/0x1c8
[   34.681708]  kunit_try_run_case+0x14c/0x3d0
[   34.682371]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.683292]  kthread+0x24c/0x2d0
[   34.683895]  ret_from_fork+0x10/0x20
[   34.684472] 
[   34.686090] The buggy address belongs to the object at fff00000c5e082a0
[   34.686090]  which belongs to the cache kmalloc-16 of size 16
[   34.687334] The buggy address is located 8 bytes inside of
[   34.687334]  allocated 9-byte region [fff00000c5e082a0, fff00000c5e082a9)
[   34.688681] 
[   34.689135] The buggy address belongs to the physical page:
[   34.690120] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08
[   34.691163] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.692323] page_type: f5(slab)
[   34.692971] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.694246] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.695375] page dumped because: kasan: bad access detected
[   34.696012] 
[   34.696429] Memory state around the buggy address:
[   34.697169]  fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.698854]  fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.699686] >fff00000c5e08280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.700625]                                   ^
[   34.701346]  fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.702491]  fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.703339] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen
[   34.606267] ==================================================================
[   34.607455] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88
[   34.608235] Read of size 1 at addr fff00000c5ec1d10 by task kunit_try_catch/248
[   34.608931] 
[   34.609374] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   34.610667] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.611143] Hardware name: linux,dummy-virt (DT)
[   34.611835] Call trace:
[   34.612298]  show_stack+0x20/0x38 (C)
[   34.612834]  dump_stack_lvl+0x8c/0xd0
[   34.613492]  print_report+0x118/0x5e0
[   34.614120]  kasan_report+0xc8/0x118
[   34.614666]  __asan_report_load1_noabort+0x20/0x30
[   34.615430]  strnlen+0x80/0x88
[   34.616011]  kasan_strings+0x380/0x8f8
[   34.616685]  kunit_try_run_case+0x14c/0x3d0
[   34.617346]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.618003]  kthread+0x24c/0x2d0
[   34.618624]  ret_from_fork+0x10/0x20
[   34.619284] 
[   34.619685] Allocated by task 248:
[   34.620247]  kasan_save_stack+0x3c/0x68
[   34.620835]  kasan_save_track+0x20/0x40
[   34.621413]  kasan_save_alloc_info+0x40/0x58
[   34.622108]  __kasan_kmalloc+0xd4/0xd8
[   34.622750]  __kmalloc_cache_noprof+0x15c/0x3c8
[   34.623282]  kasan_strings+0xb4/0x8f8
[   34.623928]  kunit_try_run_case+0x14c/0x3d0
[   34.624583]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.625366]  kthread+0x24c/0x2d0
[   34.625841]  ret_from_fork+0x10/0x20
[   34.626450] 
[   34.626844] Freed by task 248:
[   34.627316]  kasan_save_stack+0x3c/0x68
[   34.627855]  kasan_save_track+0x20/0x40
[   34.628503]  kasan_save_free_info+0x4c/0x78
[   34.629374]  __kasan_slab_free+0x6c/0x98
[   34.629897]  kfree+0x114/0x3d0
[   34.630456]  kasan_strings+0x128/0x8f8
[   34.631085]  kunit_try_run_case+0x14c/0x3d0
[   34.631776]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.632500]  kthread+0x24c/0x2d0
[   34.633093]  ret_from_fork+0x10/0x20
[   34.633638] 
[   34.634006] The buggy address belongs to the object at fff00000c5ec1d00
[   34.634006]  which belongs to the cache kmalloc-32 of size 32
[   34.635272] The buggy address is located 16 bytes inside of
[   34.635272]  freed 32-byte region [fff00000c5ec1d00, fff00000c5ec1d20)
[   34.636581] 
[   34.636968] The buggy address belongs to the physical page:
[   34.637672] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ec1
[   34.638627] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.639376] page_type: f5(slab)
[   34.639966] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   34.640934] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   34.641819] page dumped because: kasan: bad access detected
[   34.642513] 
[   34.642903] Memory state around the buggy address:
[   34.643583]  fff00000c5ec1c00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   34.644379]  fff00000c5ec1c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   34.645252] >fff00000c5ec1d00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   34.646120]                          ^
[   34.646738]  fff00000c5ec1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.647498]  fff00000c5ec1e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.648368] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen
[   34.558907] ==================================================================
[   34.559605] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   34.560470] Read of size 1 at addr fff00000c5ec1d10 by task kunit_try_catch/248
[   34.561430] 
[   34.561823] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   34.562828] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.563447] Hardware name: linux,dummy-virt (DT)
[   34.564823] Call trace:
[   34.565263]  show_stack+0x20/0x38 (C)
[   34.566170]  dump_stack_lvl+0x8c/0xd0
[   34.566851]  print_report+0x118/0x5e0
[   34.567498]  kasan_report+0xc8/0x118
[   34.568164]  __asan_report_load1_noabort+0x20/0x30
[   34.568899]  strlen+0xa8/0xb0
[   34.569517]  kasan_strings+0x320/0x8f8
[   34.570491]  kunit_try_run_case+0x14c/0x3d0
[   34.571188]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.571933]  kthread+0x24c/0x2d0
[   34.572491]  ret_from_fork+0x10/0x20
[   34.573028] 
[   34.573397] Allocated by task 248:
[   34.574277]  kasan_save_stack+0x3c/0x68
[   34.574798]  kasan_save_track+0x20/0x40
[   34.575448]  kasan_save_alloc_info+0x40/0x58
[   34.576145]  __kasan_kmalloc+0xd4/0xd8
[   34.576798]  __kmalloc_cache_noprof+0x15c/0x3c8
[   34.577440]  kasan_strings+0xb4/0x8f8
[   34.578371]  kunit_try_run_case+0x14c/0x3d0
[   34.579041]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.579748]  kthread+0x24c/0x2d0
[   34.580347]  ret_from_fork+0x10/0x20
[   34.580981] 
[   34.581329] Freed by task 248:
[   34.582917]  kasan_save_stack+0x3c/0x68
[   34.583442]  kasan_save_track+0x20/0x40
[   34.584090]  kasan_save_free_info+0x4c/0x78
[   34.584714]  __kasan_slab_free+0x6c/0x98
[   34.585221]  kfree+0x114/0x3d0
[   34.585792]  kasan_strings+0x128/0x8f8
[   34.586412]  kunit_try_run_case+0x14c/0x3d0
[   34.587015]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.587725]  kthread+0x24c/0x2d0
[   34.588318]  ret_from_fork+0x10/0x20
[   34.588948] 
[   34.589356] The buggy address belongs to the object at fff00000c5ec1d00
[   34.589356]  which belongs to the cache kmalloc-32 of size 32
[   34.590581] The buggy address is located 16 bytes inside of
[   34.590581]  freed 32-byte region [fff00000c5ec1d00, fff00000c5ec1d20)
[   34.591810] 
[   34.592169] The buggy address belongs to the physical page:
[   34.592935] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ec1
[   34.593816] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.594715] page_type: f5(slab)
[   34.595183] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   34.596063] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   34.596938] page dumped because: kasan: bad access detected
[   34.597596] 
[   34.597974] Memory state around the buggy address:
[   34.598656]  fff00000c5ec1c00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   34.599481]  fff00000c5ec1c80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   34.600320] >fff00000c5ec1d00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   34.601129]                          ^
[   34.601752]  fff00000c5ec1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.602608]  fff00000c5ec1e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.603516] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[   34.509790] ==================================================================
[   34.510660] BUG: KASAN: slab-use-after-free in kasan_strings+0x858/0x8f8
[   34.511411] Read of size 1 at addr fff00000c5ec1d10 by task kunit_try_catch/248
[   34.512064] 
[   34.512484] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   34.514782] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.515489] Hardware name: linux,dummy-virt (DT)
[   34.516337] Call trace:
[   34.516771]  show_stack+0x20/0x38 (C)
[   34.517311]  dump_stack_lvl+0x8c/0xd0
[   34.518302]  print_report+0x118/0x5e0
[   34.518942]  kasan_report+0xc8/0x118
[   34.519679]  __asan_report_load1_noabort+0x20/0x30
[   34.520416]  kasan_strings+0x858/0x8f8
[   34.521125]  kunit_try_run_case+0x14c/0x3d0
[   34.521778]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.522720]  kthread+0x24c/0x2d0
[   34.523278]  ret_from_fork+0x10/0x20
[   34.524194] 
[   34.524602] Allocated by task 248:
[   34.525215]  kasan_save_stack+0x3c/0x68
[   34.526155]  kasan_save_track+0x20/0x40
[   34.526787]  kasan_save_alloc_info+0x40/0x58
[   34.527439]  __kasan_kmalloc+0xd4/0xd8
[   34.528037]  __kmalloc_cache_noprof+0x15c/0x3c8
[   34.528796]  kasan_strings+0xb4/0x8f8
[   34.529418]  kunit_try_run_case+0x14c/0x3d0
[   34.530868]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.531569]  kthread+0x24c/0x2d0
[   34.532088]  ret_from_fork+0x10/0x20
[   34.533040] 
[   34.533393] Freed by task 248:
[   34.533964]  kasan_save_stack+0x3c/0x68
[   34.534845]  kasan_save_track+0x20/0x40
[   34.535498]  kasan_save_free_info+0x4c/0x78
[   34.536069]  __kasan_slab_free+0x6c/0x98
[   34.536687]  kfree+0x114/0x3d0
[   34.537244]  kasan_strings+0x128/0x8f8
[   34.538129]  kunit_try_run_case+0x14c/0x3d0
[   34.538742]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.539562]  kthread+0x24c/0x2d0
[   34.540159]  ret_from_fork+0x10/0x20
[   34.540832] 
[   34.541216] The buggy address belongs to the object at fff00000c5ec1d00
[   34.541216]  which belongs to the cache kmalloc-32 of size 32
[   34.542776] The buggy address is located 16 bytes inside of
[   34.542776]  freed 32-byte region [fff00000c5ec1d00, fff00000c5ec1d20)
[   34.544089] 
[   34.544428] The buggy address belongs to the physical page:
[   34.544996] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ec1
[   34.546276] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.547027] page_type: f5(slab)
[   34.547612] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   34.548463] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   34.549392] page dumped because: kasan: bad access detected
[   34.550780] 
[   34.551126] Memory state around the buggy address:
[   34.551821]  fff00000c5ec1c00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   34.552511]  fff00000c5ec1c80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   34.553630] >fff00000c5ec1d00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   34.554415]                          ^
[   34.555327]  fff00000c5ec1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.556117]  fff00000c5ec1e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.557033] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
[   34.459407] ==================================================================
[   34.460897] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   34.461728] Read of size 1 at addr fff00000c5ec1d10 by task kunit_try_catch/248
[   34.463756] 
[   34.464340] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   34.465731] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.466308] Hardware name: linux,dummy-virt (DT)
[   34.466935] Call trace:
[   34.467388]  show_stack+0x20/0x38 (C)
[   34.468021]  dump_stack_lvl+0x8c/0xd0
[   34.468649]  print_report+0x118/0x5e0
[   34.469332]  kasan_report+0xc8/0x118
[   34.470227]  __asan_report_load1_noabort+0x20/0x30
[   34.470871]  strcmp+0xc0/0xc8
[   34.471436]  kasan_strings+0x248/0x8f8
[   34.472045]  kunit_try_run_case+0x14c/0x3d0
[   34.472697]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.473404]  kthread+0x24c/0x2d0
[   34.474155]  ret_from_fork+0x10/0x20
[   34.474848] 
[   34.475230] Allocated by task 248:
[   34.475810]  kasan_save_stack+0x3c/0x68
[   34.476393]  kasan_save_track+0x20/0x40
[   34.477028]  kasan_save_alloc_info+0x40/0x58
[   34.477984]  __kasan_kmalloc+0xd4/0xd8
[   34.478587]  __kmalloc_cache_noprof+0x15c/0x3c8
[   34.479168]  kasan_strings+0xb4/0x8f8
[   34.479811]  kunit_try_run_case+0x14c/0x3d0
[   34.480497]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.481187]  kthread+0x24c/0x2d0
[   34.482246]  ret_from_fork+0x10/0x20
[   34.482869] 
[   34.483202] Freed by task 248:
[   34.483747]  kasan_save_stack+0x3c/0x68
[   34.484335]  kasan_save_track+0x20/0x40
[   34.485905]  kasan_save_free_info+0x4c/0x78
[   34.486600]  __kasan_slab_free+0x6c/0x98
[   34.487184]  kfree+0x114/0x3d0
[   34.487791]  kasan_strings+0x128/0x8f8
[   34.488321]  kunit_try_run_case+0x14c/0x3d0
[   34.489079]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.489995]  kthread+0x24c/0x2d0
[   34.490592]  ret_from_fork+0x10/0x20
[   34.490964] 
[   34.491385] The buggy address belongs to the object at fff00000c5ec1d00
[   34.491385]  which belongs to the cache kmalloc-32 of size 32
[   34.492735] The buggy address is located 16 bytes inside of
[   34.492735]  freed 32-byte region [fff00000c5ec1d00, fff00000c5ec1d20)
[   34.494461] 
[   34.494799] The buggy address belongs to the physical page:
[   34.495710] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ec1
[   34.496869] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.497942] page_type: f5(slab)
[   34.498415] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   34.499376] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   34.500323] page dumped because: kasan: bad access detected
[   34.501023] 
[   34.501439] Memory state around the buggy address:
[   34.502421]  fff00000c5ec1c00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   34.503569]  fff00000c5ec1c80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   34.504639] >fff00000c5ec1d00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   34.505568]                          ^
[   34.506466]  fff00000c5ec1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.507349]  fff00000c5ec1e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.508274] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strrchr
[   34.411563] ==================================================================
[   34.412320] BUG: KASAN: slab-use-after-free in strrchr+0x6c/0x78
[   34.412997] Read of size 1 at addr fff00000c5ec1d10 by task kunit_try_catch/248
[   34.413829] 
[   34.414236] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   34.415646] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.416148] Hardware name: linux,dummy-virt (DT)
[   34.416855] Call trace:
[   34.417284]  show_stack+0x20/0x38 (C)
[   34.418227]  dump_stack_lvl+0x8c/0xd0
[   34.418894]  print_report+0x118/0x5e0
[   34.419428]  kasan_report+0xc8/0x118
[   34.420081]  __asan_report_load1_noabort+0x20/0x30
[   34.420789]  strrchr+0x6c/0x78
[   34.421365]  kasan_strings+0x1e0/0x8f8
[   34.422281]  kunit_try_run_case+0x14c/0x3d0
[   34.422917]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.423556]  kthread+0x24c/0x2d0
[   34.424150]  ret_from_fork+0x10/0x20
[   34.424809] 
[   34.425165] Allocated by task 248:
[   34.426045]  kasan_save_stack+0x3c/0x68
[   34.426627]  kasan_save_track+0x20/0x40
[   34.427268]  kasan_save_alloc_info+0x40/0x58
[   34.427976]  __kasan_kmalloc+0xd4/0xd8
[   34.428601]  __kmalloc_cache_noprof+0x15c/0x3c8
[   34.429246]  kasan_strings+0xb4/0x8f8
[   34.430102]  kunit_try_run_case+0x14c/0x3d0
[   34.430752]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.432455]  kthread+0x24c/0x2d0
[   34.433028]  ret_from_fork+0x10/0x20
[   34.433625] 
[   34.434201] Freed by task 248:
[   34.434745]  kasan_save_stack+0x3c/0x68
[   34.435269]  kasan_save_track+0x20/0x40
[   34.436026]  kasan_save_free_info+0x4c/0x78
[   34.436658]  __kasan_slab_free+0x6c/0x98
[   34.437300]  kfree+0x114/0x3d0
[   34.438269]  kasan_strings+0x128/0x8f8
[   34.438778]  kunit_try_run_case+0x14c/0x3d0
[   34.439480]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.440151]  kthread+0x24c/0x2d0
[   34.440725]  ret_from_fork+0x10/0x20
[   34.441253] 
[   34.441645] The buggy address belongs to the object at fff00000c5ec1d00
[   34.441645]  which belongs to the cache kmalloc-32 of size 32
[   34.443137] The buggy address is located 16 bytes inside of
[   34.443137]  freed 32-byte region [fff00000c5ec1d00, fff00000c5ec1d20)
[   34.444401] 
[   34.444799] The buggy address belongs to the physical page:
[   34.445508] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ec1
[   34.446907] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.447727] page_type: f5(slab)
[   34.448310] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   34.449180] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   34.450383] page dumped because: kasan: bad access detected
[   34.451000] 
[   34.451374] Memory state around the buggy address:
[   34.452083]  fff00000c5ec1c00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   34.453395]  fff00000c5ec1c80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   34.454348] >fff00000c5ec1d00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   34.455234]                          ^
[   34.456038]  fff00000c5ec1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.456923]  fff00000c5ec1e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.458052] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strchr
[   34.362515] ==================================================================
[   34.363588] BUG: KASAN: slab-use-after-free in strchr+0xcc/0xd8
[   34.364359] Read of size 1 at addr fff00000c5ec1d10 by task kunit_try_catch/248
[   34.365098] 
[   34.365497] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   34.366912] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.367833] Hardware name: linux,dummy-virt (DT)
[   34.368453] Call trace:
[   34.368938]  show_stack+0x20/0x38 (C)
[   34.369614]  dump_stack_lvl+0x8c/0xd0
[   34.370567]  print_report+0x118/0x5e0
[   34.371118]  kasan_report+0xc8/0x118
[   34.371755]  __asan_report_load1_noabort+0x20/0x30
[   34.372403]  strchr+0xcc/0xd8
[   34.373011]  kasan_strings+0x180/0x8f8
[   34.373653]  kunit_try_run_case+0x14c/0x3d0
[   34.374322]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.375271]  kthread+0x24c/0x2d0
[   34.375777]  ret_from_fork+0x10/0x20
[   34.376440] 
[   34.376826] Allocated by task 248:
[   34.377398]  kasan_save_stack+0x3c/0x68
[   34.378261]  kasan_save_track+0x20/0x40
[   34.378853]  kasan_save_alloc_info+0x40/0x58
[   34.379589]  __kasan_kmalloc+0xd4/0xd8
[   34.380164]  __kmalloc_cache_noprof+0x15c/0x3c8
[   34.380833]  kasan_strings+0xb4/0x8f8
[   34.381322]  kunit_try_run_case+0x14c/0x3d0
[   34.382552]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.383230]  kthread+0x24c/0x2d0
[   34.383826]  ret_from_fork+0x10/0x20
[   34.384400] 
[   34.384737] Freed by task 248:
[   34.385275]  kasan_save_stack+0x3c/0x68
[   34.386003]  kasan_save_track+0x20/0x40
[   34.386645]  kasan_save_free_info+0x4c/0x78
[   34.387052]  __kasan_slab_free+0x6c/0x98
[   34.387831]  kfree+0x114/0x3d0
[   34.388414]  kasan_strings+0x128/0x8f8
[   34.389080]  kunit_try_run_case+0x14c/0x3d0
[   34.390451]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.391282]  kthread+0x24c/0x2d0
[   34.391918]  ret_from_fork+0x10/0x20
[   34.392416] 
[   34.392817] The buggy address belongs to the object at fff00000c5ec1d00
[   34.392817]  which belongs to the cache kmalloc-32 of size 32
[   34.394589] The buggy address is located 16 bytes inside of
[   34.394589]  freed 32-byte region [fff00000c5ec1d00, fff00000c5ec1d20)
[   34.395830] 
[   34.396208] The buggy address belongs to the physical page:
[   34.396882] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ec1
[   34.398005] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.398866] page_type: f5(slab)
[   34.399387] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   34.400398] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   34.401249] page dumped because: kasan: bad access detected
[   34.402224] 
[   34.402611] Memory state around the buggy address:
[   34.403448]  fff00000c5ec1c00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   34.404514]  fff00000c5ec1c80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   34.405331] >fff00000c5ec1d00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   34.406362]                          ^
[   34.406817]  fff00000c5ec1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.407820]  fff00000c5ec1e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.408765] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[   34.311627] ==================================================================
[   34.312642] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   34.313440] Read of size 1 at addr fff00000c5ec1c58 by task kunit_try_catch/246
[   34.314181] 
[   34.314604] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   34.315691] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.316309] Hardware name: linux,dummy-virt (DT)
[   34.317002] Call trace:
[   34.317476]  show_stack+0x20/0x38 (C)
[   34.319068]  dump_stack_lvl+0x8c/0xd0
[   34.319686]  print_report+0x118/0x5e0
[   34.320224]  kasan_report+0xc8/0x118
[   34.320895]  __asan_report_load1_noabort+0x20/0x30
[   34.321974]  memcmp+0x198/0x1d8
[   34.322560]  kasan_memcmp+0x16c/0x300
[   34.323188]  kunit_try_run_case+0x14c/0x3d0
[   34.323870]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.324498]  kthread+0x24c/0x2d0
[   34.325112]  ret_from_fork+0x10/0x20
[   34.326066] 
[   34.326443] Allocated by task 246:
[   34.326970]  kasan_save_stack+0x3c/0x68
[   34.327514]  kasan_save_track+0x20/0x40
[   34.328180]  kasan_save_alloc_info+0x40/0x58
[   34.328737]  __kasan_kmalloc+0xd4/0xd8
[   34.329405]  __kmalloc_cache_noprof+0x15c/0x3c8
[   34.330394]  kasan_memcmp+0xbc/0x300
[   34.331027]  kunit_try_run_case+0x14c/0x3d0
[   34.331713]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.332412]  kthread+0x24c/0x2d0
[   34.332956]  ret_from_fork+0x10/0x20
[   34.333543] 
[   34.334380] The buggy address belongs to the object at fff00000c5ec1c40
[   34.334380]  which belongs to the cache kmalloc-32 of size 32
[   34.335549] The buggy address is located 0 bytes to the right of
[   34.335549]  allocated 24-byte region [fff00000c5ec1c40, fff00000c5ec1c58)
[   34.336868] 
[   34.337255] The buggy address belongs to the physical page:
[   34.338358] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ec1
[   34.339387] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.340137] page_type: f5(slab)
[   34.340741] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   34.341574] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   34.342771] page dumped because: kasan: bad access detected
[   34.343379] 
[   34.343778] Memory state around the buggy address:
[   34.344451]  fff00000c5ec1b00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   34.345215]  fff00000c5ec1b80: fa fb fb fb fc fc fc fc 00 00 07 fc fc fc fc fc
[   34.346438] >fff00000c5ec1c00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   34.347251]                                                     ^
[   34.347931]  fff00000c5ec1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.348840]  fff00000c5ec1d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.349905] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memchr
[   34.258674] ==================================================================
[   34.259919] BUG: KASAN: slab-out-of-bounds in memchr+0x78/0x88
[   34.260826] Read of size 1 at addr fff00000c5ec56d8 by task kunit_try_catch/244
[   34.262267] 
[   34.262716] CPU: 1 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   34.264140] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.264815] Hardware name: linux,dummy-virt (DT)
[   34.265604] Call trace:
[   34.266018]  show_stack+0x20/0x38 (C)
[   34.266714]  dump_stack_lvl+0x8c/0xd0
[   34.267768]  print_report+0x118/0x5e0
[   34.268493]  kasan_report+0xc8/0x118
[   34.269106]  __asan_report_load1_noabort+0x20/0x30
[   34.270150]  memchr+0x78/0x88
[   34.270709]  kasan_memchr+0x148/0x2d8
[   34.271285]  kunit_try_run_case+0x14c/0x3d0
[   34.272559]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.273252]  kthread+0x24c/0x2d0
[   34.274140]  ret_from_fork+0x10/0x20
[   34.274732] 
[   34.275105] Allocated by task 244:
[   34.276029]  kasan_save_stack+0x3c/0x68
[   34.276666]  kasan_save_track+0x20/0x40
[   34.277245]  kasan_save_alloc_info+0x40/0x58
[   34.278544]  __kasan_kmalloc+0xd4/0xd8
[   34.279123]  __kmalloc_cache_noprof+0x15c/0x3c8
[   34.279945]  kasan_memchr+0xb0/0x2d8
[   34.280630]  kunit_try_run_case+0x14c/0x3d0
[   34.281457]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.282577]  kthread+0x24c/0x2d0
[   34.283197]  ret_from_fork+0x10/0x20
[   34.283673] 
[   34.284013] The buggy address belongs to the object at fff00000c5ec56c0
[   34.284013]  which belongs to the cache kmalloc-32 of size 32
[   34.285192] The buggy address is located 0 bytes to the right of
[   34.285192]  allocated 24-byte region [fff00000c5ec56c0, fff00000c5ec56d8)
[   34.287352] 
[   34.287758] The buggy address belongs to the physical page:
[   34.288319] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ec5
[   34.290025] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.290955] page_type: f5(slab)
[   34.291590] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   34.292378] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   34.293288] page dumped because: kasan: bad access detected
[   34.294756] 
[   34.295097] Memory state around the buggy address:
[   34.295671]  fff00000c5ec5580: 00 00 07 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   34.296861]  fff00000c5ec5600: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   34.297990] >fff00000c5ec5680: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   34.298793]                                                     ^
[   34.299587]  fff00000c5ec5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.300505]  fff00000c5ec5780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.301382] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[   34.216672] ==================================================================
[   34.217789] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2e4/0x348
[   34.218665] Read of size 1 at addr ffff800080bb7bea by task kunit_try_catch/242
[   34.219518] 
[   34.220216] CPU: 0 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   34.221341] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.222280] Hardware name: linux,dummy-virt (DT)
[   34.222905] Call trace:
[   34.223321]  show_stack+0x20/0x38 (C)
[   34.223988]  dump_stack_lvl+0x8c/0xd0
[   34.224679]  print_report+0x2fc/0x5e0
[   34.225207]  kasan_report+0xc8/0x118
[   34.226163]  __asan_report_load1_noabort+0x20/0x30
[   34.226937]  kasan_alloca_oob_right+0x2e4/0x348
[   34.227562]  kunit_try_run_case+0x14c/0x3d0
[   34.228271]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.229103]  kthread+0x24c/0x2d0
[   34.229986]  ret_from_fork+0x10/0x20
[   34.230570] 
[   34.230916] The buggy address belongs to stack of task kunit_try_catch/242
[   34.231746] 
[   34.232089] The buggy address belongs to the virtual mapping at
[   34.232089]  [ffff800080bb0000, ffff800080bb9000) created by:
[   34.232089]  kernel_clone+0x140/0x790
[   34.233747] 
[   34.234126] The buggy address belongs to the physical page:
[   34.235185] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105efa
[   34.236085] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.236984] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   34.238682] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   34.239592] page dumped because: kasan: bad access detected
[   34.240203] 
[   34.241028] Memory state around the buggy address:
[   34.241806]  ffff800080bb7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.242733]  ffff800080bb7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.243595] >ffff800080bb7b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   34.244414]                                                           ^
[   34.245304]  ffff800080bb7c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2
[   34.246477]  ffff800080bb7c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00
[   34.247262] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[   34.173016] ==================================================================
[   34.174717] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   34.175811] Read of size 1 at addr ffff800080b77bdf by task kunit_try_catch/240
[   34.177084] 
[   34.177437] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   34.178760] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.179247] Hardware name: linux,dummy-virt (DT)
[   34.179935] Call trace:
[   34.180357]  show_stack+0x20/0x38 (C)
[   34.180992]  dump_stack_lvl+0x8c/0xd0
[   34.181623]  print_report+0x2fc/0x5e0
[   34.182275]  kasan_report+0xc8/0x118
[   34.183089]  __asan_report_load1_noabort+0x20/0x30
[   34.183783]  kasan_alloca_oob_left+0x2b8/0x310
[   34.184448]  kunit_try_run_case+0x14c/0x3d0
[   34.185195]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.186231]  kthread+0x24c/0x2d0
[   34.186813]  ret_from_fork+0x10/0x20
[   34.187338] 
[   34.187741] The buggy address belongs to stack of task kunit_try_catch/240
[   34.188598] 
[   34.189023] The buggy address belongs to the virtual mapping at
[   34.189023]  [ffff800080b70000, ffff800080b79000) created by:
[   34.189023]  kernel_clone+0x140/0x790
[   34.190958] 
[   34.191339] The buggy address belongs to the physical page:
[   34.191989] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ed0
[   34.193032] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.194302] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   34.195178] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   34.196108] page dumped because: kasan: bad access detected
[   34.196837] 
[   34.197215] Memory state around the buggy address:
[   34.198192]  ffff800080b77a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.198976]  ffff800080b77b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.199924] >ffff800080b77b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   34.200732]                                                     ^
[   34.201788]  ffff800080b77c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2
[   34.202632]  ffff800080b77c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00
[   34.203432] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[   34.122452] ==================================================================
[   34.124056] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x230/0x268
[   34.124847] Read of size 1 at addr ffff800080b27cba by task kunit_try_catch/238
[   34.125592] 
[   34.127416] CPU: 1 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   34.128606] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.129111] Hardware name: linux,dummy-virt (DT)
[   34.130038] Call trace:
[   34.130472]  show_stack+0x20/0x38 (C)
[   34.131008]  dump_stack_lvl+0x8c/0xd0
[   34.131677]  print_report+0x2fc/0x5e0
[   34.132311]  kasan_report+0xc8/0x118
[   34.132827]  __asan_report_load1_noabort+0x20/0x30
[   34.133431]  kasan_stack_oob+0x230/0x268
[   34.134550]  kunit_try_run_case+0x14c/0x3d0
[   34.135348]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.136282]  kthread+0x24c/0x2d0
[   34.136995]  ret_from_fork+0x10/0x20
[   34.137658] 
[   34.138403] The buggy address belongs to stack of task kunit_try_catch/238
[   34.139377]  and is located at offset 138 in frame:
[   34.140163]  kasan_stack_oob+0x0/0x268
[   34.141239] 
[   34.141753] This frame has 4 objects:
[   34.142632]  [48, 49) '__assertion'
[   34.142819]  [64, 72) 'array'
[   34.143346]  [96, 112) '__assertion'
[   34.144218]  [128, 138) 'stack_array'
[   34.144903] 
[   34.145784] The buggy address belongs to the virtual mapping at
[   34.145784]  [ffff800080b20000, ffff800080b29000) created by:
[   34.145784]  kernel_clone+0x140/0x790
[   34.148400] 
[   34.148817] The buggy address belongs to the physical page:
[   34.149633] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f4
[   34.150921] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.152205] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   34.153319] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   34.154875] page dumped because: kasan: bad access detected
[   34.155696] 
[   34.156121] Memory state around the buggy address:
[   34.156912]  ffff800080b27b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.158107]  ffff800080b27c00: 00 00 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2
[   34.159176] >ffff800080b27c80: f2 f2 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00
[   34.159600]                                         ^
[   34.160742]  ffff800080b27d00: 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00
[   34.161551]  ffff800080b27d80: f2 f2 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00
[   34.162351] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   34.071880] ==================================================================
[   34.073171] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   34.074461] Read of size 1 at addr ffffad7794cd906d by task kunit_try_catch/234
[   34.075376] 
[   34.075810] CPU: 0 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   34.077144] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.077648] Hardware name: linux,dummy-virt (DT)
[   34.078311] Call trace:
[   34.078778]  show_stack+0x20/0x38 (C)
[   34.079376]  dump_stack_lvl+0x8c/0xd0
[   34.080313]  print_report+0x2fc/0x5e0
[   34.080888]  kasan_report+0xc8/0x118
[   34.081456]  __asan_report_load1_noabort+0x20/0x30
[   34.082436]  kasan_global_oob_right+0x230/0x270
[   34.083178]  kunit_try_run_case+0x14c/0x3d0
[   34.083807]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.084557]  kthread+0x24c/0x2d0
[   34.085152]  ret_from_fork+0x10/0x20
[   34.086097] 
[   34.086566] The buggy address belongs to the variable:
[   34.087172]  global_array+0xd/0x40
[   34.087810] 
[   34.088358] The buggy address belongs to the virtual mapping at
[   34.088358]  [ffffad7793020000, ffffad7794d91000) created by:
[   34.088358]  paging_init+0x668/0x7c8
[   34.090341] 
[   34.090990] The buggy address belongs to the physical page:
[   34.091760] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x478d9
[   34.092625] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   34.094454] raw: 03fffe0000002000 ffffc1ffc01e3648 ffffc1ffc01e3648 0000000000000000
[   34.095419] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   34.096271] page dumped because: kasan: bad access detected
[   34.097063] 
[   34.097440] Memory state around the buggy address:
[   34.098231]  ffffad7794cd8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.099473]  ffffad7794cd8f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.100096] >ffffad7794cd9000: 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9
[   34.101029]                                                           ^
[   34.101695]  ffffad7794cd9080: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9
[   34.102596]  ffffad7794cd9100: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9
[   34.103478] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[   33.970863] ==================================================================
[   33.972154] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[   33.973014] Free of addr fff00000c659b401 by task kunit_try_catch/230
[   33.973640] 
[   33.974035] CPU: 0 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   33.975822] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.976277] Hardware name: linux,dummy-virt (DT)
[   33.977245] Call trace:
[   33.977969]  show_stack+0x20/0x38 (C)
[   33.978882]  dump_stack_lvl+0x8c/0xd0
[   33.979489]  print_report+0x118/0x5e0
[   33.980011]  kasan_report_invalid_free+0xb0/0xd8
[   33.980755]  check_slab_allocation+0xfc/0x108
[   33.981410]  __kasan_mempool_poison_object+0x78/0x150
[   33.982437]  mempool_free+0x28c/0x328
[   33.982987]  mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[   33.983669]  mempool_kmalloc_invalid_free+0xb8/0x110
[   33.984430]  kunit_try_run_case+0x14c/0x3d0
[   33.985075]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.986130]  kthread+0x24c/0x2d0
[   33.986692]  ret_from_fork+0x10/0x20
[   33.987331] 
[   33.987718] Allocated by task 230:
[   33.988186]  kasan_save_stack+0x3c/0x68
[   33.988854]  kasan_save_track+0x20/0x40
[   33.989405]  kasan_save_alloc_info+0x40/0x58
[   33.990352]  __kasan_mempool_unpoison_object+0x11c/0x180
[   33.991153]  remove_element+0x130/0x1f8
[   33.992566]  mempool_alloc_preallocated+0x58/0xc0
[   33.993292]  mempool_kmalloc_invalid_free_helper+0x94/0x2a0
[   33.994009]  mempool_kmalloc_invalid_free+0xb8/0x110
[   33.994695]  kunit_try_run_case+0x14c/0x3d0
[   33.995249]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.996028]  kthread+0x24c/0x2d0
[   33.996481]  ret_from_fork+0x10/0x20
[   33.997116] 
[   33.997478] The buggy address belongs to the object at fff00000c659b400
[   33.997478]  which belongs to the cache kmalloc-128 of size 128
[   33.998713] The buggy address is located 1 bytes inside of
[   33.998713]  128-byte region [fff00000c659b400, fff00000c659b480)
[   34.000014] 
[   34.000394] The buggy address belongs to the physical page:
[   34.001127] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10659b
[   34.002038] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.002765] page_type: f5(slab)
[   34.003323] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.004225] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   34.005037] page dumped because: kasan: bad access detected
[   34.005783] 
[   34.006150] Memory state around the buggy address:
[   34.006849]  fff00000c659b300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.007660]  fff00000c659b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.008622] >fff00000c659b400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.009505]                    ^
[   34.010000]  fff00000c659b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.010902]  fff00000c659b500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.011721] ==================================================================
[   34.025011] ==================================================================
[   34.026102] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[   34.027292] Free of addr fff00000c663c001 by task kunit_try_catch/232
[   34.028129] 
[   34.028497] CPU: 1 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   34.031014] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.033462] Hardware name: linux,dummy-virt (DT)
[   34.034073] Call trace:
[   34.034454]  show_stack+0x20/0x38 (C)
[   34.034979]  dump_stack_lvl+0x8c/0xd0
[   34.035473]  print_report+0x118/0x5e0
[   34.036671]  kasan_report_invalid_free+0xb0/0xd8
[   34.037394]  __kasan_mempool_poison_object+0xfc/0x150
[   34.038583]  mempool_free+0x28c/0x328
[   34.039108]  mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[   34.039939]  mempool_kmalloc_large_invalid_free+0xb8/0x110
[   34.040706]  kunit_try_run_case+0x14c/0x3d0
[   34.041327]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.042929]  kthread+0x24c/0x2d0
[   34.043402]  ret_from_fork+0x10/0x20
[   34.044047] 
[   34.044436] The buggy address belongs to the physical page:
[   34.045138] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10663c
[   34.046461] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.047347] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   34.048221] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.049066] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   34.050793] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.051687] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   34.052577] head: 0bfffe0000000002 ffffc1ffc3198f01 ffffffffffffffff 0000000000000000
[   34.053435] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   34.054742] page dumped because: kasan: bad access detected
[   34.055315] 
[   34.055702] Memory state around the buggy address:
[   34.056377]  fff00000c663bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.057310]  fff00000c663bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.059057] >fff00000c663c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.059816]                    ^
[   34.060368]  fff00000c663c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.061183]  fff00000c663c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.062491] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[   33.814687] ==================================================================
[   33.816123] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   33.816861] Free of addr fff00000c5e7bc00 by task kunit_try_catch/224
[   33.817566] 
[   33.817970] CPU: 1 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   33.820113] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.820759] Hardware name: linux,dummy-virt (DT)
[   33.821356] Call trace:
[   33.822061]  show_stack+0x20/0x38 (C)
[   33.822663]  dump_stack_lvl+0x8c/0xd0
[   33.823248]  print_report+0x118/0x5e0
[   33.824374]  kasan_report_invalid_free+0xb0/0xd8
[   33.825117]  check_slab_allocation+0xd4/0x108
[   33.826149]  __kasan_mempool_poison_object+0x78/0x150
[   33.826831]  mempool_free+0x28c/0x328
[   33.827323]  mempool_double_free_helper+0x150/0x2e0
[   33.828081]  mempool_kmalloc_double_free+0xb8/0x110
[   33.828811]  kunit_try_run_case+0x14c/0x3d0
[   33.829513]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.830372]  kthread+0x24c/0x2d0
[   33.831422]  ret_from_fork+0x10/0x20
[   33.832357] 
[   33.832755] Allocated by task 224:
[   33.833301]  kasan_save_stack+0x3c/0x68
[   33.833895]  kasan_save_track+0x20/0x40
[   33.834509]  kasan_save_alloc_info+0x40/0x58
[   33.835622]  __kasan_mempool_unpoison_object+0x11c/0x180
[   33.836223]  remove_element+0x130/0x1f8
[   33.836864]  mempool_alloc_preallocated+0x58/0xc0
[   33.837490]  mempool_double_free_helper+0x94/0x2e0
[   33.838081]  mempool_kmalloc_double_free+0xb8/0x110
[   33.838987]  kunit_try_run_case+0x14c/0x3d0
[   33.840393]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.841107]  kthread+0x24c/0x2d0
[   33.841594]  ret_from_fork+0x10/0x20
[   33.842609] 
[   33.842956] Freed by task 224:
[   33.843427]  kasan_save_stack+0x3c/0x68
[   33.843953]  kasan_save_track+0x20/0x40
[   33.844487]  kasan_save_free_info+0x4c/0x78
[   33.845211]  __kasan_mempool_poison_object+0xc0/0x150
[   33.846268]  mempool_free+0x28c/0x328
[   33.847411]  mempool_double_free_helper+0x100/0x2e0
[   33.848616]  mempool_kmalloc_double_free+0xb8/0x110
[   33.849290]  kunit_try_run_case+0x14c/0x3d0
[   33.850112]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.851205]  kthread+0x24c/0x2d0
[   33.851795]  ret_from_fork+0x10/0x20
[   33.852386] 
[   33.852780] The buggy address belongs to the object at fff00000c5e7bc00
[   33.852780]  which belongs to the cache kmalloc-128 of size 128
[   33.854318] The buggy address is located 0 bytes inside of
[   33.854318]  128-byte region [fff00000c5e7bc00, fff00000c5e7bc80)
[   33.856403] 
[   33.856814] The buggy address belongs to the physical page:
[   33.857496] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e7b
[   33.858818] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.859737] page_type: f5(slab)
[   33.860321] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.861452] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   33.862610] page dumped because: kasan: bad access detected
[   33.863367] 
[   33.863718] Memory state around the buggy address:
[   33.864403]  fff00000c5e7bb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.865348]  fff00000c5e7bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.866024] >fff00000c5e7bc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.867356]                    ^
[   33.867764]  fff00000c5e7bc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.868850]  fff00000c5e7bd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.870001] ==================================================================
[   33.882966] ==================================================================
[   33.884217] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   33.885068] Free of addr fff00000c6630000 by task kunit_try_catch/226
[   33.885991] 
[   33.887430] CPU: 0 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   33.888478] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.889084] Hardware name: linux,dummy-virt (DT)
[   33.889862] Call trace:
[   33.890246]  show_stack+0x20/0x38 (C)
[   33.890896]  dump_stack_lvl+0x8c/0xd0
[   33.891715]  print_report+0x118/0x5e0
[   33.892307]  kasan_report_invalid_free+0xb0/0xd8
[   33.892978]  __kasan_mempool_poison_object+0x14c/0x150
[   33.893911]  mempool_free+0x28c/0x328
[   33.894446]  mempool_double_free_helper+0x150/0x2e0
[   33.895139]  mempool_kmalloc_large_double_free+0xb8/0x110
[   33.895859]  kunit_try_run_case+0x14c/0x3d0
[   33.896580]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.897277]  kthread+0x24c/0x2d0
[   33.898268]  ret_from_fork+0x10/0x20
[   33.898866] 
[   33.899229] The buggy address belongs to the physical page:
[   33.899849] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106630
[   33.900829] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.901701] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.903051] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.904635] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.905612] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.906832] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.907760] head: 0bfffe0000000002 ffffc1ffc3198c01 ffffffffffffffff 0000000000000000
[   33.908700] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   33.909503] page dumped because: kasan: bad access detected
[   33.910368] 
[   33.910757] Memory state around the buggy address:
[   33.911285]  fff00000c662ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.912502]  fff00000c662ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.913373] >fff00000c6630000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.914447]                    ^
[   33.914939]  fff00000c6630080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.915855]  fff00000c6630100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.916728] ==================================================================
[   33.929269] ==================================================================
[   33.930953] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   33.931989] Free of addr fff00000c6630000 by task kunit_try_catch/228
[   33.932969] 
[   33.933411] CPU: 0 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   33.934781] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.935620] Hardware name: linux,dummy-virt (DT)
[   33.936328] Call trace:
[   33.936853]  show_stack+0x20/0x38 (C)
[   33.937508]  dump_stack_lvl+0x8c/0xd0
[   33.938376]  print_report+0x118/0x5e0
[   33.938979]  kasan_report_invalid_free+0xb0/0xd8
[   33.939654]  __kasan_mempool_poison_pages+0xe0/0xe8
[   33.940327]  mempool_free+0x24c/0x328
[   33.940953]  mempool_double_free_helper+0x150/0x2e0
[   33.941581]  mempool_page_alloc_double_free+0xb4/0x110
[   33.942743]  kunit_try_run_case+0x14c/0x3d0
[   33.943305]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.944097]  kthread+0x24c/0x2d0
[   33.944721]  ret_from_fork+0x10/0x20
[   33.945299] 
[   33.945651] The buggy address belongs to the physical page:
[   33.946654] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106630
[   33.947461] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.948402] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.949254] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.950712] page dumped because: kasan: bad access detected
[   33.951916] 
[   33.952313] Memory state around the buggy address:
[   33.953130]  fff00000c662ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.954546]  fff00000c662ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.955410] >fff00000c6630000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.956263]                    ^
[   33.956761]  fff00000c6630080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.957911]  fff00000c6630100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.958887] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[   33.654899] ==================================================================
[   33.656880] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   33.658092] Read of size 1 at addr fff00000c6588000 by task kunit_try_catch/218
[   33.658998] 
[   33.659443] CPU: 1 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   33.660549] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.661220] Hardware name: linux,dummy-virt (DT)
[   33.661919] Call trace:
[   33.662614]  show_stack+0x20/0x38 (C)
[   33.663371]  dump_stack_lvl+0x8c/0xd0
[   33.664162]  print_report+0x118/0x5e0
[   33.664991]  kasan_report+0xc8/0x118
[   33.665870]  __asan_report_load1_noabort+0x20/0x30
[   33.666246]  mempool_uaf_helper+0x314/0x340
[   33.666553]  mempool_kmalloc_large_uaf+0xbc/0x118
[   33.666856]  kunit_try_run_case+0x14c/0x3d0
[   33.667142]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.667463]  kthread+0x24c/0x2d0
[   33.668622]  ret_from_fork+0x10/0x20
[   33.669362] 
[   33.670065] The buggy address belongs to the physical page:
[   33.671092] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106588
[   33.672215] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.673324] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.674617] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.675597] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.676579] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.677419] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.678179] head: 0bfffe0000000002 ffffc1ffc3196201 ffffffffffffffff 0000000000000000
[   33.679172] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   33.680643] page dumped because: kasan: bad access detected
[   33.681261] 
[   33.681593] Memory state around the buggy address:
[   33.682277]  fff00000c6587f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.683068]  fff00000c6587f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.684236] >fff00000c6588000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.685009]                    ^
[   33.685568]  fff00000c6588080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.686700]  fff00000c6588100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.687475] ==================================================================
[   33.774867] ==================================================================
[   33.776150] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   33.776770] Read of size 1 at addr fff00000c662c000 by task kunit_try_catch/222
[   33.777704] 
[   33.778040] CPU: 0 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   33.779239] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.779864] Hardware name: linux,dummy-virt (DT)
[   33.780486] Call trace:
[   33.780959]  show_stack+0x20/0x38 (C)
[   33.781616]  dump_stack_lvl+0x8c/0xd0
[   33.782117]  print_report+0x118/0x5e0
[   33.782772]  kasan_report+0xc8/0x118
[   33.783388]  __asan_report_load1_noabort+0x20/0x30
[   33.784015]  mempool_uaf_helper+0x314/0x340
[   33.784693]  mempool_page_alloc_uaf+0xb8/0x118
[   33.785394]  kunit_try_run_case+0x14c/0x3d0
[   33.786019]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.786730]  kthread+0x24c/0x2d0
[   33.787327]  ret_from_fork+0x10/0x20
[   33.787976] 
[   33.788359] The buggy address belongs to the physical page:
[   33.789048] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662c
[   33.789952] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.790773] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.791752] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.792653] page dumped because: kasan: bad access detected
[   33.793263] 
[   33.793649] Memory state around the buggy address:
[   33.794285]  fff00000c662bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.795092]  fff00000c662bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.795971] >fff00000c662c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.796764]                    ^
[   33.797308]  fff00000c662c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.798077]  fff00000c662c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.798889] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[   33.594707] ==================================================================
[   33.595828] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   33.596741] Read of size 1 at addr fff00000c5e7b400 by task kunit_try_catch/216
[   33.597375] 
[   33.598125] CPU: 1 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   33.599709] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.600431] Hardware name: linux,dummy-virt (DT)
[   33.601148] Call trace:
[   33.601868]  show_stack+0x20/0x38 (C)
[   33.602295]  dump_stack_lvl+0x8c/0xd0
[   33.602974]  print_report+0x118/0x5e0
[   33.603515]  kasan_report+0xc8/0x118
[   33.604173]  __asan_report_load1_noabort+0x20/0x30
[   33.604841]  mempool_uaf_helper+0x314/0x340
[   33.605572]  mempool_kmalloc_uaf+0xbc/0x118
[   33.606484]  kunit_try_run_case+0x14c/0x3d0
[   33.607079]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.607912]  kthread+0x24c/0x2d0
[   33.608418]  ret_from_fork+0x10/0x20
[   33.609135] 
[   33.609511] Allocated by task 216:
[   33.610466]  kasan_save_stack+0x3c/0x68
[   33.611241]  kasan_save_track+0x20/0x40
[   33.611832]  kasan_save_alloc_info+0x40/0x58
[   33.612498]  __kasan_mempool_unpoison_object+0x11c/0x180
[   33.613084]  remove_element+0x130/0x1f8
[   33.613770]  mempool_alloc_preallocated+0x58/0xc0
[   33.614696]  mempool_uaf_helper+0xa4/0x340
[   33.615681]  mempool_kmalloc_uaf+0xbc/0x118
[   33.616652]  kunit_try_run_case+0x14c/0x3d0
[   33.617252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.618381]  kthread+0x24c/0x2d0
[   33.618978]  ret_from_fork+0x10/0x20
[   33.619502] 
[   33.620315] Freed by task 216:
[   33.620863]  kasan_save_stack+0x3c/0x68
[   33.621397]  kasan_save_track+0x20/0x40
[   33.622317]  kasan_save_free_info+0x4c/0x78
[   33.622728]  __kasan_mempool_poison_object+0xc0/0x150
[   33.623031]  mempool_free+0x28c/0x328
[   33.623272]  mempool_uaf_helper+0x104/0x340
[   33.623556]  mempool_kmalloc_uaf+0xbc/0x118
[   33.624070]  kunit_try_run_case+0x14c/0x3d0
[   33.624772]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.625514]  kthread+0x24c/0x2d0
[   33.626429]  ret_from_fork+0x10/0x20
[   33.627035] 
[   33.627471] The buggy address belongs to the object at fff00000c5e7b400
[   33.627471]  which belongs to the cache kmalloc-128 of size 128
[   33.628712] The buggy address is located 0 bytes inside of
[   33.628712]  freed 128-byte region [fff00000c5e7b400, fff00000c5e7b480)
[   33.630589] 
[   33.631041] The buggy address belongs to the physical page:
[   33.631954] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e7b
[   33.632990] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.634421] page_type: f5(slab)
[   33.635278] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.636474] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   33.637509] page dumped because: kasan: bad access detected
[   33.638463] 
[   33.638883] Memory state around the buggy address:
[   33.639515]  fff00000c5e7b300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.640424]  fff00000c5e7b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.641317] >fff00000c5e7b400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.642399]                    ^
[   33.643170]  fff00000c5e7b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.644036]  fff00000c5e7b500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.644947] ==================================================================
[   33.701307] ==================================================================
[   33.702466] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   33.703407] Read of size 1 at addr fff00000c65a0240 by task kunit_try_catch/220
[   33.705726] 
[   33.706463] CPU: 0 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   33.707662] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.708138] Hardware name: linux,dummy-virt (DT)
[   33.709037] Call trace:
[   33.709640]  show_stack+0x20/0x38 (C)
[   33.710221]  dump_stack_lvl+0x8c/0xd0
[   33.710818]  print_report+0x118/0x5e0
[   33.711735]  kasan_report+0xc8/0x118
[   33.712363]  __asan_report_load1_noabort+0x20/0x30
[   33.713762]  mempool_uaf_helper+0x314/0x340
[   33.714670]  mempool_slab_uaf+0xb8/0x110
[   33.715399]  kunit_try_run_case+0x14c/0x3d0
[   33.716094]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.716843]  kthread+0x24c/0x2d0
[   33.717434]  ret_from_fork+0x10/0x20
[   33.718158] 
[   33.718908] Allocated by task 220:
[   33.719365]  kasan_save_stack+0x3c/0x68
[   33.720009]  kasan_save_track+0x20/0x40
[   33.720695]  kasan_save_alloc_info+0x40/0x58
[   33.721258]  __kasan_mempool_unpoison_object+0xbc/0x180
[   33.722060]  remove_element+0x16c/0x1f8
[   33.722682]  mempool_alloc_preallocated+0x58/0xc0
[   33.723641]  mempool_uaf_helper+0xa4/0x340
[   33.724246]  mempool_slab_uaf+0xb8/0x110
[   33.724908]  kunit_try_run_case+0x14c/0x3d0
[   33.726647]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.727430]  kthread+0x24c/0x2d0
[   33.728026]  ret_from_fork+0x10/0x20
[   33.728666] 
[   33.729055] Freed by task 220:
[   33.729606]  kasan_save_stack+0x3c/0x68
[   33.730190]  kasan_save_track+0x20/0x40
[   33.730783]  kasan_save_free_info+0x4c/0x78
[   33.731442]  __kasan_mempool_poison_object+0xc0/0x150
[   33.732190]  mempool_free+0x28c/0x328
[   33.733162]  mempool_uaf_helper+0x104/0x340
[   33.734663]  mempool_slab_uaf+0xb8/0x110
[   33.735220]  kunit_try_run_case+0x14c/0x3d0
[   33.735902]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.736620]  kthread+0x24c/0x2d0
[   33.737106]  ret_from_fork+0x10/0x20
[   33.738089] 
[   33.738466] The buggy address belongs to the object at fff00000c65a0240
[   33.738466]  which belongs to the cache test_cache of size 123
[   33.739812] The buggy address is located 0 bytes inside of
[   33.739812]  freed 123-byte region [fff00000c65a0240, fff00000c65a02bb)
[   33.740950] 
[   33.741327] The buggy address belongs to the physical page:
[   33.743110] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065a0
[   33.744047] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.744796] page_type: f5(slab)
[   33.745355] raw: 0bfffe0000000000 fff00000c659c000 dead000000000122 0000000000000000
[   33.746736] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000
[   33.747576] page dumped because: kasan: bad access detected
[   33.748234] 
[   33.748630] Memory state around the buggy address:
[   33.749279]  fff00000c65a0100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.751078]  fff00000c65a0180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.751885] >fff00000c65a0200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   33.752681]                                            ^
[   33.753414]  fff00000c65a0280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.754713]  fff00000c65a0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.755522] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[   33.480956] ==================================================================
[   33.482496] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   33.483298] Read of size 1 at addr fff00000c662e001 by task kunit_try_catch/212
[   33.484336] 
[   33.484855] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   33.486971] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.487633] Hardware name: linux,dummy-virt (DT)
[   33.488194] Call trace:
[   33.488684]  show_stack+0x20/0x38 (C)
[   33.489290]  dump_stack_lvl+0x8c/0xd0
[   33.489862]  print_report+0x118/0x5e0
[   33.490512]  kasan_report+0xc8/0x118
[   33.491163]  __asan_report_load1_noabort+0x20/0x30
[   33.492428]  mempool_oob_right_helper+0x2ac/0x2f0
[   33.493010]  mempool_kmalloc_large_oob_right+0xbc/0x118
[   33.493854]  kunit_try_run_case+0x14c/0x3d0
[   33.495003]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.495731]  kthread+0x24c/0x2d0
[   33.496300]  ret_from_fork+0x10/0x20
[   33.496898] 
[   33.497273] The buggy address belongs to the physical page:
[   33.498922] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662c
[   33.499793] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.500728] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.502095] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.503029] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.503844] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.504771] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.506564] head: 0bfffe0000000002 ffffc1ffc3198b01 ffffffffffffffff 0000000000000000
[   33.507396] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   33.508245] page dumped because: kasan: bad access detected
[   33.508866] 
[   33.509236] Memory state around the buggy address:
[   33.510377]  fff00000c662df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.511161]  fff00000c662df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.512045] >fff00000c662e000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   33.512819]                    ^
[   33.513367]  fff00000c662e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   33.515111]  fff00000c662e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   33.515900] ==================================================================
[   33.528781] ==================================================================
[   33.530150] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   33.531232] Read of size 1 at addr fff00000c65992bb by task kunit_try_catch/214
[   33.532038] 
[   33.532446] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   33.533519] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.534958] Hardware name: linux,dummy-virt (DT)
[   33.535921] Call trace:
[   33.536365]  show_stack+0x20/0x38 (C)
[   33.536931]  dump_stack_lvl+0x8c/0xd0
[   33.537607]  print_report+0x118/0x5e0
[   33.538263]  kasan_report+0xc8/0x118
[   33.538894]  __asan_report_load1_noabort+0x20/0x30
[   33.539505]  mempool_oob_right_helper+0x2ac/0x2f0
[   33.540360]  mempool_slab_oob_right+0xb8/0x110
[   33.541083]  kunit_try_run_case+0x14c/0x3d0
[   33.541780]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.542418]  kthread+0x24c/0x2d0
[   33.543041]  ret_from_fork+0x10/0x20
[   33.544656] 
[   33.544931] Allocated by task 214:
[   33.545404]  kasan_save_stack+0x3c/0x68
[   33.545972]  kasan_save_track+0x20/0x40
[   33.546996]  kasan_save_alloc_info+0x40/0x58
[   33.547622]  __kasan_mempool_unpoison_object+0xbc/0x180
[   33.548300]  remove_element+0x16c/0x1f8
[   33.548953]  mempool_alloc_preallocated+0x58/0xc0
[   33.550640]  mempool_oob_right_helper+0x98/0x2f0
[   33.551189]  mempool_slab_oob_right+0xb8/0x110
[   33.552055]  kunit_try_run_case+0x14c/0x3d0
[   33.552931]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.553976]  kthread+0x24c/0x2d0
[   33.554559]  ret_from_fork+0x10/0x20
[   33.555176] 
[   33.555516] The buggy address belongs to the object at fff00000c6599240
[   33.555516]  which belongs to the cache test_cache of size 123
[   33.557034] The buggy address is located 0 bytes to the right of
[   33.557034]  allocated 123-byte region [fff00000c6599240, fff00000c65992bb)
[   33.558833] 
[   33.559244] The buggy address belongs to the physical page:
[   33.559969] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106599
[   33.560878] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.562086] page_type: f5(slab)
[   33.562728] raw: 0bfffe0000000000 fff00000c46cadc0 dead000000000122 0000000000000000
[   33.563649] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000
[   33.564729] page dumped because: kasan: bad access detected
[   33.565388] 
[   33.566289] Memory state around the buggy address:
[   33.566922]  fff00000c6599180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.567599]  fff00000c6599200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   33.568554] >fff00000c6599280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   33.569377]                                         ^
[   33.570074]  fff00000c6599300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.571028]  fff00000c6599380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.572370] ==================================================================
[   33.428291] ==================================================================
[   33.429544] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   33.430803] Read of size 1 at addr fff00000c5e99d73 by task kunit_try_catch/210
[   33.431191] 
[   33.431375] CPU: 1 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   33.432343] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.432839] Hardware name: linux,dummy-virt (DT)
[   33.433516] Call trace:
[   33.433892]  show_stack+0x20/0x38 (C)
[   33.435259]  dump_stack_lvl+0x8c/0xd0
[   33.435810]  print_report+0x118/0x5e0
[   33.436421]  kasan_report+0xc8/0x118
[   33.437039]  __asan_report_load1_noabort+0x20/0x30
[   33.437774]  mempool_oob_right_helper+0x2ac/0x2f0
[   33.439020]  mempool_kmalloc_oob_right+0xbc/0x118
[   33.439778]  kunit_try_run_case+0x14c/0x3d0
[   33.440415]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.441078]  kthread+0x24c/0x2d0
[   33.442019]  ret_from_fork+0x10/0x20
[   33.442604] 
[   33.442971] Allocated by task 210:
[   33.443555]  kasan_save_stack+0x3c/0x68
[   33.444077]  kasan_save_track+0x20/0x40
[   33.444727]  kasan_save_alloc_info+0x40/0x58
[   33.445301]  __kasan_mempool_unpoison_object+0x11c/0x180
[   33.446359]  remove_element+0x130/0x1f8
[   33.447030]  mempool_alloc_preallocated+0x58/0xc0
[   33.447694]  mempool_oob_right_helper+0x98/0x2f0
[   33.448263]  mempool_kmalloc_oob_right+0xbc/0x118
[   33.449031]  kunit_try_run_case+0x14c/0x3d0
[   33.449794]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.451156]  kthread+0x24c/0x2d0
[   33.451870]  ret_from_fork+0x10/0x20
[   33.452458] 
[   33.453032] The buggy address belongs to the object at fff00000c5e99d00
[   33.453032]  which belongs to the cache kmalloc-128 of size 128
[   33.454221] The buggy address is located 0 bytes to the right of
[   33.454221]  allocated 115-byte region [fff00000c5e99d00, fff00000c5e99d73)
[   33.455494] 
[   33.455891] The buggy address belongs to the physical page:
[   33.456479] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e99
[   33.457477] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.458226] page_type: f5(slab)
[   33.458805] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.459845] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   33.460665] page dumped because: kasan: bad access detected
[   33.461409] 
[   33.461773] Memory state around the buggy address:
[   33.462379]  fff00000c5e99c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.463219]  fff00000c5e99c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.464071] >fff00000c5e99d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   33.464912]                                                              ^
[   33.465691]  fff00000c5e99d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.466450]  fff00000c5e99e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   33.467279] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[   32.798381] ==================================================================
[   32.799513] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x17c/0x2f8
[   32.800466] Read of size 1 at addr fff00000c5d7eb40 by task kunit_try_catch/204
[   32.801416] 
[   32.802369] CPU: 1 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   32.803694] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.804368] Hardware name: linux,dummy-virt (DT)
[   32.804926] Call trace:
[   32.805387]  show_stack+0x20/0x38 (C)
[   32.806483]  dump_stack_lvl+0x8c/0xd0
[   32.807060]  print_report+0x118/0x5e0
[   32.807666]  kasan_report+0xc8/0x118
[   32.808271]  __kasan_check_byte+0x54/0x70
[   32.808913]  kmem_cache_destroy+0x34/0x218
[   32.809505]  kmem_cache_double_destroy+0x17c/0x2f8
[   32.810312]  kunit_try_run_case+0x14c/0x3d0
[   32.810934]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.812091]  kthread+0x24c/0x2d0
[   32.812863]  ret_from_fork+0x10/0x20
[   32.813472] 
[   32.814251] Allocated by task 204:
[   32.814770]  kasan_save_stack+0x3c/0x68
[   32.815351]  kasan_save_track+0x20/0x40
[   32.815964]  kasan_save_alloc_info+0x40/0x58
[   32.816548]  __kasan_slab_alloc+0xa8/0xb0
[   32.817187]  kmem_cache_alloc_noprof+0x108/0x3a0
[   32.818264]  __kmem_cache_create_args+0x18c/0x2b0
[   32.819013]  kmem_cache_double_destroy+0xc8/0x2f8
[   32.819683]  kunit_try_run_case+0x14c/0x3d0
[   32.820248]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.820978]  kthread+0x24c/0x2d0
[   32.821547]  ret_from_fork+0x10/0x20
[   32.822168] 
[   32.822467] Freed by task 204:
[   32.823422]  kasan_save_stack+0x3c/0x68
[   32.824034]  kasan_save_track+0x20/0x40
[   32.824683]  kasan_save_free_info+0x4c/0x78
[   32.825202]  __kasan_slab_free+0x6c/0x98
[   32.826287]  kmem_cache_free+0x118/0x470
[   32.826839]  slab_kmem_cache_release+0x38/0x50
[   32.827464]  kmem_cache_release+0x1c/0x30
[   32.828099]  kobject_put+0x17c/0x430
[   32.828734]  sysfs_slab_release+0x1c/0x30
[   32.829288]  kmem_cache_destroy+0x118/0x218
[   32.830408]  kmem_cache_double_destroy+0x130/0x2f8
[   32.831065]  kunit_try_run_case+0x14c/0x3d0
[   32.831606]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.832384]  kthread+0x24c/0x2d0
[   32.832964]  ret_from_fork+0x10/0x20
[   32.833505] 
[   32.834321] The buggy address belongs to the object at fff00000c5d7eb40
[   32.834321]  which belongs to the cache kmem_cache of size 208
[   32.835566] The buggy address is located 0 bytes inside of
[   32.835566]  freed 208-byte region [fff00000c5d7eb40, fff00000c5d7ec10)
[   32.836700] 
[   32.837070] The buggy address belongs to the physical page:
[   32.838314] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d7e
[   32.839383] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.840139] page_type: f5(slab)
[   32.840746] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000
[   32.842073] raw: 0000000000000000 00000000800c000c 00000001f5000000 0000000000000000
[   32.843092] page dumped because: kasan: bad access detected
[   32.843566] 
[   32.843923] Memory state around the buggy address:
[   32.844642]  fff00000c5d7ea00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.845422]  fff00000c5d7ea80: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   32.846694] >fff00000c5d7eb00: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   32.847562]                                            ^
[   32.848303]  fff00000c5d7eb80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.849128]  fff00000c5d7ec00: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.850379] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[   32.670794] ==================================================================
[   32.671970] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x390/0x468
[   32.672632] Read of size 1 at addr fff00000c5ec1000 by task kunit_try_catch/202
[   32.673547] 
[   32.674750] CPU: 1 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   32.676227] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.676928] Hardware name: linux,dummy-virt (DT)
[   32.677681] Call trace:
[   32.678117]  show_stack+0x20/0x38 (C)
[   32.679039]  dump_stack_lvl+0x8c/0xd0
[   32.679611]  print_report+0x118/0x5e0
[   32.680190]  kasan_report+0xc8/0x118
[   32.680804]  __asan_report_load1_noabort+0x20/0x30
[   32.681436]  kmem_cache_rcu_uaf+0x390/0x468
[   32.682576]  kunit_try_run_case+0x14c/0x3d0
[   32.683184]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.683851]  kthread+0x24c/0x2d0
[   32.684461]  ret_from_fork+0x10/0x20
[   32.685004] 
[   32.685362] Allocated by task 202:
[   32.686304]  kasan_save_stack+0x3c/0x68
[   32.687165]  kasan_save_track+0x20/0x40
[   32.687674]  kasan_save_alloc_info+0x40/0x58
[   32.688355]  __kasan_slab_alloc+0xa8/0xb0
[   32.689012]  kmem_cache_alloc_noprof+0x108/0x3a0
[   32.689866]  kmem_cache_rcu_uaf+0x12c/0x468
[   32.690736]  kunit_try_run_case+0x14c/0x3d0
[   32.691877]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.692732]  kthread+0x24c/0x2d0
[   32.693079]  ret_from_fork+0x10/0x20
[   32.693877] 
[   32.694573] Freed by task 0:
[   32.695008]  kasan_save_stack+0x3c/0x68
[   32.695506]  kasan_save_track+0x20/0x40
[   32.696149]  kasan_save_free_info+0x4c/0x78
[   32.696809]  __kasan_slab_free+0x6c/0x98
[   32.697442]  slab_free_after_rcu_debug+0xd4/0x2f8
[   32.698878]  rcu_core+0xa54/0x1df8
[   32.699449]  rcu_core_si+0x18/0x30
[   32.699963]  handle_softirqs+0x374/0xb20
[   32.700667]  __do_softirq+0x1c/0x28
[   32.701646] 
[   32.702249] Last potentially related work creation:
[   32.703295]  kasan_save_stack+0x3c/0x68
[   32.703912]  __kasan_record_aux_stack+0xbc/0xe8
[   32.704504]  kasan_record_aux_stack_noalloc+0x14/0x20
[   32.705266]  kmem_cache_free+0x28c/0x470
[   32.706469]  kmem_cache_rcu_uaf+0x16c/0x468
[   32.707058]  kunit_try_run_case+0x14c/0x3d0
[   32.707838]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.708718]  kthread+0x24c/0x2d0
[   32.709340]  ret_from_fork+0x10/0x20
[   32.710214] 
[   32.710685] The buggy address belongs to the object at fff00000c5ec1000
[   32.710685]  which belongs to the cache test_cache of size 200
[   32.711957] The buggy address is located 0 bytes inside of
[   32.711957]  freed 200-byte region [fff00000c5ec1000, fff00000c5ec10c8)
[   32.713116] 
[   32.713547] The buggy address belongs to the physical page:
[   32.714660] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ec1
[   32.716433] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.717277] page_type: f5(slab)
[   32.718371] raw: 0bfffe0000000000 fff00000c5d7ea00 dead000000000122 0000000000000000
[   32.719191] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000
[   32.720036] page dumped because: kasan: bad access detected
[   32.720666] 
[   32.721030] Memory state around the buggy address:
[   32.721726]  fff00000c5ec0f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.723407]  fff00000c5ec0f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.724288] >fff00000c5ec1000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.725358]                    ^
[   32.726135]  fff00000c5ec1080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   32.727255]  fff00000c5ec1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.728168] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   32.538881] ==================================================================
[   32.540119] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3b8
[   32.540838] Free of addr fff00000c5e65001 by task kunit_try_catch/200
[   32.541662] 
[   32.542427] CPU: 1 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   32.543682] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.544149] Hardware name: linux,dummy-virt (DT)
[   32.544921] Call trace:
[   32.545395]  show_stack+0x20/0x38 (C)
[   32.546873]  dump_stack_lvl+0x8c/0xd0
[   32.547516]  print_report+0x118/0x5e0
[   32.548163]  kasan_report_invalid_free+0xb0/0xd8
[   32.549274]  check_slab_allocation+0xfc/0x108
[   32.550330]  __kasan_slab_pre_free+0x2c/0x48
[   32.551089]  kmem_cache_free+0xf0/0x470
[   32.551487]  kmem_cache_invalid_free+0x184/0x3b8
[   32.552371]  kunit_try_run_case+0x14c/0x3d0
[   32.553029]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.553856]  kthread+0x24c/0x2d0
[   32.554432]  ret_from_fork+0x10/0x20
[   32.555168] 
[   32.555520] Allocated by task 200:
[   32.556270]  kasan_save_stack+0x3c/0x68
[   32.556905]  kasan_save_track+0x20/0x40
[   32.557574]  kasan_save_alloc_info+0x40/0x58
[   32.558294]  __kasan_slab_alloc+0xa8/0xb0
[   32.559595]  kmem_cache_alloc_noprof+0x108/0x3a0
[   32.560323]  kmem_cache_invalid_free+0x12c/0x3b8
[   32.561029]  kunit_try_run_case+0x14c/0x3d0
[   32.561785]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.562454]  kthread+0x24c/0x2d0
[   32.563092]  ret_from_fork+0x10/0x20
[   32.563774] 
[   32.564139] The buggy address belongs to the object at fff00000c5e65000
[   32.564139]  which belongs to the cache test_cache of size 200
[   32.565545] The buggy address is located 1 bytes inside of
[   32.565545]  200-byte region [fff00000c5e65000, fff00000c5e650c8)
[   32.566689] 
[   32.567079] The buggy address belongs to the physical page:
[   32.568134] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e65
[   32.569182] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.570342] page_type: f5(slab)
[   32.570907] raw: 0bfffe0000000000 fff00000c5d7e8c0 dead000000000122 0000000000000000
[   32.571799] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000
[   32.572747] page dumped because: kasan: bad access detected
[   32.573430] 
[   32.574126] Memory state around the buggy address:
[   32.574790]  fff00000c5e64f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.575681]  fff00000c5e64f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.576593] >fff00000c5e65000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.577381]                    ^
[   32.578283]  fff00000c5e65080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   32.579765]  fff00000c5e65100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.580576] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   32.467834] ==================================================================
[   32.468949] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   32.469946] Free of addr fff00000c5ea3000 by task kunit_try_catch/198
[   32.470695] 
[   32.471097] CPU: 1 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   32.472658] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.473204] Hardware name: linux,dummy-virt (DT)
[   32.473827] Call trace:
[   32.474233]  show_stack+0x20/0x38 (C)
[   32.475030]  dump_stack_lvl+0x8c/0xd0
[   32.475673]  print_report+0x118/0x5e0
[   32.476287]  kasan_report_invalid_free+0xb0/0xd8
[   32.477149]  check_slab_allocation+0xd4/0x108
[   32.477935]  __kasan_slab_pre_free+0x2c/0x48
[   32.478605]  kmem_cache_free+0xf0/0x470
[   32.479321]  kmem_cache_double_free+0x190/0x3c8
[   32.479957]  kunit_try_run_case+0x14c/0x3d0
[   32.480713]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.481441]  kthread+0x24c/0x2d0
[   32.481991]  ret_from_fork+0x10/0x20
[   32.482587] 
[   32.482961] Allocated by task 198:
[   32.483601]  kasan_save_stack+0x3c/0x68
[   32.484266]  kasan_save_track+0x20/0x40
[   32.484942]  kasan_save_alloc_info+0x40/0x58
[   32.485712]  __kasan_slab_alloc+0xa8/0xb0
[   32.486373]  kmem_cache_alloc_noprof+0x108/0x3a0
[   32.487156]  kmem_cache_double_free+0x12c/0x3c8
[   32.487902]  kunit_try_run_case+0x14c/0x3d0
[   32.488693]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.489371]  kthread+0x24c/0x2d0
[   32.489942]  ret_from_fork+0x10/0x20
[   32.490423] 
[   32.490810] Freed by task 198:
[   32.491319]  kasan_save_stack+0x3c/0x68
[   32.491961]  kasan_save_track+0x20/0x40
[   32.492465]  kasan_save_free_info+0x4c/0x78
[   32.493159]  __kasan_slab_free+0x6c/0x98
[   32.493777]  kmem_cache_free+0x118/0x470
[   32.494408]  kmem_cache_double_free+0x140/0x3c8
[   32.495066]  kunit_try_run_case+0x14c/0x3d0
[   32.495672]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.496446]  kthread+0x24c/0x2d0
[   32.497034]  ret_from_fork+0x10/0x20
[   32.497621] 
[   32.497983] The buggy address belongs to the object at fff00000c5ea3000
[   32.497983]  which belongs to the cache test_cache of size 200
[   32.499185] The buggy address is located 0 bytes inside of
[   32.499185]  200-byte region [fff00000c5ea3000, fff00000c5ea30c8)
[   32.500367] 
[   32.500763] The buggy address belongs to the physical page:
[   32.501386] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ea3
[   32.502420] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.503234] page_type: f5(slab)
[   32.503734] raw: 0bfffe0000000000 fff00000c5d7e780 dead000000000122 0000000000000000
[   32.504734] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000
[   32.505594] page dumped because: kasan: bad access detected
[   32.506246] 
[   32.506638] Memory state around the buggy address:
[   32.507301]  fff00000c5ea2f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.508116]  fff00000c5ea2f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.509031] >fff00000c5ea3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.509903]                    ^
[   32.510356]  fff00000c5ea3080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   32.511758]  fff00000c5ea3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.512802] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   32.381021] ==================================================================
[   32.382668] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x33c/0x428
[   32.383370] Read of size 1 at addr fff00000c5e5a0c8 by task kunit_try_catch/196
[   32.384313] 
[   32.384772] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   32.385925] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.386617] Hardware name: linux,dummy-virt (DT)
[   32.387366] Call trace:
[   32.387903]  show_stack+0x20/0x38 (C)
[   32.388633]  dump_stack_lvl+0x8c/0xd0
[   32.389375]  print_report+0x118/0x5e0
[   32.390312]  kasan_report+0xc8/0x118
[   32.390909]  __asan_report_load1_noabort+0x20/0x30
[   32.391724]  kmem_cache_oob+0x33c/0x428
[   32.392454]  kunit_try_run_case+0x14c/0x3d0
[   32.393285]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.394388]  kthread+0x24c/0x2d0
[   32.394959]  ret_from_fork+0x10/0x20
[   32.395601] 
[   32.395953] Allocated by task 196:
[   32.396512]  kasan_save_stack+0x3c/0x68
[   32.397203]  kasan_save_track+0x20/0x40
[   32.397858]  kasan_save_alloc_info+0x40/0x58
[   32.398555]  __kasan_slab_alloc+0xa8/0xb0
[   32.399977]  kmem_cache_alloc_noprof+0x108/0x3a0
[   32.400704]  kmem_cache_oob+0x12c/0x428
[   32.401284]  kunit_try_run_case+0x14c/0x3d0
[   32.402285]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.403018]  kthread+0x24c/0x2d0
[   32.403617]  ret_from_fork+0x10/0x20
[   32.404272] 
[   32.404598] The buggy address belongs to the object at fff00000c5e5a000
[   32.404598]  which belongs to the cache test_cache of size 200
[   32.406321] The buggy address is located 0 bytes to the right of
[   32.406321]  allocated 200-byte region [fff00000c5e5a000, fff00000c5e5a0c8)
[   32.407739] 
[   32.408115] The buggy address belongs to the physical page:
[   32.408760] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e5a
[   32.409832] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.410953] page_type: f5(slab)
[   32.411483] raw: 0bfffe0000000000 fff00000c46cac80 dead000000000122 0000000000000000
[   32.412446] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000
[   32.413383] page dumped because: kasan: bad access detected
[   32.414324] 
[   32.414764] Memory state around the buggy address:
[   32.415364]  fff00000c5e59f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.416248]  fff00000c5e5a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.417197] >fff00000c5e5a080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   32.418395]                                               ^
[   32.419046]  fff00000c5e5a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.420544]  fff00000c5e5a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.421360] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
[   31.823122] ==================================================================
[   31.824008] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   31.824870] Free of addr fff00000c56f3820 by task kunit_try_catch/181
[   31.825476] 
[   31.827015] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   31.828242] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.829045] Hardware name: linux,dummy-virt (DT)
[   31.830089] Call trace:
[   31.830544]  show_stack+0x20/0x38 (C)
[   31.831208]  dump_stack_lvl+0x8c/0xd0
[   31.831869]  print_report+0x118/0x5e0
[   31.832418]  kasan_report_invalid_free+0xb0/0xd8
[   31.833164]  check_slab_allocation+0xd4/0x108
[   31.833832]  __kasan_slab_pre_free+0x2c/0x48
[   31.834421]  kfree+0xe8/0x3d0
[   31.835722]  kfree_sensitive+0x3c/0xb0
[   31.836355]  kmalloc_double_kzfree+0x168/0x308
[   31.837061]  kunit_try_run_case+0x14c/0x3d0
[   31.838199]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.839013]  kthread+0x24c/0x2d0
[   31.839627]  ret_from_fork+0x10/0x20
[   31.840191] 
[   31.840582] Allocated by task 181:
[   31.841064]  kasan_save_stack+0x3c/0x68
[   31.841642]  kasan_save_track+0x20/0x40
[   31.842745]  kasan_save_alloc_info+0x40/0x58
[   31.843434]  __kasan_kmalloc+0xd4/0xd8
[   31.843915]  __kmalloc_cache_noprof+0x15c/0x3c8
[   31.844628]  kmalloc_double_kzfree+0xb8/0x308
[   31.845229]  kunit_try_run_case+0x14c/0x3d0
[   31.845982]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.846694]  kthread+0x24c/0x2d0
[   31.847606]  ret_from_fork+0x10/0x20
[   31.848219] 
[   31.848611] Freed by task 181:
[   31.849120]  kasan_save_stack+0x3c/0x68
[   31.850034]  kasan_save_track+0x20/0x40
[   31.850689]  kasan_save_free_info+0x4c/0x78
[   31.851356]  __kasan_slab_free+0x6c/0x98
[   31.852740]  kfree+0x114/0x3d0
[   31.853432]  kfree_sensitive+0x80/0xb0
[   31.854460]  kmalloc_double_kzfree+0x11c/0x308
[   31.855329]  kunit_try_run_case+0x14c/0x3d0
[   31.856154]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.856915]  kthread+0x24c/0x2d0
[   31.857172]  ret_from_fork+0x10/0x20
[   31.857413] 
[   31.857628] The buggy address belongs to the object at fff00000c56f3820
[   31.857628]  which belongs to the cache kmalloc-16 of size 16
[   31.860111] The buggy address is located 0 bytes inside of
[   31.860111]  16-byte region [fff00000c56f3820, fff00000c56f3830)
[   31.861355] 
[   31.861788] The buggy address belongs to the physical page:
[   31.862800] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f3
[   31.863703] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.864372] page_type: f5(slab)
[   31.865115] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   31.866957] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   31.867771] page dumped because: kasan: bad access detected
[   31.868394] 
[   31.868791] Memory state around the buggy address:
[   31.869480]  fff00000c56f3700: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   31.870326]  fff00000c56f3780: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   31.871176] >fff00000c56f3800: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   31.872513]                                ^
[   31.873107]  fff00000c56f3880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.874775]  fff00000c56f3900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.875581] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[   31.772015] ==================================================================
[   31.773614] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   31.774856] Read of size 1 at addr fff00000c56f3820 by task kunit_try_catch/181
[   31.775619] 
[   31.776016] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   31.777234] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.777703] Hardware name: linux,dummy-virt (DT)
[   31.778636] Call trace:
[   31.779083]  show_stack+0x20/0x38 (C)
[   31.780125]  dump_stack_lvl+0x8c/0xd0
[   31.780801]  print_report+0x118/0x5e0
[   31.781433]  kasan_report+0xc8/0x118
[   31.782690]  __kasan_check_byte+0x54/0x70
[   31.783246]  kfree_sensitive+0x30/0xb0
[   31.783868]  kmalloc_double_kzfree+0x168/0x308
[   31.784567]  kunit_try_run_case+0x14c/0x3d0
[   31.785198]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.786651]  kthread+0x24c/0x2d0
[   31.786930]  ret_from_fork+0x10/0x20
[   31.787198] 
[   31.787352] Allocated by task 181:
[   31.787890]  kasan_save_stack+0x3c/0x68
[   31.788415]  kasan_save_track+0x20/0x40
[   31.789087]  kasan_save_alloc_info+0x40/0x58
[   31.789656]  __kasan_kmalloc+0xd4/0xd8
[   31.790133]  __kmalloc_cache_noprof+0x15c/0x3c8
[   31.791623]  kmalloc_double_kzfree+0xb8/0x308
[   31.792355]  kunit_try_run_case+0x14c/0x3d0
[   31.793146]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.794202]  kthread+0x24c/0x2d0
[   31.794684]  ret_from_fork+0x10/0x20
[   31.795163] 
[   31.795542] Freed by task 181:
[   31.795972]  kasan_save_stack+0x3c/0x68
[   31.796606]  kasan_save_track+0x20/0x40
[   31.797222]  kasan_save_free_info+0x4c/0x78
[   31.797915]  __kasan_slab_free+0x6c/0x98
[   31.798558]  kfree+0x114/0x3d0
[   31.799066]  kfree_sensitive+0x80/0xb0
[   31.799599]  kmalloc_double_kzfree+0x11c/0x308
[   31.800513]  kunit_try_run_case+0x14c/0x3d0
[   31.801056]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.802682]  kthread+0x24c/0x2d0
[   31.803156]  ret_from_fork+0x10/0x20
[   31.803780] 
[   31.804145] The buggy address belongs to the object at fff00000c56f3820
[   31.804145]  which belongs to the cache kmalloc-16 of size 16
[   31.805430] The buggy address is located 0 bytes inside of
[   31.805430]  freed 16-byte region [fff00000c56f3820, fff00000c56f3830)
[   31.807056] 
[   31.807427] The buggy address belongs to the physical page:
[   31.808101] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f3
[   31.809386] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.811213] page_type: f5(slab)
[   31.811700] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   31.812652] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   31.813472] page dumped because: kasan: bad access detected
[   31.814241] 
[   31.814598] Memory state around the buggy address:
[   31.815276]  fff00000c56f3700: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   31.816051]  fff00000c56f3780: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   31.817304] >fff00000c56f3800: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   31.819029]                                ^
[   31.819492]  fff00000c56f3880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.820427]  fff00000c56f3900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.821101] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[   31.645390] ==================================================================
[   31.646477] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   31.647473] Write of size 33 at addr fff00000c5e77200 by task kunit_try_catch/175
[   31.648474] 
[   31.649009] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   31.650182] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.651321] Hardware name: linux,dummy-virt (DT)
[   31.651957] Call trace:
[   31.652402]  show_stack+0x20/0x38 (C)
[   31.652995]  dump_stack_lvl+0x8c/0xd0
[   31.653613]  print_report+0x118/0x5e0
[   31.654628]  kasan_report+0xc8/0x118
[   31.655291]  kasan_check_range+0x100/0x1a8
[   31.656078]  __asan_memset+0x34/0x78
[   31.656812]  kmalloc_uaf_memset+0x170/0x310
[   31.657463]  kunit_try_run_case+0x14c/0x3d0
[   31.658416]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.659344]  kthread+0x24c/0x2d0
[   31.659911]  ret_from_fork+0x10/0x20
[   31.660554] 
[   31.660862] Allocated by task 175:
[   31.661463]  kasan_save_stack+0x3c/0x68
[   31.662521]  kasan_save_track+0x20/0x40
[   31.663413]  kasan_save_alloc_info+0x40/0x58
[   31.664149]  __kasan_kmalloc+0xd4/0xd8
[   31.664776]  __kmalloc_cache_noprof+0x15c/0x3c8
[   31.665458]  kmalloc_uaf_memset+0xb8/0x310
[   31.666338]  kunit_try_run_case+0x14c/0x3d0
[   31.667280]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.667938]  kthread+0x24c/0x2d0
[   31.668519]  ret_from_fork+0x10/0x20
[   31.669128] 
[   31.669452] Freed by task 175:
[   31.670429]  kasan_save_stack+0x3c/0x68
[   31.671071]  kasan_save_track+0x20/0x40
[   31.671600]  kasan_save_free_info+0x4c/0x78
[   31.672231]  __kasan_slab_free+0x6c/0x98
[   31.672866]  kfree+0x114/0x3d0
[   31.673416]  kmalloc_uaf_memset+0x11c/0x310
[   31.674246]  kunit_try_run_case+0x14c/0x3d0
[   31.674948]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.675934]  kthread+0x24c/0x2d0
[   31.676514]  ret_from_fork+0x10/0x20
[   31.677105] 
[   31.677456] The buggy address belongs to the object at fff00000c5e77200
[   31.677456]  which belongs to the cache kmalloc-64 of size 64
[   31.679268] The buggy address is located 0 bytes inside of
[   31.679268]  freed 64-byte region [fff00000c5e77200, fff00000c5e77240)
[   31.680424] 
[   31.680818] The buggy address belongs to the physical page:
[   31.681548] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e77
[   31.682825] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.683704] page_type: f5(slab)
[   31.684223] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   31.685236] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.686632] page dumped because: kasan: bad access detected
[   31.687276] 
[   31.687631] Memory state around the buggy address:
[   31.688197]  fff00000c5e77100: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   31.689009]  fff00000c5e77180: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   31.689936] >fff00000c5e77200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.690718]                    ^
[   31.691260]  fff00000c5e77280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.692557]  fff00000c5e77300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.693388] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   31.536362] ==================================================================
[   31.538091] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e8
[   31.539069] Read of size 64 at addr fff00000c5e5ec84 by task kunit_try_catch/171
[   31.539895] 
[   31.540313] CPU: 1 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   31.541625] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.542115] Hardware name: linux,dummy-virt (DT)
[   31.542678] Call trace:
[   31.543139]  show_stack+0x20/0x38 (C)
[   31.543787]  dump_stack_lvl+0x8c/0xd0
[   31.544316]  print_report+0x118/0x5e0
[   31.544960]  kasan_report+0xc8/0x118
[   31.545573]  kasan_check_range+0x100/0x1a8
[   31.546101]  __asan_memmove+0x3c/0x98
[   31.546759]  kmalloc_memmove_invalid_size+0x154/0x2e8
[   31.547479]  kunit_try_run_case+0x14c/0x3d0
[   31.548101]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.548976]  kthread+0x24c/0x2d0
[   31.549602]  ret_from_fork+0x10/0x20
[   31.550199] 
[   31.550573] Allocated by task 171:
[   31.551125]  kasan_save_stack+0x3c/0x68
[   31.551771]  kasan_save_track+0x20/0x40
[   31.552289]  kasan_save_alloc_info+0x40/0x58
[   31.552976]  __kasan_kmalloc+0xd4/0xd8
[   31.553602]  __kmalloc_cache_noprof+0x15c/0x3c8
[   31.554174]  kmalloc_memmove_invalid_size+0xb0/0x2e8
[   31.554923]  kunit_try_run_case+0x14c/0x3d0
[   31.555560]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.556277]  kthread+0x24c/0x2d0
[   31.556866]  ret_from_fork+0x10/0x20
[   31.557426] 
[   31.557784] The buggy address belongs to the object at fff00000c5e5ec80
[   31.557784]  which belongs to the cache kmalloc-64 of size 64
[   31.559090] The buggy address is located 4 bytes inside of
[   31.559090]  allocated 64-byte region [fff00000c5e5ec80, fff00000c5e5ecc0)
[   31.560270] 
[   31.560653] The buggy address belongs to the physical page:
[   31.561396] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e5e
[   31.562412] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.563181] page_type: f5(slab)
[   31.563703] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   31.564353] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.564999] page dumped because: kasan: bad access detected
[   31.565518] 
[   31.565895] Memory state around the buggy address:
[   31.566622]  fff00000c5e5eb80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   31.567439]  fff00000c5e5ec00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.568322] >fff00000c5e5ec80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   31.569179]                                            ^
[   31.569818]  fff00000c5e5ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.570499]  fff00000c5e5ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.571467] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   31.483561] ==================================================================
[   31.484829] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   31.485483] Read of size 18446744073709551614 at addr fff00000c5e5ec04 by task kunit_try_catch/169
[   31.487047] 
[   31.487439] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   31.488786] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.489279] Hardware name: linux,dummy-virt (DT)
[   31.490018] Call trace:
[   31.490557]  show_stack+0x20/0x38 (C)
[   31.491811]  dump_stack_lvl+0x8c/0xd0
[   31.492283]  print_report+0x118/0x5e0
[   31.493020]  kasan_report+0xc8/0x118
[   31.493795]  kasan_check_range+0x100/0x1a8
[   31.494849]  __asan_memmove+0x3c/0x98
[   31.495371]  kmalloc_memmove_negative_size+0x154/0x2e0
[   31.496124]  kunit_try_run_case+0x14c/0x3d0
[   31.496848]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.497617]  kthread+0x24c/0x2d0
[   31.498113]  ret_from_fork+0x10/0x20
[   31.498806] 
[   31.499153] Allocated by task 169:
[   31.499712]  kasan_save_stack+0x3c/0x68
[   31.500391]  kasan_save_track+0x20/0x40
[   31.500999]  kasan_save_alloc_info+0x40/0x58
[   31.501618]  __kasan_kmalloc+0xd4/0xd8
[   31.502232]  __kmalloc_cache_noprof+0x15c/0x3c8
[   31.503689]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   31.504508]  kunit_try_run_case+0x14c/0x3d0
[   31.505321]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.506520]  kthread+0x24c/0x2d0
[   31.507037]  ret_from_fork+0x10/0x20
[   31.507575] 
[   31.507937] The buggy address belongs to the object at fff00000c5e5ec00
[   31.507937]  which belongs to the cache kmalloc-64 of size 64
[   31.509554] The buggy address is located 4 bytes inside of
[   31.509554]  64-byte region [fff00000c5e5ec00, fff00000c5e5ec40)
[   31.510687] 
[   31.511052] The buggy address belongs to the physical page:
[   31.512650] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e5e
[   31.513352] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.514491] page_type: f5(slab)
[   31.515119] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   31.515898] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.516718] page dumped because: kasan: bad access detected
[   31.518073] 
[   31.518427] Memory state around the buggy address:
[   31.519156]  fff00000c5e5eb00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   31.520747]  fff00000c5e5eb80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   31.521556] >fff00000c5e5ec00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   31.522903]                    ^
[   31.523401]  fff00000c5e5ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.524276]  fff00000c5e5ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.525076] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset
[   31.327145] ==================================================================
[   31.328221] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   31.329119] Write of size 4 at addr fff00000c64d9d75 by task kunit_try_catch/163
[   31.329849] 
[   31.331027] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   31.332668] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.333388] Hardware name: linux,dummy-virt (DT)
[   31.334325] Call trace:
[   31.334771]  show_stack+0x20/0x38 (C)
[   31.335354]  dump_stack_lvl+0x8c/0xd0
[   31.335872]  print_report+0x118/0x5e0
[   31.336509]  kasan_report+0xc8/0x118
[   31.337200]  kasan_check_range+0x100/0x1a8
[   31.337908]  __asan_memset+0x34/0x78
[   31.338768]  kmalloc_oob_memset_4+0x150/0x300
[   31.339422]  kunit_try_run_case+0x14c/0x3d0
[   31.340114]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.340994]  kthread+0x24c/0x2d0
[   31.341878]  ret_from_fork+0x10/0x20
[   31.342480] 
[   31.342825] Allocated by task 163:
[   31.343277]  kasan_save_stack+0x3c/0x68
[   31.343913]  kasan_save_track+0x20/0x40
[   31.344558]  kasan_save_alloc_info+0x40/0x58
[   31.345149]  __kasan_kmalloc+0xd4/0xd8
[   31.345971]  __kmalloc_cache_noprof+0x15c/0x3c8
[   31.346634]  kmalloc_oob_memset_4+0xb0/0x300
[   31.348182]  kunit_try_run_case+0x14c/0x3d0
[   31.348806]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.349484]  kthread+0x24c/0x2d0
[   31.350486]  ret_from_fork+0x10/0x20
[   31.351015] 
[   31.351348] The buggy address belongs to the object at fff00000c64d9d00
[   31.351348]  which belongs to the cache kmalloc-128 of size 128
[   31.352740] The buggy address is located 117 bytes inside of
[   31.352740]  allocated 120-byte region [fff00000c64d9d00, fff00000c64d9d78)
[   31.354587] 
[   31.354955] The buggy address belongs to the physical page:
[   31.355673] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064d9
[   31.356647] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.357567] page_type: f5(slab)
[   31.358059] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.359477] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   31.360366] page dumped because: kasan: bad access detected
[   31.361057] 
[   31.361451] Memory state around the buggy address:
[   31.362594]  fff00000c64d9c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.363479]  fff00000c64d9c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.364225] >fff00000c64d9d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   31.365143]                                                                 ^
[   31.366150]  fff00000c64d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.367615]  fff00000c64d9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.368454] ==================================================================
[   31.379551] ==================================================================
[   31.380753] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   31.381516] Write of size 8 at addr fff00000c64d9e71 by task kunit_try_catch/165
[   31.383079] 
[   31.383434] CPU: 0 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   31.384640] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.385396] Hardware name: linux,dummy-virt (DT)
[   31.385956] Call trace:
[   31.386451]  show_stack+0x20/0x38 (C)
[   31.387085]  dump_stack_lvl+0x8c/0xd0
[   31.387785]  print_report+0x118/0x5e0
[   31.388389]  kasan_report+0xc8/0x118
[   31.389064]  kasan_check_range+0x100/0x1a8
[   31.389706]  __asan_memset+0x34/0x78
[   31.390271]  kmalloc_oob_memset_8+0x150/0x2f8
[   31.390871]  kunit_try_run_case+0x14c/0x3d0
[   31.391622]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.392370]  kthread+0x24c/0x2d0
[   31.393001]  ret_from_fork+0x10/0x20
[   31.393580] 
[   31.393980] Allocated by task 165:
[   31.394567]  kasan_save_stack+0x3c/0x68
[   31.395123]  kasan_save_track+0x20/0x40
[   31.395808]  kasan_save_alloc_info+0x40/0x58
[   31.396458]  __kasan_kmalloc+0xd4/0xd8
[   31.397052]  __kmalloc_cache_noprof+0x15c/0x3c8
[   31.397709]  kmalloc_oob_memset_8+0xb0/0x2f8
[   31.398401]  kunit_try_run_case+0x14c/0x3d0
[   31.399048]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.399873]  kthread+0x24c/0x2d0
[   31.400383]  ret_from_fork+0x10/0x20
[   31.401045] 
[   31.401434] The buggy address belongs to the object at fff00000c64d9e00
[   31.401434]  which belongs to the cache kmalloc-128 of size 128
[   31.402325] The buggy address is located 113 bytes inside of
[   31.402325]  allocated 120-byte region [fff00000c64d9e00, fff00000c64d9e78)
[   31.403224] 
[   31.403582] The buggy address belongs to the physical page:
[   31.404100] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064d9
[   31.405194] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.405808] page_type: f5(slab)
[   31.406211] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.406947] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   31.407954] page dumped because: kasan: bad access detected
[   31.408743] 
[   31.409126] Memory state around the buggy address:
[   31.409633]  fff00000c64d9d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.410566]  fff00000c64d9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.411484] >fff00000c64d9e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   31.412122]                                                                 ^
[   31.412882]  fff00000c64d9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.413804]  fff00000c64d9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.414562] ==================================================================
[   31.274961] ==================================================================
[   31.275946] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   31.276835] Write of size 2 at addr fff00000c5e27277 by task kunit_try_catch/161
[   31.277678] 
[   31.278367] CPU: 1 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   31.280454] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.281043] Hardware name: linux,dummy-virt (DT)
[   31.281782] Call trace:
[   31.282144]  show_stack+0x20/0x38 (C)
[   31.283509]  dump_stack_lvl+0x8c/0xd0
[   31.284174]  print_report+0x118/0x5e0
[   31.284861]  kasan_report+0xc8/0x118
[   31.285509]  kasan_check_range+0x100/0x1a8
[   31.286387]  __asan_memset+0x34/0x78
[   31.286993]  kmalloc_oob_memset_2+0x150/0x2f8
[   31.287634]  kunit_try_run_case+0x14c/0x3d0
[   31.288342]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.289109]  kthread+0x24c/0x2d0
[   31.289677]  ret_from_fork+0x10/0x20
[   31.290924] 
[   31.291267] Allocated by task 161:
[   31.291754]  kasan_save_stack+0x3c/0x68
[   31.292312]  kasan_save_track+0x20/0x40
[   31.292915]  kasan_save_alloc_info+0x40/0x58
[   31.293613]  __kasan_kmalloc+0xd4/0xd8
[   31.294218]  __kmalloc_cache_noprof+0x15c/0x3c8
[   31.294853]  kmalloc_oob_memset_2+0xb0/0x2f8
[   31.295517]  kunit_try_run_case+0x14c/0x3d0
[   31.296609]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.297289]  kthread+0x24c/0x2d0
[   31.298267]  ret_from_fork+0x10/0x20
[   31.299092] 
[   31.299594] The buggy address belongs to the object at fff00000c5e27200
[   31.299594]  which belongs to the cache kmalloc-128 of size 128
[   31.300845] The buggy address is located 119 bytes inside of
[   31.300845]  allocated 120-byte region [fff00000c5e27200, fff00000c5e27278)
[   31.302763] 
[   31.303125] The buggy address belongs to the physical page:
[   31.303759] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e27
[   31.304673] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.305417] page_type: f5(slab)
[   31.306485] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.307389] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   31.308181] page dumped because: kasan: bad access detected
[   31.308977] 
[   31.309347] Memory state around the buggy address:
[   31.310291]  fff00000c5e27100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   31.311027]  fff00000c5e27180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.312165] >fff00000c5e27200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   31.312894]                                                                 ^
[   31.314031]  fff00000c5e27280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.314697]  fff00000c5e27300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.315609] ==================================================================
[   31.428687] ==================================================================
[   31.429915] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   31.430901] Write of size 16 at addr fff00000c5e27869 by task kunit_try_catch/167
[   31.431935] 
[   31.433300] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   31.434577] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.435607] Hardware name: linux,dummy-virt (DT)
[   31.436465] Call trace:
[   31.436890]  show_stack+0x20/0x38 (C)
[   31.437589]  dump_stack_lvl+0x8c/0xd0
[   31.438449]  print_report+0x118/0x5e0
[   31.439332]  kasan_report+0xc8/0x118
[   31.439949]  kasan_check_range+0x100/0x1a8
[   31.440590]  __asan_memset+0x34/0x78
[   31.441244]  kmalloc_oob_memset_16+0x150/0x2f8
[   31.441922]  kunit_try_run_case+0x14c/0x3d0
[   31.442775]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.443468]  kthread+0x24c/0x2d0
[   31.443950]  ret_from_fork+0x10/0x20
[   31.444675] 
[   31.445086] Allocated by task 167:
[   31.445610]  kasan_save_stack+0x3c/0x68
[   31.446719]  kasan_save_track+0x20/0x40
[   31.447677]  kasan_save_alloc_info+0x40/0x58
[   31.448290]  __kasan_kmalloc+0xd4/0xd8
[   31.448951]  __kmalloc_cache_noprof+0x15c/0x3c8
[   31.449656]  kmalloc_oob_memset_16+0xb0/0x2f8
[   31.450474]  kunit_try_run_case+0x14c/0x3d0
[   31.450963]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.451489]  kthread+0x24c/0x2d0
[   31.451930]  ret_from_fork+0x10/0x20
[   31.452378] 
[   31.453827] The buggy address belongs to the object at fff00000c5e27800
[   31.453827]  which belongs to the cache kmalloc-128 of size 128
[   31.455022] The buggy address is located 105 bytes inside of
[   31.455022]  allocated 120-byte region [fff00000c5e27800, fff00000c5e27878)
[   31.456781] 
[   31.457356] The buggy address belongs to the physical page:
[   31.458714] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e27
[   31.460291] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.461469] page_type: f5(slab)
[   31.462666] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.463572] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   31.464550] page dumped because: kasan: bad access detected
[   31.465200] 
[   31.465568] Memory state around the buggy address:
[   31.466844]  fff00000c5e27700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   31.468201]  fff00000c5e27780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.469085] >fff00000c5e27800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   31.470127]                                                                 ^
[   31.471247]  fff00000c5e27880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.472305]  fff00000c5e27900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.473131] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   31.223054] ==================================================================
[   31.224110] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   31.224955] Write of size 128 at addr fff00000c64d9c00 by task kunit_try_catch/159
[   31.225685] 
[   31.226073] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   31.227662] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.228131] Hardware name: linux,dummy-virt (DT)
[   31.228822] Call trace:
[   31.229240]  show_stack+0x20/0x38 (C)
[   31.229961]  dump_stack_lvl+0x8c/0xd0
[   31.230634]  print_report+0x118/0x5e0
[   31.231160]  kasan_report+0xc8/0x118
[   31.232029]  kasan_check_range+0x100/0x1a8
[   31.232750]  __asan_memset+0x34/0x78
[   31.233379]  kmalloc_oob_in_memset+0x144/0x2d0
[   31.234591]  kunit_try_run_case+0x14c/0x3d0
[   31.235171]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.235896]  kthread+0x24c/0x2d0
[   31.236501]  ret_from_fork+0x10/0x20
[   31.237108] 
[   31.237447] Allocated by task 159:
[   31.237913]  kasan_save_stack+0x3c/0x68
[   31.238799]  kasan_save_track+0x20/0x40
[   31.239427]  kasan_save_alloc_info+0x40/0x58
[   31.240103]  __kasan_kmalloc+0xd4/0xd8
[   31.240736]  __kmalloc_cache_noprof+0x15c/0x3c8
[   31.241348]  kmalloc_oob_in_memset+0xb0/0x2d0
[   31.242920]  kunit_try_run_case+0x14c/0x3d0
[   31.243596]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.244404]  kthread+0x24c/0x2d0
[   31.244778]  ret_from_fork+0x10/0x20
[   31.245370] 
[   31.245967] The buggy address belongs to the object at fff00000c64d9c00
[   31.245967]  which belongs to the cache kmalloc-128 of size 128
[   31.247207] The buggy address is located 0 bytes inside of
[   31.247207]  allocated 120-byte region [fff00000c64d9c00, fff00000c64d9c78)
[   31.248442] 
[   31.248944] The buggy address belongs to the physical page:
[   31.250067] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064d9
[   31.251250] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.252147] page_type: f5(slab)
[   31.252882] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.254164] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   31.255255] page dumped because: kasan: bad access detected
[   31.256172] 
[   31.256774] Memory state around the buggy address:
[   31.257478]  fff00000c64d9b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   31.258762]  fff00000c64d9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.259870] >fff00000c64d9c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   31.260983]                                                                 ^
[   31.262011]  fff00000c64d9c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.263576]  fff00000c64d9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.264421] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[   31.161585] ==================================================================
[   31.163316] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   31.164010] Read of size 16 at addr fff00000c5e08280 by task kunit_try_catch/157
[   31.165087] 
[   31.165559] CPU: 1 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   31.167652] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.168376] Hardware name: linux,dummy-virt (DT)
[   31.169039] Call trace:
[   31.169514]  show_stack+0x20/0x38 (C)
[   31.170593]  dump_stack_lvl+0x8c/0xd0
[   31.171107]  print_report+0x118/0x5e0
[   31.171740]  kasan_report+0xc8/0x118
[   31.172323]  __asan_report_load16_noabort+0x20/0x30
[   31.173003]  kmalloc_uaf_16+0x3bc/0x438
[   31.173844]  kunit_try_run_case+0x14c/0x3d0
[   31.174477]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.175162]  kthread+0x24c/0x2d0
[   31.175971]  ret_from_fork+0x10/0x20
[   31.176516] 
[   31.176899] Allocated by task 157:
[   31.177449]  kasan_save_stack+0x3c/0x68
[   31.178441]  kasan_save_track+0x20/0x40
[   31.179068]  kasan_save_alloc_info+0x40/0x58
[   31.179676]  __kasan_kmalloc+0xd4/0xd8
[   31.180200]  __kmalloc_cache_noprof+0x15c/0x3c8
[   31.180863]  kmalloc_uaf_16+0x140/0x438
[   31.181434]  kunit_try_run_case+0x14c/0x3d0
[   31.183053]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.183774]  kthread+0x24c/0x2d0
[   31.184300]  ret_from_fork+0x10/0x20
[   31.185058] 
[   31.185427] Freed by task 157:
[   31.186443]  kasan_save_stack+0x3c/0x68
[   31.187042]  kasan_save_track+0x20/0x40
[   31.187667]  kasan_save_free_info+0x4c/0x78
[   31.188285]  __kasan_slab_free+0x6c/0x98
[   31.188852]  kfree+0x114/0x3d0
[   31.189374]  kmalloc_uaf_16+0x190/0x438
[   31.190434]  kunit_try_run_case+0x14c/0x3d0
[   31.190997]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.191784]  kthread+0x24c/0x2d0
[   31.192332]  ret_from_fork+0x10/0x20
[   31.192884] 
[   31.193248] The buggy address belongs to the object at fff00000c5e08280
[   31.193248]  which belongs to the cache kmalloc-16 of size 16
[   31.194938] The buggy address is located 0 bytes inside of
[   31.194938]  freed 16-byte region [fff00000c5e08280, fff00000c5e08290)
[   31.196137] 
[   31.196485] The buggy address belongs to the physical page:
[   31.197244] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08
[   31.198450] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.199356] page_type: f5(slab)
[   31.199932] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   31.200845] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   31.202307] page dumped because: kasan: bad access detected
[   31.203193] 
[   31.203817] Memory state around the buggy address:
[   31.204634]  fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.205548]  fff00000c5e08200: fa fb fc fc fa fb fc fc fa fb fc fc 00 00 fc fc
[   31.206558] >fff00000c5e08280: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.207399]                    ^
[   31.207950]  fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.208786]  fff00000c5e08380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.210049] ==================================================================
[   31.706742] ==================================================================
[   31.707947] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   31.708747] Read of size 1 at addr fff00000c6597128 by task kunit_try_catch/177
[   31.709357] 
[   31.710424] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   31.711745] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.712331] Hardware name: linux,dummy-virt (DT)
[   31.712980] Call trace:
[   31.713409]  show_stack+0x20/0x38 (C)
[   31.714358]  dump_stack_lvl+0x8c/0xd0
[   31.714971]  print_report+0x118/0x5e0
[   31.715601]  kasan_report+0xc8/0x118
[   31.716194]  __asan_report_load1_noabort+0x20/0x30
[   31.716944]  kmalloc_uaf2+0x3f4/0x468
[   31.717865]  kunit_try_run_case+0x14c/0x3d0
[   31.718574]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.719363]  kthread+0x24c/0x2d0
[   31.719972]  ret_from_fork+0x10/0x20
[   31.720568] 
[   31.720971] Allocated by task 177:
[   31.721874]  kasan_save_stack+0x3c/0x68
[   31.722543]  kasan_save_track+0x20/0x40
[   31.723125]  kasan_save_alloc_info+0x40/0x58
[   31.723826]  __kasan_kmalloc+0xd4/0xd8
[   31.724405]  __kmalloc_cache_noprof+0x15c/0x3c8
[   31.725148]  kmalloc_uaf2+0xc4/0x468
[   31.725939]  kunit_try_run_case+0x14c/0x3d0
[   31.726521]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.727342]  kthread+0x24c/0x2d0
[   31.727933]  ret_from_fork+0x10/0x20
[   31.728599] 
[   31.728990] Freed by task 177:
[   31.730418]  kasan_save_stack+0x3c/0x68
[   31.731040]  kasan_save_track+0x20/0x40
[   31.731492]  kasan_save_free_info+0x4c/0x78
[   31.732062]  __kasan_slab_free+0x6c/0x98
[   31.732728]  kfree+0x114/0x3d0
[   31.733205]  kmalloc_uaf2+0x134/0x468
[   31.733863]  kunit_try_run_case+0x14c/0x3d0
[   31.734458]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.735520]  kthread+0x24c/0x2d0
[   31.736015]  ret_from_fork+0x10/0x20
[   31.736651] 
[   31.737026] The buggy address belongs to the object at fff00000c6597100
[   31.737026]  which belongs to the cache kmalloc-64 of size 64
[   31.738469] The buggy address is located 40 bytes inside of
[   31.738469]  freed 64-byte region [fff00000c6597100, fff00000c6597140)
[   31.739806] 
[   31.740176] The buggy address belongs to the physical page:
[   31.740754] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106597
[   31.742074] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.742816] page_type: f5(slab)
[   31.743375] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   31.744360] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.745283] page dumped because: kasan: bad access detected
[   31.746276] 
[   31.746664] Memory state around the buggy address:
[   31.747167]  fff00000c6597000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   31.748107]  fff00000c6597080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   31.748863] >fff00000c6597100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.750277]                                   ^
[   31.751308]  fff00000c6597180: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   31.752055]  fff00000c6597200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.752823] ==================================================================
[   31.584451] ==================================================================
[   31.585652] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   31.586865] Read of size 1 at addr fff00000c56f3808 by task kunit_try_catch/173
[   31.587630] 
[   31.588049] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   31.590446] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.591043] Hardware name: linux,dummy-virt (DT)
[   31.591763] Call trace:
[   31.592281]  show_stack+0x20/0x38 (C)
[   31.592882]  dump_stack_lvl+0x8c/0xd0
[   31.593565]  print_report+0x118/0x5e0
[   31.594214]  kasan_report+0xc8/0x118
[   31.595259]  __asan_report_load1_noabort+0x20/0x30
[   31.596432]  kmalloc_uaf+0x300/0x338
[   31.597001]  kunit_try_run_case+0x14c/0x3d0
[   31.598060]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.598780]  kthread+0x24c/0x2d0
[   31.599291]  ret_from_fork+0x10/0x20
[   31.600086] 
[   31.600494] Allocated by task 173:
[   31.601084]  kasan_save_stack+0x3c/0x68
[   31.601723]  kasan_save_track+0x20/0x40
[   31.602201]  kasan_save_alloc_info+0x40/0x58
[   31.603699]  __kasan_kmalloc+0xd4/0xd8
[   31.604378]  __kmalloc_cache_noprof+0x15c/0x3c8
[   31.605026]  kmalloc_uaf+0xb8/0x338
[   31.605634]  kunit_try_run_case+0x14c/0x3d0
[   31.606542]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.607540]  kthread+0x24c/0x2d0
[   31.608111]  ret_from_fork+0x10/0x20
[   31.608708] 
[   31.609137] Freed by task 173:
[   31.610041]  kasan_save_stack+0x3c/0x68
[   31.611115]  kasan_save_track+0x20/0x40
[   31.611810]  kasan_save_free_info+0x4c/0x78
[   31.612444]  __kasan_slab_free+0x6c/0x98
[   31.613087]  kfree+0x114/0x3d0
[   31.614121]  kmalloc_uaf+0x11c/0x338
[   31.614746]  kunit_try_run_case+0x14c/0x3d0
[   31.615446]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.616179]  kthread+0x24c/0x2d0
[   31.616820]  ret_from_fork+0x10/0x20
[   31.617444] 
[   31.617873] The buggy address belongs to the object at fff00000c56f3800
[   31.617873]  which belongs to the cache kmalloc-16 of size 16
[   31.619118] The buggy address is located 8 bytes inside of
[   31.619118]  freed 16-byte region [fff00000c56f3800, fff00000c56f3810)
[   31.620573] 
[   31.621790] The buggy address belongs to the physical page:
[   31.622451] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f3
[   31.623879] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.624242] page_type: f5(slab)
[   31.624503] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   31.625970] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   31.627112] page dumped because: kasan: bad access detected
[   31.627861] 
[   31.628224] Memory state around the buggy address:
[   31.628874]  fff00000c56f3700: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   31.629653]  fff00000c56f3780: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   31.630871] >fff00000c56f3800: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.631621]                       ^
[   31.632235]  fff00000c56f3880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.633035]  fff00000c56f3900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.634000] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob
[   31.109179] ==================================================================
[   31.110406] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   31.111564] Write of size 16 at addr fff00000c5e08220 by task kunit_try_catch/155
[   31.112506] 
[   31.112965] CPU: 1 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   31.114751] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.115446] Hardware name: linux,dummy-virt (DT)
[   31.116218] Call trace:
[   31.116720]  show_stack+0x20/0x38 (C)
[   31.117399]  dump_stack_lvl+0x8c/0xd0
[   31.118188]  print_report+0x118/0x5e0
[   31.119204]  kasan_report+0xc8/0x118
[   31.119869]  __asan_report_store16_noabort+0x20/0x30
[   31.120706]  kmalloc_oob_16+0x3a0/0x3f8
[   31.121377]  kunit_try_run_case+0x14c/0x3d0
[   31.122238]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.123130]  kthread+0x24c/0x2d0
[   31.123681]  ret_from_fork+0x10/0x20
[   31.124387] 
[   31.124852] Allocated by task 155:
[   31.125472]  kasan_save_stack+0x3c/0x68
[   31.126382]  kasan_save_track+0x20/0x40
[   31.127232]  kasan_save_alloc_info+0x40/0x58
[   31.127998]  __kasan_kmalloc+0xd4/0xd8
[   31.128638]  __kmalloc_cache_noprof+0x15c/0x3c8
[   31.129385]  kmalloc_oob_16+0xb4/0x3f8
[   31.129967]  kunit_try_run_case+0x14c/0x3d0
[   31.130984]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.131793]  kthread+0x24c/0x2d0
[   31.132460]  ret_from_fork+0x10/0x20
[   31.133067] 
[   31.133570] The buggy address belongs to the object at fff00000c5e08220
[   31.133570]  which belongs to the cache kmalloc-16 of size 16
[   31.135023] The buggy address is located 0 bytes inside of
[   31.135023]  allocated 13-byte region [fff00000c5e08220, fff00000c5e0822d)
[   31.136166] 
[   31.136641] The buggy address belongs to the physical page:
[   31.137407] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08
[   31.138644] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.139801] page_type: f5(slab)
[   31.140449] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   31.141503] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   31.142735] page dumped because: kasan: bad access detected
[   31.143406] 
[   31.143846] Memory state around the buggy address:
[   31.144614]  fff00000c5e08100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.145492]  fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.146986] >fff00000c5e08200: fa fb fc fc 00 05 fc fc 00 00 fc fc fc fc fc fc
[   31.147886]                                   ^
[   31.148601]  fff00000c5e08280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.149561]  fff00000c5e08300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.151215] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[   31.050377] ==================================================================
[   31.051063] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   31.051940] Read of size 1 at addr fff00000c47dfe00 by task kunit_try_catch/153
[   31.052718] 
[   31.053149] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   31.054218] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.054894] Hardware name: linux,dummy-virt (DT)
[   31.055561] Call trace:
[   31.056067]  show_stack+0x20/0x38 (C)
[   31.056711]  dump_stack_lvl+0x8c/0xd0
[   31.057374]  print_report+0x118/0x5e0
[   31.057901]  kasan_report+0xc8/0x118
[   31.058517]  __asan_report_load1_noabort+0x20/0x30
[   31.059251]  krealloc_uaf+0x4c8/0x520
[   31.059932]  kunit_try_run_case+0x14c/0x3d0
[   31.060795]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.061567]  kthread+0x24c/0x2d0
[   31.062182]  ret_from_fork+0x10/0x20
[   31.062900] 
[   31.063320] Allocated by task 153:
[   31.063934]  kasan_save_stack+0x3c/0x68
[   31.064549]  kasan_save_track+0x20/0x40
[   31.065211]  kasan_save_alloc_info+0x40/0x58
[   31.065836]  __kasan_kmalloc+0xd4/0xd8
[   31.066385]  __kmalloc_cache_noprof+0x15c/0x3c8
[   31.067122]  krealloc_uaf+0xc8/0x520
[   31.067807]  kunit_try_run_case+0x14c/0x3d0
[   31.068437]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.069182]  kthread+0x24c/0x2d0
[   31.069799]  ret_from_fork+0x10/0x20
[   31.070390] 
[   31.070795] Freed by task 153:
[   31.071382]  kasan_save_stack+0x3c/0x68
[   31.072031]  kasan_save_track+0x20/0x40
[   31.072693]  kasan_save_free_info+0x4c/0x78
[   31.073390]  __kasan_slab_free+0x6c/0x98
[   31.073909]  kfree+0x114/0x3d0
[   31.074502]  krealloc_uaf+0x12c/0x520
[   31.075106]  kunit_try_run_case+0x14c/0x3d0
[   31.075783]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.076592]  kthread+0x24c/0x2d0
[   31.077084]  ret_from_fork+0x10/0x20
[   31.077787] 
[   31.078136] The buggy address belongs to the object at fff00000c47dfe00
[   31.078136]  which belongs to the cache kmalloc-256 of size 256
[   31.079450] The buggy address is located 0 bytes inside of
[   31.079450]  freed 256-byte region [fff00000c47dfe00, fff00000c47dff00)
[   31.080839] 
[   31.081236] The buggy address belongs to the physical page:
[   31.081930] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1047de
[   31.082876] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.083839] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.084663] page_type: f5(slab)
[   31.085511] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.086413] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   31.087282] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.088462] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   31.089343] head: 0bfffe0000000001 ffffc1ffc311f781 ffffffffffffffff 0000000000000000
[   31.090580] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   31.091558] page dumped because: kasan: bad access detected
[   31.092319] 
[   31.092928] Memory state around the buggy address:
[   31.093437]  fff00000c47dfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.094481]  fff00000c47dfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.095558] >fff00000c47dfe00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.096615]                    ^
[   31.097139]  fff00000c47dfe80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.098148]  fff00000c47dff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.099167] ==================================================================
[   30.993512] ==================================================================
[   30.994895] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   30.995581] Read of size 1 at addr fff00000c47dfe00 by task kunit_try_catch/153
[   30.996663] 
[   30.997085] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.998221] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.998861] Hardware name: linux,dummy-virt (DT)
[   30.999513] Call trace:
[   30.999889]  show_stack+0x20/0x38 (C)
[   31.001002]  dump_stack_lvl+0x8c/0xd0
[   31.001745]  print_report+0x118/0x5e0
[   31.002705]  kasan_report+0xc8/0x118
[   31.003518]  __kasan_check_byte+0x54/0x70
[   31.004352]  krealloc_noprof+0x44/0x360
[   31.005025]  krealloc_uaf+0x180/0x520
[   31.005759]  kunit_try_run_case+0x14c/0x3d0
[   31.006684]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.007607]  kthread+0x24c/0x2d0
[   31.008299]  ret_from_fork+0x10/0x20
[   31.008987] 
[   31.009416] Allocated by task 153:
[   31.010306]  kasan_save_stack+0x3c/0x68
[   31.011019]  kasan_save_track+0x20/0x40
[   31.011586]  kasan_save_alloc_info+0x40/0x58
[   31.012330]  __kasan_kmalloc+0xd4/0xd8
[   31.012955]  __kmalloc_cache_noprof+0x15c/0x3c8
[   31.014595]  krealloc_uaf+0xc8/0x520
[   31.015180]  kunit_try_run_case+0x14c/0x3d0
[   31.015936]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.016697]  kthread+0x24c/0x2d0
[   31.016952]  ret_from_fork+0x10/0x20
[   31.017193] 
[   31.017348] Freed by task 153:
[   31.018346]  kasan_save_stack+0x3c/0x68
[   31.018926]  kasan_save_track+0x20/0x40
[   31.019402]  kasan_save_free_info+0x4c/0x78
[   31.020085]  __kasan_slab_free+0x6c/0x98
[   31.020710]  kfree+0x114/0x3d0
[   31.021257]  krealloc_uaf+0x12c/0x520
[   31.021828]  kunit_try_run_case+0x14c/0x3d0
[   31.022699]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.023394]  kthread+0x24c/0x2d0
[   31.023985]  ret_from_fork+0x10/0x20
[   31.024748] 
[   31.025135] The buggy address belongs to the object at fff00000c47dfe00
[   31.025135]  which belongs to the cache kmalloc-256 of size 256
[   31.026931] The buggy address is located 0 bytes inside of
[   31.026931]  freed 256-byte region [fff00000c47dfe00, fff00000c47dff00)
[   31.028196] 
[   31.028631] The buggy address belongs to the physical page:
[   31.029235] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1047de
[   31.030685] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.031574] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.032501] page_type: f5(slab)
[   31.032965] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.034236] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   31.035019] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.035932] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   31.037364] head: 0bfffe0000000001 ffffc1ffc311f781 ffffffffffffffff 0000000000000000
[   31.038487] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   31.039702] page dumped because: kasan: bad access detected
[   31.040281] 
[   31.040700] Memory state around the buggy address:
[   31.041418]  fff00000c47dfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.042226]  fff00000c47dfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.043107] >fff00000c47dfe00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.044194]                    ^
[   31.044852]  fff00000c47dfe80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.046000]  fff00000c47dff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.047092] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   30.631218] ==================================================================
[   30.631923] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   30.632296] Write of size 1 at addr fff00000c47dfcea by task kunit_try_catch/147
[   30.633004] 
[   30.633411] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.635807] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.636481] Hardware name: linux,dummy-virt (DT)
[   30.637193] Call trace:
[   30.637709]  show_stack+0x20/0x38 (C)
[   30.638339]  dump_stack_lvl+0x8c/0xd0
[   30.640140]  print_report+0x118/0x5e0
[   30.641017]  kasan_report+0xc8/0x118
[   30.641806]  __asan_report_store1_noabort+0x20/0x30
[   30.642446]  krealloc_less_oob_helper+0xae4/0xc50
[   30.643114]  krealloc_less_oob+0x20/0x38
[   30.643821]  kunit_try_run_case+0x14c/0x3d0
[   30.644489]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.645321]  kthread+0x24c/0x2d0
[   30.645898]  ret_from_fork+0x10/0x20
[   30.646584] 
[   30.646954] Allocated by task 147:
[   30.647433]  kasan_save_stack+0x3c/0x68
[   30.648107]  kasan_save_track+0x20/0x40
[   30.648812]  kasan_save_alloc_info+0x40/0x58
[   30.649440]  __kasan_krealloc+0x118/0x178
[   30.650111]  krealloc_noprof+0x128/0x360
[   30.650788]  krealloc_less_oob_helper+0x168/0xc50
[   30.651416]  krealloc_less_oob+0x20/0x38
[   30.652104]  kunit_try_run_case+0x14c/0x3d0
[   30.652770]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.653603]  kthread+0x24c/0x2d0
[   30.654098]  ret_from_fork+0x10/0x20
[   30.654757] 
[   30.655131] The buggy address belongs to the object at fff00000c47dfc00
[   30.655131]  which belongs to the cache kmalloc-256 of size 256
[   30.656803] The buggy address is located 33 bytes to the right of
[   30.656803]  allocated 201-byte region [fff00000c47dfc00, fff00000c47dfcc9)
[   30.658257] 
[   30.658605] The buggy address belongs to the physical page:
[   30.659475] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1047de
[   30.660605] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.661657] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.662660] page_type: f5(slab)
[   30.663145] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.664223] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.665142] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.666251] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.667342] head: 0bfffe0000000001 ffffc1ffc311f781 ffffffffffffffff 0000000000000000
[   30.668002] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   30.668937] page dumped because: kasan: bad access detected
[   30.669604] 
[   30.670010] Memory state around the buggy address:
[   30.670713]  fff00000c47dfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.671437]  fff00000c47dfc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.672398] >fff00000c47dfc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.673252]                                                           ^
[   30.674074]  fff00000c47dfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.674989]  fff00000c47dfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.675789] ==================================================================
[   30.913460] ==================================================================
[   30.914761] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   30.916420] Write of size 1 at addr fff00000c64ba0ea by task kunit_try_catch/151
[   30.917289] 
[   30.917714] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.919262] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.919782] Hardware name: linux,dummy-virt (DT)
[   30.920447] Call trace:
[   30.920830]  show_stack+0x20/0x38 (C)
[   30.921454]  dump_stack_lvl+0x8c/0xd0
[   30.922934]  print_report+0x118/0x5e0
[   30.923649]  kasan_report+0xc8/0x118
[   30.924063]  __asan_report_store1_noabort+0x20/0x30
[   30.924866]  krealloc_less_oob_helper+0xae4/0xc50
[   30.926116]  krealloc_large_less_oob+0x20/0x38
[   30.926779]  kunit_try_run_case+0x14c/0x3d0
[   30.927387]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.928229]  kthread+0x24c/0x2d0
[   30.928767]  ret_from_fork+0x10/0x20
[   30.929440] 
[   30.930113] The buggy address belongs to the physical page:
[   30.930680] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064b8
[   30.932108] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.933113] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.934018] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.934959] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.936006] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.937006] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.937935] head: 0bfffe0000000002 ffffc1ffc3192e01 ffffffffffffffff 0000000000000000
[   30.938841] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.939680] page dumped because: kasan: bad access detected
[   30.940466] 
[   30.941516] Memory state around the buggy address:
[   30.942563]  fff00000c64b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.943249]  fff00000c64ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.944081] >fff00000c64ba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.944947]                                                           ^
[   30.946083]  fff00000c64ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.946860]  fff00000c64ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.948203] ==================================================================
[   30.949501] ==================================================================
[   30.950608] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   30.951255] Write of size 1 at addr fff00000c64ba0eb by task kunit_try_catch/151
[   30.951950] 
[   30.952347] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.953653] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.954135] Hardware name: linux,dummy-virt (DT)
[   30.954813] Call trace:
[   30.955279]  show_stack+0x20/0x38 (C)
[   30.957221]  dump_stack_lvl+0x8c/0xd0
[   30.958093]  print_report+0x118/0x5e0
[   30.958721]  kasan_report+0xc8/0x118
[   30.959372]  __asan_report_store1_noabort+0x20/0x30
[   30.960183]  krealloc_less_oob_helper+0xa58/0xc50
[   30.961018]  krealloc_large_less_oob+0x20/0x38
[   30.961678]  kunit_try_run_case+0x14c/0x3d0
[   30.962302]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.963252]  kthread+0x24c/0x2d0
[   30.964021]  ret_from_fork+0x10/0x20
[   30.964622] 
[   30.965140] The buggy address belongs to the physical page:
[   30.966404] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064b8
[   30.967576] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.968414] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.969249] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.970591] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.971847] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.972738] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.973636] head: 0bfffe0000000002 ffffc1ffc3192e01 ffffffffffffffff 0000000000000000
[   30.974564] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.975394] page dumped because: kasan: bad access detected
[   30.976089] 
[   30.976502] Memory state around the buggy address:
[   30.977213]  fff00000c64b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.978360]  fff00000c64ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.979898] >fff00000c64ba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.980746]                                                           ^
[   30.981565]  fff00000c64ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.982346]  fff00000c64ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.983210] ==================================================================
[   30.679382] ==================================================================
[   30.680145] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   30.681187] Write of size 1 at addr fff00000c47dfceb by task kunit_try_catch/147
[   30.682386] 
[   30.682776] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.684993] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.685795] Hardware name: linux,dummy-virt (DT)
[   30.686616] Call trace:
[   30.687201]  show_stack+0x20/0x38 (C)
[   30.687795]  dump_stack_lvl+0x8c/0xd0
[   30.688476]  print_report+0x118/0x5e0
[   30.689025]  kasan_report+0xc8/0x118
[   30.689661]  __asan_report_store1_noabort+0x20/0x30
[   30.690432]  krealloc_less_oob_helper+0xa58/0xc50
[   30.691068]  krealloc_less_oob+0x20/0x38
[   30.691727]  kunit_try_run_case+0x14c/0x3d0
[   30.692329]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.693180]  kthread+0x24c/0x2d0
[   30.693800]  ret_from_fork+0x10/0x20
[   30.694417] 
[   30.694754] Allocated by task 147:
[   30.695394]  kasan_save_stack+0x3c/0x68
[   30.695934]  kasan_save_track+0x20/0x40
[   30.696620]  kasan_save_alloc_info+0x40/0x58
[   30.697233]  __kasan_krealloc+0x118/0x178
[   30.697926]  krealloc_noprof+0x128/0x360
[   30.698584]  krealloc_less_oob_helper+0x168/0xc50
[   30.699258]  krealloc_less_oob+0x20/0x38
[   30.699952]  kunit_try_run_case+0x14c/0x3d0
[   30.700645]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.701356]  kthread+0x24c/0x2d0
[   30.701986]  ret_from_fork+0x10/0x20
[   30.702637] 
[   30.703010] The buggy address belongs to the object at fff00000c47dfc00
[   30.703010]  which belongs to the cache kmalloc-256 of size 256
[   30.704343] The buggy address is located 34 bytes to the right of
[   30.704343]  allocated 201-byte region [fff00000c47dfc00, fff00000c47dfcc9)
[   30.705794] 
[   30.706110] The buggy address belongs to the physical page:
[   30.706917] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1047de
[   30.707814] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.708760] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.709658] page_type: f5(slab)
[   30.710219] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.711089] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.712005] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.712988] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.713902] head: 0bfffe0000000001 ffffc1ffc311f781 ffffffffffffffff 0000000000000000
[   30.714827] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   30.715712] page dumped because: kasan: bad access detected
[   30.716398] 
[   30.716797] Memory state around the buggy address:
[   30.717543]  fff00000c47dfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.718290]  fff00000c47dfc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.719254] >fff00000c47dfc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.720070]                                                           ^
[   30.720917]  fff00000c47dfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.721824]  fff00000c47dfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.722665] ==================================================================
[   30.809304] ==================================================================
[   30.810651] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   30.811749] Write of size 1 at addr fff00000c64ba0c9 by task kunit_try_catch/151
[   30.812834] 
[   30.813283] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.814847] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.815393] Hardware name: linux,dummy-virt (DT)
[   30.816073] Call trace:
[   30.816575]  show_stack+0x20/0x38 (C)
[   30.817105]  dump_stack_lvl+0x8c/0xd0
[   30.817676]  print_report+0x118/0x5e0
[   30.818300]  kasan_report+0xc8/0x118
[   30.818883]  __asan_report_store1_noabort+0x20/0x30
[   30.819557]  krealloc_less_oob_helper+0xa48/0xc50
[   30.820198]  krealloc_large_less_oob+0x20/0x38
[   30.820854]  kunit_try_run_case+0x14c/0x3d0
[   30.821483]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.822349]  kthread+0x24c/0x2d0
[   30.822827]  ret_from_fork+0x10/0x20
[   30.823450] 
[   30.823836] The buggy address belongs to the physical page:
[   30.824438] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064b8
[   30.825359] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.826138] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.827223] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.828117] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.828997] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.829934] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.830783] head: 0bfffe0000000002 ffffc1ffc3192e01 ffffffffffffffff 0000000000000000
[   30.831983] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.832844] page dumped because: kasan: bad access detected
[   30.833485] 
[   30.833892] Memory state around the buggy address:
[   30.834398]  fff00000c64b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.835584]  fff00000c64ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.836632] >fff00000c64ba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.837481]                                               ^
[   30.838269]  fff00000c64ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.839241]  fff00000c64ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.839962] ==================================================================
[   30.480011] ==================================================================
[   30.481286] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   30.482130] Write of size 1 at addr fff00000c47dfcc9 by task kunit_try_catch/147
[   30.483569] 
[   30.483964] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.484903] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.485457] Hardware name: linux,dummy-virt (DT)
[   30.486012] Call trace:
[   30.486875]  show_stack+0x20/0x38 (C)
[   30.487518]  dump_stack_lvl+0x8c/0xd0
[   30.488142]  print_report+0x118/0x5e0
[   30.488676]  kasan_report+0xc8/0x118
[   30.489284]  __asan_report_store1_noabort+0x20/0x30
[   30.490478]  krealloc_less_oob_helper+0xa48/0xc50
[   30.491239]  krealloc_less_oob+0x20/0x38
[   30.491770]  kunit_try_run_case+0x14c/0x3d0
[   30.492472]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.493407]  kthread+0x24c/0x2d0
[   30.494444]  ret_from_fork+0x10/0x20
[   30.495119] 
[   30.495484] Allocated by task 147:
[   30.495929]  kasan_save_stack+0x3c/0x68
[   30.496584]  kasan_save_track+0x20/0x40
[   30.497223]  kasan_save_alloc_info+0x40/0x58
[   30.497994]  __kasan_krealloc+0x118/0x178
[   30.498961]  krealloc_noprof+0x128/0x360
[   30.499506]  krealloc_less_oob_helper+0x168/0xc50
[   30.500175]  krealloc_less_oob+0x20/0x38
[   30.501421]  kunit_try_run_case+0x14c/0x3d0
[   30.501983]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.502775]  kthread+0x24c/0x2d0
[   30.503309]  ret_from_fork+0x10/0x20
[   30.504296] 
[   30.504674] The buggy address belongs to the object at fff00000c47dfc00
[   30.504674]  which belongs to the cache kmalloc-256 of size 256
[   30.506643] The buggy address is located 0 bytes to the right of
[   30.506643]  allocated 201-byte region [fff00000c47dfc00, fff00000c47dfcc9)
[   30.507855] 
[   30.508231] The buggy address belongs to the physical page:
[   30.508933] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1047de
[   30.509819] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.511020] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.512007] page_type: f5(slab)
[   30.512507] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.513441] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.515002] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.515822] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.516759] head: 0bfffe0000000001 ffffc1ffc311f781 ffffffffffffffff 0000000000000000
[   30.517624] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   30.518455] page dumped because: kasan: bad access detected
[   30.519545] 
[   30.519910] Memory state around the buggy address:
[   30.520519]  fff00000c47dfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.521326]  fff00000c47dfc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.522842] >fff00000c47dfc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.523610]                                               ^
[   30.524322]  fff00000c47dfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.525671]  fff00000c47dfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.526436] ==================================================================
[   30.841546] ==================================================================
[   30.842709] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   30.843677] Write of size 1 at addr fff00000c64ba0d0 by task kunit_try_catch/151
[   30.844940] 
[   30.845341] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.846912] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.847399] Hardware name: linux,dummy-virt (DT)
[   30.848071] Call trace:
[   30.848431]  show_stack+0x20/0x38 (C)
[   30.849006]  dump_stack_lvl+0x8c/0xd0
[   30.849717]  print_report+0x118/0x5e0
[   30.850717]  kasan_report+0xc8/0x118
[   30.851347]  __asan_report_store1_noabort+0x20/0x30
[   30.852710]  krealloc_less_oob_helper+0xb9c/0xc50
[   30.853924]  krealloc_large_less_oob+0x20/0x38
[   30.855016]  kunit_try_run_case+0x14c/0x3d0
[   30.855967]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.857211]  kthread+0x24c/0x2d0
[   30.857832]  ret_from_fork+0x10/0x20
[   30.858387] 
[   30.858810] The buggy address belongs to the physical page:
[   30.859652] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064b8
[   30.860556] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.861353] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.862226] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.863291] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.864324] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.865240] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.866303] head: 0bfffe0000000002 ffffc1ffc3192e01 ffffffffffffffff 0000000000000000
[   30.867720] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.868657] page dumped because: kasan: bad access detected
[   30.869594] 
[   30.870221] Memory state around the buggy address:
[   30.871041]  fff00000c64b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.871946]  fff00000c64ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.872929] >fff00000c64ba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.874287]                                                  ^
[   30.875460]  fff00000c64ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.876330]  fff00000c64ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.878011] ==================================================================
[   30.528059] ==================================================================
[   30.528754] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   30.530001] Write of size 1 at addr fff00000c47dfcd0 by task kunit_try_catch/147
[   30.530864] 
[   30.531263] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.533371] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.534519] Hardware name: linux,dummy-virt (DT)
[   30.535195] Call trace:
[   30.535658]  show_stack+0x20/0x38 (C)
[   30.536304]  dump_stack_lvl+0x8c/0xd0
[   30.536874]  print_report+0x118/0x5e0
[   30.537510]  kasan_report+0xc8/0x118
[   30.538870]  __asan_report_store1_noabort+0x20/0x30
[   30.539662]  krealloc_less_oob_helper+0xb9c/0xc50
[   30.540241]  krealloc_less_oob+0x20/0x38
[   30.540925]  kunit_try_run_case+0x14c/0x3d0
[   30.541544]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.542327]  kthread+0x24c/0x2d0
[   30.543323]  ret_from_fork+0x10/0x20
[   30.543901] 
[   30.544197] Allocated by task 147:
[   30.544745]  kasan_save_stack+0x3c/0x68
[   30.545367]  kasan_save_track+0x20/0x40
[   30.546840]  kasan_save_alloc_info+0x40/0x58
[   30.547397]  __kasan_krealloc+0x118/0x178
[   30.548065]  krealloc_noprof+0x128/0x360
[   30.548860]  krealloc_less_oob_helper+0x168/0xc50
[   30.549567]  krealloc_less_oob+0x20/0x38
[   30.550461]  kunit_try_run_case+0x14c/0x3d0
[   30.551010]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.551769]  kthread+0x24c/0x2d0
[   30.552286]  ret_from_fork+0x10/0x20
[   30.553072] 
[   30.553420] The buggy address belongs to the object at fff00000c47dfc00
[   30.553420]  which belongs to the cache kmalloc-256 of size 256
[   30.555487] The buggy address is located 7 bytes to the right of
[   30.555487]  allocated 201-byte region [fff00000c47dfc00, fff00000c47dfcc9)
[   30.556908] 
[   30.557281] The buggy address belongs to the physical page:
[   30.558344] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1047de
[   30.559157] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.560114] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.560912] page_type: f5(slab)
[   30.561451] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.562878] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.563831] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.565016] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.566103] head: 0bfffe0000000001 ffffc1ffc311f781 ffffffffffffffff 0000000000000000
[   30.567520] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   30.568381] page dumped because: kasan: bad access detected
[   30.569049] 
[   30.569324] Memory state around the buggy address:
[   30.570411]  fff00000c47dfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.571291]  fff00000c47dfc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.572741] >fff00000c47dfc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.573520]                                                  ^
[   30.574281]  fff00000c47dfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.575574]  fff00000c47dfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.576345] ==================================================================
[   30.879430] ==================================================================
[   30.880245] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   30.881497] Write of size 1 at addr fff00000c64ba0da by task kunit_try_catch/151
[   30.883012] 
[   30.883349] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.884447] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.885091] Hardware name: linux,dummy-virt (DT)
[   30.885663] Call trace:
[   30.886385]  show_stack+0x20/0x38 (C)
[   30.887045]  dump_stack_lvl+0x8c/0xd0
[   30.887687]  print_report+0x118/0x5e0
[   30.888204]  kasan_report+0xc8/0x118
[   30.888929]  __asan_report_store1_noabort+0x20/0x30
[   30.889685]  krealloc_less_oob_helper+0xa80/0xc50
[   30.890662]  krealloc_large_less_oob+0x20/0x38
[   30.891260]  kunit_try_run_case+0x14c/0x3d0
[   30.891956]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.893211]  kthread+0x24c/0x2d0
[   30.893780]  ret_from_fork+0x10/0x20
[   30.894276] 
[   30.894664] The buggy address belongs to the physical page:
[   30.895354] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064b8
[   30.896413] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.897170] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.898653] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.899574] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.900550] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.901408] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.902627] head: 0bfffe0000000002 ffffc1ffc3192e01 ffffffffffffffff 0000000000000000
[   30.903502] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.904501] page dumped because: kasan: bad access detected
[   30.905178] 
[   30.905559] Memory state around the buggy address:
[   30.906159]  fff00000c64b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.907012]  fff00000c64ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.908638] >fff00000c64ba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.909396]                                                     ^
[   30.910125]  fff00000c64ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.911139]  fff00000c64ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.911947] ==================================================================
[   30.579889] ==================================================================
[   30.580638] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   30.581377] Write of size 1 at addr fff00000c47dfcda by task kunit_try_catch/147
[   30.582219] 
[   30.582897] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.584369] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.585041] Hardware name: linux,dummy-virt (DT)
[   30.586150] Call trace:
[   30.586799]  show_stack+0x20/0x38 (C)
[   30.587811]  dump_stack_lvl+0x8c/0xd0
[   30.588698]  print_report+0x118/0x5e0
[   30.589381]  kasan_report+0xc8/0x118
[   30.590252]  __asan_report_store1_noabort+0x20/0x30
[   30.591070]  krealloc_less_oob_helper+0xa80/0xc50
[   30.591693]  krealloc_less_oob+0x20/0x38
[   30.592386]  kunit_try_run_case+0x14c/0x3d0
[   30.593066]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.594019]  kthread+0x24c/0x2d0
[   30.594829]  ret_from_fork+0x10/0x20
[   30.595442] 
[   30.595771] Allocated by task 147:
[   30.596335]  kasan_save_stack+0x3c/0x68
[   30.597497]  kasan_save_track+0x20/0x40
[   30.598327]  kasan_save_alloc_info+0x40/0x58
[   30.599200]  __kasan_krealloc+0x118/0x178
[   30.599821]  krealloc_noprof+0x128/0x360
[   30.600395]  krealloc_less_oob_helper+0x168/0xc50
[   30.601402]  krealloc_less_oob+0x20/0x38
[   30.602778]  kunit_try_run_case+0x14c/0x3d0
[   30.603635]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.604572]  kthread+0x24c/0x2d0
[   30.605268]  ret_from_fork+0x10/0x20
[   30.605972] 
[   30.606497] The buggy address belongs to the object at fff00000c47dfc00
[   30.606497]  which belongs to the cache kmalloc-256 of size 256
[   30.608082] The buggy address is located 17 bytes to the right of
[   30.608082]  allocated 201-byte region [fff00000c47dfc00, fff00000c47dfcc9)
[   30.609440] 
[   30.610212] The buggy address belongs to the physical page:
[   30.611698] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1047de
[   30.612504] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.613355] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.614624] page_type: f5(slab)
[   30.615098] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.615962] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.616858] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.618016] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.618820] head: 0bfffe0000000001 ffffc1ffc311f781 ffffffffffffffff 0000000000000000
[   30.620183] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   30.621032] page dumped because: kasan: bad access detected
[   30.621744] 
[   30.622444] Memory state around the buggy address:
[   30.623271]  fff00000c47dfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.624127]  fff00000c47dfc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.624957] >fff00000c47dfc80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.625832]                                                     ^
[   30.626642]  fff00000c47dfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.627346]  fff00000c47dfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.628276] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   30.732905] ==================================================================
[   30.734511] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680
[   30.735362] Write of size 1 at addr fff00000c65720eb by task kunit_try_catch/149
[   30.736199] 
[   30.736673] CPU: 1 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.738140] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.739000] Hardware name: linux,dummy-virt (DT)
[   30.739636] Call trace:
[   30.740137]  show_stack+0x20/0x38 (C)
[   30.740776]  dump_stack_lvl+0x8c/0xd0
[   30.741452]  print_report+0x118/0x5e0
[   30.742467]  kasan_report+0xc8/0x118
[   30.743145]  __asan_report_store1_noabort+0x20/0x30
[   30.743912]  krealloc_more_oob_helper+0x614/0x680
[   30.744606]  krealloc_large_more_oob+0x20/0x38
[   30.745296]  kunit_try_run_case+0x14c/0x3d0
[   30.746319]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.747117]  kthread+0x24c/0x2d0
[   30.747664]  ret_from_fork+0x10/0x20
[   30.748229] 
[   30.749216] The buggy address belongs to the physical page:
[   30.749970] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106570
[   30.751157] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.752135] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.753143] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.753565] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.754411] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.756012] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.757075] head: 0bfffe0000000002 ffffc1ffc3195c01 ffffffffffffffff 0000000000000000
[   30.758054] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.759040] page dumped because: kasan: bad access detected
[   30.759843] 
[   30.760185] Memory state around the buggy address:
[   30.760862]  fff00000c6571f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.761801]  fff00000c6572000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.762630] >fff00000c6572080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   30.763363]                                                           ^
[   30.764130]  fff00000c6572100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.765077]  fff00000c6572180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.765792] ==================================================================
[   30.767693] ==================================================================
[   30.769369] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680
[   30.771140] Write of size 1 at addr fff00000c65720f0 by task kunit_try_catch/149
[   30.772493] 
[   30.772864] CPU: 1 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.773918] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.774542] Hardware name: linux,dummy-virt (DT)
[   30.775151] Call trace:
[   30.775515]  show_stack+0x20/0x38 (C)
[   30.776162]  dump_stack_lvl+0x8c/0xd0
[   30.776763]  print_report+0x118/0x5e0
[   30.777400]  kasan_report+0xc8/0x118
[   30.778036]  __asan_report_store1_noabort+0x20/0x30
[   30.778779]  krealloc_more_oob_helper+0x5c8/0x680
[   30.779334]  krealloc_large_more_oob+0x20/0x38
[   30.780047]  kunit_try_run_case+0x14c/0x3d0
[   30.780722]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.781546]  kthread+0x24c/0x2d0
[   30.782129]  ret_from_fork+0x10/0x20
[   30.782695] 
[   30.783065] The buggy address belongs to the physical page:
[   30.783731] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106570
[   30.784719] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.785552] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.786424] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.787172] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.788201] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.789015] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.789956] head: 0bfffe0000000002 ffffc1ffc3195c01 ffffffffffffffff 0000000000000000
[   30.790873] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.791729] page dumped because: kasan: bad access detected
[   30.792471] 
[   30.792982] Memory state around the buggy address:
[   30.793668]  fff00000c6571f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.794669]  fff00000c6572000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.795459] >fff00000c6572080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   30.796300]                                                              ^
[   30.797093]  fff00000c6572100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.797993]  fff00000c6572180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.798849] ==================================================================
[   30.368770] ==================================================================
[   30.370156] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680
[   30.372059] Write of size 1 at addr fff00000c47dfaeb by task kunit_try_catch/145
[   30.372773] 
[   30.373218] CPU: 1 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.375129] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.375702] Hardware name: linux,dummy-virt (DT)
[   30.376283] Call trace:
[   30.376795]  show_stack+0x20/0x38 (C)
[   30.377434]  dump_stack_lvl+0x8c/0xd0
[   30.378353]  print_report+0x118/0x5e0
[   30.378955]  kasan_report+0xc8/0x118
[   30.379460]  __asan_report_store1_noabort+0x20/0x30
[   30.380101]  krealloc_more_oob_helper+0x614/0x680
[   30.380880]  krealloc_more_oob+0x20/0x38
[   30.381588]  kunit_try_run_case+0x14c/0x3d0
[   30.382541]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.383240]  kthread+0x24c/0x2d0
[   30.383900]  ret_from_fork+0x10/0x20
[   30.384599] 
[   30.384909] Allocated by task 145:
[   30.385511]  kasan_save_stack+0x3c/0x68
[   30.386800]  kasan_save_track+0x20/0x40
[   30.387453]  kasan_save_alloc_info+0x40/0x58
[   30.388550]  __kasan_krealloc+0x118/0x178
[   30.389178]  krealloc_noprof+0x128/0x360
[   30.389861]  krealloc_more_oob_helper+0x168/0x680
[   30.390778]  krealloc_more_oob+0x20/0x38
[   30.391393]  kunit_try_run_case+0x14c/0x3d0
[   30.392011]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.392714]  kthread+0x24c/0x2d0
[   30.393323]  ret_from_fork+0x10/0x20
[   30.394101] 
[   30.394558] The buggy address belongs to the object at fff00000c47dfa00
[   30.394558]  which belongs to the cache kmalloc-256 of size 256
[   30.395761] The buggy address is located 0 bytes to the right of
[   30.395761]  allocated 235-byte region [fff00000c47dfa00, fff00000c47dfaeb)
[   30.398221] 
[   30.398698] The buggy address belongs to the physical page:
[   30.399408] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1047de
[   30.400462] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.401748] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.402856] page_type: f5(slab)
[   30.403558] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.404581] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.405463] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.406600] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.407492] head: 0bfffe0000000001 ffffc1ffc311f781 ffffffffffffffff 0000000000000000
[   30.408407] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   30.409330] page dumped because: kasan: bad access detected
[   30.410264] 
[   30.410638] Memory state around the buggy address:
[   30.411120]  fff00000c47df980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.411941]  fff00000c47dfa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.412708] >fff00000c47dfa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   30.413493]                                                           ^
[   30.414275]  fff00000c47dfb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.415595]  fff00000c47dfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.416664] ==================================================================
[   30.419087] ==================================================================
[   30.419996] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680
[   30.420843] Write of size 1 at addr fff00000c47dfaf0 by task kunit_try_catch/145
[   30.422818] 
[   30.423213] CPU: 1 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.424387] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.424948] Hardware name: linux,dummy-virt (DT)
[   30.425553] Call trace:
[   30.426076]  show_stack+0x20/0x38 (C)
[   30.427055]  dump_stack_lvl+0x8c/0xd0
[   30.427963]  print_report+0x118/0x5e0
[   30.428671]  kasan_report+0xc8/0x118
[   30.429361]  __asan_report_store1_noabort+0x20/0x30
[   30.430165]  krealloc_more_oob_helper+0x5c8/0x680
[   30.431302]  krealloc_more_oob+0x20/0x38
[   30.431945]  kunit_try_run_case+0x14c/0x3d0
[   30.432460]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.433274]  kthread+0x24c/0x2d0
[   30.433973]  ret_from_fork+0x10/0x20
[   30.434633] 
[   30.435006] Allocated by task 145:
[   30.436449]  kasan_save_stack+0x3c/0x68
[   30.437148]  kasan_save_track+0x20/0x40
[   30.437922]  kasan_save_alloc_info+0x40/0x58
[   30.438738]  __kasan_krealloc+0x118/0x178
[   30.439361]  krealloc_noprof+0x128/0x360
[   30.439865]  krealloc_more_oob_helper+0x168/0x680
[   30.440596]  krealloc_more_oob+0x20/0x38
[   30.441199]  kunit_try_run_case+0x14c/0x3d0
[   30.442468]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.443468]  kthread+0x24c/0x2d0
[   30.444097]  ret_from_fork+0x10/0x20
[   30.444655] 
[   30.444982] The buggy address belongs to the object at fff00000c47dfa00
[   30.444982]  which belongs to the cache kmalloc-256 of size 256
[   30.446799] The buggy address is located 5 bytes to the right of
[   30.446799]  allocated 235-byte region [fff00000c47dfa00, fff00000c47dfaeb)
[   30.448084] 
[   30.448461] The buggy address belongs to the physical page:
[   30.449578] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1047de
[   30.451176] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.452275] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.453149] page_type: f5(slab)
[   30.454083] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.455159] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.456072] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.456940] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.457976] head: 0bfffe0000000001 ffffc1ffc311f781 ffffffffffffffff 0000000000000000
[   30.458930] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   30.459778] page dumped because: kasan: bad access detected
[   30.460491] 
[   30.461657] Memory state around the buggy address:
[   30.462155]  fff00000c47df980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.463286]  fff00000c47dfa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.464144] >fff00000c47dfa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   30.465298]                                                              ^
[   30.466513]  fff00000c47dfb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.467363]  fff00000c47dfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.468139] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[   30.329117] ==================================================================
[   30.330594] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   30.331348] Read of size 1 at addr fff00000c6560000 by task kunit_try_catch/143
[   30.332896] 
[   30.333230] CPU: 1 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.335178] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.335883] Hardware name: linux,dummy-virt (DT)
[   30.336593] Call trace:
[   30.337068]  show_stack+0x20/0x38 (C)
[   30.337731]  dump_stack_lvl+0x8c/0xd0
[   30.338356]  print_report+0x118/0x5e0
[   30.339118]  kasan_report+0xc8/0x118
[   30.339843]  __asan_report_load1_noabort+0x20/0x30
[   30.340514]  page_alloc_uaf+0x328/0x350
[   30.341317]  kunit_try_run_case+0x14c/0x3d0
[   30.342085]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.343251]  kthread+0x24c/0x2d0
[   30.343932]  ret_from_fork+0x10/0x20
[   30.344562] 
[   30.345053] The buggy address belongs to the physical page:
[   30.345952] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106560
[   30.346986] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.347793] page_type: f0(buddy)
[   30.348444] raw: 0bfffe0000000000 fff00000ff615148 fff00000ff615148 0000000000000000
[   30.349479] raw: 0000000000000000 0000000000000005 00000000f0000000 0000000000000000
[   30.350589] page dumped because: kasan: bad access detected
[   30.351100] 
[   30.351336] Memory state around the buggy address:
[   30.352185]  fff00000c655ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.353200]  fff00000c655ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.354196] >fff00000c6560000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.355184]                    ^
[   30.355817]  fff00000c6560080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.356606]  fff00000c6560100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.357371] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[   30.234891] ==================================================================
[   30.236195] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   30.237086] Read of size 1 at addr fff00000c64b4000 by task kunit_try_catch/137
[   30.238583] 
[   30.239013] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.240111] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.240732] Hardware name: linux,dummy-virt (DT)
[   30.242180] Call trace:
[   30.242885]  show_stack+0x20/0x38 (C)
[   30.243632]  dump_stack_lvl+0x8c/0xd0
[   30.244329]  print_report+0x118/0x5e0
[   30.245040]  kasan_report+0xc8/0x118
[   30.245715]  __asan_report_load1_noabort+0x20/0x30
[   30.246484]  kmalloc_large_uaf+0x2cc/0x2f8
[   30.247903]  kunit_try_run_case+0x14c/0x3d0
[   30.248506]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.249339]  kthread+0x24c/0x2d0
[   30.250103]  ret_from_fork+0x10/0x20
[   30.251134] 
[   30.251549] The buggy address belongs to the physical page:
[   30.252165] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064b4
[   30.253227] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.254806] raw: 0bfffe0000000000 ffffc1ffc3192e08 fff00000da4e4f80 0000000000000000
[   30.255784] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   30.256955] page dumped because: kasan: bad access detected
[   30.257876] 
[   30.258287] Memory state around the buggy address:
[   30.259339]  fff00000c64b3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.260328]  fff00000c64b3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.261367] >fff00000c64b4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.262409]                    ^
[   30.263725]  fff00000c64b4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.264602]  fff00000c64b4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.265481] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   30.191261] ==================================================================
[   30.192497] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   30.193279] Write of size 1 at addr fff00000c64b600a by task kunit_try_catch/135
[   30.194956] 
[   30.195583] CPU: 0 UID: 0 PID: 135 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.196468] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.197312] Hardware name: linux,dummy-virt (DT)
[   30.198073] Call trace:
[   30.198981]  show_stack+0x20/0x38 (C)
[   30.199667]  dump_stack_lvl+0x8c/0xd0
[   30.200226]  print_report+0x118/0x5e0
[   30.201605]  kasan_report+0xc8/0x118
[   30.202932]  __asan_report_store1_noabort+0x20/0x30
[   30.203817]  kmalloc_large_oob_right+0x278/0x2b8
[   30.204428]  kunit_try_run_case+0x14c/0x3d0
[   30.205082]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.205860]  kthread+0x24c/0x2d0
[   30.206461]  ret_from_fork+0x10/0x20
[   30.207083] 
[   30.207701] The buggy address belongs to the physical page:
[   30.208585] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064b4
[   30.209515] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.210798] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.211654] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.212462] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.213304] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.214420] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.215574] head: 0bfffe0000000002 ffffc1ffc3192d01 ffffffffffffffff 0000000000000000
[   30.216387] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.217068] page dumped because: kasan: bad access detected
[   30.217848] 
[   30.218258] Memory state around the buggy address:
[   30.219540]  fff00000c64b5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.220316]  fff00000c64b5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.221257] >fff00000c64b6000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.222611]                       ^
[   30.223167]  fff00000c64b6080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.223993]  fff00000c64b6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.224922] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[   30.135202] ==================================================================
[   30.136381] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   30.137168] Write of size 1 at addr fff00000c6531f00 by task kunit_try_catch/133
[   30.138084] 
[   30.138767] CPU: 1 UID: 0 PID: 133 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.139852] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.140511] Hardware name: linux,dummy-virt (DT)
[   30.141076] Call trace:
[   30.141625]  show_stack+0x20/0x38 (C)
[   30.142293]  dump_stack_lvl+0x8c/0xd0
[   30.143108]  print_report+0x118/0x5e0
[   30.143811]  kasan_report+0xc8/0x118
[   30.144456]  __asan_report_store1_noabort+0x20/0x30
[   30.145297]  kmalloc_big_oob_right+0x2a4/0x2f0
[   30.146322]  kunit_try_run_case+0x14c/0x3d0
[   30.146969]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.147778]  kthread+0x24c/0x2d0
[   30.148358]  ret_from_fork+0x10/0x20
[   30.148972] 
[   30.149385] Allocated by task 133:
[   30.150232]  kasan_save_stack+0x3c/0x68
[   30.150718]  kasan_save_track+0x20/0x40
[   30.151339]  kasan_save_alloc_info+0x40/0x58
[   30.152061]  __kasan_kmalloc+0xd4/0xd8
[   30.152732]  __kmalloc_cache_noprof+0x15c/0x3c8
[   30.153417]  kmalloc_big_oob_right+0xb8/0x2f0
[   30.154412]  kunit_try_run_case+0x14c/0x3d0
[   30.155044]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.155780]  kthread+0x24c/0x2d0
[   30.156391]  ret_from_fork+0x10/0x20
[   30.156980] 
[   30.157350] The buggy address belongs to the object at fff00000c6530000
[   30.157350]  which belongs to the cache kmalloc-8k of size 8192
[   30.159236] The buggy address is located 0 bytes to the right of
[   30.159236]  allocated 7936-byte region [fff00000c6530000, fff00000c6531f00)
[   30.160968] 
[   30.161392] The buggy address belongs to the physical page:
[   30.162243] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106530
[   30.163316] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.164400] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.165477] page_type: f5(slab)
[   30.166261] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   30.167366] raw: 0000000000000000 0000000080020002 00000001f5000000 0000000000000000
[   30.168174] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   30.169140] head: 0000000000000000 0000000080020002 00000001f5000000 0000000000000000
[   30.170018] head: 0bfffe0000000003 ffffc1ffc3194c01 ffffffffffffffff 0000000000000000
[   30.170964] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000
[   30.171871] page dumped because: kasan: bad access detected
[   30.172512] 
[   30.172942] Memory state around the buggy address:
[   30.173577]  fff00000c6531e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.174440]  fff00000c6531e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.175364] >fff00000c6531f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.176259]                    ^
[   30.176864]  fff00000c6531f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.177674]  fff00000c6532000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.178627] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[   30.086841] ==================================================================
[   30.087901] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x420/0x490
[   30.088797] Write of size 1 at addr fff00000c5e7d478 by task kunit_try_catch/131
[   30.089414] 
[   30.089867] CPU: 1 UID: 0 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.091092] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.091709] Hardware name: linux,dummy-virt (DT)
[   30.092197] Call trace:
[   30.092624]  show_stack+0x20/0x38 (C)
[   30.093661]  dump_stack_lvl+0x8c/0xd0
[   30.094204]  print_report+0x118/0x5e0
[   30.094908]  kasan_report+0xc8/0x118
[   30.095633]  __asan_report_store1_noabort+0x20/0x30
[   30.096459]  kmalloc_track_caller_oob_right+0x420/0x490
[   30.097271]  kunit_try_run_case+0x14c/0x3d0
[   30.098012]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.098910]  kthread+0x24c/0x2d0
[   30.099631]  ret_from_fork+0x10/0x20
[   30.100223] 
[   30.100653] Allocated by task 131:
[   30.101128]  kasan_save_stack+0x3c/0x68
[   30.101780]  kasan_save_track+0x20/0x40
[   30.102288]  kasan_save_alloc_info+0x40/0x58
[   30.102986]  __kasan_kmalloc+0xd4/0xd8
[   30.103630]  __kmalloc_node_track_caller_noprof+0x184/0x4b8
[   30.104330]  kmalloc_track_caller_oob_right+0x184/0x490
[   30.105058]  kunit_try_run_case+0x14c/0x3d0
[   30.105775]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.106462]  kthread+0x24c/0x2d0
[   30.107095]  ret_from_fork+0x10/0x20
[   30.107646] 
[   30.108060] The buggy address belongs to the object at fff00000c5e7d400
[   30.108060]  which belongs to the cache kmalloc-128 of size 128
[   30.109343] The buggy address is located 0 bytes to the right of
[   30.109343]  allocated 120-byte region [fff00000c5e7d400, fff00000c5e7d478)
[   30.110768] 
[   30.111115] The buggy address belongs to the physical page:
[   30.111908] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e7d
[   30.112839] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.113699] page_type: f5(slab)
[   30.114294] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.115190] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.116104] page dumped because: kasan: bad access detected
[   30.116823] 
[   30.117190] Memory state around the buggy address:
[   30.117794]  fff00000c5e7d300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.118771]  fff00000c5e7d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.119547] >fff00000c5e7d400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.120477]                                                                 ^
[   30.121256]  fff00000c5e7d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.122162]  fff00000c5e7d500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.123006] ==================================================================
[   30.047218] ==================================================================
[   30.048423] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x414/0x490
[   30.049388] Write of size 1 at addr fff00000c5e7d378 by task kunit_try_catch/131
[   30.050542] 
[   30.050943] CPU: 1 UID: 0 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   30.052196] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.052793] Hardware name: linux,dummy-virt (DT)
[   30.053326] Call trace:
[   30.053798]  show_stack+0x20/0x38 (C)
[   30.054334]  dump_stack_lvl+0x8c/0xd0
[   30.054969]  print_report+0x118/0x5e0
[   30.055610]  kasan_report+0xc8/0x118
[   30.056153]  __asan_report_store1_noabort+0x20/0x30
[   30.056888]  kmalloc_track_caller_oob_right+0x414/0x490
[   30.057589]  kunit_try_run_case+0x14c/0x3d0
[   30.058271]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.058986]  kthread+0x24c/0x2d0
[   30.059591]  ret_from_fork+0x10/0x20
[   30.060159] 
[   30.060509] Allocated by task 131:
[   30.061083]  kasan_save_stack+0x3c/0x68
[   30.061603]  kasan_save_track+0x20/0x40
[   30.062221]  kasan_save_alloc_info+0x40/0x58
[   30.062807]  __kasan_kmalloc+0xd4/0xd8
[   30.063429]  __kmalloc_node_track_caller_noprof+0x184/0x4b8
[   30.064155]  kmalloc_track_caller_oob_right+0xa8/0x490
[   30.064917]  kunit_try_run_case+0x14c/0x3d0
[   30.065606]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.066310]  kthread+0x24c/0x2d0
[   30.066893]  ret_from_fork+0x10/0x20
[   30.067440] 
[   30.067829] The buggy address belongs to the object at fff00000c5e7d300
[   30.067829]  which belongs to the cache kmalloc-128 of size 128
[   30.069013] The buggy address is located 0 bytes to the right of
[   30.069013]  allocated 120-byte region [fff00000c5e7d300, fff00000c5e7d378)
[   30.070347] 
[   30.070739] The buggy address belongs to the physical page:
[   30.071476] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e7d
[   30.072347] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.073036] page_type: f5(slab)
[   30.073622] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.074453] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.075751] page dumped because: kasan: bad access detected
[   30.076469] 
[   30.076857] Memory state around the buggy address:
[   30.077598]  fff00000c5e7d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   30.078267]  fff00000c5e7d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.079821] >fff00000c5e7d300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.080807]                                                                 ^
[   30.081841]  fff00000c5e7d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.082608]  fff00000c5e7d400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.083401] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[   29.991383] ==================================================================
[   29.992580] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   29.993433] Read of size 1 at addr fff00000c6483000 by task kunit_try_catch/129
[   29.994737] 
[   29.995142] CPU: 0 UID: 0 PID: 129 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   29.996393] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.996947] Hardware name: linux,dummy-virt (DT)
[   29.997550] Call trace:
[   29.997989]  show_stack+0x20/0x38 (C)
[   29.998506]  dump_stack_lvl+0x8c/0xd0
[   29.999205]  print_report+0x118/0x5e0
[   30.000124]  kasan_report+0xc8/0x118
[   30.000763]  __asan_report_load1_noabort+0x20/0x30
[   30.001423]  kmalloc_node_oob_right+0x2f4/0x330
[   30.002340]  kunit_try_run_case+0x14c/0x3d0
[   30.002998]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.003804]  kthread+0x24c/0x2d0
[   30.004338]  ret_from_fork+0x10/0x20
[   30.004897] 
[   30.005269] Allocated by task 129:
[   30.006126]  kasan_save_stack+0x3c/0x68
[   30.006774]  kasan_save_track+0x20/0x40
[   30.007372]  kasan_save_alloc_info+0x40/0x58
[   30.008058]  __kasan_kmalloc+0xd4/0xd8
[   30.008654]  __kmalloc_cache_node_noprof+0x164/0x3d0
[   30.009282]  kmalloc_node_oob_right+0xbc/0x330
[   30.011004]  kunit_try_run_case+0x14c/0x3d0
[   30.011612]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.012292]  kthread+0x24c/0x2d0
[   30.012902]  ret_from_fork+0x10/0x20
[   30.013509] 
[   30.014186] The buggy address belongs to the object at fff00000c6482000
[   30.014186]  which belongs to the cache kmalloc-4k of size 4096
[   30.015382] The buggy address is located 0 bytes to the right of
[   30.015382]  allocated 4096-byte region [fff00000c6482000, fff00000c6483000)
[   30.016628] 
[   30.016997] The buggy address belongs to the physical page:
[   30.018112] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106480
[   30.019345] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.020278] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.021131] page_type: f5(slab)
[   30.021923] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   30.022901] raw: 0000000000000000 0000000080040004 00000001f5000000 0000000000000000
[   30.023799] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   30.024637] head: 0000000000000000 0000000080040004 00000001f5000000 0000000000000000
[   30.025544] head: 0bfffe0000000003 ffffc1ffc3192001 ffffffffffffffff 0000000000000000
[   30.026818] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000
[   30.027646] page dumped because: kasan: bad access detected
[   30.028342] 
[   30.028730] Memory state around the buggy address:
[   30.029401]  fff00000c6482f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.031279]  fff00000c6482f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.032063] >fff00000c6483000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.033014]                    ^
[   30.033608]  fff00000c6483080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.034669]  fff00000c6483100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.035816] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   29.931058] ==================================================================
[   29.932311] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   29.933022] Read of size 1 at addr fff00000c5e081ff by task kunit_try_catch/127
[   29.934594] 
[   29.934923] CPU: 1 UID: 0 PID: 127 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   29.936429] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.937207] Hardware name: linux,dummy-virt (DT)
[   29.938232] Call trace:
[   29.938862]  show_stack+0x20/0x38 (C)
[   29.939383]  dump_stack_lvl+0x8c/0xd0
[   29.940464]  print_report+0x118/0x5e0
[   29.941194]  kasan_report+0xc8/0x118
[   29.942143]  __asan_report_load1_noabort+0x20/0x30
[   29.942848]  kmalloc_oob_left+0x2ec/0x320
[   29.943332]  kunit_try_run_case+0x14c/0x3d0
[   29.944020]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.944780]  kthread+0x24c/0x2d0
[   29.945372]  ret_from_fork+0x10/0x20
[   29.946363] 
[   29.946690] Allocated by task 28:
[   29.947246]  kasan_save_stack+0x3c/0x68
[   29.947787]  kasan_save_track+0x20/0x40
[   29.948423]  kasan_save_alloc_info+0x40/0x58
[   29.949133]  __kasan_kmalloc+0xd4/0xd8
[   29.949632]  __kmalloc_node_track_caller_noprof+0x184/0x4b8
[   29.950758]  kstrdup+0x54/0xc8
[   29.951636]  devtmpfs_work_loop+0x384/0x590
[   29.952191]  devtmpfsd+0x50/0x58
[   29.952760]  kthread+0x24c/0x2d0
[   29.953263]  ret_from_fork+0x10/0x20
[   29.954113] 
[   29.954441] Freed by task 28:
[   29.954887]  kasan_save_stack+0x3c/0x68
[   29.955516]  kasan_save_track+0x20/0x40
[   29.956599]  kasan_save_free_info+0x4c/0x78
[   29.957283]  __kasan_slab_free+0x6c/0x98
[   29.958171]  kfree+0x114/0x3d0
[   29.958660]  devtmpfs_work_loop+0x498/0x590
[   29.959242]  devtmpfsd+0x50/0x58
[   29.959839]  kthread+0x24c/0x2d0
[   29.960414]  ret_from_fork+0x10/0x20
[   29.961376] 
[   29.962189] The buggy address belongs to the object at fff00000c5e081e0
[   29.962189]  which belongs to the cache kmalloc-16 of size 16
[   29.963383] The buggy address is located 15 bytes to the right of
[   29.963383]  allocated 16-byte region [fff00000c5e081e0, fff00000c5e081f0)
[   29.965511] 
[   29.965845] The buggy address belongs to the physical page:
[   29.966591] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e08
[   29.967458] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.968606] page_type: f5(slab)
[   29.969192] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   29.970873] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   29.971680] page dumped because: kasan: bad access detected
[   29.972382] 
[   29.972956] Memory state around the buggy address:
[   29.973581]  fff00000c5e08080: fa fb fc fc fa fb fc fc fa fb fc fc 00 00 fc fc
[   29.974881]  fff00000c5e08100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.975802] >fff00000c5e08180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.976669]                                                                 ^
[   29.977559]  fff00000c5e08200: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.979376]  fff00000c5e08280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.980196] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   29.787485] ==================================================================
[   29.789023] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   29.791798] Write of size 1 at addr fff00000c64ec673 by task kunit_try_catch/125
[   29.792648] 
[   29.794687] CPU: 0 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G                 N 6.12.0-next-20241126 #1
[   29.796112] Tainted: [N]=TEST
[   29.796617] Hardware name: linux,dummy-virt (DT)
[   29.797781] Call trace:
[   29.798664]  show_stack+0x20/0x38 (C)
[   29.799547]  dump_stack_lvl+0x8c/0xd0
[   29.800228]  print_report+0x118/0x5e0
[   29.800755]  kasan_report+0xc8/0x118
[   29.801371]  __asan_report_store1_noabort+0x20/0x30
[   29.802115]  kmalloc_oob_right+0x5a4/0x660
[   29.802795]  kunit_try_run_case+0x14c/0x3d0
[   29.803206]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.804019]  kthread+0x24c/0x2d0
[   29.804559]  ret_from_fork+0x10/0x20
[   29.805509] 
[   29.806360] Allocated by task 125:
[   29.807238]  kasan_save_stack+0x3c/0x68
[   29.807924]  kasan_save_track+0x20/0x40
[   29.808445]  kasan_save_alloc_info+0x40/0x58
[   29.809170]  __kasan_kmalloc+0xd4/0xd8
[   29.809733]  __kmalloc_cache_noprof+0x15c/0x3c8
[   29.810440]  kmalloc_oob_right+0xb0/0x660
[   29.812002]  kunit_try_run_case+0x14c/0x3d0
[   29.812630]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.813300]  kthread+0x24c/0x2d0
[   29.814518]  ret_from_fork+0x10/0x20
[   29.815163] 
[   29.815667] The buggy address belongs to the object at fff00000c64ec600
[   29.815667]  which belongs to the cache kmalloc-128 of size 128
[   29.817080] The buggy address is located 0 bytes to the right of
[   29.817080]  allocated 115-byte region [fff00000c64ec600, fff00000c64ec673)
[   29.818668] 
[   29.819296] The buggy address belongs to the physical page:
[   29.820578] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064ec
[   29.822213] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.823498] page_type: f5(slab)
[   29.824694] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.825587] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   29.826992] page dumped because: kasan: bad access detected
[   29.827735] 
[   29.828081] Memory state around the buggy address:
[   29.829350]  fff00000c64ec500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.830357]  fff00000c64ec580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.831583] >fff00000c64ec600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.832730]                                                              ^
[   29.833809]  fff00000c64ec680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.834977]  fff00000c64ec700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.836099] ==================================================================
[   29.840499] ==================================================================
[   29.841259] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   29.842432] Write of size 1 at addr fff00000c64ec678 by task kunit_try_catch/125
[   29.844063] 
[   29.844480] CPU: 0 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   29.846094] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.846763] Hardware name: linux,dummy-virt (DT)
[   29.847456] Call trace:
[   29.847942]  show_stack+0x20/0x38 (C)
[   29.848602]  dump_stack_lvl+0x8c/0xd0
[   29.849220]  print_report+0x118/0x5e0
[   29.849997]  kasan_report+0xc8/0x118
[   29.850818]  __asan_report_store1_noabort+0x20/0x30
[   29.851466]  kmalloc_oob_right+0x538/0x660
[   29.851786]  kunit_try_run_case+0x14c/0x3d0
[   29.852212]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.853078]  kthread+0x24c/0x2d0
[   29.853698]  ret_from_fork+0x10/0x20
[   29.854289] 
[   29.854912] Allocated by task 125:
[   29.855422]  kasan_save_stack+0x3c/0x68
[   29.855991]  kasan_save_track+0x20/0x40
[   29.856631]  kasan_save_alloc_info+0x40/0x58
[   29.857292]  __kasan_kmalloc+0xd4/0xd8
[   29.858213]  __kmalloc_cache_noprof+0x15c/0x3c8
[   29.858807]  kmalloc_oob_right+0xb0/0x660
[   29.859453]  kunit_try_run_case+0x14c/0x3d0
[   29.860122]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.860925]  kthread+0x24c/0x2d0
[   29.861445]  ret_from_fork+0x10/0x20
[   29.862985] 
[   29.863336] The buggy address belongs to the object at fff00000c64ec600
[   29.863336]  which belongs to the cache kmalloc-128 of size 128
[   29.864845] The buggy address is located 5 bytes to the right of
[   29.864845]  allocated 115-byte region [fff00000c64ec600, fff00000c64ec673)
[   29.866673] 
[   29.867093] The buggy address belongs to the physical page:
[   29.867799] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064ec
[   29.868687] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.869624] page_type: f5(slab)
[   29.870486] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.871558] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   29.872231] page dumped because: kasan: bad access detected
[   29.873135] 
[   29.873311] Memory state around the buggy address:
[   29.873995]  fff00000c64ec500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.874723]  fff00000c64ec580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.875724] >fff00000c64ec600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.876663]                                                                 ^
[   29.877661]  fff00000c64ec680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.878865]  fff00000c64ec700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.879565] ==================================================================
[   29.880837] ==================================================================
[   29.881610] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   29.882307] Read of size 1 at addr fff00000c64ec680 by task kunit_try_catch/125
[   29.883164] 
[   29.883797] CPU: 0 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[   29.885175] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.886394] Hardware name: linux,dummy-virt (DT)
[   29.887202] Call trace:
[   29.887634]  show_stack+0x20/0x38 (C)
[   29.888299]  dump_stack_lvl+0x8c/0xd0
[   29.889018]  print_report+0x118/0x5e0
[   29.889891]  kasan_report+0xc8/0x118
[   29.890367]  __asan_report_load1_noabort+0x20/0x30
[   29.891156]  kmalloc_oob_right+0x5d0/0x660
[   29.891943]  kunit_try_run_case+0x14c/0x3d0
[   29.892696]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.893498]  kthread+0x24c/0x2d0
[   29.894354]  ret_from_fork+0x10/0x20
[   29.895024] 
[   29.895397] Allocated by task 125:
[   29.895865]  kasan_save_stack+0x3c/0x68
[   29.896547]  kasan_save_track+0x20/0x40
[   29.897110]  kasan_save_alloc_info+0x40/0x58
[   29.898086]  __kasan_kmalloc+0xd4/0xd8
[   29.898646]  __kmalloc_cache_noprof+0x15c/0x3c8
[   29.899473]  kmalloc_oob_right+0xb0/0x660
[   29.900082]  kunit_try_run_case+0x14c/0x3d0
[   29.900731]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.901407]  kthread+0x24c/0x2d0
[   29.902485]  ret_from_fork+0x10/0x20
[   29.903226] 
[   29.903574] The buggy address belongs to the object at fff00000c64ec600
[   29.903574]  which belongs to the cache kmalloc-128 of size 128
[   29.905424] The buggy address is located 13 bytes to the right of
[   29.905424]  allocated 115-byte region [fff00000c64ec600, fff00000c64ec673)
[   29.907245] 
[   29.907590] The buggy address belongs to the physical page:
[   29.908315] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064ec
[   29.909355] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.910494] page_type: f5(slab)
[   29.910993] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.911983] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   29.912905] page dumped because: kasan: bad access detected
[   29.913577] 
[   29.914257] Memory state around the buggy address:
[   29.914930]  fff00000c64ec580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.915742]  fff00000c64ec600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.916662] >fff00000c64ec680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.917463]                    ^
[   29.918354]  fff00000c64ec700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.919184]  fff00000c64ec780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.920052] ==================================================================
Failure - log-parser-boot - internal-error-oops-oops-preempt-smp KNOWN ISSUE - kunit_test_null_dereference internal oops on qemu-arm64 KUNIT KASAN
[  149.429822] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
[  149.431686] Modules linked in:
[  149.433036] CPU: 0 UID: 0 PID: 621 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241126 #1
[  149.434487] Tainted: [B]=BAD_PAGE, [N]=TEST
[  149.434977] Hardware name: linux,dummy-virt (DT)
[  149.435813] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  149.436766] pc : kunit_test_null_dereference+0x70/0x170
[  149.437495] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[  149.438221] sp : ffff800083447dc0
[  149.439112] x29: ffff800083447e20 x28: 0000000000000000 x27: 0000000000000000
[  149.440404] x26: 0000000000000000 x25: 0000000000000000 x24: fff00000c56f4b00
[  149.441492] x23: ffffad778e7c9710 x22: ffffad778e7d22d0 x21: fff00000c56f4b08
[  149.442811] x20: 1ffff00010688fb8 x19: ffff8000800879f0 x18: 00000000b7bd21cf
[  149.443911] x17: 0000000000000001 x16: fff00000da4e0ca0 x15: 0000000055307943
[  149.444983] x14: 00000000d1144ba8 x13: 1ffe00001815db34 x12: fffd80001997911a
[  149.446288] x11: 1ffe000019979119 x10: fffd800019979119 x9 : ffffad778e7c9798
[  149.447476] x8 : ffff800083447cb8 x7 : 0000000000000001 x6 : 0000000041b58ab3
[  149.448607] x5 : ffff700010688fb8 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[  149.449674] x2 : dfff800000000000 x1 : fff00000ccbc8000 x0 : ffff8000800879f0
[  149.451566] Call trace:
[  149.452138]  kunit_test_null_dereference+0x70/0x170 (P)
[  149.452673]  kunit_generic_run_threadfn_adapter+0x88/0x100 (L)
[  149.453515]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  149.454741]  kthread+0x24c/0x2d0
[  149.455278]  ret_from_fork+0x10/0x20
[  149.456520] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[  149.458016] ---[ end trace 0000000000000000 ]---