Hay
Date
Nov. 27, 2024, 3:37 a.m.
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[   62.917829] ==================================================================
[   62.919134] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   62.919134] 
[   62.920218] Invalid read at 0x00000000c820c669:
[   62.920965]  test_invalid_access+0xdc/0x1f0
[   62.923152]  kunit_try_run_case+0x14c/0x3d0
[   62.923980]  kunit_try_run_case+0x14c/0x3d0
[   62.924765]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.925904]  kthread+0x24c/0x2d0
[   62.926470]  ret_from_fork+0x10/0x20
[   62.927052] 
[   62.927506] CPU: 0 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   62.928697] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.929260] Hardware name: linux,dummy-virt (DT)
[   62.930010] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[   56.861891] ==================================================================
[   56.862794] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   56.862794] 
[   56.863666] Out-of-bounds write at 0x00000000b8fd362d (1B left of kfence-#160):
[   56.864087]  test_out_of_bounds_write+0x100/0x240
[   56.864700]  test_out_of_bounds_write+0xc8/0x240
[   56.865599]  kunit_try_run_case+0x14c/0x3d0
[   56.866422]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.867050]  kthread+0x24c/0x2d0
[   56.867636]  ret_from_fork+0x10/0x20
[   56.868122] 
[   56.868441] kfence-#160: 0x00000000e07bf36e-0x000000005a55684e, size=32, cache=test
[   56.868441] 
[   56.869475] allocated by task 282 on cpu 0 at 56.861731s (0.007734s ago):
[   56.870443]  test_alloc+0x22c/0x620
[   56.870940]  test_out_of_bounds_write+0xc8/0x240
[   56.871657]  kunit_try_run_case+0x14c/0x3d0
[   56.872264]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.872956]  kthread+0x24c/0x2d0
[   56.873560]  ret_from_fork+0x10/0x20
[   56.874147] 
[   56.874567] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   56.875765] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.876310] Hardware name: linux,dummy-virt (DT)
[   56.876891] ==================================================================
[   56.446186] ==================================================================
[   56.447095] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   56.447095] 
[   56.448188] Out-of-bounds write at 0x000000007360a25c (1B left of kfence-#156):
[   56.449188]  test_out_of_bounds_write+0x100/0x240
[   56.450211]  test_out_of_bounds_write+0xc8/0x240
[   56.451039]  kunit_try_run_case+0x14c/0x3d0
[   56.451742]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.452601]  kthread+0x24c/0x2d0
[   56.453248]  ret_from_fork+0x10/0x20
[   56.453865] 
[   56.454212] kfence-#156: 0x00000000d3e03450-0x00000000b08e18b8, size=32, cache=kmalloc-32
[   56.454212] 
[   56.455432] allocated by task 280 on cpu 0 at 56.445942s (0.009481s ago):
[   56.456569]  test_alloc+0x298/0x620
[   56.457271]  test_out_of_bounds_write+0xc8/0x240
[   56.458043]  kunit_try_run_case+0x14c/0x3d0
[   56.458809]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.459625]  kthread+0x24c/0x2d0
[   56.460216]  ret_from_fork+0x10/0x20
[   56.460845] 
[   56.461340] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   56.462610] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.463236] Hardware name: linux,dummy-virt (DT)
[   56.463847] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[   81.826753] ==================================================================
[   81.827551] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[   81.827551] 
[   81.828524] Use-after-free read at 0x000000000df2877e (in kfence-#222):
[   81.829760]  test_krealloc+0x51c/0x830
[   81.830317]  test_krealloc+0x458/0x830
[   81.830876]  kunit_try_run_case+0x14c/0x3d0
[   81.831517]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   81.832197]  kthread+0x24c/0x2d0
[   81.832711]  ret_from_fork+0x10/0x20
[   81.833326] 
[   81.833695] kfence-#222: 0x000000000df2877e-0x0000000040be0bb2, size=32, cache=kmalloc-32
[   81.833695] 
[   81.834868] allocated by task 326 on cpu 1 at 81.825695s (0.009164s ago):
[   81.835761]  test_alloc+0x298/0x620
[   81.836279]  test_krealloc+0xc0/0x830
[   81.836991]  kunit_try_run_case+0x14c/0x3d0
[   81.837630]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   81.838426]  kthread+0x24c/0x2d0
[   81.838892]  ret_from_fork+0x10/0x20
[   81.839526] 
[   81.839886] freed by task 326 on cpu 1 at 81.826086s (0.013789s ago):
[   81.840697]  krealloc_noprof+0x148/0x360
[   81.841381]  test_krealloc+0x1dc/0x830
[   81.841996]  kunit_try_run_case+0x14c/0x3d0
[   81.842547]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   81.843263]  kthread+0x24c/0x2d0
[   81.843735]  ret_from_fork+0x10/0x20
[   81.844313] 
[   81.844670] CPU: 1 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   81.845874] Tainted: [B]=BAD_PAGE, [N]=TEST
[   81.846521] Hardware name: linux,dummy-virt (DT)
[   81.847121] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[   81.638128] ==================================================================
[   81.638912] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[   81.638912] 
[   81.639953] Use-after-free read at 0x000000008dae3eb9 (in kfence-#220):
[   81.640660]  test_memcache_typesafe_by_rcu+0x280/0x560
[   81.641705]  test_memcache_typesafe_by_rcu+0x260/0x560
[   81.642658]  kunit_try_run_case+0x14c/0x3d0
[   81.643245]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   81.643922]  kthread+0x24c/0x2d0
[   81.644538]  ret_from_fork+0x10/0x20
[   81.645234] 
[   81.645572] kfence-#220: 0x000000008dae3eb9-0x000000000e24a4ee, size=32, cache=test
[   81.645572] 
[   81.646562] allocated by task 324 on cpu 0 at 81.618968s (0.027584s ago):
[   81.647453]  test_alloc+0x22c/0x620
[   81.648171]  test_memcache_typesafe_by_rcu+0x15c/0x560
[   81.649034]  kunit_try_run_case+0x14c/0x3d0
[   81.649629]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   81.650355]  kthread+0x24c/0x2d0
[   81.651059]  ret_from_fork+0x10/0x20
[   81.651671] 
[   81.652005] freed by task 324 on cpu 0 at 81.619139s (0.032857s ago):
[   81.652813]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[   81.653656]  kunit_try_run_case+0x14c/0x3d0
[   81.654317]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   81.655035]  kthread+0x24c/0x2d0
[   81.655767]  ret_from_fork+0x10/0x20
[   81.656271] 
[   81.656703] CPU: 0 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   81.657827] Tainted: [B]=BAD_PAGE, [N]=TEST
[   81.658401] Hardware name: linux,dummy-virt (DT)
[   81.659150] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[   62.686045] ==================================================================
[   62.686900] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   62.686900] 
[   62.687745] Corrupted memory at 0x00000000e92f4065 [ ! . . . . . . . . . . . . . . . ] (in kfence-#216):
[   62.690223]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   62.690907]  kunit_try_run_case+0x14c/0x3d0
[   62.691598]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.692264]  kthread+0x24c/0x2d0
[   62.692947]  ret_from_fork+0x10/0x20
[   62.693447] 
[   62.693805] kfence-#216: 0x00000000b7e75076-0x00000000ef61111f, size=73, cache=kmalloc-96
[   62.693805] 
[   62.694936] allocated by task 314 on cpu 1 at 62.685659s (0.009268s ago):
[   62.695813]  test_alloc+0x298/0x620
[   62.696428]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   62.697028]  kunit_try_run_case+0x14c/0x3d0
[   62.697703]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.698537]  kthread+0x24c/0x2d0
[   62.699000]  ret_from_fork+0x10/0x20
[   62.699618] 
[   62.699918] freed by task 314 on cpu 1 at 62.685875s (0.014034s ago):
[   62.700860]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   62.701676]  kunit_try_run_case+0x14c/0x3d0
[   62.702262]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.703085]  kthread+0x24c/0x2d0
[   62.703551]  ret_from_fork+0x10/0x20
[   62.704180] 
[   62.704559] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   62.705763] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.706336] Hardware name: linux,dummy-virt (DT)
[   62.707023] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[   62.270626] ==================================================================
[   62.271400] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   62.271400] 
[   62.272574] Out-of-bounds read at 0x000000009df81205 (105B right of kfence-#212):
[   62.273488]  test_kmalloc_aligned_oob_read+0x238/0x468
[   62.274489]  test_kmalloc_aligned_oob_read+0x100/0x468
[   62.275205]  kunit_try_run_case+0x14c/0x3d0
[   62.276579]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.277714]  kthread+0x24c/0x2d0
[   62.278388]  ret_from_fork+0x10/0x20
[   62.279017] 
[   62.279484] kfence-#212: 0x000000003735abb6-0x0000000023f5a97b, size=73, cache=kmalloc-96
[   62.279484] 
[   62.280586] allocated by task 312 on cpu 0 at 62.270271s (0.010305s ago):
[   62.281874]  test_alloc+0x298/0x620
[   62.282641]  test_kmalloc_aligned_oob_read+0x100/0x468
[   62.283234]  kunit_try_run_case+0x14c/0x3d0
[   62.283990]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.284868]  kthread+0x24c/0x2d0
[   62.285533]  ret_from_fork+0x10/0x20
[   62.286163] 
[   62.286577] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   62.287879] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.288446] Hardware name: linux,dummy-virt (DT)
[   62.288996] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[   58.317962] ==================================================================
[   58.318891] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   58.318891] 
[   58.319595] Corrupted memory at 0x0000000093590f96 [ ! . . . . . . . . . . . . . . . ] (in kfence-#174):
[   58.322212]  test_corruption+0x120/0x378
[   58.322980]  kunit_try_run_case+0x14c/0x3d0
[   58.323776]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.324429]  kthread+0x24c/0x2d0
[   58.324981]  ret_from_fork+0x10/0x20
[   58.325521] 
[   58.325816] kfence-#174: 0x00000000cc0f8d77-0x0000000098966412, size=32, cache=test
[   58.325816] 
[   58.326804] allocated by task 302 on cpu 1 at 58.317728s (0.009066s ago):
[   58.327782]  test_alloc+0x22c/0x620
[   58.328281]  test_corruption+0xdc/0x378
[   58.329034]  kunit_try_run_case+0x14c/0x3d0
[   58.329726]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.330344]  kthread+0x24c/0x2d0
[   58.330916]  ret_from_fork+0x10/0x20
[   58.331477] 
[   58.331924] freed by task 302 on cpu 1 at 58.317817s (0.014099s ago):
[   58.332901]  test_corruption+0x120/0x378
[   58.333546]  kunit_try_run_case+0x14c/0x3d0
[   58.334100]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.334862]  kthread+0x24c/0x2d0
[   58.335350]  ret_from_fork+0x10/0x20
[   58.335967] 
[   58.336354] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   58.337499] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.338115] Hardware name: linux,dummy-virt (DT)
[   58.338654] ==================================================================
[   58.526026] ==================================================================
[   58.526893] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   58.526893] 
[   58.527757] Corrupted memory at 0x0000000047a9992b [ ! ] (in kfence-#176):
[   58.528846]  test_corruption+0x1d8/0x378
[   58.529546]  kunit_try_run_case+0x14c/0x3d0
[   58.531717]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.532343]  kthread+0x24c/0x2d0
[   58.532712]  ret_from_fork+0x10/0x20
[   58.533097] 
[   58.534035] kfence-#176: 0x00000000e388f115-0x00000000711e6e3d, size=32, cache=test
[   58.534035] 
[   58.536312] allocated by task 302 on cpu 1 at 58.525795s (0.010504s ago):
[   58.537161]  test_alloc+0x22c/0x620
[   58.537549]  test_corruption+0x198/0x378
[   58.537957]  kunit_try_run_case+0x14c/0x3d0
[   58.539584]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.541483]  kthread+0x24c/0x2d0
[   58.542566]  ret_from_fork+0x10/0x20
[   58.543935] 
[   58.544560] freed by task 302 on cpu 1 at 58.525886s (0.018664s ago):
[   58.546651]  test_corruption+0x1d8/0x378
[   58.547707]  kunit_try_run_case+0x14c/0x3d0
[   58.548472]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.549468]  kthread+0x24c/0x2d0
[   58.550400]  ret_from_fork+0x10/0x20
[   58.551246] 
[   58.551642] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   58.553124] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.553774] Hardware name: linux,dummy-virt (DT)
[   58.554435] ==================================================================
[   57.798146] ==================================================================
[   57.798997] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   57.798997] 
[   57.799853] Corrupted memory at 0x000000007751a015 [ ! . . . . . . . . . . . . . . . ] (in kfence-#169):
[   57.803434]  test_corruption+0x278/0x378
[   57.804073]  kunit_try_run_case+0x14c/0x3d0
[   57.804646]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.805275]  kthread+0x24c/0x2d0
[   57.805831]  ret_from_fork+0x10/0x20
[   57.806542] 
[   57.806960] kfence-#169: 0x0000000019aa0747-0x00000000e3cc0d9f, size=32, cache=kmalloc-32
[   57.806960] 
[   57.808226] allocated by task 300 on cpu 1 at 57.797711s (0.010507s ago):
[   57.809074]  test_alloc+0x298/0x620
[   57.809689]  test_corruption+0xdc/0x378
[   57.810203]  kunit_try_run_case+0x14c/0x3d0
[   57.811047]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.811913]  kthread+0x24c/0x2d0
[   57.812402]  ret_from_fork+0x10/0x20
[   57.812840] 
[   57.813198] freed by task 300 on cpu 1 at 57.797859s (0.015330s ago):
[   57.814333]  test_corruption+0x278/0x378
[   57.815127]  kunit_try_run_case+0x14c/0x3d0
[   57.815653]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.816333]  kthread+0x24c/0x2d0
[   57.816763]  ret_from_fork+0x10/0x20
[   57.817368] 
[   57.817758] CPU: 1 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   57.818870] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.819484] Hardware name: linux,dummy-virt (DT)
[   57.820088] ==================================================================
[   57.902132] ==================================================================
[   57.902947] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   57.902947] 
[   57.903856] Corrupted memory at 0x000000008f2d0cf5 [ ! ] (in kfence-#170):
[   57.905024]  test_corruption+0x284/0x378
[   57.905637]  kunit_try_run_case+0x14c/0x3d0
[   57.906218]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.906860]  kthread+0x24c/0x2d0
[   57.907436]  ret_from_fork+0x10/0x20
[   57.908057] 
[   57.908368] kfence-#170: 0x00000000604ed725-0x00000000a98ab62a, size=32, cache=kmalloc-32
[   57.908368] 
[   57.909434] allocated by task 300 on cpu 1 at 57.901743s (0.007681s ago):
[   57.910433]  test_alloc+0x298/0x620
[   57.910955]  test_corruption+0x198/0x378
[   57.911567]  kunit_try_run_case+0x14c/0x3d0
[   57.912120]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.912988]  kthread+0x24c/0x2d0
[   57.913473]  ret_from_fork+0x10/0x20
[   57.914126] 
[   57.914433] freed by task 300 on cpu 1 at 57.901867s (0.012557s ago):
[   57.915316]  test_corruption+0x284/0x378
[   57.915869]  kunit_try_run_case+0x14c/0x3d0
[   57.916453]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.917258]  kthread+0x24c/0x2d0
[   57.917750]  ret_from_fork+0x10/0x20
[   57.918364] 
[   57.918712] CPU: 1 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   57.919853] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.920462] Hardware name: linux,dummy-virt (DT)
[   57.921094] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[   57.693827] ==================================================================
[   57.694618] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   57.694618] 
[   57.695468] Invalid free of 0x00000000c60e739b (in kfence-#168):
[   57.696174]  test_invalid_addr_free+0xec/0x238
[   57.697059]  kunit_try_run_case+0x14c/0x3d0
[   57.697996]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.698664]  kthread+0x24c/0x2d0
[   57.699164]  ret_from_fork+0x10/0x20
[   57.699785] 
[   57.700065] kfence-#168: 0x00000000bae47ff0-0x00000000cd90d9ed, size=32, cache=test
[   57.700065] 
[   57.701352] allocated by task 298 on cpu 1 at 57.693672s (0.007671s ago):
[   57.702198]  test_alloc+0x22c/0x620
[   57.702745]  test_invalid_addr_free+0xd4/0x238
[   57.703515]  kunit_try_run_case+0x14c/0x3d0
[   57.704238]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.704915]  kthread+0x24c/0x2d0
[   57.705521]  ret_from_fork+0x10/0x20
[   57.706011] 
[   57.706423] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   57.707648] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.708171] Hardware name: linux,dummy-virt (DT)
[   57.708811] ==================================================================
[   57.590077] ==================================================================
[   57.590862] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   57.590862] 
[   57.591876] Invalid free of 0x000000008712e942 (in kfence-#167):
[   57.592775]  test_invalid_addr_free+0x1ac/0x238
[   57.593421]  kunit_try_run_case+0x14c/0x3d0
[   57.594238]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.594964]  kthread+0x24c/0x2d0
[   57.595631]  ret_from_fork+0x10/0x20
[   57.596394] 
[   57.596730] kfence-#167: 0x0000000083b6f074-0x00000000b777f08a, size=32, cache=kmalloc-32
[   57.596730] 
[   57.597782] allocated by task 296 on cpu 1 at 57.589839s (0.007934s ago):
[   57.598708]  test_alloc+0x298/0x620
[   57.599406]  test_invalid_addr_free+0xd4/0x238
[   57.599948]  kunit_try_run_case+0x14c/0x3d0
[   57.600639]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.601324]  kthread+0x24c/0x2d0
[   57.601906]  ret_from_fork+0x10/0x20
[   57.602482] 
[   57.602832] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   57.603924] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.604581] Hardware name: linux,dummy-virt (DT)
[   57.605182] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[   57.382250] ==================================================================
[   57.383163] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   57.383163] 
[   57.383929] Invalid free of 0x000000002c0ba8a6 (in kfence-#165):
[   57.384592]  test_double_free+0x1bc/0x238
[   57.385346]  kunit_try_run_case+0x14c/0x3d0
[   57.386022]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.386762]  kthread+0x24c/0x2d0
[   57.387262]  ret_from_fork+0x10/0x20
[   57.387919] 
[   57.388202] kfence-#165: 0x000000002c0ba8a6-0x0000000079dbae02, size=32, cache=kmalloc-32
[   57.388202] 
[   57.389439] allocated by task 292 on cpu 0 at 57.381764s (0.007665s ago):
[   57.390312]  test_alloc+0x298/0x620
[   57.390953]  test_double_free+0xd4/0x238
[   57.391592]  kunit_try_run_case+0x14c/0x3d0
[   57.392159]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.393016]  kthread+0x24c/0x2d0
[   57.393510]  ret_from_fork+0x10/0x20
[   57.394125] 
[   57.394517] freed by task 292 on cpu 0 at 57.381882s (0.012624s ago):
[   57.395370]  test_double_free+0x1ac/0x238
[   57.395960]  kunit_try_run_case+0x14c/0x3d0
[   57.396468]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.397318]  kthread+0x24c/0x2d0
[   57.397833]  ret_from_fork+0x10/0x20
[   57.398308] 
[   57.398716] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   57.399938] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.400538] Hardware name: linux,dummy-virt (DT)
[   57.401170] ==================================================================
[   57.486109] ==================================================================
[   57.486910] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   57.486910] 
[   57.487711] Invalid free of 0x0000000017d3286d (in kfence-#166):
[   57.488471]  test_double_free+0x100/0x238
[   57.489191]  kunit_try_run_case+0x14c/0x3d0
[   57.489721]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.490501]  kthread+0x24c/0x2d0
[   57.491019]  ret_from_fork+0x10/0x20
[   57.491530] 
[   57.491983] kfence-#166: 0x0000000017d3286d-0x00000000c77d9e40, size=32, cache=test
[   57.491983] 
[   57.492915] allocated by task 294 on cpu 1 at 57.485750s (0.007155s ago):
[   57.493887]  test_alloc+0x22c/0x620
[   57.494502]  test_double_free+0xd4/0x238
[   57.495267]  kunit_try_run_case+0x14c/0x3d0
[   57.495856]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.496686]  kthread+0x24c/0x2d0
[   57.497264]  ret_from_fork+0x10/0x20
[   57.497737] 
[   57.498105] freed by task 294 on cpu 1 at 57.485842s (0.012254s ago):
[   57.498889]  test_double_free+0xf0/0x238
[   57.499603]  kunit_try_run_case+0x14c/0x3d0
[   57.500246]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.500977]  kthread+0x24c/0x2d0
[   57.501484]  ret_from_fork+0x10/0x20
[   57.502105] 
[   57.502499] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   57.503718] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.504370] Hardware name: linux,dummy-virt (DT)
[   57.504949] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[   57.070094] ==================================================================
[   57.070881] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   57.070881] 
[   57.071844] Use-after-free read at 0x0000000029a0ceb8 (in kfence-#162):
[   57.072746]  test_use_after_free_read+0x114/0x248
[   57.073467]  test_use_after_free_read+0xf0/0x248
[   57.074440]  kunit_try_run_case+0x14c/0x3d0
[   57.075268]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.076079]  kthread+0x24c/0x2d0
[   57.076690]  ret_from_fork+0x10/0x20
[   57.077279] 
[   57.077676] kfence-#162: 0x0000000029a0ceb8-0x000000002b8a4f78, size=32, cache=test
[   57.077676] 
[   57.078856] allocated by task 286 on cpu 1 at 57.069811s (0.009036s ago):
[   57.079862]  test_alloc+0x22c/0x620
[   57.080494]  test_use_after_free_read+0xd0/0x248
[   57.081174]  kunit_try_run_case+0x14c/0x3d0
[   57.081831]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.082599]  kthread+0x24c/0x2d0
[   57.083156]  ret_from_fork+0x10/0x20
[   57.083776] 
[   57.084145] freed by task 286 on cpu 1 at 57.069894s (0.014243s ago):
[   57.085242]  test_use_after_free_read+0xf0/0x248
[   57.085993]  kunit_try_run_case+0x14c/0x3d0
[   57.086675]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.087475]  kthread+0x24c/0x2d0
[   57.088038]  ret_from_fork+0x10/0x20
[   57.088643] 
[   57.089008] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   57.090358] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.090996] Hardware name: linux,dummy-virt (DT)
[   57.091666] ==================================================================
[   56.966348] ==================================================================
[   56.967122] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   56.967122] 
[   56.968165] Use-after-free read at 0x000000002e3edaab (in kfence-#161):
[   56.969030]  test_use_after_free_read+0x114/0x248
[   56.969577]  test_use_after_free_read+0x1c0/0x248
[   56.970065]  kunit_try_run_case+0x14c/0x3d0
[   56.970594]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.971360]  kthread+0x24c/0x2d0
[   56.971870]  ret_from_fork+0x10/0x20
[   56.972539] 
[   56.972983] kfence-#161: 0x000000002e3edaab-0x00000000a1dd806b, size=32, cache=kmalloc-32
[   56.972983] 
[   56.974094] allocated by task 284 on cpu 1 at 56.965783s (0.008303s ago):
[   56.975120]  test_alloc+0x298/0x620
[   56.975680]  test_use_after_free_read+0xd0/0x248
[   56.976232]  kunit_try_run_case+0x14c/0x3d0
[   56.976979]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.977693]  kthread+0x24c/0x2d0
[   56.978198]  ret_from_fork+0x10/0x20
[   56.978797] 
[   56.979404] freed by task 284 on cpu 1 at 56.965890s (0.013326s ago):
[   56.980322]  test_use_after_free_read+0x1c0/0x248
[   56.981034]  kunit_try_run_case+0x14c/0x3d0
[   56.981677]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.982388]  kthread+0x24c/0x2d0
[   56.982888]  ret_from_fork+0x10/0x20
[   56.983553] 
[   56.983943] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   56.985004] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.985611] Hardware name: linux,dummy-virt (DT)
[   56.986215] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[   55.407122] ==================================================================
[   55.408087] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   55.408087] 
[   55.409197] Out-of-bounds read at 0x000000004c79a626 (1B left of kfence-#146):
[   55.410733]  test_out_of_bounds_read+0x114/0x3e0
[   55.411510]  test_out_of_bounds_read+0xdc/0x3e0
[   55.412247]  kunit_try_run_case+0x14c/0x3d0
[   55.412965]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.413808]  kthread+0x24c/0x2d0
[   55.414378]  ret_from_fork+0x10/0x20
[   55.414976] 
[   55.415735] kfence-#146: 0x00000000bfd11f8e-0x00000000a69e739f, size=32, cache=kmalloc-32
[   55.415735] 
[   55.417230] allocated by task 276 on cpu 0 at 55.405860s (0.011199s ago):
[   55.418756]  test_alloc+0x298/0x620
[   55.419329]  test_out_of_bounds_read+0xdc/0x3e0
[   55.420027]  kunit_try_run_case+0x14c/0x3d0
[   55.420681]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.421463]  kthread+0x24c/0x2d0
[   55.422071]  ret_from_fork+0x10/0x20
[   55.422762] 
[   55.423307] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   55.424456] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.425067] Hardware name: linux,dummy-virt (DT)
[   55.425761] ==================================================================
[   55.925980] ==================================================================
[   55.926926] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   55.926926] 
[   55.927858] Out-of-bounds read at 0x000000000c4c437c (1B left of kfence-#151):
[   55.928617]  test_out_of_bounds_read+0x114/0x3e0
[   55.929480]  test_out_of_bounds_read+0xdc/0x3e0
[   55.930380]  kunit_try_run_case+0x14c/0x3d0
[   55.931237]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.931967]  kthread+0x24c/0x2d0
[   55.932424]  ret_from_fork+0x10/0x20
[   55.932959] 
[   55.933349] kfence-#151: 0x0000000077289022-0x00000000023ddf0c, size=32, cache=test
[   55.933349] 
[   55.934280] allocated by task 278 on cpu 1 at 55.925814s (0.008456s ago):
[   55.935547]  test_alloc+0x22c/0x620
[   55.936176]  test_out_of_bounds_read+0xdc/0x3e0
[   55.936762]  kunit_try_run_case+0x14c/0x3d0
[   55.937197]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.937887]  kthread+0x24c/0x2d0
[   55.938507]  ret_from_fork+0x10/0x20
[   55.939014] 
[   55.939484] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   55.940747] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.941258] Hardware name: linux,dummy-virt (DT)
[   55.941880] ==================================================================
[   56.237819] ==================================================================
[   56.238819] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   56.238819] 
[   56.239736] Out-of-bounds read at 0x000000008c164954 (32B right of kfence-#154):
[   56.240726]  test_out_of_bounds_read+0x1c8/0x3e0
[   56.241680]  test_out_of_bounds_read+0x198/0x3e0
[   56.242578]  kunit_try_run_case+0x14c/0x3d0
[   56.243311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.244077]  kthread+0x24c/0x2d0
[   56.244653]  ret_from_fork+0x10/0x20
[   56.245259] 
[   56.245634] kfence-#154: 0x0000000073f884b6-0x00000000f56eee9b, size=32, cache=test
[   56.245634] 
[   56.246810] allocated by task 278 on cpu 1 at 56.237677s (0.009124s ago):
[   56.247866]  test_alloc+0x22c/0x620
[   56.248576]  test_out_of_bounds_read+0x198/0x3e0
[   56.249235]  kunit_try_run_case+0x14c/0x3d0
[   56.249882]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.250772]  kthread+0x24c/0x2d0
[   56.251366]  ret_from_fork+0x10/0x20
[   56.251956] 
[   56.252395] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   56.253635] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.254252] Hardware name: linux,dummy-virt (DT)
[   56.254913] ==================================================================
[   55.614156] ==================================================================
[   55.614987] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   55.614987] 
[   55.615964] Out-of-bounds read at 0x000000003a0da0d1 (32B right of kfence-#148):
[   55.616711]  test_out_of_bounds_read+0x1c8/0x3e0
[   55.617759]  test_out_of_bounds_read+0x198/0x3e0
[   55.618551]  kunit_try_run_case+0x14c/0x3d0
[   55.619053]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.619930]  kthread+0x24c/0x2d0
[   55.620607]  ret_from_fork+0x10/0x20
[   55.621080] 
[   55.621531] kfence-#148: 0x000000007ce66532-0x0000000027d75871, size=32, cache=kmalloc-32
[   55.621531] 
[   55.622636] allocated by task 276 on cpu 0 at 55.613741s (0.008887s ago):
[   55.623555]  test_alloc+0x298/0x620
[   55.624129]  test_out_of_bounds_read+0x198/0x3e0
[   55.624682]  kunit_try_run_case+0x14c/0x3d0
[   55.625398]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.626092]  kthread+0x24c/0x2d0
[   55.626608]  ret_from_fork+0x10/0x20
[   55.627196] 
[   55.627578] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   55.628865] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.629430] Hardware name: linux,dummy-virt (DT)
[   55.629992] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[   55.056139] ==================================================================
[   55.057012] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   55.057837] Write of size 1 at addr fff00000c61a5678 by task kunit_try_catch/274
[   55.058905] 
[   55.059357] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   55.060502] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.061149] Hardware name: linux,dummy-virt (DT)
[   55.061668] Call trace:
[   55.062281]  show_stack+0x20/0x38 (C)
[   55.062832]  dump_stack_lvl+0x8c/0xd0
[   55.063410]  print_report+0x118/0x5e0
[   55.064068]  kasan_report+0xc8/0x118
[   55.064585]  __asan_report_store1_noabort+0x20/0x30
[   55.065435]  strncpy_from_user+0x270/0x2a0
[   55.066133]  copy_user_test_oob+0x5c0/0xec0
[   55.066784]  kunit_try_run_case+0x14c/0x3d0
[   55.067364]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.068178]  kthread+0x24c/0x2d0
[   55.068687]  ret_from_fork+0x10/0x20
[   55.069321] 
[   55.069637] Allocated by task 274:
[   55.070281]  kasan_save_stack+0x3c/0x68
[   55.071166]  kasan_save_track+0x20/0x40
[   55.071722]  kasan_save_alloc_info+0x40/0x58
[   55.072407]  __kasan_kmalloc+0xd4/0xd8
[   55.073048]  __kmalloc_noprof+0x188/0x4c8
[   55.073701]  kunit_kmalloc_array+0x34/0x88
[   55.074345]  copy_user_test_oob+0xac/0xec0
[   55.074969]  kunit_try_run_case+0x14c/0x3d0
[   55.075609]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.076378]  kthread+0x24c/0x2d0
[   55.077007]  ret_from_fork+0x10/0x20
[   55.077605] 
[   55.077948] The buggy address belongs to the object at fff00000c61a5600
[   55.077948]  which belongs to the cache kmalloc-128 of size 128
[   55.079413] The buggy address is located 0 bytes to the right of
[   55.079413]  allocated 120-byte region [fff00000c61a5600, fff00000c61a5678)
[   55.080922] 
[   55.081375] The buggy address belongs to the physical page:
[   55.082043] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061a5
[   55.083157] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.084023] page_type: f5(slab)
[   55.084708] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   55.085667] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   55.086648] page dumped because: kasan: bad access detected
[   55.087413] 
[   55.087773] Memory state around the buggy address:
[   55.088532]  fff00000c61a5500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   55.089541]  fff00000c61a5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.090525] >fff00000c61a5600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   55.091375]                                                                 ^
[   55.092261]  fff00000c61a5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.093258]  fff00000c61a5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.094148] ==================================================================
[   55.015728] ==================================================================
[   55.016876] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   55.017599] Write of size 121 at addr fff00000c61a5600 by task kunit_try_catch/274
[   55.018606] 
[   55.018960] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   55.020218] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.020836] Hardware name: linux,dummy-virt (DT)
[   55.021635] Call trace:
[   55.022078]  show_stack+0x20/0x38 (C)
[   55.022757]  dump_stack_lvl+0x8c/0xd0
[   55.023380]  print_report+0x118/0x5e0
[   55.024001]  kasan_report+0xc8/0x118
[   55.024581]  kasan_check_range+0x100/0x1a8
[   55.025168]  __kasan_check_write+0x20/0x30
[   55.025770]  strncpy_from_user+0x3c/0x2a0
[   55.026334]  copy_user_test_oob+0x5c0/0xec0
[   55.027071]  kunit_try_run_case+0x14c/0x3d0
[   55.027744]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.028508]  kthread+0x24c/0x2d0
[   55.029066]  ret_from_fork+0x10/0x20
[   55.029677] 
[   55.030055] Allocated by task 274:
[   55.030676]  kasan_save_stack+0x3c/0x68
[   55.031323]  kasan_save_track+0x20/0x40
[   55.032001]  kasan_save_alloc_info+0x40/0x58
[   55.032742]  __kasan_kmalloc+0xd4/0xd8
[   55.033412]  __kmalloc_noprof+0x188/0x4c8
[   55.034058]  kunit_kmalloc_array+0x34/0x88
[   55.034723]  copy_user_test_oob+0xac/0xec0
[   55.035388]  kunit_try_run_case+0x14c/0x3d0
[   55.036024]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.036762]  kthread+0x24c/0x2d0
[   55.037348]  ret_from_fork+0x10/0x20
[   55.037988] 
[   55.038402] The buggy address belongs to the object at fff00000c61a5600
[   55.038402]  which belongs to the cache kmalloc-128 of size 128
[   55.039893] The buggy address is located 0 bytes inside of
[   55.039893]  allocated 120-byte region [fff00000c61a5600, fff00000c61a5678)
[   55.041447] 
[   55.041863] The buggy address belongs to the physical page:
[   55.042587] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061a5
[   55.043674] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.044515] page_type: f5(slab)
[   55.045050] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   55.046064] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   55.047093] page dumped because: kasan: bad access detected
[   55.047870] 
[   55.048213] Memory state around the buggy address:
[   55.048930]  fff00000c61a5500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   55.049986]  fff00000c61a5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.050930] >fff00000c61a5600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   55.051840]                                                                 ^
[   55.052702]  fff00000c61a5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.053671]  fff00000c61a5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.054533] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[   54.767282] ==================================================================
[   54.768734] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec0
[   54.769635] Write of size 121 at addr fff00000c61a5600 by task kunit_try_catch/274
[   54.771375] 
[   54.771715] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   54.773043] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.774117] Hardware name: linux,dummy-virt (DT)
[   54.774732] Call trace:
[   54.775144]  show_stack+0x20/0x38 (C)
[   54.775729]  dump_stack_lvl+0x8c/0xd0
[   54.776317]  print_report+0x118/0x5e0
[   54.776897]  kasan_report+0xc8/0x118
[   54.777791]  kasan_check_range+0x100/0x1a8
[   54.778407]  __kasan_check_write+0x20/0x30
[   54.779015]  copy_user_test_oob+0x234/0xec0
[   54.779617]  kunit_try_run_case+0x14c/0x3d0
[   54.780285]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.780922]  kthread+0x24c/0x2d0
[   54.781900]  ret_from_fork+0x10/0x20
[   54.782509] 
[   54.782827] Allocated by task 274:
[   54.783432]  kasan_save_stack+0x3c/0x68
[   54.784075]  kasan_save_track+0x20/0x40
[   54.784693]  kasan_save_alloc_info+0x40/0x58
[   54.785575]  __kasan_kmalloc+0xd4/0xd8
[   54.786155]  __kmalloc_noprof+0x188/0x4c8
[   54.786755]  kunit_kmalloc_array+0x34/0x88
[   54.787306]  copy_user_test_oob+0xac/0xec0
[   54.787854]  kunit_try_run_case+0x14c/0x3d0
[   54.788494]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.789192]  kthread+0x24c/0x2d0
[   54.789825]  ret_from_fork+0x10/0x20
[   54.790322] 
[   54.790710] The buggy address belongs to the object at fff00000c61a5600
[   54.790710]  which belongs to the cache kmalloc-128 of size 128
[   54.792834] The buggy address is located 0 bytes inside of
[   54.792834]  allocated 120-byte region [fff00000c61a5600, fff00000c61a5678)
[   54.794473] 
[   54.794779] The buggy address belongs to the physical page:
[   54.795528] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061a5
[   54.796491] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.797568] page_type: f5(slab)
[   54.798222] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   54.799159] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   54.800057] page dumped because: kasan: bad access detected
[   54.800713] 
[   54.801021] Memory state around the buggy address:
[   54.802048]  fff00000c61a5500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   54.802941]  fff00000c61a5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.804081] >fff00000c61a5600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   54.804901]                                                                 ^
[   54.806479]  fff00000c61a5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.807585]  fff00000c61a5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.808544] ==================================================================
[   54.864802] ==================================================================
[   54.865897] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec0
[   54.867251] Write of size 121 at addr fff00000c61a5600 by task kunit_try_catch/274
[   54.868482] 
[   54.868803] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   54.870126] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.870702] Hardware name: linux,dummy-virt (DT)
[   54.871190] Call trace:
[   54.871582]  show_stack+0x20/0x38 (C)
[   54.872156]  dump_stack_lvl+0x8c/0xd0
[   54.872822]  print_report+0x118/0x5e0
[   54.873421]  kasan_report+0xc8/0x118
[   54.873971]  kasan_check_range+0x100/0x1a8
[   54.874619]  __kasan_check_write+0x20/0x30
[   54.875227]  copy_user_test_oob+0x35c/0xec0
[   54.875784]  kunit_try_run_case+0x14c/0x3d0
[   54.876490]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.877265]  kthread+0x24c/0x2d0
[   54.877733]  ret_from_fork+0x10/0x20
[   54.878390] 
[   54.878763] Allocated by task 274:
[   54.879228]  kasan_save_stack+0x3c/0x68
[   54.879859]  kasan_save_track+0x20/0x40
[   54.880376]  kasan_save_alloc_info+0x40/0x58
[   54.881049]  __kasan_kmalloc+0xd4/0xd8
[   54.881698]  __kmalloc_noprof+0x188/0x4c8
[   54.882234]  kunit_kmalloc_array+0x34/0x88
[   54.882846]  copy_user_test_oob+0xac/0xec0
[   54.883404]  kunit_try_run_case+0x14c/0x3d0
[   54.884023]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.884627]  kthread+0x24c/0x2d0
[   54.885208]  ret_from_fork+0x10/0x20
[   54.885761] 
[   54.886068] The buggy address belongs to the object at fff00000c61a5600
[   54.886068]  which belongs to the cache kmalloc-128 of size 128
[   54.887426] The buggy address is located 0 bytes inside of
[   54.887426]  allocated 120-byte region [fff00000c61a5600, fff00000c61a5678)
[   54.888767] 
[   54.889084] The buggy address belongs to the physical page:
[   54.889973] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061a5
[   54.890874] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.891732] page_type: f5(slab)
[   54.892317] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   54.893177] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   54.894060] page dumped because: kasan: bad access detected
[   54.894742] 
[   54.895132] Memory state around the buggy address:
[   54.895750]  fff00000c61a5500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   54.896732]  fff00000c61a5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.897675] >fff00000c61a5600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   54.898558]                                                                 ^
[   54.899406]  fff00000c61a5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.900171]  fff00000c61a5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.900972] ==================================================================
[   54.816603] ==================================================================
[   54.817609] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec0
[   54.819244] Read of size 121 at addr fff00000c61a5600 by task kunit_try_catch/274
[   54.820212] 
[   54.820595] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   54.821903] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.822606] Hardware name: linux,dummy-virt (DT)
[   54.823254] Call trace:
[   54.823662]  show_stack+0x20/0x38 (C)
[   54.824165]  dump_stack_lvl+0x8c/0xd0
[   54.824853]  print_report+0x118/0x5e0
[   54.825893]  kasan_report+0xc8/0x118
[   54.826511]  kasan_check_range+0x100/0x1a8
[   54.827115]  __kasan_check_read+0x20/0x30
[   54.827622]  copy_user_test_oob+0x728/0xec0
[   54.828128]  kunit_try_run_case+0x14c/0x3d0
[   54.828707]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.829488]  kthread+0x24c/0x2d0
[   54.830132]  ret_from_fork+0x10/0x20
[   54.830694] 
[   54.831003] Allocated by task 274:
[   54.831834]  kasan_save_stack+0x3c/0x68
[   54.832469]  kasan_save_track+0x20/0x40
[   54.833316]  kasan_save_alloc_info+0x40/0x58
[   54.833929]  __kasan_kmalloc+0xd4/0xd8
[   54.834462]  __kmalloc_noprof+0x188/0x4c8
[   54.835087]  kunit_kmalloc_array+0x34/0x88
[   54.835715]  copy_user_test_oob+0xac/0xec0
[   54.836393]  kunit_try_run_case+0x14c/0x3d0
[   54.836993]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.838383]  kthread+0x24c/0x2d0
[   54.839087]  ret_from_fork+0x10/0x20
[   54.839599] 
[   54.839916] The buggy address belongs to the object at fff00000c61a5600
[   54.839916]  which belongs to the cache kmalloc-128 of size 128
[   54.841801] The buggy address is located 0 bytes inside of
[   54.841801]  allocated 120-byte region [fff00000c61a5600, fff00000c61a5678)
[   54.843366] 
[   54.843860] The buggy address belongs to the physical page:
[   54.844515] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061a5
[   54.844974] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.846283] page_type: f5(slab)
[   54.846759] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   54.847676] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   54.848651] page dumped because: kasan: bad access detected
[   54.849450] 
[   54.849873] Memory state around the buggy address:
[   54.850521]  fff00000c61a5500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   54.851417]  fff00000c61a5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.852367] >fff00000c61a5600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   54.853391]                                                                 ^
[   54.854235]  fff00000c61a5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.855050]  fff00000c61a5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.855616] ==================================================================
[   54.902681] ==================================================================
[   54.903520] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec0
[   54.904167] Read of size 121 at addr fff00000c61a5600 by task kunit_try_catch/274
[   54.905384] 
[   54.906051] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   54.907233] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.907761] Hardware name: linux,dummy-virt (DT)
[   54.908368] Call trace:
[   54.908732]  show_stack+0x20/0x38 (C)
[   54.909370]  dump_stack_lvl+0x8c/0xd0
[   54.909943]  print_report+0x118/0x5e0
[   54.910526]  kasan_report+0xc8/0x118
[   54.911076]  kasan_check_range+0x100/0x1a8
[   54.911673]  __kasan_check_read+0x20/0x30
[   54.912322]  copy_user_test_oob+0x3c8/0xec0
[   54.912931]  kunit_try_run_case+0x14c/0x3d0
[   54.913630]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.914415]  kthread+0x24c/0x2d0
[   54.914952]  ret_from_fork+0x10/0x20
[   54.915540] 
[   54.915806] Allocated by task 274:
[   54.916286]  kasan_save_stack+0x3c/0x68
[   54.916920]  kasan_save_track+0x20/0x40
[   54.917479]  kasan_save_alloc_info+0x40/0x58
[   54.918158]  __kasan_kmalloc+0xd4/0xd8
[   54.918742]  __kmalloc_noprof+0x188/0x4c8
[   54.919347]  kunit_kmalloc_array+0x34/0x88
[   54.919871]  copy_user_test_oob+0xac/0xec0
[   54.920523]  kunit_try_run_case+0x14c/0x3d0
[   54.921109]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.921787]  kthread+0x24c/0x2d0
[   54.922269]  ret_from_fork+0x10/0x20
[   54.922893] 
[   54.923188] The buggy address belongs to the object at fff00000c61a5600
[   54.923188]  which belongs to the cache kmalloc-128 of size 128
[   54.924547] The buggy address is located 0 bytes inside of
[   54.924547]  allocated 120-byte region [fff00000c61a5600, fff00000c61a5678)
[   54.925892] 
[   54.926187] The buggy address belongs to the physical page:
[   54.926961] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061a5
[   54.927815] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.928626] page_type: f5(slab)
[   54.929071] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   54.930104] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   54.930991] page dumped because: kasan: bad access detected
[   54.931732] 
[   54.932053] Memory state around the buggy address:
[   54.932605]  fff00000c61a5500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   54.933516]  fff00000c61a5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.934470] >fff00000c61a5600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   54.935230]                                                                 ^
[   54.936094]  fff00000c61a5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.936947]  fff00000c61a5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.937827] ==================================================================
[   54.939643] ==================================================================
[   54.940421] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec0
[   54.941221] Write of size 121 at addr fff00000c61a5600 by task kunit_try_catch/274
[   54.942886] 
[   54.943326] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   54.944447] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.945098] Hardware name: linux,dummy-virt (DT)
[   54.945751] Call trace:
[   54.946125]  show_stack+0x20/0x38 (C)
[   54.946641]  dump_stack_lvl+0x8c/0xd0
[   54.947279]  print_report+0x118/0x5e0
[   54.947869]  kasan_report+0xc8/0x118
[   54.948433]  kasan_check_range+0x100/0x1a8
[   54.949065]  __kasan_check_write+0x20/0x30
[   54.949769]  copy_user_test_oob+0x434/0xec0
[   54.950420]  kunit_try_run_case+0x14c/0x3d0
[   54.951125]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.951835]  kthread+0x24c/0x2d0
[   54.952366]  ret_from_fork+0x10/0x20
[   54.952981] 
[   54.953342] Allocated by task 274:
[   54.953845]  kasan_save_stack+0x3c/0x68
[   54.954394]  kasan_save_track+0x20/0x40
[   54.954925]  kasan_save_alloc_info+0x40/0x58
[   54.955639]  __kasan_kmalloc+0xd4/0xd8
[   54.956215]  __kmalloc_noprof+0x188/0x4c8
[   54.956705]  kunit_kmalloc_array+0x34/0x88
[   54.957394]  copy_user_test_oob+0xac/0xec0
[   54.957997]  kunit_try_run_case+0x14c/0x3d0
[   54.958726]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.959363]  kthread+0x24c/0x2d0
[   54.959906]  ret_from_fork+0x10/0x20
[   54.960418] 
[   54.960840] The buggy address belongs to the object at fff00000c61a5600
[   54.960840]  which belongs to the cache kmalloc-128 of size 128
[   54.962209] The buggy address is located 0 bytes inside of
[   54.962209]  allocated 120-byte region [fff00000c61a5600, fff00000c61a5678)
[   54.963580] 
[   54.963851] The buggy address belongs to the physical page:
[   54.964593] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061a5
[   54.965520] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.966382] page_type: f5(slab)
[   54.966890] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   54.967761] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   54.968783] page dumped because: kasan: bad access detected
[   54.969574] 
[   54.969888] Memory state around the buggy address:
[   54.970530]  fff00000c61a5500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   54.971346]  fff00000c61a5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.972270] >fff00000c61a5600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   54.973076]                                                                 ^
[   54.973894]  fff00000c61a5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.974847]  fff00000c61a5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.975802] ==================================================================
[   54.978785] ==================================================================
[   54.979554] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec0
[   54.980340] Read of size 121 at addr fff00000c61a5600 by task kunit_try_catch/274
[   54.981087] 
[   54.981572] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   54.982792] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.983368] Hardware name: linux,dummy-virt (DT)
[   54.983908] Call trace:
[   54.984411]  show_stack+0x20/0x38 (C)
[   54.985068]  dump_stack_lvl+0x8c/0xd0
[   54.985739]  print_report+0x118/0x5e0
[   54.986276]  kasan_report+0xc8/0x118
[   54.987004]  kasan_check_range+0x100/0x1a8
[   54.987622]  __kasan_check_read+0x20/0x30
[   54.988322]  copy_user_test_oob+0x4a0/0xec0
[   54.989018]  kunit_try_run_case+0x14c/0x3d0
[   54.989672]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.990396]  kthread+0x24c/0x2d0
[   54.991017]  ret_from_fork+0x10/0x20
[   54.991654] 
[   54.991941] Allocated by task 274:
[   54.992500]  kasan_save_stack+0x3c/0x68
[   54.993131]  kasan_save_track+0x20/0x40
[   54.993686]  kasan_save_alloc_info+0x40/0x58
[   54.994269]  __kasan_kmalloc+0xd4/0xd8
[   54.994852]  __kmalloc_noprof+0x188/0x4c8
[   54.995350]  kunit_kmalloc_array+0x34/0x88
[   54.996005]  copy_user_test_oob+0xac/0xec0
[   54.996693]  kunit_try_run_case+0x14c/0x3d0
[   54.997283]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.998027]  kthread+0x24c/0x2d0
[   54.998516]  ret_from_fork+0x10/0x20
[   54.999047] 
[   54.999417] The buggy address belongs to the object at fff00000c61a5600
[   54.999417]  which belongs to the cache kmalloc-128 of size 128
[   55.000844] The buggy address is located 0 bytes inside of
[   55.000844]  allocated 120-byte region [fff00000c61a5600, fff00000c61a5678)
[   55.002212] 
[   55.002618] The buggy address belongs to the physical page:
[   55.003279] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061a5
[   55.004259] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.005054] page_type: f5(slab)
[   55.005591] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   55.006444] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   55.007477] page dumped because: kasan: bad access detected
[   55.008168] 
[   55.008510] Memory state around the buggy address:
[   55.009120]  fff00000c61a5500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   55.009989]  fff00000c61a5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.010891] >fff00000c61a5600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   55.011752]                                                                 ^
[   55.012621]  fff00000c61a5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.013491]  fff00000c61a5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.014341] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[   54.699715] ==================================================================
[   54.700608] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   54.701889] Write of size 8 at addr fff00000c61a5378 by task kunit_try_catch/270
[   54.703515] 
[   54.704065] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   54.705072] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.705997] Hardware name: linux,dummy-virt (DT)
[   54.706850] Call trace:
[   54.707278]  show_stack+0x20/0x38 (C)
[   54.708010]  dump_stack_lvl+0x8c/0xd0
[   54.708679]  print_report+0x118/0x5e0
[   54.709486]  kasan_report+0xc8/0x118
[   54.710344]  kasan_check_range+0x100/0x1a8
[   54.710977]  __kasan_check_write+0x20/0x30
[   54.711677]  copy_to_kernel_nofault+0x8c/0x250
[   54.712347]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   54.713010]  kunit_try_run_case+0x14c/0x3d0
[   54.713837]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.714826]  kthread+0x24c/0x2d0
[   54.715124]  ret_from_fork+0x10/0x20
[   54.715437] 
[   54.715611] Allocated by task 270:
[   54.715861]  kasan_save_stack+0x3c/0x68
[   54.716155]  kasan_save_track+0x20/0x40
[   54.716544]  kasan_save_alloc_info+0x40/0x58
[   54.717171]  __kasan_kmalloc+0xd4/0xd8
[   54.717789]  __kmalloc_cache_noprof+0x15c/0x3c0
[   54.718485]  copy_to_kernel_nofault_oob+0xc8/0x418
[   54.719144]  kunit_try_run_case+0x14c/0x3d0
[   54.719685]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.720246]  kthread+0x24c/0x2d0
[   54.721019]  ret_from_fork+0x10/0x20
[   54.721900] 
[   54.722498] The buggy address belongs to the object at fff00000c61a5300
[   54.722498]  which belongs to the cache kmalloc-128 of size 128
[   54.723876] The buggy address is located 0 bytes to the right of
[   54.723876]  allocated 120-byte region [fff00000c61a5300, fff00000c61a5378)
[   54.725327] 
[   54.725894] The buggy address belongs to the physical page:
[   54.727175] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061a5
[   54.728272] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.729145] page_type: f5(slab)
[   54.729699] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   54.730727] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   54.731691] page dumped because: kasan: bad access detected
[   54.732606] 
[   54.733061] Memory state around the buggy address:
[   54.733920]  fff00000c61a5200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   54.734791]  fff00000c61a5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.735707] >fff00000c61a5300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   54.736670]                                                                 ^
[   54.737641]  fff00000c61a5380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.739058]  fff00000c61a5400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.739931] ==================================================================
[   54.654062] ==================================================================
[   54.655660] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   54.656394] Read of size 8 at addr fff00000c61a5378 by task kunit_try_catch/270
[   54.657388] 
[   54.657762] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   54.659330] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.659788] Hardware name: linux,dummy-virt (DT)
[   54.660464] Call trace:
[   54.660923]  show_stack+0x20/0x38 (C)
[   54.661477]  dump_stack_lvl+0x8c/0xd0
[   54.662127]  print_report+0x118/0x5e0
[   54.662899]  kasan_report+0xc8/0x118
[   54.663428]  __asan_report_load8_noabort+0x20/0x30
[   54.664194]  copy_to_kernel_nofault+0x204/0x250
[   54.665216]  copy_to_kernel_nofault_oob+0x158/0x418
[   54.666411]  kunit_try_run_case+0x14c/0x3d0
[   54.667156]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.668216]  kthread+0x24c/0x2d0
[   54.668880]  ret_from_fork+0x10/0x20
[   54.669843] 
[   54.670415] Allocated by task 270:
[   54.670952]  kasan_save_stack+0x3c/0x68
[   54.671633]  kasan_save_track+0x20/0x40
[   54.672163]  kasan_save_alloc_info+0x40/0x58
[   54.672890]  __kasan_kmalloc+0xd4/0xd8
[   54.673717]  __kmalloc_cache_noprof+0x15c/0x3c0
[   54.674573]  copy_to_kernel_nofault_oob+0xc8/0x418
[   54.675399]  kunit_try_run_case+0x14c/0x3d0
[   54.675978]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.677212]  kthread+0x24c/0x2d0
[   54.677943]  ret_from_fork+0x10/0x20
[   54.678676] 
[   54.679691] The buggy address belongs to the object at fff00000c61a5300
[   54.679691]  which belongs to the cache kmalloc-128 of size 128
[   54.681460] The buggy address is located 0 bytes to the right of
[   54.681460]  allocated 120-byte region [fff00000c61a5300, fff00000c61a5378)
[   54.683187] 
[   54.683521] The buggy address belongs to the physical page:
[   54.684309] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061a5
[   54.685329] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.686213] page_type: f5(slab)
[   54.687053] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   54.687925] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   54.688751] page dumped because: kasan: bad access detected
[   54.689618] 
[   54.690083] Memory state around the buggy address:
[   54.690984]  fff00000c61a5200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   54.691964]  fff00000c61a5280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.692902] >fff00000c61a5300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   54.693831]                                                                 ^
[   54.695233]  fff00000c61a5380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.696122]  fff00000c61a5400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.697196] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[   54.573848] ==================================================================
[   54.575018] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   54.575880] Read of size 1 at addr ffff80008010b7f8 by task kunit_try_catch/258
[   54.576836] 
[   54.578186] CPU: 1 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   54.579378] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.579912] Hardware name: linux,dummy-virt (DT)
[   54.580465] Call trace:
[   54.580951]  show_stack+0x20/0x38 (C)
[   54.581595]  dump_stack_lvl+0x8c/0xd0
[   54.582100]  print_report+0x2fc/0x5e0
[   54.582757]  kasan_report+0xc8/0x118
[   54.583776]  __asan_report_load1_noabort+0x20/0x30
[   54.584393]  vmalloc_oob+0x51c/0x5d0
[   54.585036]  kunit_try_run_case+0x14c/0x3d0
[   54.586131]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.586877]  kthread+0x24c/0x2d0
[   54.587631]  ret_from_fork+0x10/0x20
[   54.588135] 
[   54.588522] The buggy address belongs to the virtual mapping at
[   54.588522]  [ffff80008010b000, ffff80008010d000) created by:
[   54.588522]  vmalloc_oob+0x98/0x5d0
[   54.591127] 
[   54.591456] The buggy address belongs to the physical page:
[   54.592044] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106125
[   54.593183] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.594550] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   54.595565] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   54.596417] page dumped because: kasan: bad access detected
[   54.597067] 
[   54.597442] Memory state around the buggy address:
[   54.598167]  ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   54.599464]  ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   54.600910] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   54.602068]                                                                 ^
[   54.602853]  ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   54.603621]  ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   54.604631] ==================================================================
[   54.541649] ==================================================================
[   54.543186] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   54.544012] Read of size 1 at addr ffff80008010b7f3 by task kunit_try_catch/258
[   54.544716] 
[   54.545958] CPU: 1 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   54.547480] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.548151] Hardware name: linux,dummy-virt (DT)
[   54.549117] Call trace:
[   54.549532]  show_stack+0x20/0x38 (C)
[   54.550104]  dump_stack_lvl+0x8c/0xd0
[   54.550852]  print_report+0x2fc/0x5e0
[   54.551430]  kasan_report+0xc8/0x118
[   54.551984]  __asan_report_load1_noabort+0x20/0x30
[   54.552714]  vmalloc_oob+0x578/0x5d0
[   54.553441]  kunit_try_run_case+0x14c/0x3d0
[   54.554100]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.554828]  kthread+0x24c/0x2d0
[   54.555575]  ret_from_fork+0x10/0x20
[   54.556068] 
[   54.556370] The buggy address belongs to the virtual mapping at
[   54.556370]  [ffff80008010b000, ffff80008010d000) created by:
[   54.556370]  vmalloc_oob+0x98/0x5d0
[   54.558111] 
[   54.558517] The buggy address belongs to the physical page:
[   54.559755] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106125
[   54.560934] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.562081] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   54.563168] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   54.564064] page dumped because: kasan: bad access detected
[   54.564763] 
[   54.565502] Memory state around the buggy address:
[   54.566148]  ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   54.567111]  ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   54.567964] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   54.568830]                                                              ^
[   54.570026]  ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   54.571740]  ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   54.572543] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   53.374731] ==================================================================
[   53.375355] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   53.376376] Read of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   53.377395] 
[   53.377690] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   53.379194] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.379850] Hardware name: linux,dummy-virt (DT)
[   53.380494] Call trace:
[   53.380881]  show_stack+0x20/0x38 (C)
[   53.381504]  dump_stack_lvl+0x8c/0xd0
[   53.382056]  print_report+0x118/0x5e0
[   53.382655]  kasan_report+0xc8/0x118
[   53.383195]  kasan_check_range+0x100/0x1a8
[   53.383721]  __kasan_check_read+0x20/0x30
[   53.384532]  kasan_atomics_helper+0xdd4/0x4858
[   53.385148]  kasan_atomics+0x198/0x2e8
[   53.385749]  kunit_try_run_case+0x14c/0x3d0
[   53.386257]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.387068]  kthread+0x24c/0x2d0
[   53.387696]  ret_from_fork+0x10/0x20
[   53.388355] 
[   53.388749] Allocated by task 254:
[   53.389228]  kasan_save_stack+0x3c/0x68
[   53.389885]  kasan_save_track+0x20/0x40
[   53.390426]  kasan_save_alloc_info+0x40/0x58
[   53.391060]  __kasan_kmalloc+0xd4/0xd8
[   53.391582]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.392263]  kasan_atomics+0xb8/0x2e8
[   53.392825]  kunit_try_run_case+0x14c/0x3d0
[   53.393412]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.394206]  kthread+0x24c/0x2d0
[   53.394740]  ret_from_fork+0x10/0x20
[   53.395276] 
[   53.395636] The buggy address belongs to the object at fff00000c616b300
[   53.395636]  which belongs to the cache kmalloc-64 of size 64
[   53.396926] The buggy address is located 0 bytes to the right of
[   53.396926]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   53.398335] 
[   53.398669] The buggy address belongs to the physical page:
[   53.399350] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   53.400216] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.401160] page_type: f5(slab)
[   53.401657] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   53.402590] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.403487] page dumped because: kasan: bad access detected
[   53.404252] 
[   53.404621] Memory state around the buggy address:
[   53.405188]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.406108]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.406935] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.407870]                                      ^
[   53.408501]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.409384]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.410249] ==================================================================
[   53.992960] ==================================================================
[   53.993785] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   53.994812] Read of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   53.995803] 
[   53.996162] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   53.997535] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.998185] Hardware name: linux,dummy-virt (DT)
[   53.998994] Call trace:
[   53.999467]  show_stack+0x20/0x38 (C)
[   54.000195]  dump_stack_lvl+0x8c/0xd0
[   54.000943]  print_report+0x118/0x5e0
[   54.001558]  kasan_report+0xc8/0x118
[   54.002155]  __asan_report_load8_noabort+0x20/0x30
[   54.002891]  kasan_atomics_helper+0x3f04/0x4858
[   54.003594]  kasan_atomics+0x198/0x2e8
[   54.004091]  kunit_try_run_case+0x14c/0x3d0
[   54.004764]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.005495]  kthread+0x24c/0x2d0
[   54.006116]  ret_from_fork+0x10/0x20
[   54.006784] 
[   54.007170] Allocated by task 254:
[   54.007756]  kasan_save_stack+0x3c/0x68
[   54.008508]  kasan_save_track+0x20/0x40
[   54.009203]  kasan_save_alloc_info+0x40/0x58
[   54.009926]  __kasan_kmalloc+0xd4/0xd8
[   54.010555]  __kmalloc_cache_noprof+0x15c/0x3c0
[   54.011235]  kasan_atomics+0xb8/0x2e8
[   54.011948]  kunit_try_run_case+0x14c/0x3d0
[   54.012678]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.013482]  kthread+0x24c/0x2d0
[   54.014126]  ret_from_fork+0x10/0x20
[   54.014704] 
[   54.015117] The buggy address belongs to the object at fff00000c616b300
[   54.015117]  which belongs to the cache kmalloc-64 of size 64
[   54.016721] The buggy address is located 0 bytes to the right of
[   54.016721]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   54.018117] 
[   54.018606] The buggy address belongs to the physical page:
[   54.019423] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   54.020423] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.021239] page_type: f5(slab)
[   54.021792] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   54.022826] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   54.023833] page dumped because: kasan: bad access detected
[   54.024685] 
[   54.025032] Memory state around the buggy address:
[   54.025746]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.026840]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.027744] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.028635]                                      ^
[   54.029371]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.030345]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.031222] ==================================================================
[   53.490893] ==================================================================
[   53.491969] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   53.492650] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   53.493708] 
[   53.494000] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   53.495164] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.495924] Hardware name: linux,dummy-virt (DT)
[   53.496564] Call trace:
[   53.497014]  show_stack+0x20/0x38 (C)
[   53.497656]  dump_stack_lvl+0x8c/0xd0
[   53.498206]  print_report+0x118/0x5e0
[   53.498750]  kasan_report+0xc8/0x118
[   53.499405]  __asan_report_store8_noabort+0x20/0x30
[   53.500068]  kasan_atomics_helper+0x3e5c/0x4858
[   53.500691]  kasan_atomics+0x198/0x2e8
[   53.501216]  kunit_try_run_case+0x14c/0x3d0
[   53.501886]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.502588]  kthread+0x24c/0x2d0
[   53.503249]  ret_from_fork+0x10/0x20
[   53.503806] 
[   53.504236] Allocated by task 254:
[   53.504735]  kasan_save_stack+0x3c/0x68
[   53.505217]  kasan_save_track+0x20/0x40
[   53.505882]  kasan_save_alloc_info+0x40/0x58
[   53.506520]  __kasan_kmalloc+0xd4/0xd8
[   53.507148]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.507835]  kasan_atomics+0xb8/0x2e8
[   53.508418]  kunit_try_run_case+0x14c/0x3d0
[   53.509033]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.509702]  kthread+0x24c/0x2d0
[   53.510376]  ret_from_fork+0x10/0x20
[   53.510970] 
[   53.511286] The buggy address belongs to the object at fff00000c616b300
[   53.511286]  which belongs to the cache kmalloc-64 of size 64
[   53.512463] The buggy address is located 0 bytes to the right of
[   53.512463]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   53.513930] 
[   53.514226] The buggy address belongs to the physical page:
[   53.515046] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   53.516011] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.516783] page_type: f5(slab)
[   53.517387] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   53.518326] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.519242] page dumped because: kasan: bad access detected
[   53.519874] 
[   53.520197] Memory state around the buggy address:
[   53.520840]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.521674]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.522548] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.523401]                                      ^
[   53.523956]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.524793]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.525699] ==================================================================
[   52.211062] ==================================================================
[   52.212042] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   52.213000] Read of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   52.214264] 
[   52.214754] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   52.216372] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.216875] Hardware name: linux,dummy-virt (DT)
[   52.217702] Call trace:
[   52.218095]  show_stack+0x20/0x38 (C)
[   52.218705]  dump_stack_lvl+0x8c/0xd0
[   52.219351]  print_report+0x118/0x5e0
[   52.219987]  kasan_report+0xc8/0x118
[   52.220635]  __asan_report_load4_noabort+0x20/0x30
[   52.221313]  kasan_atomics_helper+0x40fc/0x4858
[   52.221941]  kasan_atomics+0x198/0x2e8
[   52.222621]  kunit_try_run_case+0x14c/0x3d0
[   52.223225]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.223991]  kthread+0x24c/0x2d0
[   52.224588]  ret_from_fork+0x10/0x20
[   52.225172] 
[   52.225481] Allocated by task 254:
[   52.226048]  kasan_save_stack+0x3c/0x68
[   52.226757]  kasan_save_track+0x20/0x40
[   52.227345]  kasan_save_alloc_info+0x40/0x58
[   52.227890]  __kasan_kmalloc+0xd4/0xd8
[   52.228511]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.229329]  kasan_atomics+0xb8/0x2e8
[   52.229800]  kunit_try_run_case+0x14c/0x3d0
[   52.230508]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.231185]  kthread+0x24c/0x2d0
[   52.231854]  ret_from_fork+0x10/0x20
[   52.232761] 
[   52.233771] The buggy address belongs to the object at fff00000c616b300
[   52.233771]  which belongs to the cache kmalloc-64 of size 64
[   52.235235] The buggy address is located 0 bytes to the right of
[   52.235235]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   52.238613] 
[   52.238871] The buggy address belongs to the physical page:
[   52.240258] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   52.242022] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.243873] page_type: f5(slab)
[   52.245078] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   52.245694] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.246371] page dumped because: kasan: bad access detected
[   52.247550] 
[   52.247852] Memory state around the buggy address:
[   52.248499]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.249384]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.250219] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.251081]                                      ^
[   52.251889]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.252695]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.253659] ==================================================================
[   53.565005] ==================================================================
[   53.565856] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   53.566734] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   53.567497] 
[   53.567978] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   53.569096] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.569666] Hardware name: linux,dummy-virt (DT)
[   53.570352] Call trace:
[   53.570870]  show_stack+0x20/0x38 (C)
[   53.571473]  dump_stack_lvl+0x8c/0xd0
[   53.572038]  print_report+0x118/0x5e0
[   53.572615]  kasan_report+0xc8/0x118
[   53.573201]  kasan_check_range+0x100/0x1a8
[   53.573823]  __kasan_check_write+0x20/0x30
[   53.574477]  kasan_atomics_helper+0xf20/0x4858
[   53.575061]  kasan_atomics+0x198/0x2e8
[   53.575767]  kunit_try_run_case+0x14c/0x3d0
[   53.576413]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.577220]  kthread+0x24c/0x2d0
[   53.577865]  ret_from_fork+0x10/0x20
[   53.578420] 
[   53.578829] Allocated by task 254:
[   53.579330]  kasan_save_stack+0x3c/0x68
[   53.579929]  kasan_save_track+0x20/0x40
[   53.580512]  kasan_save_alloc_info+0x40/0x58
[   53.581143]  __kasan_kmalloc+0xd4/0xd8
[   53.581704]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.582357]  kasan_atomics+0xb8/0x2e8
[   53.582832]  kunit_try_run_case+0x14c/0x3d0
[   53.583529]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.584230]  kthread+0x24c/0x2d0
[   53.584797]  ret_from_fork+0x10/0x20
[   53.585352] 
[   53.585651] The buggy address belongs to the object at fff00000c616b300
[   53.585651]  which belongs to the cache kmalloc-64 of size 64
[   53.586983] The buggy address is located 0 bytes to the right of
[   53.586983]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   53.588421] 
[   53.588745] The buggy address belongs to the physical page:
[   53.589368] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   53.590138] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.591099] page_type: f5(slab)
[   53.591632] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   53.592700] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.593596] page dumped because: kasan: bad access detected
[   53.594175] 
[   53.594561] Memory state around the buggy address:
[   53.595164]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.596139]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.597065] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.597915]                                      ^
[   53.598347]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.598904]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.600852] ==================================================================
[   54.034021] ==================================================================
[   54.034816] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   54.035762] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   54.036572] 
[   54.037015] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   54.038324] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.038982] Hardware name: linux,dummy-virt (DT)
[   54.039656] Call trace:
[   54.040150]  show_stack+0x20/0x38 (C)
[   54.040818]  dump_stack_lvl+0x8c/0xd0
[   54.041488]  print_report+0x118/0x5e0
[   54.042102]  kasan_report+0xc8/0x118
[   54.042716]  kasan_check_range+0x100/0x1a8
[   54.043424]  __kasan_check_write+0x20/0x30
[   54.044100]  kasan_atomics_helper+0x1414/0x4858
[   54.044763]  kasan_atomics+0x198/0x2e8
[   54.045405]  kunit_try_run_case+0x14c/0x3d0
[   54.046094]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.046907]  kthread+0x24c/0x2d0
[   54.047550]  ret_from_fork+0x10/0x20
[   54.048016] 
[   54.048557] Allocated by task 254:
[   54.049155]  kasan_save_stack+0x3c/0x68
[   54.049777]  kasan_save_track+0x20/0x40
[   54.050489]  kasan_save_alloc_info+0x40/0x58
[   54.051195]  __kasan_kmalloc+0xd4/0xd8
[   54.051872]  __kmalloc_cache_noprof+0x15c/0x3c0
[   54.052537]  kasan_atomics+0xb8/0x2e8
[   54.053096]  kunit_try_run_case+0x14c/0x3d0
[   54.053709]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.054483]  kthread+0x24c/0x2d0
[   54.055087]  ret_from_fork+0x10/0x20
[   54.055745] 
[   54.056112] The buggy address belongs to the object at fff00000c616b300
[   54.056112]  which belongs to the cache kmalloc-64 of size 64
[   54.057628] The buggy address is located 0 bytes to the right of
[   54.057628]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   54.059179] 
[   54.059602] The buggy address belongs to the physical page:
[   54.060396] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   54.061466] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.062394] page_type: f5(slab)
[   54.062961] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   54.063975] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   54.064925] page dumped because: kasan: bad access detected
[   54.065664] 
[   54.065997] Memory state around the buggy address:
[   54.066742]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.067816]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.068698] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.069562]                                      ^
[   54.070240]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.071254]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.072141] ==================================================================
[   53.527355] ==================================================================
[   53.528089] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   53.529241] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   53.530128] 
[   53.530522] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   53.531667] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.532247] Hardware name: linux,dummy-virt (DT)
[   53.532951] Call trace:
[   53.533348]  show_stack+0x20/0x38 (C)
[   53.533962]  dump_stack_lvl+0x8c/0xd0
[   53.534490]  print_report+0x118/0x5e0
[   53.535118]  kasan_report+0xc8/0x118
[   53.535695]  kasan_check_range+0x100/0x1a8
[   53.536325]  __kasan_check_write+0x20/0x30
[   53.536887]  kasan_atomics_helper+0xeb8/0x4858
[   53.537594]  kasan_atomics+0x198/0x2e8
[   53.538090]  kunit_try_run_case+0x14c/0x3d0
[   53.538853]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.539623]  kthread+0x24c/0x2d0
[   53.540193]  ret_from_fork+0x10/0x20
[   53.540734] 
[   53.541078] Allocated by task 254:
[   53.541583]  kasan_save_stack+0x3c/0x68
[   53.542105]  kasan_save_track+0x20/0x40
[   53.542727]  kasan_save_alloc_info+0x40/0x58
[   53.543441]  __kasan_kmalloc+0xd4/0xd8
[   53.543958]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.544610]  kasan_atomics+0xb8/0x2e8
[   53.545154]  kunit_try_run_case+0x14c/0x3d0
[   53.545764]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.546550]  kthread+0x24c/0x2d0
[   53.547005]  ret_from_fork+0x10/0x20
[   53.547555] 
[   53.547909] The buggy address belongs to the object at fff00000c616b300
[   53.547909]  which belongs to the cache kmalloc-64 of size 64
[   53.549206] The buggy address is located 0 bytes to the right of
[   53.549206]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   53.550612] 
[   53.550891] The buggy address belongs to the physical page:
[   53.551610] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   53.552564] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.553322] page_type: f5(slab)
[   53.553869] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   53.554775] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.555832] page dumped because: kasan: bad access detected
[   53.556474] 
[   53.556794] Memory state around the buggy address:
[   53.557399]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.558215]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.559067] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.559973]                                      ^
[   53.560615]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.561519]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.562367] ==================================================================
[   52.121977] ==================================================================
[   52.123216] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   52.124566] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   52.126498] 
[   52.126783] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   52.128063] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.128647] Hardware name: linux,dummy-virt (DT)
[   52.129412] Call trace:
[   52.129875]  show_stack+0x20/0x38 (C)
[   52.130608]  dump_stack_lvl+0x8c/0xd0
[   52.131339]  print_report+0x118/0x5e0
[   52.132039]  kasan_report+0xc8/0x118
[   52.132733]  kasan_check_range+0x100/0x1a8
[   52.133459]  __kasan_check_write+0x20/0x30
[   52.134381]  kasan_atomics_helper+0x24c/0x4858
[   52.135117]  kasan_atomics+0x198/0x2e8
[   52.135648]  kunit_try_run_case+0x14c/0x3d0
[   52.136342]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.137096]  kthread+0x24c/0x2d0
[   52.137952]  ret_from_fork+0x10/0x20
[   52.138499] 
[   52.138850] Allocated by task 254:
[   52.139317]  kasan_save_stack+0x3c/0x68
[   52.139926]  kasan_save_track+0x20/0x40
[   52.140464]  kasan_save_alloc_info+0x40/0x58
[   52.141390]  __kasan_kmalloc+0xd4/0xd8
[   52.142100]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.142736]  kasan_atomics+0xb8/0x2e8
[   52.143288]  kunit_try_run_case+0x14c/0x3d0
[   52.143808]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.144632]  kthread+0x24c/0x2d0
[   52.145072]  ret_from_fork+0x10/0x20
[   52.145894] 
[   52.146249] The buggy address belongs to the object at fff00000c616b300
[   52.146249]  which belongs to the cache kmalloc-64 of size 64
[   52.147602] The buggy address is located 0 bytes to the right of
[   52.147602]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   52.149070] 
[   52.149533] The buggy address belongs to the physical page:
[   52.150217] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   52.151452] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.152410] page_type: f5(slab)
[   52.153040] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   52.154161] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.155082] page dumped because: kasan: bad access detected
[   52.155994] 
[   52.156354] Memory state around the buggy address:
[   52.157033]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.158075]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.158926] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.159777]                                      ^
[   52.160540]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.161725]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.162676] ==================================================================
[   53.030985] ==================================================================
[   53.031769] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   53.032556] Read of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   53.033227] 
[   53.033690] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   53.034951] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.035518] Hardware name: linux,dummy-virt (DT)
[   53.036095] Call trace:
[   53.036501]  show_stack+0x20/0x38 (C)
[   53.036930]  dump_stack_lvl+0x8c/0xd0
[   53.037497]  print_report+0x118/0x5e0
[   53.037922]  kasan_report+0xc8/0x118
[   53.038356]  __asan_report_load4_noabort+0x20/0x30
[   53.038908]  kasan_atomics_helper+0x3dcc/0x4858
[   53.039444]  kasan_atomics+0x198/0x2e8
[   53.040136]  kunit_try_run_case+0x14c/0x3d0
[   53.040978]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.041568]  kthread+0x24c/0x2d0
[   53.042008]  ret_from_fork+0x10/0x20
[   53.042492] 
[   53.042751] Allocated by task 254:
[   53.043140]  kasan_save_stack+0x3c/0x68
[   53.043616]  kasan_save_track+0x20/0x40
[   53.044385]  kasan_save_alloc_info+0x40/0x58
[   53.045068]  __kasan_kmalloc+0xd4/0xd8
[   53.045848]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.046690]  kasan_atomics+0xb8/0x2e8
[   53.047279]  kunit_try_run_case+0x14c/0x3d0
[   53.047778]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.048541]  kthread+0x24c/0x2d0
[   53.049182]  ret_from_fork+0x10/0x20
[   53.049836] 
[   53.050223] The buggy address belongs to the object at fff00000c616b300
[   53.050223]  which belongs to the cache kmalloc-64 of size 64
[   53.051341] The buggy address is located 0 bytes to the right of
[   53.051341]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   53.053034] 
[   53.053508] The buggy address belongs to the physical page:
[   53.054175] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   53.055147] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.056085] page_type: f5(slab)
[   53.056687] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   53.057677] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.058388] page dumped because: kasan: bad access detected
[   53.059274] 
[   53.059626] Memory state around the buggy address:
[   53.060455]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.061411]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.062470] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.063248]                                      ^
[   53.063909]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.064737]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.065681] ==================================================================
[   52.333628] ==================================================================
[   52.334450] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[   52.335540] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   52.336482] 
[   52.336776] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   52.337850] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.338521] Hardware name: linux,dummy-virt (DT)
[   52.339080] Call trace:
[   52.339509]  show_stack+0x20/0x38 (C)
[   52.340133]  dump_stack_lvl+0x8c/0xd0
[   52.340668]  print_report+0x118/0x5e0
[   52.341352]  kasan_report+0xc8/0x118
[   52.341897]  kasan_check_range+0x100/0x1a8
[   52.342525]  __kasan_check_write+0x20/0x30
[   52.343130]  kasan_atomics_helper+0x3ac/0x4858
[   52.343887]  kasan_atomics+0x198/0x2e8
[   52.344634]  kunit_try_run_case+0x14c/0x3d0
[   52.345420]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.346105]  kthread+0x24c/0x2d0
[   52.346795]  ret_from_fork+0x10/0x20
[   52.347381] 
[   52.347721] Allocated by task 254:
[   52.348234]  kasan_save_stack+0x3c/0x68
[   52.348878]  kasan_save_track+0x20/0x40
[   52.349356]  kasan_save_alloc_info+0x40/0x58
[   52.350144]  __kasan_kmalloc+0xd4/0xd8
[   52.350749]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.351396]  kasan_atomics+0xb8/0x2e8
[   52.351952]  kunit_try_run_case+0x14c/0x3d0
[   52.352495]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.353280]  kthread+0x24c/0x2d0
[   52.353848]  ret_from_fork+0x10/0x20
[   52.354357] 
[   52.354756] The buggy address belongs to the object at fff00000c616b300
[   52.354756]  which belongs to the cache kmalloc-64 of size 64
[   52.356087] The buggy address is located 0 bytes to the right of
[   52.356087]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   52.357497] 
[   52.357786] The buggy address belongs to the physical page:
[   52.358426] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   52.359347] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.360251] page_type: f5(slab)
[   52.360874] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   52.361781] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.362656] page dumped because: kasan: bad access detected
[   52.363368] 
[   52.363665] Memory state around the buggy address:
[   52.364370]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.365249]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.366123] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.366991]                                      ^
[   52.367597]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.368455]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.369269] ==================================================================
[   51.994490] ==================================================================
[   51.995965] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   51.996977] Read of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   51.998802] 
[   51.999223] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   52.000431] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.001012] Hardware name: linux,dummy-virt (DT)
[   52.001759] Call trace:
[   52.002209]  show_stack+0x20/0x38 (C)
[   52.002843]  dump_stack_lvl+0x8c/0xd0
[   52.003733]  print_report+0x118/0x5e0
[   52.004501]  kasan_report+0xc8/0x118
[   52.005282]  __asan_report_load4_noabort+0x20/0x30
[   52.006209]  kasan_atomics_helper+0x40a8/0x4858
[   52.006953]  kasan_atomics+0x198/0x2e8
[   52.007562]  kunit_try_run_case+0x14c/0x3d0
[   52.008184]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.008920]  kthread+0x24c/0x2d0
[   52.009717]  ret_from_fork+0x10/0x20
[   52.010415] 
[   52.010706] Allocated by task 254:
[   52.011527]  kasan_save_stack+0x3c/0x68
[   52.012142]  kasan_save_track+0x20/0x40
[   52.012971]  kasan_save_alloc_info+0x40/0x58
[   52.013800]  __kasan_kmalloc+0xd4/0xd8
[   52.014447]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.015255]  kasan_atomics+0xb8/0x2e8
[   52.015816]  kunit_try_run_case+0x14c/0x3d0
[   52.016456]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.017088]  kthread+0x24c/0x2d0
[   52.017747]  ret_from_fork+0x10/0x20
[   52.018394] 
[   52.018767] The buggy address belongs to the object at fff00000c616b300
[   52.018767]  which belongs to the cache kmalloc-64 of size 64
[   52.020535] The buggy address is located 0 bytes to the right of
[   52.020535]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   52.022447] 
[   52.022973] The buggy address belongs to the physical page:
[   52.023560] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   52.024480] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.025337] page_type: f5(slab)
[   52.026010] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   52.026976] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.027802] page dumped because: kasan: bad access detected
[   52.028536] 
[   52.028879] Memory state around the buggy address:
[   52.029540]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.030264]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.031326] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.032121]                                      ^
[   52.032852]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.033832]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.034883] ==================================================================
[   53.105773] ==================================================================
[   53.106826] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   53.107768] Read of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   53.108556] 
[   53.108909] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   53.109992] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.110763] Hardware name: linux,dummy-virt (DT)
[   53.111430] Call trace:
[   53.111890]  show_stack+0x20/0x38 (C)
[   53.112564]  dump_stack_lvl+0x8c/0xd0
[   53.113247]  print_report+0x118/0x5e0
[   53.113812]  kasan_report+0xc8/0x118
[   53.114479]  __asan_report_load4_noabort+0x20/0x30
[   53.115102]  kasan_atomics_helper+0x3dbc/0x4858
[   53.115823]  kasan_atomics+0x198/0x2e8
[   53.116375]  kunit_try_run_case+0x14c/0x3d0
[   53.117008]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.117735]  kthread+0x24c/0x2d0
[   53.118377]  ret_from_fork+0x10/0x20
[   53.118956] 
[   53.119268] Allocated by task 254:
[   53.119843]  kasan_save_stack+0x3c/0x68
[   53.120518]  kasan_save_track+0x20/0x40
[   53.121156]  kasan_save_alloc_info+0x40/0x58
[   53.121764]  __kasan_kmalloc+0xd4/0xd8
[   53.122335]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.122895]  kasan_atomics+0xb8/0x2e8
[   53.123543]  kunit_try_run_case+0x14c/0x3d0
[   53.124150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.124889]  kthread+0x24c/0x2d0
[   53.125499]  ret_from_fork+0x10/0x20
[   53.126051] 
[   53.126399] The buggy address belongs to the object at fff00000c616b300
[   53.126399]  which belongs to the cache kmalloc-64 of size 64
[   53.127851] The buggy address is located 0 bytes to the right of
[   53.127851]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   53.129149] 
[   53.129500] The buggy address belongs to the physical page:
[   53.130152] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   53.131040] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.131886] page_type: f5(slab)
[   53.132443] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   53.133380] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.134289] page dumped because: kasan: bad access detected
[   53.135015] 
[   53.135388] Memory state around the buggy address:
[   53.135999]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.136841]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.137708] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.138658]                                      ^
[   53.139286]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.140130]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.141099] ==================================================================
[   52.682032] ==================================================================
[   52.683620] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[   52.684706] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   52.685872] 
[   52.686258] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   52.687681] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.688236] Hardware name: linux,dummy-virt (DT)
[   52.688787] Call trace:
[   52.689240]  show_stack+0x20/0x38 (C)
[   52.689803]  dump_stack_lvl+0x8c/0xd0
[   52.690496]  print_report+0x118/0x5e0
[   52.691044]  kasan_report+0xc8/0x118
[   52.691705]  kasan_check_range+0x100/0x1a8
[   52.692491]  __kasan_check_write+0x20/0x30
[   52.693195]  kasan_atomics_helper+0x760/0x4858
[   52.693792]  kasan_atomics+0x198/0x2e8
[   52.694508]  kunit_try_run_case+0x14c/0x3d0
[   52.695137]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.695967]  kthread+0x24c/0x2d0
[   52.696546]  ret_from_fork+0x10/0x20
[   52.697142] 
[   52.697527] Allocated by task 254:
[   52.698024]  kasan_save_stack+0x3c/0x68
[   52.698763]  kasan_save_track+0x20/0x40
[   52.699382]  kasan_save_alloc_info+0x40/0x58
[   52.699994]  __kasan_kmalloc+0xd4/0xd8
[   52.700495]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.701208]  kasan_atomics+0xb8/0x2e8
[   52.701710]  kunit_try_run_case+0x14c/0x3d0
[   52.702339]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.702975]  kthread+0x24c/0x2d0
[   52.703606]  ret_from_fork+0x10/0x20
[   52.704153] 
[   52.704461] The buggy address belongs to the object at fff00000c616b300
[   52.704461]  which belongs to the cache kmalloc-64 of size 64
[   52.705854] The buggy address is located 0 bytes to the right of
[   52.705854]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   52.707317] 
[   52.707732] The buggy address belongs to the physical page:
[   52.708363] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   52.709396] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.710162] page_type: f5(slab)
[   52.710628] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   52.711592] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.712554] page dumped because: kasan: bad access detected
[   52.713335] 
[   52.713682] Memory state around the buggy address:
[   52.714315]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.715147]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.716054] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.716983]                                      ^
[   52.717737]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.718685]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.719561] ==================================================================
[   53.257578] ==================================================================
[   53.258355] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   53.259409] Read of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   53.260430] 
[   53.260802] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   53.262067] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.262584] Hardware name: linux,dummy-virt (DT)
[   53.263495] Call trace:
[   53.263930]  show_stack+0x20/0x38 (C)
[   53.264683]  dump_stack_lvl+0x8c/0xd0
[   53.265347]  print_report+0x118/0x5e0
[   53.266055]  kasan_report+0xc8/0x118
[   53.266744]  __asan_report_load4_noabort+0x20/0x30
[   53.267476]  kasan_atomics_helper+0x3dd8/0x4858
[   53.268157]  kasan_atomics+0x198/0x2e8
[   53.268805]  kunit_try_run_case+0x14c/0x3d0
[   53.269618]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.270310]  kthread+0x24c/0x2d0
[   53.270899]  ret_from_fork+0x10/0x20
[   53.271655] 
[   53.272053] Allocated by task 254:
[   53.272700]  kasan_save_stack+0x3c/0x68
[   53.273349]  kasan_save_track+0x20/0x40
[   53.274080]  kasan_save_alloc_info+0x40/0x58
[   53.274804]  __kasan_kmalloc+0xd4/0xd8
[   53.275558]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.276238]  kasan_atomics+0xb8/0x2e8
[   53.276911]  kunit_try_run_case+0x14c/0x3d0
[   53.277599]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.278383]  kthread+0x24c/0x2d0
[   53.278964]  ret_from_fork+0x10/0x20
[   53.279575] 
[   53.279921] The buggy address belongs to the object at fff00000c616b300
[   53.279921]  which belongs to the cache kmalloc-64 of size 64
[   53.281376] The buggy address is located 0 bytes to the right of
[   53.281376]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   53.282870] 
[   53.283230] The buggy address belongs to the physical page:
[   53.283864] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   53.284784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.285658] page_type: f5(slab)
[   53.286142] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   53.287107] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.288205] page dumped because: kasan: bad access detected
[   53.289043] 
[   53.289485] Memory state around the buggy address:
[   53.290245]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.291240]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.292240] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.293149]                                      ^
[   53.293905]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.295015]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.296003] ==================================================================
[   53.142637] ==================================================================
[   53.143406] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   53.144343] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   53.145226] 
[   53.145661] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   53.146844] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.147456] Hardware name: linux,dummy-virt (DT)
[   53.147984] Call trace:
[   53.148487]  show_stack+0x20/0x38 (C)
[   53.149140]  dump_stack_lvl+0x8c/0xd0
[   53.149675]  print_report+0x118/0x5e0
[   53.150277]  kasan_report+0xc8/0x118
[   53.150893]  kasan_check_range+0x100/0x1a8
[   53.151513]  __kasan_check_write+0x20/0x30
[   53.152110]  kasan_atomics_helper+0xc08/0x4858
[   53.152741]  kasan_atomics+0x198/0x2e8
[   53.153402]  kunit_try_run_case+0x14c/0x3d0
[   53.154009]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.154749]  kthread+0x24c/0x2d0
[   53.155361]  ret_from_fork+0x10/0x20
[   53.156005] 
[   53.156308] Allocated by task 254:
[   53.156851]  kasan_save_stack+0x3c/0x68
[   53.157394]  kasan_save_track+0x20/0x40
[   53.157913]  kasan_save_alloc_info+0x40/0x58
[   53.158726]  __kasan_kmalloc+0xd4/0xd8
[   53.159443]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.160194]  kasan_atomics+0xb8/0x2e8
[   53.160746]  kunit_try_run_case+0x14c/0x3d0
[   53.161396]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.162129]  kthread+0x24c/0x2d0
[   53.162735]  ret_from_fork+0x10/0x20
[   53.163245] 
[   53.163559] The buggy address belongs to the object at fff00000c616b300
[   53.163559]  which belongs to the cache kmalloc-64 of size 64
[   53.164996] The buggy address is located 0 bytes to the right of
[   53.164996]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   53.166349] 
[   53.166693] The buggy address belongs to the physical page:
[   53.167541] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   53.168454] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.169226] page_type: f5(slab)
[   53.169711] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   53.170643] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.171520] page dumped because: kasan: bad access detected
[   53.172214] 
[   53.172572] Memory state around the buggy address:
[   53.173169]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.174025]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.174947] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.175759]                                      ^
[   53.176385]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.177280]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.178160] ==================================================================
[   53.639959] ==================================================================
[   53.640872] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   53.642013] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   53.642959] 
[   53.643322] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   53.644276] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.644987] Hardware name: linux,dummy-virt (DT)
[   53.645620] Call trace:
[   53.646149]  show_stack+0x20/0x38 (C)
[   53.646692]  dump_stack_lvl+0x8c/0xd0
[   53.647341]  print_report+0x118/0x5e0
[   53.648005]  kasan_report+0xc8/0x118
[   53.648615]  kasan_check_range+0x100/0x1a8
[   53.649348]  __kasan_check_write+0x20/0x30
[   53.649973]  kasan_atomics_helper+0xff0/0x4858
[   53.650667]  kasan_atomics+0x198/0x2e8
[   53.651221]  kunit_try_run_case+0x14c/0x3d0
[   53.651841]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.652564]  kthread+0x24c/0x2d0
[   53.653072]  ret_from_fork+0x10/0x20
[   53.653747] 
[   53.654065] Allocated by task 254:
[   53.654594]  kasan_save_stack+0x3c/0x68
[   53.655181]  kasan_save_track+0x20/0x40
[   53.655706]  kasan_save_alloc_info+0x40/0x58
[   53.656408]  __kasan_kmalloc+0xd4/0xd8
[   53.656907]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.657655]  kasan_atomics+0xb8/0x2e8
[   53.658169]  kunit_try_run_case+0x14c/0x3d0
[   53.658829]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.659432]  kthread+0x24c/0x2d0
[   53.660025]  ret_from_fork+0x10/0x20
[   53.660508] 
[   53.660900] The buggy address belongs to the object at fff00000c616b300
[   53.660900]  which belongs to the cache kmalloc-64 of size 64
[   53.662327] The buggy address is located 0 bytes to the right of
[   53.662327]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   53.663764] 
[   53.664098] The buggy address belongs to the physical page:
[   53.664746] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   53.665713] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.666566] page_type: f5(slab)
[   53.667168] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   53.668077] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.669039] page dumped because: kasan: bad access detected
[   53.669743] 
[   53.670069] Memory state around the buggy address:
[   53.670725]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.671687]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.672682] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.673597]                                      ^
[   53.674149]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.675024]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.675850] ==================================================================
[   52.077377] ==================================================================
[   52.079332] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   52.079944] Read of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   52.081247] 
[   52.081709] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   52.082779] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.083193] Hardware name: linux,dummy-virt (DT)
[   52.084122] Call trace:
[   52.084708]  show_stack+0x20/0x38 (C)
[   52.085422]  dump_stack_lvl+0x8c/0xd0
[   52.086267]  print_report+0x118/0x5e0
[   52.087019]  kasan_report+0xc8/0x118
[   52.087819]  kasan_check_range+0x100/0x1a8
[   52.088632]  __kasan_check_read+0x20/0x30
[   52.089467]  kasan_atomics_helper+0x1ec/0x4858
[   52.090163]  kasan_atomics+0x198/0x2e8
[   52.090924]  kunit_try_run_case+0x14c/0x3d0
[   52.091645]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.092243]  kthread+0x24c/0x2d0
[   52.092895]  ret_from_fork+0x10/0x20
[   52.093655] 
[   52.094052] Allocated by task 254:
[   52.094595]  kasan_save_stack+0x3c/0x68
[   52.095245]  kasan_save_track+0x20/0x40
[   52.096220]  kasan_save_alloc_info+0x40/0x58
[   52.096872]  __kasan_kmalloc+0xd4/0xd8
[   52.097691]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.098150]  kasan_atomics+0xb8/0x2e8
[   52.098920]  kunit_try_run_case+0x14c/0x3d0
[   52.099790]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.100623]  kthread+0x24c/0x2d0
[   52.101454]  ret_from_fork+0x10/0x20
[   52.102144] 
[   52.102409] The buggy address belongs to the object at fff00000c616b300
[   52.102409]  which belongs to the cache kmalloc-64 of size 64
[   52.104075] The buggy address is located 0 bytes to the right of
[   52.104075]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   52.106167] 
[   52.106403] The buggy address belongs to the physical page:
[   52.107428] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   52.108361] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.109262] page_type: f5(slab)
[   52.110157] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   52.111058] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.112000] page dumped because: kasan: bad access detected
[   52.112705] 
[   52.112999] Memory state around the buggy address:
[   52.113729]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.114606]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.115458] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.116240]                                      ^
[   52.116968]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.117979]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.118831] ==================================================================
[   52.801951] ==================================================================
[   52.802702] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   52.803946] Read of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   52.805663] 
[   52.806133] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   52.807681] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.808269] Hardware name: linux,dummy-virt (DT)
[   52.808829] Call trace:
[   52.809215]  show_stack+0x20/0x38 (C)
[   52.809761]  dump_stack_lvl+0x8c/0xd0
[   52.810491]  print_report+0x118/0x5e0
[   52.811185]  kasan_report+0xc8/0x118
[   52.811913]  __asan_report_load4_noabort+0x20/0x30
[   52.812562]  kasan_atomics_helper+0x42d8/0x4858
[   52.813230]  kasan_atomics+0x198/0x2e8
[   52.813860]  kunit_try_run_case+0x14c/0x3d0
[   52.814481]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.815346]  kthread+0x24c/0x2d0
[   52.815853]  ret_from_fork+0x10/0x20
[   52.816465] 
[   52.816753] Allocated by task 254:
[   52.817288]  kasan_save_stack+0x3c/0x68
[   52.817820]  kasan_save_track+0x20/0x40
[   52.818472]  kasan_save_alloc_info+0x40/0x58
[   52.819002]  __kasan_kmalloc+0xd4/0xd8
[   52.819677]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.820309]  kasan_atomics+0xb8/0x2e8
[   52.820976]  kunit_try_run_case+0x14c/0x3d0
[   52.821652]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.822528]  kthread+0x24c/0x2d0
[   52.823002]  ret_from_fork+0x10/0x20
[   52.823625] 
[   52.823947] The buggy address belongs to the object at fff00000c616b300
[   52.823947]  which belongs to the cache kmalloc-64 of size 64
[   52.825394] The buggy address is located 0 bytes to the right of
[   52.825394]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   52.826755] 
[   52.827052] The buggy address belongs to the physical page:
[   52.827835] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   52.828777] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.829632] page_type: f5(slab)
[   52.830136] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   52.831026] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.832022] page dumped because: kasan: bad access detected
[   52.832674] 
[   52.833022] Memory state around the buggy address:
[   52.833615]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.834517]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.835497] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.836346]                                      ^
[   52.837379]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.838332]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.839332] ==================================================================
[   53.717558] ==================================================================
[   53.718399] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   53.719139] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   53.720191] 
[   53.720588] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   53.721766] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.722426] Hardware name: linux,dummy-virt (DT)
[   53.722998] Call trace:
[   53.723472]  show_stack+0x20/0x38 (C)
[   53.724041]  dump_stack_lvl+0x8c/0xd0
[   53.724634]  print_report+0x118/0x5e0
[   53.725177]  kasan_report+0xc8/0x118
[   53.725734]  kasan_check_range+0x100/0x1a8
[   53.726385]  __kasan_check_write+0x20/0x30
[   53.726963]  kasan_atomics_helper+0x10c0/0x4858
[   53.727655]  kasan_atomics+0x198/0x2e8
[   53.728149]  kunit_try_run_case+0x14c/0x3d0
[   53.728837]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.729685]  kthread+0x24c/0x2d0
[   53.730248]  ret_from_fork+0x10/0x20
[   53.730858] 
[   53.731164] Allocated by task 254:
[   53.731763]  kasan_save_stack+0x3c/0x68
[   53.732346]  kasan_save_track+0x20/0x40
[   53.732989]  kasan_save_alloc_info+0x40/0x58
[   53.733574]  __kasan_kmalloc+0xd4/0xd8
[   53.734191]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.734821]  kasan_atomics+0xb8/0x2e8
[   53.735358]  kunit_try_run_case+0x14c/0x3d0
[   53.735947]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.736793]  kthread+0x24c/0x2d0
[   53.737270]  ret_from_fork+0x10/0x20
[   53.737830] 
[   53.738128] The buggy address belongs to the object at fff00000c616b300
[   53.738128]  which belongs to the cache kmalloc-64 of size 64
[   53.739636] The buggy address is located 0 bytes to the right of
[   53.739636]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   53.741047] 
[   53.741345] The buggy address belongs to the physical page:
[   53.742124] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   53.743022] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.743857] page_type: f5(slab)
[   53.744351] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   53.745189] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.746175] page dumped because: kasan: bad access detected
[   53.746899] 
[   53.747229] Memory state around the buggy address:
[   53.747853]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.748691]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.749650] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.750520]                                      ^
[   53.751199]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.752015]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.752858] ==================================================================
[   54.187491] ==================================================================
[   54.188191] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   54.188936] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   54.189979] 
[   54.190326] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   54.191437] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.191972] Hardware name: linux,dummy-virt (DT)
[   54.192618] Call trace:
[   54.193081]  show_stack+0x20/0x38 (C)
[   54.193596]  dump_stack_lvl+0x8c/0xd0
[   54.194236]  print_report+0x118/0x5e0
[   54.194739]  kasan_report+0xc8/0x118
[   54.195478]  kasan_check_range+0x100/0x1a8
[   54.196096]  __kasan_check_write+0x20/0x30
[   54.196675]  kasan_atomics_helper+0x15b4/0x4858
[   54.197442]  kasan_atomics+0x198/0x2e8
[   54.197947]  kunit_try_run_case+0x14c/0x3d0
[   54.198672]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.199417]  kthread+0x24c/0x2d0
[   54.200077]  ret_from_fork+0x10/0x20
[   54.200560] 
[   54.200921] Allocated by task 254:
[   54.201530]  kasan_save_stack+0x3c/0x68
[   54.202075]  kasan_save_track+0x20/0x40
[   54.202744]  kasan_save_alloc_info+0x40/0x58
[   54.203444]  __kasan_kmalloc+0xd4/0xd8
[   54.203911]  __kmalloc_cache_noprof+0x15c/0x3c0
[   54.204658]  kasan_atomics+0xb8/0x2e8
[   54.205108]  kunit_try_run_case+0x14c/0x3d0
[   54.205792]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.206421]  kthread+0x24c/0x2d0
[   54.207041]  ret_from_fork+0x10/0x20
[   54.207624] 
[   54.208087] The buggy address belongs to the object at fff00000c616b300
[   54.208087]  which belongs to the cache kmalloc-64 of size 64
[   54.209498] The buggy address is located 0 bytes to the right of
[   54.209498]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   54.210906] 
[   54.211217] The buggy address belongs to the physical page:
[   54.211954] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   54.212838] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.213718] page_type: f5(slab)
[   54.214199] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   54.215068] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   54.215975] page dumped because: kasan: bad access detected
[   54.216786] 
[   54.217094] Memory state around the buggy address:
[   54.217811]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.218668]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.219620] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.220431]                                      ^
[   54.221008]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.221879]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.222801] ==================================================================
[   52.918108] ==================================================================
[   52.918947] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   52.919742] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   52.920490] 
[   52.920916] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   52.922350] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.922984] Hardware name: linux,dummy-virt (DT)
[   52.923640] Call trace:
[   52.923969]  show_stack+0x20/0x38 (C)
[   52.924632]  dump_stack_lvl+0x8c/0xd0
[   52.925173]  print_report+0x118/0x5e0
[   52.925786]  kasan_report+0xc8/0x118
[   52.926351]  kasan_check_range+0x100/0x1a8
[   52.927050]  __kasan_check_write+0x20/0x30
[   52.927685]  kasan_atomics_helper+0xa04/0x4858
[   52.928279]  kasan_atomics+0x198/0x2e8
[   52.928984]  kunit_try_run_case+0x14c/0x3d0
[   52.929678]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.930488]  kthread+0x24c/0x2d0
[   52.931038]  ret_from_fork+0x10/0x20
[   52.931607] 
[   52.932036] Allocated by task 254:
[   52.932638]  kasan_save_stack+0x3c/0x68
[   52.933141]  kasan_save_track+0x20/0x40
[   52.933799]  kasan_save_alloc_info+0x40/0x58
[   52.934320]  __kasan_kmalloc+0xd4/0xd8
[   52.934943]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.935621]  kasan_atomics+0xb8/0x2e8
[   52.936130]  kunit_try_run_case+0x14c/0x3d0
[   52.936810]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.937489]  kthread+0x24c/0x2d0
[   52.938073]  ret_from_fork+0x10/0x20
[   52.938593] 
[   52.939037] The buggy address belongs to the object at fff00000c616b300
[   52.939037]  which belongs to the cache kmalloc-64 of size 64
[   52.940429] The buggy address is located 0 bytes to the right of
[   52.940429]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   52.941789] 
[   52.942103] The buggy address belongs to the physical page:
[   52.942863] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   52.943739] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.944608] page_type: f5(slab)
[   52.945169] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   52.946148] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.947086] page dumped because: kasan: bad access detected
[   52.947722] 
[   52.948058] Memory state around the buggy address:
[   52.948599]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.949553]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.950430] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.951384]                                      ^
[   52.952103]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.952929]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.953798] ==================================================================
[   52.993375] ==================================================================
[   52.994173] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   52.995762] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   52.996502] 
[   52.996962] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   52.998093] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.998652] Hardware name: linux,dummy-virt (DT)
[   52.999255] Call trace:
[   52.999705]  show_stack+0x20/0x38 (C)
[   53.000420]  dump_stack_lvl+0x8c/0xd0
[   53.000976]  print_report+0x118/0x5e0
[   53.001747]  kasan_report+0xc8/0x118
[   53.002354]  kasan_check_range+0x100/0x1a8
[   53.002909]  __kasan_check_write+0x20/0x30
[   53.003677]  kasan_atomics_helper+0xad4/0x4858
[   53.004334]  kasan_atomics+0x198/0x2e8
[   53.004863]  kunit_try_run_case+0x14c/0x3d0
[   53.005646]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.006506]  kthread+0x24c/0x2d0
[   53.007155]  ret_from_fork+0x10/0x20
[   53.007702] 
[   53.008054] Allocated by task 254:
[   53.008689]  kasan_save_stack+0x3c/0x68
[   53.009249]  kasan_save_track+0x20/0x40
[   53.009752]  kasan_save_alloc_info+0x40/0x58
[   53.010482]  __kasan_kmalloc+0xd4/0xd8
[   53.011023]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.011713]  kasan_atomics+0xb8/0x2e8
[   53.012366]  kunit_try_run_case+0x14c/0x3d0
[   53.012933]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.013621]  kthread+0x24c/0x2d0
[   53.014192]  ret_from_fork+0x10/0x20
[   53.014715] 
[   53.015093] The buggy address belongs to the object at fff00000c616b300
[   53.015093]  which belongs to the cache kmalloc-64 of size 64
[   53.016401] The buggy address is located 0 bytes to the right of
[   53.016401]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   53.017862] 
[   53.018198] The buggy address belongs to the physical page:
[   53.018769] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   53.019810] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.020640] page_type: f5(slab)
[   53.021101] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   53.022062] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.023052] page dumped because: kasan: bad access detected
[   53.023856] 
[   53.024149] Memory state around the buggy address:
[   53.024747]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.025584]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.026490] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.027307]                                      ^
[   53.027910]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.028784]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.029629] ==================================================================
[   53.677803] ==================================================================
[   53.678628] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   53.680142] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   53.681083] 
[   53.681549] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   53.683312] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.683953] Hardware name: linux,dummy-virt (DT)
[   53.684990] Call trace:
[   53.686124]  show_stack+0x20/0x38 (C)
[   53.686813]  dump_stack_lvl+0x8c/0xd0
[   53.687438]  print_report+0x118/0x5e0
[   53.688066]  kasan_report+0xc8/0x118
[   53.688751]  kasan_check_range+0x100/0x1a8
[   53.689409]  __kasan_check_write+0x20/0x30
[   53.690006]  kasan_atomics_helper+0x1058/0x4858
[   53.690575]  kasan_atomics+0x198/0x2e8
[   53.691202]  kunit_try_run_case+0x14c/0x3d0
[   53.691903]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.692701]  kthread+0x24c/0x2d0
[   53.693259]  ret_from_fork+0x10/0x20
[   53.693849] 
[   53.694204] Allocated by task 254:
[   53.694803]  kasan_save_stack+0x3c/0x68
[   53.695558]  kasan_save_track+0x20/0x40
[   53.696113]  kasan_save_alloc_info+0x40/0x58
[   53.696725]  __kasan_kmalloc+0xd4/0xd8
[   53.697328]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.697941]  kasan_atomics+0xb8/0x2e8
[   53.698482]  kunit_try_run_case+0x14c/0x3d0
[   53.699117]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.699825]  kthread+0x24c/0x2d0
[   53.700390]  ret_from_fork+0x10/0x20
[   53.700884] 
[   53.701328] The buggy address belongs to the object at fff00000c616b300
[   53.701328]  which belongs to the cache kmalloc-64 of size 64
[   53.702643] The buggy address is located 0 bytes to the right of
[   53.702643]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   53.704037] 
[   53.704360] The buggy address belongs to the physical page:
[   53.705114] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   53.706170] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.707024] page_type: f5(slab)
[   53.707641] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   53.708549] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.709394] page dumped because: kasan: bad access detected
[   53.710133] 
[   53.710529] Memory state around the buggy address:
[   53.711139]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.712012]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.712914] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.713793]                                      ^
[   53.714381]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.715320]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.716121] ==================================================================
[   53.216640] ==================================================================
[   53.218228] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   53.219396] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   53.220539] 
[   53.220882] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   53.222070] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.222965] Hardware name: linux,dummy-virt (DT)
[   53.223564] Call trace:
[   53.224052]  show_stack+0x20/0x38 (C)
[   53.224734]  dump_stack_lvl+0x8c/0xd0
[   53.225418]  print_report+0x118/0x5e0
[   53.226082]  kasan_report+0xc8/0x118
[   53.226718]  kasan_check_range+0x100/0x1a8
[   53.227421]  __kasan_check_write+0x20/0x30
[   53.228119]  kasan_atomics_helper+0xca0/0x4858
[   53.228886]  kasan_atomics+0x198/0x2e8
[   53.229582]  kunit_try_run_case+0x14c/0x3d0
[   53.230260]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.231129]  kthread+0x24c/0x2d0
[   53.231821]  ret_from_fork+0x10/0x20
[   53.232457] 
[   53.232789] Allocated by task 254:
[   53.233365]  kasan_save_stack+0x3c/0x68
[   53.234067]  kasan_save_track+0x20/0x40
[   53.234716]  kasan_save_alloc_info+0x40/0x58
[   53.235381]  __kasan_kmalloc+0xd4/0xd8
[   53.236108]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.236816]  kasan_atomics+0xb8/0x2e8
[   53.237436]  kunit_try_run_case+0x14c/0x3d0
[   53.238110]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.238872]  kthread+0x24c/0x2d0
[   53.239486]  ret_from_fork+0x10/0x20
[   53.240060] 
[   53.240465] The buggy address belongs to the object at fff00000c616b300
[   53.240465]  which belongs to the cache kmalloc-64 of size 64
[   53.241910] The buggy address is located 0 bytes to the right of
[   53.241910]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   53.243403] 
[   53.243811] The buggy address belongs to the physical page:
[   53.244576] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   53.245588] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.246382] page_type: f5(slab)
[   53.246969] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   53.248006] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.248949] page dumped because: kasan: bad access detected
[   53.249727] 
[   53.250123] Memory state around the buggy address:
[   53.250787]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.251818]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.252709] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.253597]                                      ^
[   53.254266]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.255169]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.256024] ==================================================================
[   53.754169] ==================================================================
[   53.755578] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   53.756382] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   53.757399] 
[   53.757722] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   53.758934] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.759442] Hardware name: linux,dummy-virt (DT)
[   53.759950] Call trace:
[   53.760448]  show_stack+0x20/0x38 (C)
[   53.761101]  dump_stack_lvl+0x8c/0xd0
[   53.761646]  print_report+0x118/0x5e0
[   53.762350]  kasan_report+0xc8/0x118
[   53.763050]  kasan_check_range+0x100/0x1a8
[   53.763798]  __kasan_check_write+0x20/0x30
[   53.764486]  kasan_atomics_helper+0x1128/0x4858
[   53.765251]  kasan_atomics+0x198/0x2e8
[   53.765804]  kunit_try_run_case+0x14c/0x3d0
[   53.766536]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.767247]  kthread+0x24c/0x2d0
[   53.767879]  ret_from_fork+0x10/0x20
[   53.768489] 
[   53.768853] Allocated by task 254:
[   53.769373]  kasan_save_stack+0x3c/0x68
[   53.769932]  kasan_save_track+0x20/0x40
[   53.770516]  kasan_save_alloc_info+0x40/0x58
[   53.771227]  __kasan_kmalloc+0xd4/0xd8
[   53.771739]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.772485]  kasan_atomics+0xb8/0x2e8
[   53.773045]  kunit_try_run_case+0x14c/0x3d0
[   53.773658]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.774437]  kthread+0x24c/0x2d0
[   53.774961]  ret_from_fork+0x10/0x20
[   53.775544] 
[   53.775837] The buggy address belongs to the object at fff00000c616b300
[   53.775837]  which belongs to the cache kmalloc-64 of size 64
[   53.777195] The buggy address is located 0 bytes to the right of
[   53.777195]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   53.778610] 
[   53.778899] The buggy address belongs to the physical page:
[   53.779682] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   53.780522] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.781422] page_type: f5(slab)
[   53.781874] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   53.782796] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.783779] page dumped because: kasan: bad access detected
[   53.784453] 
[   53.784759] Memory state around the buggy address:
[   53.785419]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.786267]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.787030] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.787950]                                      ^
[   53.788642]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.789655]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.790768] ==================================================================
[   54.112535] ==================================================================
[   54.113769] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   54.114341] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   54.115135] 
[   54.115535] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   54.116588] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.117224] Hardware name: linux,dummy-virt (DT)
[   54.117778] Call trace:
[   54.118256]  show_stack+0x20/0x38 (C)
[   54.118825]  dump_stack_lvl+0x8c/0xd0
[   54.119626]  print_report+0x118/0x5e0
[   54.120155]  kasan_report+0xc8/0x118
[   54.120748]  kasan_check_range+0x100/0x1a8
[   54.121395]  __kasan_check_write+0x20/0x30
[   54.122100]  kasan_atomics_helper+0x14e4/0x4858
[   54.122779]  kasan_atomics+0x198/0x2e8
[   54.123332]  kunit_try_run_case+0x14c/0x3d0
[   54.123996]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.124732]  kthread+0x24c/0x2d0
[   54.125316]  ret_from_fork+0x10/0x20
[   54.125939] 
[   54.126271] Allocated by task 254:
[   54.126851]  kasan_save_stack+0x3c/0x68
[   54.127370]  kasan_save_track+0x20/0x40
[   54.127998]  kasan_save_alloc_info+0x40/0x58
[   54.128599]  __kasan_kmalloc+0xd4/0xd8
[   54.129056]  __kmalloc_cache_noprof+0x15c/0x3c0
[   54.129788]  kasan_atomics+0xb8/0x2e8
[   54.130266]  kunit_try_run_case+0x14c/0x3d0
[   54.130968]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.131765]  kthread+0x24c/0x2d0
[   54.132390]  ret_from_fork+0x10/0x20
[   54.132899] 
[   54.133333] The buggy address belongs to the object at fff00000c616b300
[   54.133333]  which belongs to the cache kmalloc-64 of size 64
[   54.134708] The buggy address is located 0 bytes to the right of
[   54.134708]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   54.136152] 
[   54.136496] The buggy address belongs to the physical page:
[   54.137283] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   54.138205] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.138947] page_type: f5(slab)
[   54.139508] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   54.140413] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   54.141337] page dumped because: kasan: bad access detected
[   54.142068] 
[   54.142438] Memory state around the buggy address:
[   54.143087]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.143950]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.144802] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.145688]                                      ^
[   54.146285]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.147160]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.148092] ==================================================================
[   54.224042] ==================================================================
[   54.224765] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   54.225778] Read of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   54.226615] 
[   54.227064] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   54.228171] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.228627] Hardware name: linux,dummy-virt (DT)
[   54.229398] Call trace:
[   54.229783]  show_stack+0x20/0x38 (C)
[   54.230469]  dump_stack_lvl+0x8c/0xd0
[   54.230982]  print_report+0x118/0x5e0
[   54.231640]  kasan_report+0xc8/0x118
[   54.232353]  __asan_report_load8_noabort+0x20/0x30
[   54.233098]  kasan_atomics_helper+0x3db0/0x4858
[   54.233773]  kasan_atomics+0x198/0x2e8
[   54.234338]  kunit_try_run_case+0x14c/0x3d0
[   54.234946]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.235589]  kthread+0x24c/0x2d0
[   54.236205]  ret_from_fork+0x10/0x20
[   54.236841] 
[   54.237200] Allocated by task 254:
[   54.237723]  kasan_save_stack+0x3c/0x68
[   54.238346]  kasan_save_track+0x20/0x40
[   54.238930]  kasan_save_alloc_info+0x40/0x58
[   54.239476]  __kasan_kmalloc+0xd4/0xd8
[   54.240133]  __kmalloc_cache_noprof+0x15c/0x3c0
[   54.240829]  kasan_atomics+0xb8/0x2e8
[   54.241565]  kunit_try_run_case+0x14c/0x3d0
[   54.242201]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.243118]  kthread+0x24c/0x2d0
[   54.243646]  ret_from_fork+0x10/0x20
[   54.244190] 
[   54.244515] The buggy address belongs to the object at fff00000c616b300
[   54.244515]  which belongs to the cache kmalloc-64 of size 64
[   54.245998] The buggy address is located 0 bytes to the right of
[   54.245998]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   54.247411] 
[   54.247740] The buggy address belongs to the physical page:
[   54.248348] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   54.249353] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.250135] page_type: f5(slab)
[   54.250671] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   54.251554] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   54.252502] page dumped because: kasan: bad access detected
[   54.253252] 
[   54.253586] Memory state around the buggy address:
[   54.254205]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.255057]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.255912] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.256826]                                      ^
[   54.257362]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.258180]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.259085] ==================================================================
[   54.335423] ==================================================================
[   54.336212] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   54.337756] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   54.339284] 
[   54.339627] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   54.340478] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.340833] Hardware name: linux,dummy-virt (DT)
[   54.341211] Call trace:
[   54.341494]  show_stack+0x20/0x38 (C)
[   54.341872]  dump_stack_lvl+0x8c/0xd0
[   54.342249]  print_report+0x118/0x5e0
[   54.342732]  kasan_report+0xc8/0x118
[   54.343182]  kasan_check_range+0x100/0x1a8
[   54.343786]  __kasan_check_write+0x20/0x30
[   54.344620]  kasan_atomics_helper+0x16d0/0x4858
[   54.345442]  kasan_atomics+0x198/0x2e8
[   54.345835]  kunit_try_run_case+0x14c/0x3d0
[   54.346243]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.346747]  kthread+0x24c/0x2d0
[   54.347133]  ret_from_fork+0x10/0x20
[   54.347560] 
[   54.347843] Allocated by task 254:
[   54.348323]  kasan_save_stack+0x3c/0x68
[   54.349175]  kasan_save_track+0x20/0x40
[   54.349811]  kasan_save_alloc_info+0x40/0x58
[   54.350715]  __kasan_kmalloc+0xd4/0xd8
[   54.351425]  __kmalloc_cache_noprof+0x15c/0x3c0
[   54.351994]  kasan_atomics+0xb8/0x2e8
[   54.352451]  kunit_try_run_case+0x14c/0x3d0
[   54.352912]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.353455]  kthread+0x24c/0x2d0
[   54.354124]  ret_from_fork+0x10/0x20
[   54.354877] 
[   54.355357] The buggy address belongs to the object at fff00000c616b300
[   54.355357]  which belongs to the cache kmalloc-64 of size 64
[   54.356872] The buggy address is located 0 bytes to the right of
[   54.356872]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   54.358030] 
[   54.358512] The buggy address belongs to the physical page:
[   54.359702] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   54.360645] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.361439] page_type: f5(slab)
[   54.361991] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   54.362904] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   54.363830] page dumped because: kasan: bad access detected
[   54.364601] 
[   54.364909] Memory state around the buggy address:
[   54.365556]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.366473]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.367361] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.368258]                                      ^
[   54.368920]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.369741]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.370675] ==================================================================
[   53.875913] ==================================================================
[   53.877604] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   53.878344] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   53.879356] 
[   53.879725] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   53.880979] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.881660] Hardware name: linux,dummy-virt (DT)
[   53.882283] Call trace:
[   53.882674]  show_stack+0x20/0x38 (C)
[   53.883282]  dump_stack_lvl+0x8c/0xd0
[   53.883940]  print_report+0x118/0x5e0
[   53.884537]  kasan_report+0xc8/0x118
[   53.885077]  kasan_check_range+0x100/0x1a8
[   53.885639]  __kasan_check_write+0x20/0x30
[   53.886438]  kasan_atomics_helper+0x126c/0x4858
[   53.887083]  kasan_atomics+0x198/0x2e8
[   53.887648]  kunit_try_run_case+0x14c/0x3d0
[   53.888249]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.888975]  kthread+0x24c/0x2d0
[   53.889600]  ret_from_fork+0x10/0x20
[   53.890235] 
[   53.890580] Allocated by task 254:
[   53.891240]  kasan_save_stack+0x3c/0x68
[   53.891794]  kasan_save_track+0x20/0x40
[   53.892674]  kasan_save_alloc_info+0x40/0x58
[   53.893320]  __kasan_kmalloc+0xd4/0xd8
[   53.893947]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.894781]  kasan_atomics+0xb8/0x2e8
[   53.895521]  kunit_try_run_case+0x14c/0x3d0
[   53.896223]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.897098]  kthread+0x24c/0x2d0
[   53.897691]  ret_from_fork+0x10/0x20
[   53.898217] 
[   53.898763] The buggy address belongs to the object at fff00000c616b300
[   53.898763]  which belongs to the cache kmalloc-64 of size 64
[   53.899959] The buggy address is located 0 bytes to the right of
[   53.899959]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   53.901074] 
[   53.901410] The buggy address belongs to the physical page:
[   53.902064] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   53.902872] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.903851] page_type: f5(slab)
[   53.904575] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   53.905532] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.906407] page dumped because: kasan: bad access detected
[   53.907101] 
[   53.907521] Memory state around the buggy address:
[   53.908103]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.908908]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.909807] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.910617]                                      ^
[   53.911260]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.912154]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.913066] ==================================================================
[   54.449976] ==================================================================
[   54.450860] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   54.451660] Read of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   54.452441] 
[   54.452815] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   54.453973] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.454585] Hardware name: linux,dummy-virt (DT)
[   54.455308] Call trace:
[   54.455736]  show_stack+0x20/0x38 (C)
[   54.456313]  dump_stack_lvl+0x8c/0xd0
[   54.456924]  print_report+0x118/0x5e0
[   54.457495]  kasan_report+0xc8/0x118
[   54.458022]  __asan_report_load8_noabort+0x20/0x30
[   54.458680]  kasan_atomics_helper+0x3e20/0x4858
[   54.459475]  kasan_atomics+0x198/0x2e8
[   54.460011]  kunit_try_run_case+0x14c/0x3d0
[   54.460634]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.461367]  kthread+0x24c/0x2d0
[   54.461971]  ret_from_fork+0x10/0x20
[   54.462495] 
[   54.462836] Allocated by task 254:
[   54.463315]  kasan_save_stack+0x3c/0x68
[   54.463938]  kasan_save_track+0x20/0x40
[   54.464545]  kasan_save_alloc_info+0x40/0x58
[   54.465154]  __kasan_kmalloc+0xd4/0xd8
[   54.465698]  __kmalloc_cache_noprof+0x15c/0x3c0
[   54.466423]  kasan_atomics+0xb8/0x2e8
[   54.466923]  kunit_try_run_case+0x14c/0x3d0
[   54.467580]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.468281]  kthread+0x24c/0x2d0
[   54.468912]  ret_from_fork+0x10/0x20
[   54.469398] 
[   54.469788] The buggy address belongs to the object at fff00000c616b300
[   54.469788]  which belongs to the cache kmalloc-64 of size 64
[   54.471237] The buggy address is located 0 bytes to the right of
[   54.471237]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   54.472581] 
[   54.472952] The buggy address belongs to the physical page:
[   54.473692] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   54.474544] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.475482] page_type: f5(slab)
[   54.475968] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   54.476829] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   54.477800] page dumped because: kasan: bad access detected
[   54.478511] 
[   54.478832] Memory state around the buggy address:
[   54.479455]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.480171]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.481086] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.481957]                                      ^
[   54.482636]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.483538]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.484441] ==================================================================
[   52.955000] ==================================================================
[   52.956070] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   52.956850] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   52.957731] 
[   52.958276] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   52.959565] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.960050] Hardware name: linux,dummy-virt (DT)
[   52.960633] Call trace:
[   52.961093]  show_stack+0x20/0x38 (C)
[   52.961742]  dump_stack_lvl+0x8c/0xd0
[   52.962371]  print_report+0x118/0x5e0
[   52.962901]  kasan_report+0xc8/0x118
[   52.963641]  kasan_check_range+0x100/0x1a8
[   52.964225]  __kasan_check_write+0x20/0x30
[   52.964939]  kasan_atomics_helper+0xa6c/0x4858
[   52.965643]  kasan_atomics+0x198/0x2e8
[   52.966124]  kunit_try_run_case+0x14c/0x3d0
[   52.966918]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.967695]  kthread+0x24c/0x2d0
[   52.968265]  ret_from_fork+0x10/0x20
[   52.968917] 
[   52.969217] Allocated by task 254:
[   52.969865]  kasan_save_stack+0x3c/0x68
[   52.970447]  kasan_save_track+0x20/0x40
[   52.970970]  kasan_save_alloc_info+0x40/0x58
[   52.971713]  __kasan_kmalloc+0xd4/0xd8
[   52.972389]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.972960]  kasan_atomics+0xb8/0x2e8
[   52.973683]  kunit_try_run_case+0x14c/0x3d0
[   52.974346]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.975072]  kthread+0x24c/0x2d0
[   52.975586]  ret_from_fork+0x10/0x20
[   52.976083] 
[   52.976420] The buggy address belongs to the object at fff00000c616b300
[   52.976420]  which belongs to the cache kmalloc-64 of size 64
[   52.977876] The buggy address is located 0 bytes to the right of
[   52.977876]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   52.979239] 
[   52.979658] The buggy address belongs to the physical page:
[   52.980396] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   52.981271] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.982041] page_type: f5(slab)
[   52.982559] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   52.983385] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.984383] page dumped because: kasan: bad access detected
[   52.985103] 
[   52.985449] Memory state around the buggy address:
[   52.986041]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.986896]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.987750] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.988666]                                      ^
[   52.989227]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.990047]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.990952] ==================================================================
[   52.164836] ==================================================================
[   52.166203] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   52.166897] Read of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   52.167850] 
[   52.168138] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   52.169570] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.170081] Hardware name: linux,dummy-virt (DT)
[   52.171513] Call trace:
[   52.172111]  show_stack+0x20/0x38 (C)
[   52.172818]  dump_stack_lvl+0x8c/0xd0
[   52.173407]  print_report+0x118/0x5e0
[   52.174252]  kasan_report+0xc8/0x118
[   52.174892]  kasan_check_range+0x100/0x1a8
[   52.175568]  __kasan_check_read+0x20/0x30
[   52.176238]  kasan_atomics_helper+0x2b0/0x4858
[   52.176948]  kasan_atomics+0x198/0x2e8
[   52.177795]  kunit_try_run_case+0x14c/0x3d0
[   52.178509]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.179341]  kthread+0x24c/0x2d0
[   52.179973]  ret_from_fork+0x10/0x20
[   52.180856] 
[   52.181415] Allocated by task 254:
[   52.181934]  kasan_save_stack+0x3c/0x68
[   52.182510]  kasan_save_track+0x20/0x40
[   52.183234]  kasan_save_alloc_info+0x40/0x58
[   52.183770]  __kasan_kmalloc+0xd4/0xd8
[   52.184420]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.185096]  kasan_atomics+0xb8/0x2e8
[   52.185974]  kunit_try_run_case+0x14c/0x3d0
[   52.186667]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.187818]  kthread+0x24c/0x2d0
[   52.189061]  ret_from_fork+0x10/0x20
[   52.189669] 
[   52.190177] The buggy address belongs to the object at fff00000c616b300
[   52.190177]  which belongs to the cache kmalloc-64 of size 64
[   52.191880] The buggy address is located 0 bytes to the right of
[   52.191880]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   52.193823] 
[   52.194122] The buggy address belongs to the physical page:
[   52.194968] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   52.196045] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.196873] page_type: f5(slab)
[   52.197500] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   52.198539] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.199771] page dumped because: kasan: bad access detected
[   52.200696] 
[   52.201206] Memory state around the buggy address:
[   52.201776]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.202814]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.204127] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.204976]                                      ^
[   52.206054]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.207486]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.208750] ==================================================================
[   54.073584] ==================================================================
[   54.074220] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   54.075146] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   54.076353] 
[   54.076799] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   54.078416] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.078898] Hardware name: linux,dummy-virt (DT)
[   54.079698] Call trace:
[   54.080264]  show_stack+0x20/0x38 (C)
[   54.080923]  dump_stack_lvl+0x8c/0xd0
[   54.081558]  print_report+0x118/0x5e0
[   54.082181]  kasan_report+0xc8/0x118
[   54.082833]  kasan_check_range+0x100/0x1a8
[   54.083600]  __kasan_check_write+0x20/0x30
[   54.084346]  kasan_atomics_helper+0x147c/0x4858
[   54.085135]  kasan_atomics+0x198/0x2e8
[   54.085798]  kunit_try_run_case+0x14c/0x3d0
[   54.086513]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.087314]  kthread+0x24c/0x2d0
[   54.087920]  ret_from_fork+0x10/0x20
[   54.088571] 
[   54.089057] Allocated by task 254:
[   54.089603]  kasan_save_stack+0x3c/0x68
[   54.090189]  kasan_save_track+0x20/0x40
[   54.090865]  kasan_save_alloc_info+0x40/0x58
[   54.091636]  __kasan_kmalloc+0xd4/0xd8
[   54.092238]  __kmalloc_cache_noprof+0x15c/0x3c0
[   54.092910]  kasan_atomics+0xb8/0x2e8
[   54.093509]  kunit_try_run_case+0x14c/0x3d0
[   54.094221]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.095117]  kthread+0x24c/0x2d0
[   54.095693]  ret_from_fork+0x10/0x20
[   54.096184] 
[   54.096594] The buggy address belongs to the object at fff00000c616b300
[   54.096594]  which belongs to the cache kmalloc-64 of size 64
[   54.097824] The buggy address is located 0 bytes to the right of
[   54.097824]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   54.099360] 
[   54.099649] The buggy address belongs to the physical page:
[   54.100334] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   54.101288] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.102017] page_type: f5(slab)
[   54.102564] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   54.103546] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   54.104443] page dumped because: kasan: bad access detected
[   54.105150] 
[   54.105507] Memory state around the buggy address:
[   54.106068]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.106968]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.107913] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.108821]                                      ^
[   54.109384]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.110258]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.111153] ==================================================================
[   53.793156] ==================================================================
[   53.794733] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   53.795641] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   53.796445] 
[   53.796868] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   53.797985] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.798959] Hardware name: linux,dummy-virt (DT)
[   53.799602] Call trace:
[   53.800010]  show_stack+0x20/0x38 (C)
[   53.800886]  dump_stack_lvl+0x8c/0xd0
[   53.801487]  print_report+0x118/0x5e0
[   53.802009]  kasan_report+0xc8/0x118
[   53.802651]  kasan_check_range+0x100/0x1a8
[   53.803377]  __kasan_check_write+0x20/0x30
[   53.803970]  kasan_atomics_helper+0x1190/0x4858
[   53.804613]  kasan_atomics+0x198/0x2e8
[   53.805163]  kunit_try_run_case+0x14c/0x3d0
[   53.805819]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.806618]  kthread+0x24c/0x2d0
[   53.807262]  ret_from_fork+0x10/0x20
[   53.807867] 
[   53.808245] Allocated by task 254:
[   53.808703]  kasan_save_stack+0x3c/0x68
[   53.809364]  kasan_save_track+0x20/0x40
[   53.809952]  kasan_save_alloc_info+0x40/0x58
[   53.810540]  __kasan_kmalloc+0xd4/0xd8
[   53.811153]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.811760]  kasan_atomics+0xb8/0x2e8
[   53.812313]  kunit_try_run_case+0x14c/0x3d0
[   53.812961]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.813601]  kthread+0x24c/0x2d0
[   53.814238]  ret_from_fork+0x10/0x20
[   53.814825] 
[   53.815224] The buggy address belongs to the object at fff00000c616b300
[   53.815224]  which belongs to the cache kmalloc-64 of size 64
[   53.816574] The buggy address is located 0 bytes to the right of
[   53.816574]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   53.817919] 
[   53.818253] The buggy address belongs to the physical page:
[   53.818952] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   53.819903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.820633] page_type: f5(slab)
[   53.821194] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   53.822058] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.823050] page dumped because: kasan: bad access detected
[   53.823738] 
[   53.824088] Memory state around the buggy address:
[   53.824743]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.826224]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.827081] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.827864]                                      ^
[   53.828800]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.829388]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.829943] ==================================================================
[   54.411076] ==================================================================
[   54.411988] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   54.414065] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   54.415842] 
[   54.416143] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   54.417540] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.418136] Hardware name: linux,dummy-virt (DT)
[   54.418754] Call trace:
[   54.419233]  show_stack+0x20/0x38 (C)
[   54.420012]  dump_stack_lvl+0x8c/0xd0
[   54.420602]  print_report+0x118/0x5e0
[   54.421125]  kasan_report+0xc8/0x118
[   54.421756]  kasan_check_range+0x100/0x1a8
[   54.422365]  __kasan_check_write+0x20/0x30
[   54.423023]  kasan_atomics_helper+0x175c/0x4858
[   54.423773]  kasan_atomics+0x198/0x2e8
[   54.424355]  kunit_try_run_case+0x14c/0x3d0
[   54.424954]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.425739]  kthread+0x24c/0x2d0
[   54.426397]  ret_from_fork+0x10/0x20
[   54.426974] 
[   54.427356] Allocated by task 254:
[   54.427787]  kasan_save_stack+0x3c/0x68
[   54.428452]  kasan_save_track+0x20/0x40
[   54.428895]  kasan_save_alloc_info+0x40/0x58
[   54.429664]  __kasan_kmalloc+0xd4/0xd8
[   54.430213]  __kmalloc_cache_noprof+0x15c/0x3c0
[   54.430867]  kasan_atomics+0xb8/0x2e8
[   54.431420]  kunit_try_run_case+0x14c/0x3d0
[   54.431992]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.432697]  kthread+0x24c/0x2d0
[   54.433206]  ret_from_fork+0x10/0x20
[   54.433764] 
[   54.434080] The buggy address belongs to the object at fff00000c616b300
[   54.434080]  which belongs to the cache kmalloc-64 of size 64
[   54.435376] The buggy address is located 0 bytes to the right of
[   54.435376]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   54.436706] 
[   54.437091] The buggy address belongs to the physical page:
[   54.437775] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   54.438814] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.439653] page_type: f5(slab)
[   54.440214] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   54.441120] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   54.441988] page dumped because: kasan: bad access detected
[   54.442721] 
[   54.443054] Memory state around the buggy address:
[   54.443644]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.444557]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.445478] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.446321]                                      ^
[   54.446898]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.447814]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.448687] ==================================================================
[   52.408265] ==================================================================
[   52.409660] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   52.410394] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   52.411643] 
[   52.412094] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   52.413537] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.414098] Hardware name: linux,dummy-virt (DT)
[   52.414786] Call trace:
[   52.415253]  show_stack+0x20/0x38 (C)
[   52.415808]  dump_stack_lvl+0x8c/0xd0
[   52.416405]  print_report+0x118/0x5e0
[   52.416938]  kasan_report+0xc8/0x118
[   52.417489]  kasan_check_range+0x100/0x1a8
[   52.418121]  __kasan_check_write+0x20/0x30
[   52.418863]  kasan_atomics_helper+0x47c/0x4858
[   52.419426]  kasan_atomics+0x198/0x2e8
[   52.420086]  kunit_try_run_case+0x14c/0x3d0
[   52.420658]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.421544]  kthread+0x24c/0x2d0
[   52.422104]  ret_from_fork+0x10/0x20
[   52.422764] 
[   52.423114] Allocated by task 254:
[   52.423650]  kasan_save_stack+0x3c/0x68
[   52.424215]  kasan_save_track+0x20/0x40
[   52.424777]  kasan_save_alloc_info+0x40/0x58
[   52.425558]  __kasan_kmalloc+0xd4/0xd8
[   52.426061]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.426849]  kasan_atomics+0xb8/0x2e8
[   52.427371]  kunit_try_run_case+0x14c/0x3d0
[   52.428068]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.428802]  kthread+0x24c/0x2d0
[   52.429396]  ret_from_fork+0x10/0x20
[   52.429941] 
[   52.430214] The buggy address belongs to the object at fff00000c616b300
[   52.430214]  which belongs to the cache kmalloc-64 of size 64
[   52.431621] The buggy address is located 0 bytes to the right of
[   52.431621]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   52.433022] 
[   52.433405] The buggy address belongs to the physical page:
[   52.434098] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   52.435014] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.435823] page_type: f5(slab)
[   52.436423] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   52.437412] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.438279] page dumped because: kasan: bad access detected
[   52.438938] 
[   52.439273] Memory state around the buggy address:
[   52.439855]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.440788]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.441710] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.442613]                                      ^
[   52.443204]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.444099]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.445077] ==================================================================
[   52.878602] ==================================================================
[   52.880186] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   52.881081] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   52.882423] 
[   52.882868] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   52.884137] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.884814] Hardware name: linux,dummy-virt (DT)
[   52.885387] Call trace:
[   52.885868]  show_stack+0x20/0x38 (C)
[   52.886365]  dump_stack_lvl+0x8c/0xd0
[   52.887032]  print_report+0x118/0x5e0
[   52.887635]  kasan_report+0xc8/0x118
[   52.888163]  kasan_check_range+0x100/0x1a8
[   52.888887]  __kasan_check_write+0x20/0x30
[   52.889545]  kasan_atomics_helper+0x99c/0x4858
[   52.890328]  kasan_atomics+0x198/0x2e8
[   52.890855]  kunit_try_run_case+0x14c/0x3d0
[   52.891587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.892311]  kthread+0x24c/0x2d0
[   52.892948]  ret_from_fork+0x10/0x20
[   52.893468] 
[   52.893823] Allocated by task 254:
[   52.894352]  kasan_save_stack+0x3c/0x68
[   52.894953]  kasan_save_track+0x20/0x40
[   52.895473]  kasan_save_alloc_info+0x40/0x58
[   52.896156]  __kasan_kmalloc+0xd4/0xd8
[   52.896745]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.897374]  kasan_atomics+0xb8/0x2e8
[   52.897871]  kunit_try_run_case+0x14c/0x3d0
[   52.898440]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.899092]  kthread+0x24c/0x2d0
[   52.899731]  ret_from_fork+0x10/0x20
[   52.900183] 
[   52.900614] The buggy address belongs to the object at fff00000c616b300
[   52.900614]  which belongs to the cache kmalloc-64 of size 64
[   52.902044] The buggy address is located 0 bytes to the right of
[   52.902044]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   52.903415] 
[   52.903790] The buggy address belongs to the physical page:
[   52.904484] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   52.905500] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.906196] page_type: f5(slab)
[   52.906810] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   52.907850] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.908642] page dumped because: kasan: bad access detected
[   52.909371] 
[   52.909731] Memory state around the buggy address:
[   52.910326]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.911567]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.912484] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.913319]                                      ^
[   52.913889]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.914987]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.915780] ==================================================================
[   53.411482] ==================================================================
[   53.412668] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   53.413774] Read of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   53.414611] 
[   53.415104] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   53.416349] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.416862] Hardware name: linux,dummy-virt (DT)
[   53.417557] Call trace:
[   53.417911]  show_stack+0x20/0x38 (C)
[   53.418628]  dump_stack_lvl+0x8c/0xd0
[   53.419158]  print_report+0x118/0x5e0
[   53.419752]  kasan_report+0xc8/0x118
[   53.420331]  __asan_report_load8_noabort+0x20/0x30
[   53.421004]  kasan_atomics_helper+0x3f58/0x4858
[   53.421677]  kasan_atomics+0x198/0x2e8
[   53.422211]  kunit_try_run_case+0x14c/0x3d0
[   53.422851]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.423621]  kthread+0x24c/0x2d0
[   53.424136]  ret_from_fork+0x10/0x20
[   53.424731] 
[   53.425104] Allocated by task 254:
[   53.425664]  kasan_save_stack+0x3c/0x68
[   53.426149]  kasan_save_track+0x20/0x40
[   53.426831]  kasan_save_alloc_info+0x40/0x58
[   53.427445]  __kasan_kmalloc+0xd4/0xd8
[   53.427926]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.428657]  kasan_atomics+0xb8/0x2e8
[   53.429190]  kunit_try_run_case+0x14c/0x3d0
[   53.429805]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.430623]  kthread+0x24c/0x2d0
[   53.431124]  ret_from_fork+0x10/0x20
[   53.431611] 
[   53.432028] The buggy address belongs to the object at fff00000c616b300
[   53.432028]  which belongs to the cache kmalloc-64 of size 64
[   53.433332] The buggy address is located 0 bytes to the right of
[   53.433332]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   53.434703] 
[   53.435014] The buggy address belongs to the physical page:
[   53.435590] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   53.436671] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.437427] page_type: f5(slab)
[   53.437960] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   53.438938] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.439871] page dumped because: kasan: bad access detected
[   53.440569] 
[   53.441080] Memory state around the buggy address:
[   53.441782]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.442699]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.443524] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.444436]                                      ^
[   53.445209]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.446164]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.447048] ==================================================================
[   52.840920] ==================================================================
[   52.841731] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   52.842703] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   52.843548] 
[   52.843968] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   52.845355] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.845913] Hardware name: linux,dummy-virt (DT)
[   52.846519] Call trace:
[   52.846945]  show_stack+0x20/0x38 (C)
[   52.847611]  dump_stack_lvl+0x8c/0xd0
[   52.848128]  print_report+0x118/0x5e0
[   52.848778]  kasan_report+0xc8/0x118
[   52.849277]  kasan_check_range+0x100/0x1a8
[   52.849978]  __kasan_check_write+0x20/0x30
[   52.850647]  kasan_atomics_helper+0x934/0x4858
[   52.851353]  kasan_atomics+0x198/0x2e8
[   52.851915]  kunit_try_run_case+0x14c/0x3d0
[   52.852581]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.853250]  kthread+0x24c/0x2d0
[   52.853883]  ret_from_fork+0x10/0x20
[   52.854506] 
[   52.854845] Allocated by task 254:
[   52.855390]  kasan_save_stack+0x3c/0x68
[   52.855918]  kasan_save_track+0x20/0x40
[   52.856493]  kasan_save_alloc_info+0x40/0x58
[   52.857159]  __kasan_kmalloc+0xd4/0xd8
[   52.857693]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.858371]  kasan_atomics+0xb8/0x2e8
[   52.858916]  kunit_try_run_case+0x14c/0x3d0
[   52.859459]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.860232]  kthread+0x24c/0x2d0
[   52.860885]  ret_from_fork+0x10/0x20
[   52.861458] 
[   52.861790] The buggy address belongs to the object at fff00000c616b300
[   52.861790]  which belongs to the cache kmalloc-64 of size 64
[   52.863172] The buggy address is located 0 bytes to the right of
[   52.863172]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   52.864537] 
[   52.864860] The buggy address belongs to the physical page:
[   52.865557] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   52.866585] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.867488] page_type: f5(slab)
[   52.867934] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   52.869119] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.869892] page dumped because: kasan: bad access detected
[   52.870565] 
[   52.871003] Memory state around the buggy address:
[   52.871730]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.872773]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.873648] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.874489]                                      ^
[   52.875167]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.876058]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.876894] ==================================================================
[   52.255354] ==================================================================
[   52.256117] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   52.257493] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   52.258245] 
[   52.258753] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   52.259994] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.260567] Hardware name: linux,dummy-virt (DT)
[   52.261238] Call trace:
[   52.261622]  show_stack+0x20/0x38 (C)
[   52.262278]  dump_stack_lvl+0x8c/0xd0
[   52.262881]  print_report+0x118/0x5e0
[   52.263643]  kasan_report+0xc8/0x118
[   52.264218]  kasan_check_range+0x100/0x1a8
[   52.264933]  __kasan_check_write+0x20/0x30
[   52.265594]  kasan_atomics_helper+0x32c/0x4858
[   52.266113]  kasan_atomics+0x198/0x2e8
[   52.266856]  kunit_try_run_case+0x14c/0x3d0
[   52.267546]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.268355]  kthread+0x24c/0x2d0
[   52.268931]  ret_from_fork+0x10/0x20
[   52.269509] 
[   52.269841] Allocated by task 254:
[   52.270385]  kasan_save_stack+0x3c/0x68
[   52.270853]  kasan_save_track+0x20/0x40
[   52.271519]  kasan_save_alloc_info+0x40/0x58
[   52.272036]  __kasan_kmalloc+0xd4/0xd8
[   52.272757]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.273422]  kasan_atomics+0xb8/0x2e8
[   52.274013]  kunit_try_run_case+0x14c/0x3d0
[   52.274602]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.275413]  kthread+0x24c/0x2d0
[   52.275915]  ret_from_fork+0x10/0x20
[   52.276535] 
[   52.276851] The buggy address belongs to the object at fff00000c616b300
[   52.276851]  which belongs to the cache kmalloc-64 of size 64
[   52.278224] The buggy address is located 0 bytes to the right of
[   52.278224]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   52.279750] 
[   52.280045] The buggy address belongs to the physical page:
[   52.280838] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   52.281815] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.282586] page_type: f5(slab)
[   52.283188] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   52.284029] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.285012] page dumped because: kasan: bad access detected
[   52.285696] 
[   52.286050] Memory state around the buggy address:
[   52.286654]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.287646]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.288500] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.289345]                                      ^
[   52.290074]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.290891]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.291721] ==================================================================
[   53.179959] ==================================================================
[   53.180653] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   53.181824] Read of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   53.182718] 
[   53.183023] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   53.184158] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.184768] Hardware name: linux,dummy-virt (DT)
[   53.185505] Call trace:
[   53.185994]  show_stack+0x20/0x38 (C)
[   53.186597]  dump_stack_lvl+0x8c/0xd0
[   53.187240]  print_report+0x118/0x5e0
[   53.187776]  kasan_report+0xc8/0x118
[   53.188310]  __asan_report_load4_noabort+0x20/0x30
[   53.188894]  kasan_atomics_helper+0x3de4/0x4858
[   53.189652]  kasan_atomics+0x198/0x2e8
[   53.190187]  kunit_try_run_case+0x14c/0x3d0
[   53.191121]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.191818]  kthread+0x24c/0x2d0
[   53.192360]  ret_from_fork+0x10/0x20
[   53.192975] 
[   53.193356] Allocated by task 254:
[   53.193758]  kasan_save_stack+0x3c/0x68
[   53.194468]  kasan_save_track+0x20/0x40
[   53.195020]  kasan_save_alloc_info+0x40/0x58
[   53.195658]  __kasan_kmalloc+0xd4/0xd8
[   53.196147]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.196868]  kasan_atomics+0xb8/0x2e8
[   53.197367]  kunit_try_run_case+0x14c/0x3d0
[   53.198099]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.198707]  kthread+0x24c/0x2d0
[   53.199340]  ret_from_fork+0x10/0x20
[   53.199891] 
[   53.200322] The buggy address belongs to the object at fff00000c616b300
[   53.200322]  which belongs to the cache kmalloc-64 of size 64
[   53.201715] The buggy address is located 0 bytes to the right of
[   53.201715]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   53.203135] 
[   53.203490] The buggy address belongs to the physical page:
[   53.204215] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   53.205129] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.205855] page_type: f5(slab)
[   53.206410] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   53.207368] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.208283] page dumped because: kasan: bad access detected
[   53.209051] 
[   53.209348] Memory state around the buggy address:
[   53.210015]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.210836]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.211648] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.212573]                                      ^
[   53.213165]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.214111]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.214966] ==================================================================
[   52.760897] ==================================================================
[   52.761800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   52.763094] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   52.764183] 
[   52.764633] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   52.766269] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.766861] Hardware name: linux,dummy-virt (DT)
[   52.767518] Call trace:
[   52.768035]  show_stack+0x20/0x38 (C)
[   52.768677]  dump_stack_lvl+0x8c/0xd0
[   52.769349]  print_report+0x118/0x5e0
[   52.769994]  kasan_report+0xc8/0x118
[   52.770622]  kasan_check_range+0x100/0x1a8
[   52.771309]  __kasan_check_write+0x20/0x30
[   52.771969]  kasan_atomics_helper+0x894/0x4858
[   52.772655]  kasan_atomics+0x198/0x2e8
[   52.773255]  kunit_try_run_case+0x14c/0x3d0
[   52.773956]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.774777]  kthread+0x24c/0x2d0
[   52.775481]  ret_from_fork+0x10/0x20
[   52.776117] 
[   52.776444] Allocated by task 254:
[   52.777065]  kasan_save_stack+0x3c/0x68
[   52.777664]  kasan_save_track+0x20/0x40
[   52.778402]  kasan_save_alloc_info+0x40/0x58
[   52.779078]  __kasan_kmalloc+0xd4/0xd8
[   52.779908]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.780330]  kasan_atomics+0xb8/0x2e8
[   52.780680]  kunit_try_run_case+0x14c/0x3d0
[   52.781062]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.781528]  kthread+0x24c/0x2d0
[   52.781895]  ret_from_fork+0x10/0x20
[   52.782249] 
[   52.783339] The buggy address belongs to the object at fff00000c616b300
[   52.783339]  which belongs to the cache kmalloc-64 of size 64
[   52.786337] The buggy address is located 0 bytes to the right of
[   52.786337]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   52.787911] 
[   52.788239] The buggy address belongs to the physical page:
[   52.788980] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   52.789831] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.790657] page_type: f5(slab)
[   52.791117] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   52.792101] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.793089] page dumped because: kasan: bad access detected
[   52.793775] 
[   52.794085] Memory state around the buggy address:
[   52.794711]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.795619]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.796547] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.797333]                                      ^
[   52.797995]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.798838]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.799713] ==================================================================
[   53.914681] ==================================================================
[   53.915772] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   53.916771] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   53.917528] 
[   53.917903] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   53.919138] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.919710] Hardware name: linux,dummy-virt (DT)
[   53.920275] Call trace:
[   53.921171]  show_stack+0x20/0x38 (C)
[   53.921736]  dump_stack_lvl+0x8c/0xd0
[   53.922429]  print_report+0x118/0x5e0
[   53.922971]  kasan_report+0xc8/0x118
[   53.923542]  kasan_check_range+0x100/0x1a8
[   53.924216]  __kasan_check_write+0x20/0x30
[   53.924863]  kasan_atomics_helper+0x12d8/0x4858
[   53.925529]  kasan_atomics+0x198/0x2e8
[   53.926111]  kunit_try_run_case+0x14c/0x3d0
[   53.926748]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.927547]  kthread+0x24c/0x2d0
[   53.928117]  ret_from_fork+0x10/0x20
[   53.928618] 
[   53.928975] Allocated by task 254:
[   53.929630]  kasan_save_stack+0x3c/0x68
[   53.930164]  kasan_save_track+0x20/0x40
[   53.930727]  kasan_save_alloc_info+0x40/0x58
[   53.931425]  __kasan_kmalloc+0xd4/0xd8
[   53.931967]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.932593]  kasan_atomics+0xb8/0x2e8
[   53.933105]  kunit_try_run_case+0x14c/0x3d0
[   53.933772]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.934475]  kthread+0x24c/0x2d0
[   53.934954]  ret_from_fork+0x10/0x20
[   53.935628] 
[   53.935986] The buggy address belongs to the object at fff00000c616b300
[   53.935986]  which belongs to the cache kmalloc-64 of size 64
[   53.937371] The buggy address is located 0 bytes to the right of
[   53.937371]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   53.938841] 
[   53.939177] The buggy address belongs to the physical page:
[   53.939883] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   53.940792] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.941703] page_type: f5(slab)
[   53.942170] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   53.943200] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.944182] page dumped because: kasan: bad access detected
[   53.944844] 
[   53.945163] Memory state around the buggy address:
[   53.945761]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.946662]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.947549] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.948496]                                      ^
[   53.949073]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.949951]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.950840] ==================================================================
[   54.149963] ==================================================================
[   54.150741] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   54.151714] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   54.152777] 
[   54.153105] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   54.154282] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.154913] Hardware name: linux,dummy-virt (DT)
[   54.155543] Call trace:
[   54.155970]  show_stack+0x20/0x38 (C)
[   54.156493]  dump_stack_lvl+0x8c/0xd0
[   54.157154]  print_report+0x118/0x5e0
[   54.157728]  kasan_report+0xc8/0x118
[   54.158428]  kasan_check_range+0x100/0x1a8
[   54.159061]  __kasan_check_write+0x20/0x30
[   54.159763]  kasan_atomics_helper+0x154c/0x4858
[   54.160502]  kasan_atomics+0x198/0x2e8
[   54.161187]  kunit_try_run_case+0x14c/0x3d0
[   54.161760]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.162567]  kthread+0x24c/0x2d0
[   54.163129]  ret_from_fork+0x10/0x20
[   54.163668] 
[   54.164054] Allocated by task 254:
[   54.164587]  kasan_save_stack+0x3c/0x68
[   54.165110]  kasan_save_track+0x20/0x40
[   54.165697]  kasan_save_alloc_info+0x40/0x58
[   54.166419]  __kasan_kmalloc+0xd4/0xd8
[   54.166972]  __kmalloc_cache_noprof+0x15c/0x3c0
[   54.167748]  kasan_atomics+0xb8/0x2e8
[   54.168268]  kunit_try_run_case+0x14c/0x3d0
[   54.168950]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.169648]  kthread+0x24c/0x2d0
[   54.170166]  ret_from_fork+0x10/0x20
[   54.170702] 
[   54.171021] The buggy address belongs to the object at fff00000c616b300
[   54.171021]  which belongs to the cache kmalloc-64 of size 64
[   54.172390] The buggy address is located 0 bytes to the right of
[   54.172390]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   54.173668] 
[   54.174105] The buggy address belongs to the physical page:
[   54.174908] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   54.175826] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.176648] page_type: f5(slab)
[   54.177213] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   54.178126] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   54.179030] page dumped because: kasan: bad access detected
[   54.179694] 
[   54.180028] Memory state around the buggy address:
[   54.180651]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.181500]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.182420] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.183231]                                      ^
[   54.183813]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.184678]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.185609] ==================================================================
[   52.446565] ==================================================================
[   52.447283] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   52.448609] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   52.449876] 
[   52.450215] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   52.451388] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.452019] Hardware name: linux,dummy-virt (DT)
[   52.452590] Call trace:
[   52.453038]  show_stack+0x20/0x38 (C)
[   52.453621]  dump_stack_lvl+0x8c/0xd0
[   52.454176]  print_report+0x118/0x5e0
[   52.454816]  kasan_report+0xc8/0x118
[   52.455373]  kasan_check_range+0x100/0x1a8
[   52.456077]  __kasan_check_write+0x20/0x30
[   52.456714]  kasan_atomics_helper+0x4e4/0x4858
[   52.457539]  kasan_atomics+0x198/0x2e8
[   52.458204]  kunit_try_run_case+0x14c/0x3d0
[   52.458912]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.459632]  kthread+0x24c/0x2d0
[   52.460186]  ret_from_fork+0x10/0x20
[   52.460896] 
[   52.461204] Allocated by task 254:
[   52.461898]  kasan_save_stack+0x3c/0x68
[   52.462544]  kasan_save_track+0x20/0x40
[   52.463138]  kasan_save_alloc_info+0x40/0x58
[   52.463746]  __kasan_kmalloc+0xd4/0xd8
[   52.464445]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.465029]  kasan_atomics+0xb8/0x2e8
[   52.465704]  kunit_try_run_case+0x14c/0x3d0
[   52.466252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.467088]  kthread+0x24c/0x2d0
[   52.467650]  ret_from_fork+0x10/0x20
[   52.468151] 
[   52.468547] The buggy address belongs to the object at fff00000c616b300
[   52.468547]  which belongs to the cache kmalloc-64 of size 64
[   52.469835] The buggy address is located 0 bytes to the right of
[   52.469835]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   52.471316] 
[   52.471610] The buggy address belongs to the physical page:
[   52.472309] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   52.473238] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.474051] page_type: f5(slab)
[   52.474621] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   52.475492] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.476541] page dumped because: kasan: bad access detected
[   52.477209] 
[   52.477578] Memory state around the buggy address:
[   52.478208]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.479114]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.480080] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.480968]                                      ^
[   52.481614]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.482521]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.483428] ==================================================================
[   53.298429] ==================================================================
[   53.299208] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   53.300162] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   53.300886] 
[   53.301594] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   53.302958] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.303470] Hardware name: linux,dummy-virt (DT)
[   53.304189] Call trace:
[   53.304589]  show_stack+0x20/0x38 (C)
[   53.305112]  dump_stack_lvl+0x8c/0xd0
[   53.305839]  print_report+0x118/0x5e0
[   53.306406]  kasan_report+0xc8/0x118
[   53.306983]  kasan_check_range+0x100/0x1a8
[   53.307604]  __kasan_check_write+0x20/0x30
[   53.308223]  kasan_atomics_helper+0xd3c/0x4858
[   53.308935]  kasan_atomics+0x198/0x2e8
[   53.309557]  kunit_try_run_case+0x14c/0x3d0
[   53.310143]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.311003]  kthread+0x24c/0x2d0
[   53.311567]  ret_from_fork+0x10/0x20
[   53.312127] 
[   53.312438] Allocated by task 254:
[   53.312992]  kasan_save_stack+0x3c/0x68
[   53.313647]  kasan_save_track+0x20/0x40
[   53.314228]  kasan_save_alloc_info+0x40/0x58
[   53.314845]  __kasan_kmalloc+0xd4/0xd8
[   53.315427]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.316039]  kasan_atomics+0xb8/0x2e8
[   53.316792]  kunit_try_run_case+0x14c/0x3d0
[   53.317457]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.318213]  kthread+0x24c/0x2d0
[   53.318796]  ret_from_fork+0x10/0x20
[   53.319520] 
[   53.319815] The buggy address belongs to the object at fff00000c616b300
[   53.319815]  which belongs to the cache kmalloc-64 of size 64
[   53.320939] The buggy address is located 0 bytes to the right of
[   53.320939]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   53.322143] 
[   53.322582] The buggy address belongs to the physical page:
[   53.323069] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   53.324276] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.324851] page_type: f5(slab)
[   53.325218] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   53.326013] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.326962] page dumped because: kasan: bad access detected
[   53.328030] 
[   53.328375] Memory state around the buggy address:
[   53.329335]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.330169]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.330989] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.332202]                                      ^
[   53.333141]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.334083]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.334967] ==================================================================
[   52.370633] ==================================================================
[   52.371357] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   52.372480] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   52.373489] 
[   52.373826] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   52.375181] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.375852] Hardware name: linux,dummy-virt (DT)
[   52.376469] Call trace:
[   52.376968]  show_stack+0x20/0x38 (C)
[   52.377540]  dump_stack_lvl+0x8c/0xd0
[   52.378268]  print_report+0x118/0x5e0
[   52.378871]  kasan_report+0xc8/0x118
[   52.379521]  kasan_check_range+0x100/0x1a8
[   52.380276]  __kasan_check_write+0x20/0x30
[   52.380904]  kasan_atomics_helper+0x414/0x4858
[   52.381592]  kasan_atomics+0x198/0x2e8
[   52.382235]  kunit_try_run_case+0x14c/0x3d0
[   52.382883]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.383584]  kthread+0x24c/0x2d0
[   52.384211]  ret_from_fork+0x10/0x20
[   52.384781] 
[   52.385083] Allocated by task 254:
[   52.385667]  kasan_save_stack+0x3c/0x68
[   52.386277]  kasan_save_track+0x20/0x40
[   52.386798]  kasan_save_alloc_info+0x40/0x58
[   52.387501]  __kasan_kmalloc+0xd4/0xd8
[   52.388038]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.388643]  kasan_atomics+0xb8/0x2e8
[   52.389239]  kunit_try_run_case+0x14c/0x3d0
[   52.389853]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.390499]  kthread+0x24c/0x2d0
[   52.391135]  ret_from_fork+0x10/0x20
[   52.391673] 
[   52.391996] The buggy address belongs to the object at fff00000c616b300
[   52.391996]  which belongs to the cache kmalloc-64 of size 64
[   52.393287] The buggy address is located 0 bytes to the right of
[   52.393287]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   52.394792] 
[   52.395110] The buggy address belongs to the physical page:
[   52.395806] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   52.396707] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.397608] page_type: f5(slab)
[   52.398094] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   52.399154] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.400021] page dumped because: kasan: bad access detected
[   52.400686] 
[   52.400995] Memory state around the buggy address:
[   52.401629]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.402448]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.403349] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.404174]                                      ^
[   52.404772]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.405677]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.406521] ==================================================================
[   53.448829] ==================================================================
[   53.449743] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   53.451547] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   53.453257] 
[   53.453680] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   53.454943] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.455556] Hardware name: linux,dummy-virt (DT)
[   53.456199] Call trace:
[   53.456881]  show_stack+0x20/0x38 (C)
[   53.457502]  dump_stack_lvl+0x8c/0xd0
[   53.458216]  print_report+0x118/0x5e0
[   53.458910]  kasan_report+0xc8/0x118
[   53.459609]  kasan_check_range+0x100/0x1a8
[   53.460261]  __kasan_check_write+0x20/0x30
[   53.460928]  kasan_atomics_helper+0xe44/0x4858
[   53.461635]  kasan_atomics+0x198/0x2e8
[   53.462248]  kunit_try_run_case+0x14c/0x3d0
[   53.462945]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.463751]  kthread+0x24c/0x2d0
[   53.464379]  ret_from_fork+0x10/0x20
[   53.465043] 
[   53.465444] Allocated by task 254:
[   53.465977]  kasan_save_stack+0x3c/0x68
[   53.466720]  kasan_save_track+0x20/0x40
[   53.467344]  kasan_save_alloc_info+0x40/0x58
[   53.467980]  __kasan_kmalloc+0xd4/0xd8
[   53.468702]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.469425]  kasan_atomics+0xb8/0x2e8
[   53.470034]  kunit_try_run_case+0x14c/0x3d0
[   53.470735]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.471597]  kthread+0x24c/0x2d0
[   53.472175]  ret_from_fork+0x10/0x20
[   53.472761] 
[   53.473145] The buggy address belongs to the object at fff00000c616b300
[   53.473145]  which belongs to the cache kmalloc-64 of size 64
[   53.474645] The buggy address is located 0 bytes to the right of
[   53.474645]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   53.476155] 
[   53.476596] The buggy address belongs to the physical page:
[   53.477384] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   53.478395] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.479360] page_type: f5(slab)
[   53.479968] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   53.480957] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.481854] page dumped because: kasan: bad access detected
[   53.482607] 
[   53.482947] Memory state around the buggy address:
[   53.483678]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.484698]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.485685] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.486718]                                      ^
[   53.487500]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.488289]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.489331] ==================================================================
[   53.602719] ==================================================================
[   53.603691] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   53.604645] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   53.605446] 
[   53.605841] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   53.607123] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.607710] Hardware name: linux,dummy-virt (DT)
[   53.608366] Call trace:
[   53.608715]  show_stack+0x20/0x38 (C)
[   53.609318]  dump_stack_lvl+0x8c/0xd0
[   53.610021]  print_report+0x118/0x5e0
[   53.610661]  kasan_report+0xc8/0x118
[   53.611165]  kasan_check_range+0x100/0x1a8
[   53.611931]  __kasan_check_write+0x20/0x30
[   53.612482]  kasan_atomics_helper+0xf88/0x4858
[   53.613346]  kasan_atomics+0x198/0x2e8
[   53.613821]  kunit_try_run_case+0x14c/0x3d0
[   53.614629]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.615394]  kthread+0x24c/0x2d0
[   53.616029]  ret_from_fork+0x10/0x20
[   53.616567] 
[   53.616949] Allocated by task 254:
[   53.617527]  kasan_save_stack+0x3c/0x68
[   53.618132]  kasan_save_track+0x20/0x40
[   53.618712]  kasan_save_alloc_info+0x40/0x58
[   53.619196]  __kasan_kmalloc+0xd4/0xd8
[   53.619846]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.620410]  kasan_atomics+0xb8/0x2e8
[   53.621024]  kunit_try_run_case+0x14c/0x3d0
[   53.621578]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.622374]  kthread+0x24c/0x2d0
[   53.622935]  ret_from_fork+0x10/0x20
[   53.623408] 
[   53.623856] The buggy address belongs to the object at fff00000c616b300
[   53.623856]  which belongs to the cache kmalloc-64 of size 64
[   53.625376] The buggy address is located 0 bytes to the right of
[   53.625376]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   53.626786] 
[   53.627064] The buggy address belongs to the physical page:
[   53.627703] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   53.628645] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.629549] page_type: f5(slab)
[   53.630026] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   53.630954] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.631845] page dumped because: kasan: bad access detected
[   53.632604] 
[   53.632954] Memory state around the buggy address:
[   53.633621]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.634463]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.635364] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.636198]                                      ^
[   53.636776]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.637675]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.638634] ==================================================================
[   52.522426] ==================================================================
[   52.523536] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   52.524533] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   52.525542] 
[   52.525955] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   52.527046] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.527373] Hardware name: linux,dummy-virt (DT)
[   52.528061] Call trace:
[   52.528660]  show_stack+0x20/0x38 (C)
[   52.529205]  dump_stack_lvl+0x8c/0xd0
[   52.529842]  print_report+0x118/0x5e0
[   52.530480]  kasan_report+0xc8/0x118
[   52.531121]  kasan_check_range+0x100/0x1a8
[   52.531771]  __kasan_check_write+0x20/0x30
[   52.532520]  kasan_atomics_helper+0x5b4/0x4858
[   52.533262]  kasan_atomics+0x198/0x2e8
[   52.533914]  kunit_try_run_case+0x14c/0x3d0
[   52.534625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.535505]  kthread+0x24c/0x2d0
[   52.536136]  ret_from_fork+0x10/0x20
[   52.536760] 
[   52.537088] Allocated by task 254:
[   52.537715]  kasan_save_stack+0x3c/0x68
[   52.538434]  kasan_save_track+0x20/0x40
[   52.539057]  kasan_save_alloc_info+0x40/0x58
[   52.539735]  __kasan_kmalloc+0xd4/0xd8
[   52.540360]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.541030]  kasan_atomics+0xb8/0x2e8
[   52.541657]  kunit_try_run_case+0x14c/0x3d0
[   52.542384]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.543157]  kthread+0x24c/0x2d0
[   52.543743]  ret_from_fork+0x10/0x20
[   52.544379] 
[   52.544856] The buggy address belongs to the object at fff00000c616b300
[   52.544856]  which belongs to the cache kmalloc-64 of size 64
[   52.546264] The buggy address is located 0 bytes to the right of
[   52.546264]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   52.547896] 
[   52.548185] The buggy address belongs to the physical page:
[   52.548954] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   52.550020] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.550882] page_type: f5(slab)
[   52.551430] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   52.552470] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.553435] page dumped because: kasan: bad access detected
[   52.554153] 
[   52.554488] Memory state around the buggy address:
[   52.555205]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.556165]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.557051] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.557905]                                      ^
[   52.558570]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.559492]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.560424] ==================================================================
[   53.834230] ==================================================================
[   53.836904] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   53.839170] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   53.841667] 
[   53.841979] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   53.843130] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.843710] Hardware name: linux,dummy-virt (DT)
[   53.844289] Call trace:
[   53.844690]  show_stack+0x20/0x38 (C)
[   53.845336]  dump_stack_lvl+0x8c/0xd0
[   53.845906]  print_report+0x118/0x5e0
[   53.846481]  kasan_report+0xc8/0x118
[   53.847019]  kasan_check_range+0x100/0x1a8
[   53.847582]  __kasan_check_write+0x20/0x30
[   53.848352]  kasan_atomics_helper+0x11f8/0x4858
[   53.849004]  kasan_atomics+0x198/0x2e8
[   53.849704]  kunit_try_run_case+0x14c/0x3d0
[   53.850338]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.851241]  kthread+0x24c/0x2d0
[   53.851926]  ret_from_fork+0x10/0x20
[   53.852480] 
[   53.852776] Allocated by task 254:
[   53.853236]  kasan_save_stack+0x3c/0x68
[   53.853853]  kasan_save_track+0x20/0x40
[   53.854343]  kasan_save_alloc_info+0x40/0x58
[   53.854983]  __kasan_kmalloc+0xd4/0xd8
[   53.855689]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.856195]  kasan_atomics+0xb8/0x2e8
[   53.856834]  kunit_try_run_case+0x14c/0x3d0
[   53.857503]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.858181]  kthread+0x24c/0x2d0
[   53.858744]  ret_from_fork+0x10/0x20
[   53.859263] 
[   53.859579] The buggy address belongs to the object at fff00000c616b300
[   53.859579]  which belongs to the cache kmalloc-64 of size 64
[   53.861061] The buggy address is located 0 bytes to the right of
[   53.861061]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   53.862476] 
[   53.862792] The buggy address belongs to the physical page:
[   53.863485] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   53.864371] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.865225] page_type: f5(slab)
[   53.865666] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   53.866604] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.867536] page dumped because: kasan: bad access detected
[   53.868220] 
[   53.868601] Memory state around the buggy address:
[   53.869265]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.870099]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.870920] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.871840]                                      ^
[   53.872593]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.873392]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.874279] ==================================================================
[   53.952560] ==================================================================
[   53.953249] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   53.954003] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   53.955075] 
[   53.955472] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   53.956565] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.957337] Hardware name: linux,dummy-virt (DT)
[   53.957929] Call trace:
[   53.958357]  show_stack+0x20/0x38 (C)
[   53.959031]  dump_stack_lvl+0x8c/0xd0
[   53.959687]  print_report+0x118/0x5e0
[   53.960401]  kasan_report+0xc8/0x118
[   53.961120]  kasan_check_range+0x100/0x1a8
[   53.961857]  __kasan_check_write+0x20/0x30
[   53.962619]  kasan_atomics_helper+0x1384/0x4858
[   53.963504]  kasan_atomics+0x198/0x2e8
[   53.964114]  kunit_try_run_case+0x14c/0x3d0
[   53.964772]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.965553]  kthread+0x24c/0x2d0
[   53.966233]  ret_from_fork+0x10/0x20
[   53.966958] 
[   53.967320] Allocated by task 254:
[   53.967929]  kasan_save_stack+0x3c/0x68
[   53.968656]  kasan_save_track+0x20/0x40
[   53.969353]  kasan_save_alloc_info+0x40/0x58
[   53.970004]  __kasan_kmalloc+0xd4/0xd8
[   53.970646]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.971309]  kasan_atomics+0xb8/0x2e8
[   53.971994]  kunit_try_run_case+0x14c/0x3d0
[   53.972690]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.973468]  kthread+0x24c/0x2d0
[   53.974051]  ret_from_fork+0x10/0x20
[   53.974681] 
[   53.975024] The buggy address belongs to the object at fff00000c616b300
[   53.975024]  which belongs to the cache kmalloc-64 of size 64
[   53.976538] The buggy address is located 0 bytes to the right of
[   53.976538]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   53.978100] 
[   53.978508] The buggy address belongs to the physical page:
[   53.979362] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   53.980368] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.981321] page_type: f5(slab)
[   53.981877] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   53.982879] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.983891] page dumped because: kasan: bad access detected
[   53.984631] 
[   53.984969] Memory state around the buggy address:
[   53.985692]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.986711]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.987618] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.988523]                                      ^
[   53.989323]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.990255]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.991238] ==================================================================
[   52.721398] ==================================================================
[   52.722012] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   52.722971] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   52.723807] 
[   52.724142] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   52.725574] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.726179] Hardware name: linux,dummy-virt (DT)
[   52.726857] Call trace:
[   52.727248]  show_stack+0x20/0x38 (C)
[   52.727941]  dump_stack_lvl+0x8c/0xd0
[   52.728591]  print_report+0x118/0x5e0
[   52.729251]  kasan_report+0xc8/0x118
[   52.729893]  kasan_check_range+0x100/0x1a8
[   52.730598]  __kasan_check_write+0x20/0x30
[   52.731251]  kasan_atomics_helper+0x7cc/0x4858
[   52.731950]  kasan_atomics+0x198/0x2e8
[   52.732589]  kunit_try_run_case+0x14c/0x3d0
[   52.733272]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.734145]  kthread+0x24c/0x2d0
[   52.734827]  ret_from_fork+0x10/0x20
[   52.735522] 
[   52.735932] Allocated by task 254:
[   52.736540]  kasan_save_stack+0x3c/0x68
[   52.737239]  kasan_save_track+0x20/0x40
[   52.737857]  kasan_save_alloc_info+0x40/0x58
[   52.738620]  __kasan_kmalloc+0xd4/0xd8
[   52.739210]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.739903]  kasan_atomics+0xb8/0x2e8
[   52.740495]  kunit_try_run_case+0x14c/0x3d0
[   52.741083]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.741822]  kthread+0x24c/0x2d0
[   52.742487]  ret_from_fork+0x10/0x20
[   52.743272] 
[   52.743664] The buggy address belongs to the object at fff00000c616b300
[   52.743664]  which belongs to the cache kmalloc-64 of size 64
[   52.745066] The buggy address is located 0 bytes to the right of
[   52.745066]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   52.746548] 
[   52.747006] The buggy address belongs to the physical page:
[   52.747783] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   52.748771] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.749608] page_type: f5(slab)
[   52.750263] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   52.751236] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.752165] page dumped because: kasan: bad access detected
[   52.752888] 
[   52.753245] Memory state around the buggy address:
[   52.753998]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.754890]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.755810] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.756680]                                      ^
[   52.757409]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.758280]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.759143] ==================================================================
[   52.562092] ==================================================================
[   52.562737] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   52.563803] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   52.564611] 
[   52.564994] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   52.566207] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.566839] Hardware name: linux,dummy-virt (DT)
[   52.567520] Call trace:
[   52.568029]  show_stack+0x20/0x38 (C)
[   52.568539]  dump_stack_lvl+0x8c/0xd0
[   52.569184]  print_report+0x118/0x5e0
[   52.569827]  kasan_report+0xc8/0x118
[   52.570355]  kasan_check_range+0x100/0x1a8
[   52.571002]  __kasan_check_write+0x20/0x30
[   52.571664]  kasan_atomics_helper+0x61c/0x4858
[   52.572218]  kasan_atomics+0x198/0x2e8
[   52.572924]  kunit_try_run_case+0x14c/0x3d0
[   52.573557]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.574241]  kthread+0x24c/0x2d0
[   52.574886]  ret_from_fork+0x10/0x20
[   52.575522] 
[   52.575869] Allocated by task 254:
[   52.576288]  kasan_save_stack+0x3c/0x68
[   52.576973]  kasan_save_track+0x20/0x40
[   52.577509]  kasan_save_alloc_info+0x40/0x58
[   52.578079]  __kasan_kmalloc+0xd4/0xd8
[   52.578702]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.579273]  kasan_atomics+0xb8/0x2e8
[   52.579887]  kunit_try_run_case+0x14c/0x3d0
[   52.580396]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.581145]  kthread+0x24c/0x2d0
[   52.581678]  ret_from_fork+0x10/0x20
[   52.582313] 
[   52.582651] The buggy address belongs to the object at fff00000c616b300
[   52.582651]  which belongs to the cache kmalloc-64 of size 64
[   52.583990] The buggy address is located 0 bytes to the right of
[   52.583990]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   52.585657] 
[   52.586377] The buggy address belongs to the physical page:
[   52.587103] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   52.588218] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.589215] page_type: f5(slab)
[   52.589677] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   52.590716] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.591749] page dumped because: kasan: bad access detected
[   52.592516] 
[   52.592855] Memory state around the buggy address:
[   52.593626]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.594569]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.595522] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.596397]                                      ^
[   52.597086]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.597979]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.598993] ==================================================================
[   54.486040] ==================================================================
[   54.486779] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   54.487802] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   54.488932] 
[   54.489712] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   54.490879] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.491813] Hardware name: linux,dummy-virt (DT)
[   54.492573] Call trace:
[   54.493055]  show_stack+0x20/0x38 (C)
[   54.493647]  dump_stack_lvl+0x8c/0xd0
[   54.494208]  print_report+0x118/0x5e0
[   54.494853]  kasan_report+0xc8/0x118
[   54.495449]  kasan_check_range+0x100/0x1a8
[   54.496136]  __kasan_check_write+0x20/0x30
[   54.496713]  kasan_atomics_helper+0x17ec/0x4858
[   54.497460]  kasan_atomics+0x198/0x2e8
[   54.497991]  kunit_try_run_case+0x14c/0x3d0
[   54.498694]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.499526]  kthread+0x24c/0x2d0
[   54.500031]  ret_from_fork+0x10/0x20
[   54.500631] 
[   54.501100] Allocated by task 254:
[   54.501659]  kasan_save_stack+0x3c/0x68
[   54.502174]  kasan_save_track+0x20/0x40
[   54.502956]  kasan_save_alloc_info+0x40/0x58
[   54.503606]  __kasan_kmalloc+0xd4/0xd8
[   54.504121]  __kmalloc_cache_noprof+0x15c/0x3c0
[   54.504920]  kasan_atomics+0xb8/0x2e8
[   54.505488]  kunit_try_run_case+0x14c/0x3d0
[   54.506053]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.506705]  kthread+0x24c/0x2d0
[   54.507288]  ret_from_fork+0x10/0x20
[   54.507798] 
[   54.508174] The buggy address belongs to the object at fff00000c616b300
[   54.508174]  which belongs to the cache kmalloc-64 of size 64
[   54.509628] The buggy address is located 0 bytes to the right of
[   54.509628]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   54.511003] 
[   54.511396] The buggy address belongs to the physical page:
[   54.512099] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   54.512996] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.514013] page_type: f5(slab)
[   54.514595] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   54.515605] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   54.516507] page dumped because: kasan: bad access detected
[   54.517264] 
[   54.517610] Memory state around the buggy address:
[   54.518268]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.519110]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.519931] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.520797]                                      ^
[   54.521430]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.522316]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.523224] ==================================================================
[   54.260663] ==================================================================
[   54.262468] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   54.263247] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   54.264253] 
[   54.264589] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   54.265788] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.266372] Hardware name: linux,dummy-virt (DT)
[   54.266972] Call trace:
[   54.267405]  show_stack+0x20/0x38 (C)
[   54.268069]  dump_stack_lvl+0x8c/0xd0
[   54.268682]  print_report+0x118/0x5e0
[   54.269227]  kasan_report+0xc8/0x118
[   54.269782]  kasan_check_range+0x100/0x1a8
[   54.270419]  __kasan_check_write+0x20/0x30
[   54.271056]  kasan_atomics_helper+0x1644/0x4858
[   54.271732]  kasan_atomics+0x198/0x2e8
[   54.272345]  kunit_try_run_case+0x14c/0x3d0
[   54.272841]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.273616]  kthread+0x24c/0x2d0
[   54.274209]  ret_from_fork+0x10/0x20
[   54.274832] 
[   54.275200] Allocated by task 254:
[   54.275656]  kasan_save_stack+0x3c/0x68
[   54.276315]  kasan_save_track+0x20/0x40
[   54.276881]  kasan_save_alloc_info+0x40/0x58
[   54.277384]  __kasan_kmalloc+0xd4/0xd8
[   54.277998]  __kmalloc_cache_noprof+0x15c/0x3c0
[   54.278623]  kasan_atomics+0xb8/0x2e8
[   54.279269]  kunit_try_run_case+0x14c/0x3d0
[   54.279923]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.280570]  kthread+0x24c/0x2d0
[   54.281168]  ret_from_fork+0x10/0x20
[   54.281714] 
[   54.281986] The buggy address belongs to the object at fff00000c616b300
[   54.281986]  which belongs to the cache kmalloc-64 of size 64
[   54.283384] The buggy address is located 0 bytes to the right of
[   54.283384]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   54.284892] 
[   54.285202] The buggy address belongs to the physical page:
[   54.286001] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   54.286895] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.287753] page_type: f5(slab)
[   54.288218] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   54.289207] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   54.290053] page dumped because: kasan: bad access detected
[   54.290624] 
[   54.290984] Memory state around the buggy address:
[   54.291615]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.292569]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.293541] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.294437]                                      ^
[   54.295065]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.295925]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.296834] ==================================================================
[   52.295279] ==================================================================
[   52.296061] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   52.296850] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   52.297714] 
[   52.298172] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   52.299244] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.300106] Hardware name: linux,dummy-virt (DT)
[   52.300654] Call trace:
[   52.301108]  show_stack+0x20/0x38 (C)
[   52.301673]  dump_stack_lvl+0x8c/0xd0
[   52.302339]  print_report+0x118/0x5e0
[   52.302898]  kasan_report+0xc8/0x118
[   52.303461]  __asan_report_store4_noabort+0x20/0x30
[   52.304168]  kasan_atomics_helper+0x3f94/0x4858
[   52.305159]  kasan_atomics+0x198/0x2e8
[   52.305831]  kunit_try_run_case+0x14c/0x3d0
[   52.306616]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.307468]  kthread+0x24c/0x2d0
[   52.308063]  ret_from_fork+0x10/0x20
[   52.308635] 
[   52.309044] Allocated by task 254:
[   52.309607]  kasan_save_stack+0x3c/0x68
[   52.310365]  kasan_save_track+0x20/0x40
[   52.311021]  kasan_save_alloc_info+0x40/0x58
[   52.311808]  __kasan_kmalloc+0xd4/0xd8
[   52.312398]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.313099]  kasan_atomics+0xb8/0x2e8
[   52.313819]  kunit_try_run_case+0x14c/0x3d0
[   52.314481]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.315214]  kthread+0x24c/0x2d0
[   52.315843]  ret_from_fork+0x10/0x20
[   52.316462] 
[   52.316794] The buggy address belongs to the object at fff00000c616b300
[   52.316794]  which belongs to the cache kmalloc-64 of size 64
[   52.318314] The buggy address is located 0 bytes to the right of
[   52.318314]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   52.319726] 
[   52.320076] The buggy address belongs to the physical page:
[   52.320813] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   52.321860] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.322734] page_type: f5(slab)
[   52.323271] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   52.324264] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.325195] page dumped because: kasan: bad access detected
[   52.325959] 
[   52.326532] Memory state around the buggy address:
[   52.327102]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.328001]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.328915] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.329719]                                      ^
[   52.330361]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.331110]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.332134] ==================================================================
[   52.600490] ==================================================================
[   52.602128] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   52.603170] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   52.604274] 
[   52.604694] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   52.605826] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.606613] Hardware name: linux,dummy-virt (DT)
[   52.607280] Call trace:
[   52.607768]  show_stack+0x20/0x38 (C)
[   52.608458]  dump_stack_lvl+0x8c/0xd0
[   52.609112]  print_report+0x118/0x5e0
[   52.609781]  kasan_report+0xc8/0x118
[   52.610365]  kasan_check_range+0x100/0x1a8
[   52.610997]  __kasan_check_write+0x20/0x30
[   52.611713]  kasan_atomics_helper+0x684/0x4858
[   52.612431]  kasan_atomics+0x198/0x2e8
[   52.613073]  kunit_try_run_case+0x14c/0x3d0
[   52.613835]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.614733]  kthread+0x24c/0x2d0
[   52.615358]  ret_from_fork+0x10/0x20
[   52.615981] 
[   52.616347] Allocated by task 254:
[   52.617039]  kasan_save_stack+0x3c/0x68
[   52.617695]  kasan_save_track+0x20/0x40
[   52.618347]  kasan_save_alloc_info+0x40/0x58
[   52.619026]  __kasan_kmalloc+0xd4/0xd8
[   52.619666]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.620346]  kasan_atomics+0xb8/0x2e8
[   52.620930]  kunit_try_run_case+0x14c/0x3d0
[   52.621587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.622373]  kthread+0x24c/0x2d0
[   52.623040]  ret_from_fork+0x10/0x20
[   52.623771] 
[   52.624146] The buggy address belongs to the object at fff00000c616b300
[   52.624146]  which belongs to the cache kmalloc-64 of size 64
[   52.625585] The buggy address is located 0 bytes to the right of
[   52.625585]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   52.627110] 
[   52.627547] The buggy address belongs to the physical page:
[   52.628282] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   52.629470] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.630358] page_type: f5(slab)
[   52.630929] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   52.631967] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.632885] page dumped because: kasan: bad access detected
[   52.633668] 
[   52.634000] Memory state around the buggy address:
[   52.634811]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.635639]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.636708] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.637624]                                      ^
[   52.638358]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.639251]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.640137] ==================================================================
[   52.642691] ==================================================================
[   52.643499] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   52.644259] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   52.645238] 
[   52.645595] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   52.646759] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.647287] Hardware name: linux,dummy-virt (DT)
[   52.647947] Call trace:
[   52.648475]  show_stack+0x20/0x38 (C)
[   52.649018]  dump_stack_lvl+0x8c/0xd0
[   52.649830]  print_report+0x118/0x5e0
[   52.650521]  kasan_report+0xc8/0x118
[   52.651210]  kasan_check_range+0x100/0x1a8
[   52.651884]  __kasan_check_write+0x20/0x30
[   52.652588]  kasan_atomics_helper+0x6ec/0x4858
[   52.653218]  kasan_atomics+0x198/0x2e8
[   52.653865]  kunit_try_run_case+0x14c/0x3d0
[   52.654572]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.655350]  kthread+0x24c/0x2d0
[   52.655993]  ret_from_fork+0x10/0x20
[   52.656597] 
[   52.656956] Allocated by task 254:
[   52.657610]  kasan_save_stack+0x3c/0x68
[   52.658287]  kasan_save_track+0x20/0x40
[   52.658892]  kasan_save_alloc_info+0x40/0x58
[   52.659656]  __kasan_kmalloc+0xd4/0xd8
[   52.660321]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.660992]  kasan_atomics+0xb8/0x2e8
[   52.661643]  kunit_try_run_case+0x14c/0x3d0
[   52.662283]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.663103]  kthread+0x24c/0x2d0
[   52.663664]  ret_from_fork+0x10/0x20
[   52.664184] 
[   52.664496] The buggy address belongs to the object at fff00000c616b300
[   52.664496]  which belongs to the cache kmalloc-64 of size 64
[   52.665935] The buggy address is located 0 bytes to the right of
[   52.665935]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   52.667509] 
[   52.668000] The buggy address belongs to the physical page:
[   52.668736] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   52.669803] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.670735] page_type: f5(slab)
[   52.671271] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   52.672289] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.673252] page dumped because: kasan: bad access detected
[   52.674051] 
[   52.674469] Memory state around the buggy address:
[   52.675196]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.676124]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.677011] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.677926]                                      ^
[   52.678641]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.679636]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.680544] ==================================================================
[   52.484854] ==================================================================
[   52.485604] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   52.486590] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   52.487504] 
[   52.487882] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   52.488977] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.489568] Hardware name: linux,dummy-virt (DT)
[   52.490100] Call trace:
[   52.490599]  show_stack+0x20/0x38 (C)
[   52.491117]  dump_stack_lvl+0x8c/0xd0
[   52.491780]  print_report+0x118/0x5e0
[   52.492361]  kasan_report+0xc8/0x118
[   52.492910]  kasan_check_range+0x100/0x1a8
[   52.493507]  __kasan_check_write+0x20/0x30
[   52.494082]  kasan_atomics_helper+0x54c/0x4858
[   52.494820]  kasan_atomics+0x198/0x2e8
[   52.495416]  kunit_try_run_case+0x14c/0x3d0
[   52.496089]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.496779]  kthread+0x24c/0x2d0
[   52.497417]  ret_from_fork+0x10/0x20
[   52.498005] 
[   52.498314] Allocated by task 254:
[   52.498842]  kasan_save_stack+0x3c/0x68
[   52.499440]  kasan_save_track+0x20/0x40
[   52.500114]  kasan_save_alloc_info+0x40/0x58
[   52.500743]  __kasan_kmalloc+0xd4/0xd8
[   52.501284]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.501828]  kasan_atomics+0xb8/0x2e8
[   52.502444]  kunit_try_run_case+0x14c/0x3d0
[   52.503025]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.503760]  kthread+0x24c/0x2d0
[   52.504379]  ret_from_fork+0x10/0x20
[   52.504931] 
[   52.505219] The buggy address belongs to the object at fff00000c616b300
[   52.505219]  which belongs to the cache kmalloc-64 of size 64
[   52.506692] The buggy address is located 0 bytes to the right of
[   52.506692]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   52.507984] 
[   52.508400] The buggy address belongs to the physical page:
[   52.509121] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   52.509928] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.510798] page_type: f5(slab)
[   52.511273] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   52.512458] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.513358] page dumped because: kasan: bad access detected
[   52.514016] 
[   52.514320] Memory state around the buggy address:
[   52.514925]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.515808]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.516564] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.517497]                                      ^
[   52.518045]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.518948]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.519794] ==================================================================
[   52.036811] ==================================================================
[   52.038179] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   52.038838] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   52.040352] 
[   52.040648] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   52.042447] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.042856] Hardware name: linux,dummy-virt (DT)
[   52.043456] Call trace:
[   52.043928]  show_stack+0x20/0x38 (C)
[   52.044532]  dump_stack_lvl+0x8c/0xd0
[   52.045377]  print_report+0x118/0x5e0
[   52.045910]  kasan_report+0xc8/0x118
[   52.046582]  __asan_report_store4_noabort+0x20/0x30
[   52.047242]  kasan_atomics_helper+0x3f7c/0x4858
[   52.047890]  kasan_atomics+0x198/0x2e8
[   52.048385]  kunit_try_run_case+0x14c/0x3d0
[   52.049288]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.050034]  kthread+0x24c/0x2d0
[   52.050649]  ret_from_fork+0x10/0x20
[   52.051284] 
[   52.051674] Allocated by task 254:
[   52.052287]  kasan_save_stack+0x3c/0x68
[   52.052846]  kasan_save_track+0x20/0x40
[   52.053792]  kasan_save_alloc_info+0x40/0x58
[   52.054360]  __kasan_kmalloc+0xd4/0xd8
[   52.054987]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.055662]  kasan_atomics+0xb8/0x2e8
[   52.056176]  kunit_try_run_case+0x14c/0x3d0
[   52.056838]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.058132]  kthread+0x24c/0x2d0
[   52.058592]  ret_from_fork+0x10/0x20
[   52.059047] 
[   52.059510] The buggy address belongs to the object at fff00000c616b300
[   52.059510]  which belongs to the cache kmalloc-64 of size 64
[   52.060840] The buggy address is located 0 bytes to the right of
[   52.060840]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   52.062437] 
[   52.062922] The buggy address belongs to the physical page:
[   52.063642] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   52.065327] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.066126] page_type: f5(slab)
[   52.066590] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   52.067593] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   52.068529] page dumped because: kasan: bad access detected
[   52.069199] 
[   52.069900] Memory state around the buggy address:
[   52.070600]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.071603]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.072556] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.073597]                                      ^
[   52.074143]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.074997]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.075851] ==================================================================
[   53.336673] ==================================================================
[   53.338288] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   53.339564] Read of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   53.340755] 
[   53.341178] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   53.342366] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.342899] Hardware name: linux,dummy-virt (DT)
[   53.343570] Call trace:
[   53.343938]  show_stack+0x20/0x38 (C)
[   53.344584]  dump_stack_lvl+0x8c/0xd0
[   53.345235]  print_report+0x118/0x5e0
[   53.345831]  kasan_report+0xc8/0x118
[   53.346388]  __asan_report_load4_noabort+0x20/0x30
[   53.347032]  kasan_atomics_helper+0x3e04/0x4858
[   53.347762]  kasan_atomics+0x198/0x2e8
[   53.348569]  kunit_try_run_case+0x14c/0x3d0
[   53.349158]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.349778]  kthread+0x24c/0x2d0
[   53.350501]  ret_from_fork+0x10/0x20
[   53.351069] 
[   53.351466] Allocated by task 254:
[   53.351957]  kasan_save_stack+0x3c/0x68
[   53.352524]  kasan_save_track+0x20/0x40
[   53.353154]  kasan_save_alloc_info+0x40/0x58
[   53.353781]  __kasan_kmalloc+0xd4/0xd8
[   53.354271]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.355055]  kasan_atomics+0xb8/0x2e8
[   53.355618]  kunit_try_run_case+0x14c/0x3d0
[   53.356279]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.356992]  kthread+0x24c/0x2d0
[   53.357573]  ret_from_fork+0x10/0x20
[   53.358167] 
[   53.358506] The buggy address belongs to the object at fff00000c616b300
[   53.358506]  which belongs to the cache kmalloc-64 of size 64
[   53.359830] The buggy address is located 0 bytes to the right of
[   53.359830]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   53.361212] 
[   53.361686] The buggy address belongs to the physical page:
[   53.362428] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   53.363386] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.364194] page_type: f5(slab)
[   53.364683] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   53.365571] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.366495] page dumped because: kasan: bad access detected
[   53.367080] 
[   53.367452] Memory state around the buggy address:
[   53.368144]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.369000]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.369902] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.370764]                                      ^
[   53.371375]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.372245]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.373047] ==================================================================
[   54.298245] ==================================================================
[   54.299095] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   54.299913] Read of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   54.300827] 
[   54.301255] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   54.302463] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.303109] Hardware name: linux,dummy-virt (DT)
[   54.303776] Call trace:
[   54.304165]  show_stack+0x20/0x38 (C)
[   54.304693]  dump_stack_lvl+0x8c/0xd0
[   54.305364]  print_report+0x118/0x5e0
[   54.305884]  kasan_report+0xc8/0x118
[   54.306607]  __asan_report_load8_noabort+0x20/0x30
[   54.307338]  kasan_atomics_helper+0x3df4/0x4858
[   54.308017]  kasan_atomics+0x198/0x2e8
[   54.308738]  kunit_try_run_case+0x14c/0x3d0
[   54.309315]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.310229]  kthread+0x24c/0x2d0
[   54.310733]  ret_from_fork+0x10/0x20
[   54.311360] 
[   54.311645] Allocated by task 254:
[   54.312080]  kasan_save_stack+0x3c/0x68
[   54.312762]  kasan_save_track+0x20/0x40
[   54.313363]  kasan_save_alloc_info+0x40/0x58
[   54.313996]  __kasan_kmalloc+0xd4/0xd8
[   54.314589]  __kmalloc_cache_noprof+0x15c/0x3c0
[   54.315127]  kasan_atomics+0xb8/0x2e8
[   54.315762]  kunit_try_run_case+0x14c/0x3d0
[   54.316473]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.317119]  kthread+0x24c/0x2d0
[   54.317716]  ret_from_fork+0x10/0x20
[   54.318252] 
[   54.318569] The buggy address belongs to the object at fff00000c616b300
[   54.318569]  which belongs to the cache kmalloc-64 of size 64
[   54.319956] The buggy address is located 0 bytes to the right of
[   54.319956]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   54.321398] 
[   54.321690] The buggy address belongs to the physical page:
[   54.322446] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   54.323516] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.324286] page_type: f5(slab)
[   54.324870] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   54.325783] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   54.326668] page dumped because: kasan: bad access detected
[   54.327470] 
[   54.327978] Memory state around the buggy address:
[   54.328773]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.329613]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.330500] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.331494]                                      ^
[   54.332067]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.332885]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.333826] ==================================================================
[   54.372193] ==================================================================
[   54.373132] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   54.374265] Read of size 8 at addr fff00000c616b330 by task kunit_try_catch/254
[   54.375392] 
[   54.375776] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   54.377307] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.377800] Hardware name: linux,dummy-virt (DT)
[   54.378717] Call trace:
[   54.379534]  show_stack+0x20/0x38 (C)
[   54.380060]  dump_stack_lvl+0x8c/0xd0
[   54.380809]  print_report+0x118/0x5e0
[   54.381633]  kasan_report+0xc8/0x118
[   54.382240]  __asan_report_load8_noabort+0x20/0x30
[   54.383205]  kasan_atomics_helper+0x3e10/0x4858
[   54.383927]  kasan_atomics+0x198/0x2e8
[   54.384533]  kunit_try_run_case+0x14c/0x3d0
[   54.385361]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.386196]  kthread+0x24c/0x2d0
[   54.386781]  ret_from_fork+0x10/0x20
[   54.387405] 
[   54.387852] Allocated by task 254:
[   54.388354]  kasan_save_stack+0x3c/0x68
[   54.389057]  kasan_save_track+0x20/0x40
[   54.389660]  kasan_save_alloc_info+0x40/0x58
[   54.390176]  __kasan_kmalloc+0xd4/0xd8
[   54.390910]  __kmalloc_cache_noprof+0x15c/0x3c0
[   54.391590]  kasan_atomics+0xb8/0x2e8
[   54.392139]  kunit_try_run_case+0x14c/0x3d0
[   54.392637]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.393445]  kthread+0x24c/0x2d0
[   54.393977]  ret_from_fork+0x10/0x20
[   54.394544] 
[   54.394875] The buggy address belongs to the object at fff00000c616b300
[   54.394875]  which belongs to the cache kmalloc-64 of size 64
[   54.396131] The buggy address is located 0 bytes to the right of
[   54.396131]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   54.397552] 
[   54.397923] The buggy address belongs to the physical page:
[   54.398688] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   54.399612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.400425] page_type: f5(slab)
[   54.400977] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   54.401817] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   54.402800] page dumped because: kasan: bad access detected
[   54.403512] 
[   54.403857] Memory state around the buggy address:
[   54.404544]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.405390]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.406176] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.407013]                                      ^
[   54.407736]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.408611]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.409433] ==================================================================
[   53.067869] ==================================================================
[   53.068725] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   53.069670] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254
[   53.070660] 
[   53.071041] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   53.071954] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.072656] Hardware name: linux,dummy-virt (DT)
[   53.073334] Call trace:
[   53.073760]  show_stack+0x20/0x38 (C)
[   53.074250]  dump_stack_lvl+0x8c/0xd0
[   53.074807]  print_report+0x118/0x5e0
[   53.075584]  kasan_report+0xc8/0x118
[   53.076217]  kasan_check_range+0x100/0x1a8
[   53.076899]  __kasan_check_write+0x20/0x30
[   53.077427]  kasan_atomics_helper+0xb70/0x4858
[   53.078229]  kasan_atomics+0x198/0x2e8
[   53.078919]  kunit_try_run_case+0x14c/0x3d0
[   53.079578]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.080485]  kthread+0x24c/0x2d0
[   53.081077]  ret_from_fork+0x10/0x20
[   53.081761] 
[   53.082143] Allocated by task 254:
[   53.082761]  kasan_save_stack+0x3c/0x68
[   53.083446]  kasan_save_track+0x20/0x40
[   53.083950]  kasan_save_alloc_info+0x40/0x58
[   53.084489]  __kasan_kmalloc+0xd4/0xd8
[   53.084893]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.085463]  kasan_atomics+0xb8/0x2e8
[   53.086120]  kunit_try_run_case+0x14c/0x3d0
[   53.086601]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.087125]  kthread+0x24c/0x2d0
[   53.087580]  ret_from_fork+0x10/0x20
[   53.088016] 
[   53.088458] The buggy address belongs to the object at fff00000c616b300
[   53.088458]  which belongs to the cache kmalloc-64 of size 64
[   53.090216] The buggy address is located 0 bytes to the right of
[   53.090216]  allocated 48-byte region [fff00000c616b300, fff00000c616b330)
[   53.091620] 
[   53.091901] The buggy address belongs to the physical page:
[   53.092932] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b
[   53.093933] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.094810] page_type: f5(slab)
[   53.095318] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   53.096185] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   53.097049] page dumped because: kasan: bad access detected
[   53.097839] 
[   53.098083] Memory state around the buggy address:
[   53.098700]  fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.099842]  fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.100696] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.101558]                                      ^
[   53.102250]  fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.103107]  fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.104052] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   51.699999] ==================================================================
[   51.700594] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[   51.701110] Write of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250
[   51.702385] 
[   51.702855] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   51.704346] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.704924] Hardware name: linux,dummy-virt (DT)
[   51.705515] Call trace:
[   51.705967]  show_stack+0x20/0x38 (C)
[   51.706564]  dump_stack_lvl+0x8c/0xd0
[   51.707347]  print_report+0x118/0x5e0
[   51.708098]  kasan_report+0xc8/0x118
[   51.708886]  kasan_check_range+0x100/0x1a8
[   51.709640]  __kasan_check_write+0x20/0x30
[   51.710487]  kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[   51.711518]  kasan_bitops_generic+0x11c/0x1c8
[   51.712262]  kunit_try_run_case+0x14c/0x3d0
[   51.712907]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.713635]  kthread+0x24c/0x2d0
[   51.714321]  ret_from_fork+0x10/0x20
[   51.714856] 
[   51.715219] Allocated by task 250:
[   51.715805]  kasan_save_stack+0x3c/0x68
[   51.716374]  kasan_save_track+0x20/0x40
[   51.716858]  kasan_save_alloc_info+0x40/0x58
[   51.717596]  __kasan_kmalloc+0xd4/0xd8
[   51.718099]  __kmalloc_cache_noprof+0x15c/0x3c0
[   51.718857]  kasan_bitops_generic+0xa0/0x1c8
[   51.719462]  kunit_try_run_case+0x14c/0x3d0
[   51.720020]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.720847]  kthread+0x24c/0x2d0
[   51.721399]  ret_from_fork+0x10/0x20
[   51.721910] 
[   51.722334] The buggy address belongs to the object at fff00000c5f55320
[   51.722334]  which belongs to the cache kmalloc-16 of size 16
[   51.723738] The buggy address is located 8 bytes inside of
[   51.723738]  allocated 9-byte region [fff00000c5f55320, fff00000c5f55329)
[   51.725046] 
[   51.725374] The buggy address belongs to the physical page:
[   51.726195] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55
[   51.727264] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.728148] page_type: f5(slab)
[   51.728721] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   51.729733] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   51.730674] page dumped because: kasan: bad access detected
[   51.731430] 
[   51.731741] Memory state around the buggy address:
[   51.732420]  fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc
[   51.733357]  fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   51.734408] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   51.735339]                                   ^
[   51.735994]  fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.737054]  fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.738006] ==================================================================
[   51.739776] ==================================================================
[   51.741310] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8
[   51.742206] Read of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250
[   51.742985] 
[   51.743369] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   51.744549] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.745259] Hardware name: linux,dummy-virt (DT)
[   51.745957] Call trace:
[   51.746417]  show_stack+0x20/0x38 (C)
[   51.746998]  dump_stack_lvl+0x8c/0xd0
[   51.747538]  print_report+0x118/0x5e0
[   51.748008]  kasan_report+0xc8/0x118
[   51.748836]  __asan_report_load8_noabort+0x20/0x30
[   51.749700]  kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8
[   51.750555]  kasan_bitops_generic+0x11c/0x1c8
[   51.751263]  kunit_try_run_case+0x14c/0x3d0
[   51.752142]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.752823]  kthread+0x24c/0x2d0
[   51.753368]  ret_from_fork+0x10/0x20
[   51.753865] 
[   51.754177] Allocated by task 250:
[   51.754910]  kasan_save_stack+0x3c/0x68
[   51.755647]  kasan_save_track+0x20/0x40
[   51.756090]  kasan_save_alloc_info+0x40/0x58
[   51.756715]  __kasan_kmalloc+0xd4/0xd8
[   51.757320]  __kmalloc_cache_noprof+0x15c/0x3c0
[   51.757910]  kasan_bitops_generic+0xa0/0x1c8
[   51.758590]  kunit_try_run_case+0x14c/0x3d0
[   51.759177]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.759968]  kthread+0x24c/0x2d0
[   51.760565]  ret_from_fork+0x10/0x20
[   51.761110] 
[   51.761406] The buggy address belongs to the object at fff00000c5f55320
[   51.761406]  which belongs to the cache kmalloc-16 of size 16
[   51.762805] The buggy address is located 8 bytes inside of
[   51.762805]  allocated 9-byte region [fff00000c5f55320, fff00000c5f55329)
[   51.764001] 
[   51.764379] The buggy address belongs to the physical page:
[   51.765120] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55
[   51.765967] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.766698] page_type: f5(slab)
[   51.767260] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   51.768206] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   51.769138] page dumped because: kasan: bad access detected
[   51.769814] 
[   51.770136] Memory state around the buggy address:
[   51.770691]  fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc
[   51.771630]  fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   51.772504] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   51.773342]                                   ^
[   51.773913]  fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.774783]  fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.775649] ==================================================================
[   51.860713] ==================================================================
[   51.861521] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[   51.862601] Write of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250
[   51.863567] 
[   51.864005] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   51.865360] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.865998] Hardware name: linux,dummy-virt (DT)
[   51.866763] Call trace:
[   51.867210]  show_stack+0x20/0x38 (C)
[   51.867913]  dump_stack_lvl+0x8c/0xd0
[   51.868512]  print_report+0x118/0x5e0
[   51.869206]  kasan_report+0xc8/0x118
[   51.869874]  kasan_check_range+0x100/0x1a8
[   51.870592]  __kasan_check_write+0x20/0x30
[   51.871352]  kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[   51.872247]  kasan_bitops_generic+0x11c/0x1c8
[   51.872949]  kunit_try_run_case+0x14c/0x3d0
[   51.873716]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.874586]  kthread+0x24c/0x2d0
[   51.875199]  ret_from_fork+0x10/0x20
[   51.875832] 
[   51.876172] Allocated by task 250:
[   51.876785]  kasan_save_stack+0x3c/0x68
[   51.877409]  kasan_save_track+0x20/0x40
[   51.877924]  kasan_save_alloc_info+0x40/0x58
[   51.878671]  __kasan_kmalloc+0xd4/0xd8
[   51.879358]  __kmalloc_cache_noprof+0x15c/0x3c0
[   51.880006]  kasan_bitops_generic+0xa0/0x1c8
[   51.880725]  kunit_try_run_case+0x14c/0x3d0
[   51.881594]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.882407]  kthread+0x24c/0x2d0
[   51.882949]  ret_from_fork+0x10/0x20
[   51.883541] 
[   51.883937] The buggy address belongs to the object at fff00000c5f55320
[   51.883937]  which belongs to the cache kmalloc-16 of size 16
[   51.885308] The buggy address is located 8 bytes inside of
[   51.885308]  allocated 9-byte region [fff00000c5f55320, fff00000c5f55329)
[   51.886637] 
[   51.886979] The buggy address belongs to the physical page:
[   51.887713] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55
[   51.888684] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.889553] page_type: f5(slab)
[   51.890024] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   51.890948] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   51.891797] page dumped because: kasan: bad access detected
[   51.892540] 
[   51.892890] Memory state around the buggy address:
[   51.893447]  fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc
[   51.894397]  fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   51.895230] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   51.895996]                                   ^
[   51.896691]  fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.897560]  fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.898481] ==================================================================
[   51.900114] ==================================================================
[   51.900836] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8
[   51.902185] Read of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250
[   51.903144] 
[   51.903475] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   51.904599] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.905230] Hardware name: linux,dummy-virt (DT)
[   51.905814] Call trace:
[   51.906308]  show_stack+0x20/0x38 (C)
[   51.906836]  dump_stack_lvl+0x8c/0xd0
[   51.907429]  print_report+0x118/0x5e0
[   51.907960]  kasan_report+0xc8/0x118
[   51.908658]  __asan_report_load8_noabort+0x20/0x30
[   51.909353]  kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8
[   51.910109]  kasan_bitops_generic+0x11c/0x1c8
[   51.910669]  kunit_try_run_case+0x14c/0x3d0
[   51.911334]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.912080]  kthread+0x24c/0x2d0
[   51.912821]  ret_from_fork+0x10/0x20
[   51.913488] 
[   51.913900] Allocated by task 250:
[   51.914424]  kasan_save_stack+0x3c/0x68
[   51.915178]  kasan_save_track+0x20/0x40
[   51.915832]  kasan_save_alloc_info+0x40/0x58
[   51.916529]  __kasan_kmalloc+0xd4/0xd8
[   51.917263]  __kmalloc_cache_noprof+0x15c/0x3c0
[   51.918014]  kasan_bitops_generic+0xa0/0x1c8
[   51.918703]  kunit_try_run_case+0x14c/0x3d0
[   51.919529]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.920312]  kthread+0x24c/0x2d0
[   51.920985]  ret_from_fork+0x10/0x20
[   51.921615] 
[   51.921956] The buggy address belongs to the object at fff00000c5f55320
[   51.921956]  which belongs to the cache kmalloc-16 of size 16
[   51.923507] The buggy address is located 8 bytes inside of
[   51.923507]  allocated 9-byte region [fff00000c5f55320, fff00000c5f55329)
[   51.924897] 
[   51.925348] The buggy address belongs to the physical page:
[   51.926051] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55
[   51.927125] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.927999] page_type: f5(slab)
[   51.928624] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   51.929608] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   51.930565] page dumped because: kasan: bad access detected
[   51.931357] 
[   51.931689] Memory state around the buggy address:
[   51.932342]  fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc
[   51.933259]  fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   51.934347] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   51.935244]                                   ^
[   51.935923]  fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.936884]  fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.937772] ==================================================================
[   51.662730] ==================================================================
[   51.663508] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8
[   51.664694] Read of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250
[   51.665820] 
[   51.666175] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   51.667437] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.668000] Hardware name: linux,dummy-virt (DT)
[   51.668777] Call trace:
[   51.669164]  show_stack+0x20/0x38 (C)
[   51.669783]  dump_stack_lvl+0x8c/0xd0
[   51.670428]  print_report+0x118/0x5e0
[   51.671002]  kasan_report+0xc8/0x118
[   51.671666]  __asan_report_load8_noabort+0x20/0x30
[   51.672320]  kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8
[   51.673206]  kasan_bitops_generic+0x11c/0x1c8
[   51.673761]  kunit_try_run_case+0x14c/0x3d0
[   51.674503]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.675181]  kthread+0x24c/0x2d0
[   51.675775]  ret_from_fork+0x10/0x20
[   51.676404] 
[   51.676704] Allocated by task 250:
[   51.677318]  kasan_save_stack+0x3c/0x68
[   51.677920]  kasan_save_track+0x20/0x40
[   51.678475]  kasan_save_alloc_info+0x40/0x58
[   51.679006]  __kasan_kmalloc+0xd4/0xd8
[   51.679589]  __kmalloc_cache_noprof+0x15c/0x3c0
[   51.680378]  kasan_bitops_generic+0xa0/0x1c8
[   51.680976]  kunit_try_run_case+0x14c/0x3d0
[   51.681674]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.682353]  kthread+0x24c/0x2d0
[   51.682979]  ret_from_fork+0x10/0x20
[   51.683500] 
[   51.683853] The buggy address belongs to the object at fff00000c5f55320
[   51.683853]  which belongs to the cache kmalloc-16 of size 16
[   51.685212] The buggy address is located 8 bytes inside of
[   51.685212]  allocated 9-byte region [fff00000c5f55320, fff00000c5f55329)
[   51.686484] 
[   51.686874] The buggy address belongs to the physical page:
[   51.687449] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55
[   51.688396] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.688944] page_type: f5(slab)
[   51.689429] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   51.690130] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   51.690980] page dumped because: kasan: bad access detected
[   51.691483] 
[   51.691860] Memory state around the buggy address:
[   51.692357]  fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc
[   51.692931]  fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   51.693738] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   51.694626]                                   ^
[   51.695240]  fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.696600]  fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.697371] ==================================================================
[   51.778564] ==================================================================
[   51.779348] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[   51.780227] Write of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250
[   51.780938] 
[   51.781516] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   51.782918] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.783549] Hardware name: linux,dummy-virt (DT)
[   51.784211] Call trace:
[   51.784674]  show_stack+0x20/0x38 (C)
[   51.785325]  dump_stack_lvl+0x8c/0xd0
[   51.785954]  print_report+0x118/0x5e0
[   51.786539]  kasan_report+0xc8/0x118
[   51.787105]  kasan_check_range+0x100/0x1a8
[   51.787833]  __kasan_check_write+0x20/0x30
[   51.788551]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[   51.789439]  kasan_bitops_generic+0x11c/0x1c8
[   51.790238]  kunit_try_run_case+0x14c/0x3d0
[   51.791021]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.791939]  kthread+0x24c/0x2d0
[   51.792572]  ret_from_fork+0x10/0x20
[   51.793077] 
[   51.793439] Allocated by task 250:
[   51.794152]  kasan_save_stack+0x3c/0x68
[   51.794799]  kasan_save_track+0x20/0x40
[   51.795536]  kasan_save_alloc_info+0x40/0x58
[   51.796134]  __kasan_kmalloc+0xd4/0xd8
[   51.796764]  __kmalloc_cache_noprof+0x15c/0x3c0
[   51.797542]  kasan_bitops_generic+0xa0/0x1c8
[   51.798220]  kunit_try_run_case+0x14c/0x3d0
[   51.798897]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.799681]  kthread+0x24c/0x2d0
[   51.800356]  ret_from_fork+0x10/0x20
[   51.800945] 
[   51.801324] The buggy address belongs to the object at fff00000c5f55320
[   51.801324]  which belongs to the cache kmalloc-16 of size 16
[   51.802799] The buggy address is located 8 bytes inside of
[   51.802799]  allocated 9-byte region [fff00000c5f55320, fff00000c5f55329)
[   51.804375] 
[   51.804795] The buggy address belongs to the physical page:
[   51.805503] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55
[   51.806632] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.807471] page_type: f5(slab)
[   51.808071] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   51.809055] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   51.809997] page dumped because: kasan: bad access detected
[   51.810772] 
[   51.811085] Memory state around the buggy address:
[   51.811703]  fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc
[   51.812732]  fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   51.813614] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   51.814523]                                   ^
[   51.815331]  fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.816384]  fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.817406] ==================================================================
[   51.819787] ==================================================================
[   51.820844] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8
[   51.822342] Read of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250
[   51.823258] 
[   51.823640] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   51.824934] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.825551] Hardware name: linux,dummy-virt (DT)
[   51.826192] Call trace:
[   51.826761]  show_stack+0x20/0x38 (C)
[   51.827391]  dump_stack_lvl+0x8c/0xd0
[   51.828066]  print_report+0x118/0x5e0
[   51.828734]  kasan_report+0xc8/0x118
[   51.829354]  __asan_report_load8_noabort+0x20/0x30
[   51.830163]  kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8
[   51.831018]  kasan_bitops_generic+0x11c/0x1c8
[   51.831720]  kunit_try_run_case+0x14c/0x3d0
[   51.832449]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.833231]  kthread+0x24c/0x2d0
[   51.833824]  ret_from_fork+0x10/0x20
[   51.834545] 
[   51.834925] Allocated by task 250:
[   51.835565]  kasan_save_stack+0x3c/0x68
[   51.836108]  kasan_save_track+0x20/0x40
[   51.836847]  kasan_save_alloc_info+0x40/0x58
[   51.837600]  __kasan_kmalloc+0xd4/0xd8
[   51.838240]  __kmalloc_cache_noprof+0x15c/0x3c0
[   51.839052]  kasan_bitops_generic+0xa0/0x1c8
[   51.839856]  kunit_try_run_case+0x14c/0x3d0
[   51.840586]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.841413]  kthread+0x24c/0x2d0
[   51.842079]  ret_from_fork+0x10/0x20
[   51.842693] 
[   51.843056] The buggy address belongs to the object at fff00000c5f55320
[   51.843056]  which belongs to the cache kmalloc-16 of size 16
[   51.844498] The buggy address is located 8 bytes inside of
[   51.844498]  allocated 9-byte region [fff00000c5f55320, fff00000c5f55329)
[   51.845960] 
[   51.846403] The buggy address belongs to the physical page:
[   51.847169] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55
[   51.848156] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.848983] page_type: f5(slab)
[   51.849521] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   51.850543] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   51.851537] page dumped because: kasan: bad access detected
[   51.852408] 
[   51.852940] Memory state around the buggy address:
[   51.853591]  fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc
[   51.854492]  fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   51.855427] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   51.856267]                                   ^
[   51.856954]  fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.857913]  fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.858892] ==================================================================
[   51.624061] ==================================================================
[   51.624875] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[   51.626132] Write of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250
[   51.627244] 
[   51.627624] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   51.629023] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.629626] Hardware name: linux,dummy-virt (DT)
[   51.630364] Call trace:
[   51.630861]  show_stack+0x20/0x38 (C)
[   51.631421]  dump_stack_lvl+0x8c/0xd0
[   51.632041]  print_report+0x118/0x5e0
[   51.632662]  kasan_report+0xc8/0x118
[   51.633280]  kasan_check_range+0x100/0x1a8
[   51.634206]  __kasan_check_write+0x20/0x30
[   51.634800]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[   51.635533]  kasan_bitops_generic+0x11c/0x1c8
[   51.636184]  kunit_try_run_case+0x14c/0x3d0
[   51.636905]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.637662]  kthread+0x24c/0x2d0
[   51.638247]  ret_from_fork+0x10/0x20
[   51.638870] 
[   51.639230] Allocated by task 250:
[   51.639712]  kasan_save_stack+0x3c/0x68
[   51.640434]  kasan_save_track+0x20/0x40
[   51.641006]  kasan_save_alloc_info+0x40/0x58
[   51.641605]  __kasan_kmalloc+0xd4/0xd8
[   51.642093]  __kmalloc_cache_noprof+0x15c/0x3c0
[   51.642858]  kasan_bitops_generic+0xa0/0x1c8
[   51.643441]  kunit_try_run_case+0x14c/0x3d0
[   51.644095]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.644801]  kthread+0x24c/0x2d0
[   51.645341]  ret_from_fork+0x10/0x20
[   51.645876] 
[   51.646161] The buggy address belongs to the object at fff00000c5f55320
[   51.646161]  which belongs to the cache kmalloc-16 of size 16
[   51.647642] The buggy address is located 8 bytes inside of
[   51.647642]  allocated 9-byte region [fff00000c5f55320, fff00000c5f55329)
[   51.648948] 
[   51.649247] The buggy address belongs to the physical page:
[   51.650024] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55
[   51.650938] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.651858] page_type: f5(slab)
[   51.652288] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   51.653273] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   51.654213] page dumped because: kasan: bad access detected
[   51.654895] 
[   51.655189] Memory state around the buggy address:
[   51.655782]  fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc
[   51.656584]  fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   51.657465] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   51.658430]                                   ^
[   51.658959]  fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.659878]  fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.660839] ==================================================================
[   51.940036] ==================================================================
[   51.940698] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8
[   51.942068] Read of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250
[   51.942990] 
[   51.943421] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   51.944728] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.945012] Hardware name: linux,dummy-virt (DT)
[   51.945781] Call trace:
[   51.946214]  show_stack+0x20/0x38 (C)
[   51.946954]  dump_stack_lvl+0x8c/0xd0
[   51.947681]  print_report+0x118/0x5e0
[   51.948323]  kasan_report+0xc8/0x118
[   51.949009]  __asan_report_load8_noabort+0x20/0x30
[   51.949783]  kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8
[   51.950711]  kasan_bitops_generic+0x11c/0x1c8
[   51.951461]  kunit_try_run_case+0x14c/0x3d0
[   51.952148]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.952920]  kthread+0x24c/0x2d0
[   51.953594]  ret_from_fork+0x10/0x20
[   51.954275] 
[   51.954646] Allocated by task 250:
[   51.955222]  kasan_save_stack+0x3c/0x68
[   51.955927]  kasan_save_track+0x20/0x40
[   51.956482]  kasan_save_alloc_info+0x40/0x58
[   51.956887]  __kasan_kmalloc+0xd4/0xd8
[   51.957279]  __kmalloc_cache_noprof+0x15c/0x3c0
[   51.957940]  kasan_bitops_generic+0xa0/0x1c8
[   51.958381]  kunit_try_run_case+0x14c/0x3d0
[   51.958798]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.959267]  kthread+0x24c/0x2d0
[   51.960430]  ret_from_fork+0x10/0x20
[   51.961159] 
[   51.961714] The buggy address belongs to the object at fff00000c5f55320
[   51.961714]  which belongs to the cache kmalloc-16 of size 16
[   51.963353] The buggy address is located 8 bytes inside of
[   51.963353]  allocated 9-byte region [fff00000c5f55320, fff00000c5f55329)
[   51.964926] 
[   51.965348] The buggy address belongs to the physical page:
[   51.966178] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55
[   51.967341] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.968272] page_type: f5(slab)
[   51.968811] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   51.969794] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   51.970749] page dumped because: kasan: bad access detected
[   51.971514] 
[   51.971839] Memory state around the buggy address:
[   51.972497]  fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc
[   51.973557]  fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   51.974563] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   51.975507]                                   ^
[   51.976196]  fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.977087]  fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.977972] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[   51.346870] ==================================================================
[   51.347783] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8
[   51.348693] Read of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250
[   51.349646] 
[   51.349972] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   51.351239] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.351891] Hardware name: linux,dummy-virt (DT)
[   51.352428] Call trace:
[   51.352963]  show_stack+0x20/0x38 (C)
[   51.353506]  dump_stack_lvl+0x8c/0xd0
[   51.354167]  print_report+0x118/0x5e0
[   51.354781]  kasan_report+0xc8/0x118
[   51.355472]  __asan_report_load8_noabort+0x20/0x30
[   51.356503]  kasan_bitops_modify.constprop.0+0xa88/0xbc8
[   51.357691]  kasan_bitops_generic+0x110/0x1c8
[   51.358481]  kunit_try_run_case+0x14c/0x3d0
[   51.359029]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.359936]  kthread+0x24c/0x2d0
[   51.360612]  ret_from_fork+0x10/0x20
[   51.361135] 
[   51.361461] Allocated by task 250:
[   51.361900]  kasan_save_stack+0x3c/0x68
[   51.362592]  kasan_save_track+0x20/0x40
[   51.363137]  kasan_save_alloc_info+0x40/0x58
[   51.363810]  __kasan_kmalloc+0xd4/0xd8
[   51.364271]  __kmalloc_cache_noprof+0x15c/0x3c0
[   51.365015]  kasan_bitops_generic+0xa0/0x1c8
[   51.365673]  kunit_try_run_case+0x14c/0x3d0
[   51.366352]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.367028]  kthread+0x24c/0x2d0
[   51.367656]  ret_from_fork+0x10/0x20
[   51.368126] 
[   51.368524] The buggy address belongs to the object at fff00000c5f55320
[   51.368524]  which belongs to the cache kmalloc-16 of size 16
[   51.369915] The buggy address is located 8 bytes inside of
[   51.369915]  allocated 9-byte region [fff00000c5f55320, fff00000c5f55329)
[   51.371307] 
[   51.371638] The buggy address belongs to the physical page:
[   51.372311] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55
[   51.373358] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.374134] page_type: f5(slab)
[   51.374640] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   51.375495] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   51.376484] page dumped because: kasan: bad access detected
[   51.377111] 
[   51.377449] Memory state around the buggy address:
[   51.377990]  fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc
[   51.378947]  fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   51.379753] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   51.380613]                                   ^
[   51.381151]  fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.382048]  fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.382943] ==================================================================
[   51.232184] ==================================================================
[   51.233400] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8
[   51.234274] Write of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250
[   51.235188] 
[   51.235630] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   51.236790] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.237349] Hardware name: linux,dummy-virt (DT)
[   51.238146] Call trace:
[   51.238694]  show_stack+0x20/0x38 (C)
[   51.239241]  dump_stack_lvl+0x8c/0xd0
[   51.239854]  print_report+0x118/0x5e0
[   51.240526]  kasan_report+0xc8/0x118
[   51.241085]  kasan_check_range+0x100/0x1a8
[   51.241764]  __kasan_check_write+0x20/0x30
[   51.242353]  kasan_bitops_modify.constprop.0+0x100/0xbc8
[   51.243195]  kasan_bitops_generic+0x110/0x1c8
[   51.243901]  kunit_try_run_case+0x14c/0x3d0
[   51.244499]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.245272]  kthread+0x24c/0x2d0
[   51.245895]  ret_from_fork+0x10/0x20
[   51.246581] 
[   51.246904] Allocated by task 250:
[   51.247586]  kasan_save_stack+0x3c/0x68
[   51.248100]  kasan_save_track+0x20/0x40
[   51.248876]  kasan_save_alloc_info+0x40/0x58
[   51.249445]  __kasan_kmalloc+0xd4/0xd8
[   51.250064]  __kmalloc_cache_noprof+0x15c/0x3c0
[   51.250722]  kasan_bitops_generic+0xa0/0x1c8
[   51.251287]  kunit_try_run_case+0x14c/0x3d0
[   51.251953]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.252619]  kthread+0x24c/0x2d0
[   51.253160]  ret_from_fork+0x10/0x20
[   51.253625] 
[   51.254004] The buggy address belongs to the object at fff00000c5f55320
[   51.254004]  which belongs to the cache kmalloc-16 of size 16
[   51.255512] The buggy address is located 8 bytes inside of
[   51.255512]  allocated 9-byte region [fff00000c5f55320, fff00000c5f55329)
[   51.256945] 
[   51.257243] The buggy address belongs to the physical page:
[   51.258030] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55
[   51.258941] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.259821] page_type: f5(slab)
[   51.260416] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   51.261370] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   51.262364] page dumped because: kasan: bad access detected
[   51.263057] 
[   51.263361] Memory state around the buggy address:
[   51.263970]  fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc
[   51.264864]  fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   51.265698] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   51.266611]                                   ^
[   51.267216]  fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.268109]  fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.268982] ==================================================================
[   51.462428] ==================================================================
[   51.463187] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[   51.464262] Read of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250
[   51.466340] 
[   51.466747] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   51.467983] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.468564] Hardware name: linux,dummy-virt (DT)
[   51.469132] Call trace:
[   51.469601]  show_stack+0x20/0x38 (C)
[   51.470214]  dump_stack_lvl+0x8c/0xd0
[   51.470831]  print_report+0x118/0x5e0
[   51.471412]  kasan_report+0xc8/0x118
[   51.471967]  __asan_report_load8_noabort+0x20/0x30
[   51.472618]  kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[   51.473329]  kasan_bitops_generic+0x110/0x1c8
[   51.474005]  kunit_try_run_case+0x14c/0x3d0
[   51.474680]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.475370]  kthread+0x24c/0x2d0
[   51.475983]  ret_from_fork+0x10/0x20
[   51.476547] 
[   51.476926] Allocated by task 250:
[   51.477511]  kasan_save_stack+0x3c/0x68
[   51.478130]  kasan_save_track+0x20/0x40
[   51.478755]  kasan_save_alloc_info+0x40/0x58
[   51.479265]  __kasan_kmalloc+0xd4/0xd8
[   51.479905]  __kmalloc_cache_noprof+0x15c/0x3c0
[   51.480543]  kasan_bitops_generic+0xa0/0x1c8
[   51.481234]  kunit_try_run_case+0x14c/0x3d0
[   51.481855]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.482680]  kthread+0x24c/0x2d0
[   51.483236]  ret_from_fork+0x10/0x20
[   51.483850] 
[   51.484161] The buggy address belongs to the object at fff00000c5f55320
[   51.484161]  which belongs to the cache kmalloc-16 of size 16
[   51.485485] The buggy address is located 8 bytes inside of
[   51.485485]  allocated 9-byte region [fff00000c5f55320, fff00000c5f55329)
[   51.486831] 
[   51.487151] The buggy address belongs to the physical page:
[   51.487740] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55
[   51.488857] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.489758] page_type: f5(slab)
[   51.490330] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   51.491213] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   51.492191] page dumped because: kasan: bad access detected
[   51.492833] 
[   51.493175] Memory state around the buggy address:
[   51.493755]  fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc
[   51.494632]  fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   51.495475] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   51.496398]                                   ^
[   51.496968]  fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.497887]  fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.498765] ==================================================================
[   51.584032] ==================================================================
[   51.585445] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8
[   51.586376] Read of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250
[   51.587222] 
[   51.588655] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   51.590127] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.590883] Hardware name: linux,dummy-virt (DT)
[   51.591514] Call trace:
[   51.591904]  show_stack+0x20/0x38 (C)
[   51.592611]  dump_stack_lvl+0x8c/0xd0
[   51.593228]  print_report+0x118/0x5e0
[   51.593863]  kasan_report+0xc8/0x118
[   51.594471]  __asan_report_load8_noabort+0x20/0x30
[   51.595115]  kasan_bitops_modify.constprop.0+0xa28/0xbc8
[   51.595898]  kasan_bitops_generic+0x110/0x1c8
[   51.596595]  kunit_try_run_case+0x14c/0x3d0
[   51.597272]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.598055]  kthread+0x24c/0x2d0
[   51.598679]  ret_from_fork+0x10/0x20
[   51.599735] 
[   51.599998] Allocated by task 250:
[   51.600851]  kasan_save_stack+0x3c/0x68
[   51.601503]  kasan_save_track+0x20/0x40
[   51.602043]  kasan_save_alloc_info+0x40/0x58
[   51.602490]  __kasan_kmalloc+0xd4/0xd8
[   51.603010]  __kmalloc_cache_noprof+0x15c/0x3c0
[   51.603597]  kasan_bitops_generic+0xa0/0x1c8
[   51.604098]  kunit_try_run_case+0x14c/0x3d0
[   51.604885]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.605595]  kthread+0x24c/0x2d0
[   51.606113]  ret_from_fork+0x10/0x20
[   51.606723] 
[   51.607055] The buggy address belongs to the object at fff00000c5f55320
[   51.607055]  which belongs to the cache kmalloc-16 of size 16
[   51.608539] The buggy address is located 8 bytes inside of
[   51.608539]  allocated 9-byte region [fff00000c5f55320, fff00000c5f55329)
[   51.609843] 
[   51.610133] The buggy address belongs to the physical page:
[   51.610929] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55
[   51.611859] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.612630] page_type: f5(slab)
[   51.613177] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   51.614118] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   51.614890] page dumped because: kasan: bad access detected
[   51.615549] 
[   51.615896] Memory state around the buggy address:
[   51.616527]  fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc
[   51.617461]  fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   51.618388] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   51.619212]                                   ^
[   51.619893]  fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.620711]  fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.621670] ==================================================================
[   51.270566] ==================================================================
[   51.272236] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[   51.273122] Read of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250
[   51.274015] 
[   51.274387] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   51.275542] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.276008] Hardware name: linux,dummy-virt (DT)
[   51.276682] Call trace:
[   51.277030]  show_stack+0x20/0x38 (C)
[   51.277649]  dump_stack_lvl+0x8c/0xd0
[   51.278319]  print_report+0x118/0x5e0
[   51.278860]  kasan_report+0xc8/0x118
[   51.279393]  __asan_report_load8_noabort+0x20/0x30
[   51.280157]  kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[   51.280866]  kasan_bitops_generic+0x110/0x1c8
[   51.281452]  kunit_try_run_case+0x14c/0x3d0
[   51.282023]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.282876]  kthread+0x24c/0x2d0
[   51.283374]  ret_from_fork+0x10/0x20
[   51.283992] 
[   51.284319] Allocated by task 250:
[   51.284824]  kasan_save_stack+0x3c/0x68
[   51.285523]  kasan_save_track+0x20/0x40
[   51.286160]  kasan_save_alloc_info+0x40/0x58
[   51.286795]  __kasan_kmalloc+0xd4/0xd8
[   51.287388]  __kmalloc_cache_noprof+0x15c/0x3c0
[   51.287889]  kasan_bitops_generic+0xa0/0x1c8
[   51.288594]  kunit_try_run_case+0x14c/0x3d0
[   51.289078]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.289901]  kthread+0x24c/0x2d0
[   51.290469]  ret_from_fork+0x10/0x20
[   51.291081] 
[   51.291470] The buggy address belongs to the object at fff00000c5f55320
[   51.291470]  which belongs to the cache kmalloc-16 of size 16
[   51.292770] The buggy address is located 8 bytes inside of
[   51.292770]  allocated 9-byte region [fff00000c5f55320, fff00000c5f55329)
[   51.294047] 
[   51.294397] The buggy address belongs to the physical page:
[   51.295080] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55
[   51.295971] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.296847] page_type: f5(slab)
[   51.297379] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   51.298236] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   51.299230] page dumped because: kasan: bad access detected
[   51.299950] 
[   51.300253] Memory state around the buggy address:
[   51.300862]  fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc
[   51.301685]  fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   51.302584] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   51.303479]                                   ^
[   51.304064]  fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.304938]  fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.305821] ==================================================================
[   51.422659] ==================================================================
[   51.423605] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc8
[   51.425283] Write of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250
[   51.427066] 
[   51.427390] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   51.428702] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.429544] Hardware name: linux,dummy-virt (DT)
[   51.430392] Call trace:
[   51.431232]  show_stack+0x20/0x38 (C)
[   51.431822]  dump_stack_lvl+0x8c/0xd0
[   51.432541]  print_report+0x118/0x5e0
[   51.433119]  kasan_report+0xc8/0x118
[   51.433877]  kasan_check_range+0x100/0x1a8
[   51.434565]  __kasan_check_write+0x20/0x30
[   51.435154]  kasan_bitops_modify.constprop.0+0x320/0xbc8
[   51.435876]  kasan_bitops_generic+0x110/0x1c8
[   51.436503]  kunit_try_run_case+0x14c/0x3d0
[   51.437080]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.437832]  kthread+0x24c/0x2d0
[   51.438404]  ret_from_fork+0x10/0x20
[   51.439050] 
[   51.439389] Allocated by task 250:
[   51.439868]  kasan_save_stack+0x3c/0x68
[   51.440423]  kasan_save_track+0x20/0x40
[   51.441039]  kasan_save_alloc_info+0x40/0x58
[   51.441660]  __kasan_kmalloc+0xd4/0xd8
[   51.442245]  __kmalloc_cache_noprof+0x15c/0x3c0
[   51.442875]  kasan_bitops_generic+0xa0/0x1c8
[   51.443504]  kunit_try_run_case+0x14c/0x3d0
[   51.444094]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.444820]  kthread+0x24c/0x2d0
[   51.445433]  ret_from_fork+0x10/0x20
[   51.445974] 
[   51.446255] The buggy address belongs to the object at fff00000c5f55320
[   51.446255]  which belongs to the cache kmalloc-16 of size 16
[   51.447766] The buggy address is located 8 bytes inside of
[   51.447766]  allocated 9-byte region [fff00000c5f55320, fff00000c5f55329)
[   51.449092] 
[   51.449407] The buggy address belongs to the physical page:
[   51.450051] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55
[   51.451060] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.451852] page_type: f5(slab)
[   51.452352] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   51.453332] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   51.454226] page dumped because: kasan: bad access detected
[   51.454903] 
[   51.455243] Memory state around the buggy address:
[   51.455832]  fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc
[   51.456725]  fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   51.457582] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   51.458519]                                   ^
[   51.459075]  fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.459989]  fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.460877] ==================================================================
[   51.542818] ==================================================================
[   51.543578] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[   51.544570] Write of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250
[   51.545404] 
[   51.545967] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   51.547453] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.548020] Hardware name: linux,dummy-virt (DT)
[   51.548673] Call trace:
[   51.549215]  show_stack+0x20/0x38 (C)
[   51.549953]  dump_stack_lvl+0x8c/0xd0
[   51.550604]  print_report+0x118/0x5e0
[   51.551235]  kasan_report+0xc8/0x118
[   51.551872]  kasan_check_range+0x100/0x1a8
[   51.552549]  __kasan_check_write+0x20/0x30
[   51.553214]  kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[   51.553996]  kasan_bitops_generic+0x110/0x1c8
[   51.554710]  kunit_try_run_case+0x14c/0x3d0
[   51.555408]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.556187]  kthread+0x24c/0x2d0
[   51.556827]  ret_from_fork+0x10/0x20
[   51.557513] 
[   51.557908] Allocated by task 250:
[   51.558478]  kasan_save_stack+0x3c/0x68
[   51.559188]  kasan_save_track+0x20/0x40
[   51.559831]  kasan_save_alloc_info+0x40/0x58
[   51.560564]  __kasan_kmalloc+0xd4/0xd8
[   51.561187]  __kmalloc_cache_noprof+0x15c/0x3c0
[   51.561925]  kasan_bitops_generic+0xa0/0x1c8
[   51.562697]  kunit_try_run_case+0x14c/0x3d0
[   51.563374]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.564228]  kthread+0x24c/0x2d0
[   51.564932]  ret_from_fork+0x10/0x20
[   51.565561] 
[   51.565905] The buggy address belongs to the object at fff00000c5f55320
[   51.565905]  which belongs to the cache kmalloc-16 of size 16
[   51.567381] The buggy address is located 8 bytes inside of
[   51.567381]  allocated 9-byte region [fff00000c5f55320, fff00000c5f55329)
[   51.568885] 
[   51.569352] The buggy address belongs to the physical page:
[   51.570093] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55
[   51.571163] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.571992] page_type: f5(slab)
[   51.572536] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   51.573539] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   51.574568] page dumped because: kasan: bad access detected
[   51.575285] 
[   51.575652] Memory state around the buggy address:
[   51.576379]  fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc
[   51.577407]  fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   51.578521] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   51.579575]                                   ^
[   51.580091]  fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.580997]  fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.581794] ==================================================================
[   51.307538] ==================================================================
[   51.308145] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[   51.310059] Write of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250
[   51.310767] 
[   51.311094] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   51.312375] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.313212] Hardware name: linux,dummy-virt (DT)
[   51.313776] Call trace:
[   51.314220]  show_stack+0x20/0x38 (C)
[   51.314797]  dump_stack_lvl+0x8c/0xd0
[   51.315330]  print_report+0x118/0x5e0
[   51.315970]  kasan_report+0xc8/0x118
[   51.316567]  kasan_check_range+0x100/0x1a8
[   51.317093]  __kasan_check_write+0x20/0x30
[   51.317792]  kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[   51.318473]  kasan_bitops_generic+0x110/0x1c8
[   51.319218]  kunit_try_run_case+0x14c/0x3d0
[   51.319829]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.320608]  kthread+0x24c/0x2d0
[   51.321144]  ret_from_fork+0x10/0x20
[   51.321785] 
[   51.322080] Allocated by task 250:
[   51.322698]  kasan_save_stack+0x3c/0x68
[   51.323287]  kasan_save_track+0x20/0x40
[   51.323890]  kasan_save_alloc_info+0x40/0x58
[   51.324518]  __kasan_kmalloc+0xd4/0xd8
[   51.325078]  __kmalloc_cache_noprof+0x15c/0x3c0
[   51.325663]  kasan_bitops_generic+0xa0/0x1c8
[   51.326313]  kunit_try_run_case+0x14c/0x3d0
[   51.326888]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.327631]  kthread+0x24c/0x2d0
[   51.328158]  ret_from_fork+0x10/0x20
[   51.328683] 
[   51.329027] The buggy address belongs to the object at fff00000c5f55320
[   51.329027]  which belongs to the cache kmalloc-16 of size 16
[   51.330514] The buggy address is located 8 bytes inside of
[   51.330514]  allocated 9-byte region [fff00000c5f55320, fff00000c5f55329)
[   51.331834] 
[   51.332157] The buggy address belongs to the physical page:
[   51.332786] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55
[   51.333758] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.334611] page_type: f5(slab)
[   51.335189] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   51.336208] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   51.337120] page dumped because: kasan: bad access detected
[   51.337744] 
[   51.338031] Memory state around the buggy address:
[   51.338779]  fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc
[   51.339686]  fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   51.340526] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   51.341355]                                   ^
[   51.341965]  fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.342805]  fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.343671] ==================================================================
[   51.500423] ==================================================================
[   51.502243] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc8
[   51.503686] Write of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250
[   51.504605] 
[   51.504911] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   51.506218] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.507002] Hardware name: linux,dummy-virt (DT)
[   51.507733] Call trace:
[   51.508250]  show_stack+0x20/0x38 (C)
[   51.508939]  dump_stack_lvl+0x8c/0xd0
[   51.509593]  print_report+0x118/0x5e0
[   51.510158]  kasan_report+0xc8/0x118
[   51.510905]  kasan_check_range+0x100/0x1a8
[   51.511635]  __kasan_check_write+0x20/0x30
[   51.512282]  kasan_bitops_modify.constprop.0+0x344/0xbc8
[   51.513124]  kasan_bitops_generic+0x110/0x1c8
[   51.513890]  kunit_try_run_case+0x14c/0x3d0
[   51.514680]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.515468]  kthread+0x24c/0x2d0
[   51.516071]  ret_from_fork+0x10/0x20
[   51.516682] 
[   51.517030] Allocated by task 250:
[   51.517710]  kasan_save_stack+0x3c/0x68
[   51.518325]  kasan_save_track+0x20/0x40
[   51.518985]  kasan_save_alloc_info+0x40/0x58
[   51.519692]  __kasan_kmalloc+0xd4/0xd8
[   51.520399]  __kmalloc_cache_noprof+0x15c/0x3c0
[   51.521066]  kasan_bitops_generic+0xa0/0x1c8
[   51.521732]  kunit_try_run_case+0x14c/0x3d0
[   51.522412]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.523138]  kthread+0x24c/0x2d0
[   51.523691]  ret_from_fork+0x10/0x20
[   51.524362] 
[   51.524775] The buggy address belongs to the object at fff00000c5f55320
[   51.524775]  which belongs to the cache kmalloc-16 of size 16
[   51.526263] The buggy address is located 8 bytes inside of
[   51.526263]  allocated 9-byte region [fff00000c5f55320, fff00000c5f55329)
[   51.527810] 
[   51.528150] The buggy address belongs to the physical page:
[   51.528960] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55
[   51.529995] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.530873] page_type: f5(slab)
[   51.531422] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   51.532428] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   51.533410] page dumped because: kasan: bad access detected
[   51.534158] 
[   51.534632] Memory state around the buggy address:
[   51.535250]  fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc
[   51.536271]  fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   51.537143] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   51.538030]                                   ^
[   51.538761]  fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.539674]  fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.540640] ==================================================================
[   51.385004] ==================================================================
[   51.385711] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[   51.387047] Write of size 8 at addr fff00000c5f55328 by task kunit_try_catch/250
[   51.388123] 
[   51.388450] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   51.389822] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.390268] Hardware name: linux,dummy-virt (DT)
[   51.390963] Call trace:
[   51.391383]  show_stack+0x20/0x38 (C)
[   51.392093]  dump_stack_lvl+0x8c/0xd0
[   51.392872]  print_report+0x118/0x5e0
[   51.393430]  kasan_report+0xc8/0x118
[   51.394056]  kasan_check_range+0x100/0x1a8
[   51.394849]  __kasan_check_write+0x20/0x30
[   51.395418]  kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[   51.396146]  kasan_bitops_generic+0x110/0x1c8
[   51.396799]  kunit_try_run_case+0x14c/0x3d0
[   51.397389]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.398140]  kthread+0x24c/0x2d0
[   51.398751]  ret_from_fork+0x10/0x20
[   51.399314] 
[   51.399612] Allocated by task 250:
[   51.400146]  kasan_save_stack+0x3c/0x68
[   51.400787]  kasan_save_track+0x20/0x40
[   51.401417]  kasan_save_alloc_info+0x40/0x58
[   51.402016]  __kasan_kmalloc+0xd4/0xd8
[   51.402610]  __kmalloc_cache_noprof+0x15c/0x3c0
[   51.403175]  kasan_bitops_generic+0xa0/0x1c8
[   51.403856]  kunit_try_run_case+0x14c/0x3d0
[   51.404473]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.405094]  kthread+0x24c/0x2d0
[   51.405710]  ret_from_fork+0x10/0x20
[   51.406251] 
[   51.406662] The buggy address belongs to the object at fff00000c5f55320
[   51.406662]  which belongs to the cache kmalloc-16 of size 16
[   51.407956] The buggy address is located 8 bytes inside of
[   51.407956]  allocated 9-byte region [fff00000c5f55320, fff00000c5f55329)
[   51.409278] 
[   51.409633] The buggy address belongs to the physical page:
[   51.410396] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55
[   51.411233] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.412095] page_type: f5(slab)
[   51.412701] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   51.413636] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   51.414593] page dumped because: kasan: bad access detected
[   51.415255] 
[   51.415559] Memory state around the buggy address:
[   51.416130]  fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc
[   51.417040]  fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   51.417802] >fff00000c5f55300: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   51.418698]                                   ^
[   51.419307]  fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.420185]  fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.421106] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen
[   51.167889] ==================================================================
[   51.170211] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88
[   51.170728] Read of size 1 at addr fff00000c616c150 by task kunit_try_catch/248
[   51.171268] 
[   51.173981] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   51.175936] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.176723] Hardware name: linux,dummy-virt (DT)
[   51.177401] Call trace:
[   51.178037]  show_stack+0x20/0x38 (C)
[   51.179338]  dump_stack_lvl+0x8c/0xd0
[   51.179922]  print_report+0x118/0x5e0
[   51.180523]  kasan_report+0xc8/0x118
[   51.181130]  __asan_report_load1_noabort+0x20/0x30
[   51.181826]  strnlen+0x80/0x88
[   51.182445]  kasan_strings+0x380/0x8f8
[   51.182993]  kunit_try_run_case+0x14c/0x3d0
[   51.184085]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.184755]  kthread+0x24c/0x2d0
[   51.185649]  ret_from_fork+0x10/0x20
[   51.186211] 
[   51.186594] Allocated by task 248:
[   51.187097]  kasan_save_stack+0x3c/0x68
[   51.187664]  kasan_save_track+0x20/0x40
[   51.188382]  kasan_save_alloc_info+0x40/0x58
[   51.189133]  __kasan_kmalloc+0xd4/0xd8
[   51.190133]  __kmalloc_cache_noprof+0x15c/0x3c0
[   51.190923]  kasan_strings+0xb4/0x8f8
[   51.191854]  kunit_try_run_case+0x14c/0x3d0
[   51.192387]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.193352]  kthread+0x24c/0x2d0
[   51.193942]  ret_from_fork+0x10/0x20
[   51.194639] 
[   51.195161] Freed by task 248:
[   51.195658]  kasan_save_stack+0x3c/0x68
[   51.196391]  kasan_save_track+0x20/0x40
[   51.197271]  kasan_save_free_info+0x4c/0x78
[   51.198525]  __kasan_slab_free+0x6c/0x98
[   51.199468]  kfree+0x114/0x3c8
[   51.199992]  kasan_strings+0x128/0x8f8
[   51.200499]  kunit_try_run_case+0x14c/0x3d0
[   51.200807]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.201558]  kthread+0x24c/0x2d0
[   51.202633]  ret_from_fork+0x10/0x20
[   51.203603] 
[   51.203930] The buggy address belongs to the object at fff00000c616c140
[   51.203930]  which belongs to the cache kmalloc-32 of size 32
[   51.205819] The buggy address is located 16 bytes inside of
[   51.205819]  freed 32-byte region [fff00000c616c140, fff00000c616c160)
[   51.208163] 
[   51.208636] The buggy address belongs to the physical page:
[   51.209391] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616c
[   51.210700] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.211464] page_type: f5(slab)
[   51.212284] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   51.213440] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   51.214264] page dumped because: kasan: bad access detected
[   51.215007] 
[   51.215414] Memory state around the buggy address:
[   51.216095]  fff00000c616c000: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   51.216842]  fff00000c616c080: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   51.218183] >fff00000c616c100: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   51.219012]                                                  ^
[   51.219766]  fff00000c616c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.220672]  fff00000c616c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.222108] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen
[   51.111184] ==================================================================
[   51.111831] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   51.112999] Read of size 1 at addr fff00000c616c150 by task kunit_try_catch/248
[   51.114790] 
[   51.115073] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   51.116652] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.117601] Hardware name: linux,dummy-virt (DT)
[   51.118801] Call trace:
[   51.119349]  show_stack+0x20/0x38 (C)
[   51.119855]  dump_stack_lvl+0x8c/0xd0
[   51.120466]  print_report+0x118/0x5e0
[   51.121091]  kasan_report+0xc8/0x118
[   51.121986]  __asan_report_load1_noabort+0x20/0x30
[   51.122774]  strlen+0xa8/0xb0
[   51.123388]  kasan_strings+0x320/0x8f8
[   51.124072]  kunit_try_run_case+0x14c/0x3d0
[   51.124834]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.126006]  kthread+0x24c/0x2d0
[   51.126595]  ret_from_fork+0x10/0x20
[   51.127307] 
[   51.127823] Allocated by task 248:
[   51.128417]  kasan_save_stack+0x3c/0x68
[   51.129084]  kasan_save_track+0x20/0x40
[   51.129625]  kasan_save_alloc_info+0x40/0x58
[   51.130331]  __kasan_kmalloc+0xd4/0xd8
[   51.130928]  __kmalloc_cache_noprof+0x15c/0x3c0
[   51.131975]  kasan_strings+0xb4/0x8f8
[   51.132469]  kunit_try_run_case+0x14c/0x3d0
[   51.133913]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.134649]  kthread+0x24c/0x2d0
[   51.135127]  ret_from_fork+0x10/0x20
[   51.135708] 
[   51.136097] Freed by task 248:
[   51.136762]  kasan_save_stack+0x3c/0x68
[   51.138036]  kasan_save_track+0x20/0x40
[   51.139361]  kasan_save_free_info+0x4c/0x78
[   51.140319]  __kasan_slab_free+0x6c/0x98
[   51.140953]  kfree+0x114/0x3c8
[   51.141938]  kasan_strings+0x128/0x8f8
[   51.142744]  kunit_try_run_case+0x14c/0x3d0
[   51.143362]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.144076]  kthread+0x24c/0x2d0
[   51.144617]  ret_from_fork+0x10/0x20
[   51.145251] 
[   51.145603] The buggy address belongs to the object at fff00000c616c140
[   51.145603]  which belongs to the cache kmalloc-32 of size 32
[   51.147168] The buggy address is located 16 bytes inside of
[   51.147168]  freed 32-byte region [fff00000c616c140, fff00000c616c160)
[   51.148571] 
[   51.148864] The buggy address belongs to the physical page:
[   51.150283] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616c
[   51.151255] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.152180] page_type: f5(slab)
[   51.152844] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   51.154164] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   51.155108] page dumped because: kasan: bad access detected
[   51.155817] 
[   51.156168] Memory state around the buggy address:
[   51.156868]  fff00000c616c000: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   51.158022]  fff00000c616c080: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   51.159817] >fff00000c616c100: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   51.160490]                                                  ^
[   51.161895]  fff00000c616c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.163773]  fff00000c616c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.165209] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[   51.058091] ==================================================================
[   51.058991] BUG: KASAN: slab-use-after-free in kasan_strings+0x858/0x8f8
[   51.060075] Read of size 1 at addr fff00000c616c150 by task kunit_try_catch/248
[   51.060971] 
[   51.061731] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   51.063056] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.063731] Hardware name: linux,dummy-virt (DT)
[   51.064365] Call trace:
[   51.064904]  show_stack+0x20/0x38 (C)
[   51.066241]  dump_stack_lvl+0x8c/0xd0
[   51.066849]  print_report+0x118/0x5e0
[   51.067474]  kasan_report+0xc8/0x118
[   51.068161]  __asan_report_load1_noabort+0x20/0x30
[   51.068974]  kasan_strings+0x858/0x8f8
[   51.069625]  kunit_try_run_case+0x14c/0x3d0
[   51.070698]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.071501]  kthread+0x24c/0x2d0
[   51.072183]  ret_from_fork+0x10/0x20
[   51.072716] 
[   51.072964] Allocated by task 248:
[   51.073829]  kasan_save_stack+0x3c/0x68
[   51.074489]  kasan_save_track+0x20/0x40
[   51.075213]  kasan_save_alloc_info+0x40/0x58
[   51.076573]  __kasan_kmalloc+0xd4/0xd8
[   51.077192]  __kmalloc_cache_noprof+0x15c/0x3c0
[   51.078047]  kasan_strings+0xb4/0x8f8
[   51.078673]  kunit_try_run_case+0x14c/0x3d0
[   51.079377]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.080225]  kthread+0x24c/0x2d0
[   51.080918]  ret_from_fork+0x10/0x20
[   51.081431] 
[   51.081813] Freed by task 248:
[   51.082256]  kasan_save_stack+0x3c/0x68
[   51.082812]  kasan_save_track+0x20/0x40
[   51.083485]  kasan_save_free_info+0x4c/0x78
[   51.083960]  __kasan_slab_free+0x6c/0x98
[   51.085068]  kfree+0x114/0x3c8
[   51.086143]  kasan_strings+0x128/0x8f8
[   51.087155]  kunit_try_run_case+0x14c/0x3d0
[   51.087962]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.088774]  kthread+0x24c/0x2d0
[   51.089898]  ret_from_fork+0x10/0x20
[   51.090703] 
[   51.091059] The buggy address belongs to the object at fff00000c616c140
[   51.091059]  which belongs to the cache kmalloc-32 of size 32
[   51.092831] The buggy address is located 16 bytes inside of
[   51.092831]  freed 32-byte region [fff00000c616c140, fff00000c616c160)
[   51.095256] 
[   51.095541] The buggy address belongs to the physical page:
[   51.096416] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616c
[   51.097398] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.098322] page_type: f5(slab)
[   51.098815] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   51.100017] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   51.100979] page dumped because: kasan: bad access detected
[   51.102357] 
[   51.102650] Memory state around the buggy address:
[   51.103664]  fff00000c616c000: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   51.104531]  fff00000c616c080: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   51.105829] >fff00000c616c100: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   51.106602]                                                  ^
[   51.107287]  fff00000c616c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.108119]  fff00000c616c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.109077] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
[   51.006365] ==================================================================
[   51.007709] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   51.008496] Read of size 1 at addr fff00000c616c150 by task kunit_try_catch/248
[   51.009534] 
[   51.010384] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   51.011634] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.012782] Hardware name: linux,dummy-virt (DT)
[   51.013639] Call trace:
[   51.014221]  show_stack+0x20/0x38 (C)
[   51.014868]  dump_stack_lvl+0x8c/0xd0
[   51.015432]  print_report+0x118/0x5e0
[   51.015974]  kasan_report+0xc8/0x118
[   51.016620]  __asan_report_load1_noabort+0x20/0x30
[   51.017754]  strcmp+0xc0/0xc8
[   51.018426]  kasan_strings+0x248/0x8f8
[   51.019020]  kunit_try_run_case+0x14c/0x3d0
[   51.019736]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.020538]  kthread+0x24c/0x2d0
[   51.021231]  ret_from_fork+0x10/0x20
[   51.021646] 
[   51.021815] Allocated by task 248:
[   51.022067]  kasan_save_stack+0x3c/0x68
[   51.022379]  kasan_save_track+0x20/0x40
[   51.022675]  kasan_save_alloc_info+0x40/0x58
[   51.022974]  __kasan_kmalloc+0xd4/0xd8
[   51.023249]  __kmalloc_cache_noprof+0x15c/0x3c0
[   51.025143]  kasan_strings+0xb4/0x8f8
[   51.025895]  kunit_try_run_case+0x14c/0x3d0
[   51.026774]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.027331]  kthread+0x24c/0x2d0
[   51.028225]  ret_from_fork+0x10/0x20
[   51.029040] 
[   51.029312] Freed by task 248:
[   51.029860]  kasan_save_stack+0x3c/0x68
[   51.030716]  kasan_save_track+0x20/0x40
[   51.031386]  kasan_save_free_info+0x4c/0x78
[   51.031973]  __kasan_slab_free+0x6c/0x98
[   51.032522]  kfree+0x114/0x3c8
[   51.033916]  kasan_strings+0x128/0x8f8
[   51.034490]  kunit_try_run_case+0x14c/0x3d0
[   51.035072]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.035806]  kthread+0x24c/0x2d0
[   51.036420]  ret_from_fork+0x10/0x20
[   51.037157] 
[   51.037521] The buggy address belongs to the object at fff00000c616c140
[   51.037521]  which belongs to the cache kmalloc-32 of size 32
[   51.039440] The buggy address is located 16 bytes inside of
[   51.039440]  freed 32-byte region [fff00000c616c140, fff00000c616c160)
[   51.040893] 
[   51.041386] The buggy address belongs to the physical page:
[   51.042772] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616c
[   51.043860] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.044830] page_type: f5(slab)
[   51.045352] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   51.046624] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   51.047504] page dumped because: kasan: bad access detected
[   51.048214] 
[   51.048619] Memory state around the buggy address:
[   51.049409]  fff00000c616c000: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   51.050989]  fff00000c616c080: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   51.052055] >fff00000c616c100: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   51.053028]                                                  ^
[   51.053751]  fff00000c616c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.054590]  fff00000c616c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.055351] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strrchr
[   50.953219] ==================================================================
[   50.955085] BUG: KASAN: slab-use-after-free in strrchr+0x6c/0x78
[   50.955836] Read of size 1 at addr fff00000c616c150 by task kunit_try_catch/248
[   50.956706] 
[   50.957051] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   50.958262] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.959540] Hardware name: linux,dummy-virt (DT)
[   50.960187] Call trace:
[   50.960589]  show_stack+0x20/0x38 (C)
[   50.961681]  dump_stack_lvl+0x8c/0xd0
[   50.962250]  print_report+0x118/0x5e0
[   50.962822]  kasan_report+0xc8/0x118
[   50.963650]  __asan_report_load1_noabort+0x20/0x30
[   50.964330]  strrchr+0x6c/0x78
[   50.964801]  kasan_strings+0x1e0/0x8f8
[   50.965603]  kunit_try_run_case+0x14c/0x3d0
[   50.966361]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.967110]  kthread+0x24c/0x2d0
[   50.967877]  ret_from_fork+0x10/0x20
[   50.968526] 
[   50.968917] Allocated by task 248:
[   50.969507]  kasan_save_stack+0x3c/0x68
[   50.970148]  kasan_save_track+0x20/0x40
[   50.970892]  kasan_save_alloc_info+0x40/0x58
[   50.972091]  __kasan_kmalloc+0xd4/0xd8
[   50.972660]  __kmalloc_cache_noprof+0x15c/0x3c0
[   50.973251]  kasan_strings+0xb4/0x8f8
[   50.973760]  kunit_try_run_case+0x14c/0x3d0
[   50.974860]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.975532]  kthread+0x24c/0x2d0
[   50.976096]  ret_from_fork+0x10/0x20
[   50.976638] 
[   50.976996] Freed by task 248:
[   50.977592]  kasan_save_stack+0x3c/0x68
[   50.978131]  kasan_save_track+0x20/0x40
[   50.978845]  kasan_save_free_info+0x4c/0x78
[   50.979862]  __kasan_slab_free+0x6c/0x98
[   50.980489]  kfree+0x114/0x3c8
[   50.981190]  kasan_strings+0x128/0x8f8
[   50.982213]  kunit_try_run_case+0x14c/0x3d0
[   50.983022]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.983748]  kthread+0x24c/0x2d0
[   50.984584]  ret_from_fork+0x10/0x20
[   50.985151] 
[   50.985776] The buggy address belongs to the object at fff00000c616c140
[   50.985776]  which belongs to the cache kmalloc-32 of size 32
[   50.987683] The buggy address is located 16 bytes inside of
[   50.987683]  freed 32-byte region [fff00000c616c140, fff00000c616c160)
[   50.988988] 
[   50.989669] The buggy address belongs to the physical page:
[   50.990321] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616c
[   50.991596] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.992544] page_type: f5(slab)
[   50.993338] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   50.994866] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   50.995940] page dumped because: kasan: bad access detected
[   50.996856] 
[   50.997222] Memory state around the buggy address:
[   50.998359]  fff00000c616c000: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   50.999619]  fff00000c616c080: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   51.000757] >fff00000c616c100: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   51.001798]                                                  ^
[   51.002904]  fff00000c616c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.003734]  fff00000c616c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.004517] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strchr
[   50.900709] ==================================================================
[   50.902844] BUG: KASAN: slab-use-after-free in strchr+0xcc/0xd8
[   50.903649] Read of size 1 at addr fff00000c616c150 by task kunit_try_catch/248
[   50.904463] 
[   50.904924] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   50.906820] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.907593] Hardware name: linux,dummy-virt (DT)
[   50.908392] Call trace:
[   50.908938]  show_stack+0x20/0x38 (C)
[   50.909515]  dump_stack_lvl+0x8c/0xd0
[   50.910852]  print_report+0x118/0x5e0
[   50.911982]  kasan_report+0xc8/0x118
[   50.912755]  __asan_report_load1_noabort+0x20/0x30
[   50.913552]  strchr+0xcc/0xd8
[   50.914524]  kasan_strings+0x180/0x8f8
[   50.915059]  kunit_try_run_case+0x14c/0x3d0
[   50.915723]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.916502]  kthread+0x24c/0x2d0
[   50.917312]  ret_from_fork+0x10/0x20
[   50.918207] 
[   50.918522] Allocated by task 248:
[   50.919063]  kasan_save_stack+0x3c/0x68
[   50.919694]  kasan_save_track+0x20/0x40
[   50.920517]  kasan_save_alloc_info+0x40/0x58
[   50.921245]  __kasan_kmalloc+0xd4/0xd8
[   50.921980]  __kmalloc_cache_noprof+0x15c/0x3c0
[   50.922638]  kasan_strings+0xb4/0x8f8
[   50.923284]  kunit_try_run_case+0x14c/0x3d0
[   50.923865]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.924666]  kthread+0x24c/0x2d0
[   50.925361]  ret_from_fork+0x10/0x20
[   50.925791] 
[   50.926149] Freed by task 248:
[   50.926760]  kasan_save_stack+0x3c/0x68
[   50.928016]  kasan_save_track+0x20/0x40
[   50.928614]  kasan_save_free_info+0x4c/0x78
[   50.929184]  __kasan_slab_free+0x6c/0x98
[   50.929826]  kfree+0x114/0x3c8
[   50.930711]  kasan_strings+0x128/0x8f8
[   50.931258]  kunit_try_run_case+0x14c/0x3d0
[   50.931877]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.932506]  kthread+0x24c/0x2d0
[   50.933559]  ret_from_fork+0x10/0x20
[   50.934004] 
[   50.934377] The buggy address belongs to the object at fff00000c616c140
[   50.934377]  which belongs to the cache kmalloc-32 of size 32
[   50.935859] The buggy address is located 16 bytes inside of
[   50.935859]  freed 32-byte region [fff00000c616c140, fff00000c616c160)
[   50.938036] 
[   50.938282] The buggy address belongs to the physical page:
[   50.939030] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616c
[   50.939915] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.940827] page_type: f5(slab)
[   50.942065] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   50.943014] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   50.943932] page dumped because: kasan: bad access detected
[   50.944617] 
[   50.944904] Memory state around the buggy address:
[   50.945570]  fff00000c616c000: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   50.946384]  fff00000c616c080: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   50.947261] >fff00000c616c100: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   50.948533]                                                  ^
[   50.949617]  fff00000c616c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.950502]  fff00000c616c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.951835] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[   50.851899] ==================================================================
[   50.853002] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   50.853697] Read of size 1 at addr fff00000c616c018 by task kunit_try_catch/246
[   50.855462] 
[   50.855904] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   50.857235] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.857785] Hardware name: linux,dummy-virt (DT)
[   50.858668] Call trace:
[   50.859058]  show_stack+0x20/0x38 (C)
[   50.859580]  dump_stack_lvl+0x8c/0xd0
[   50.860121]  print_report+0x118/0x5e0
[   50.860743]  kasan_report+0xc8/0x118
[   50.861691]  __asan_report_load1_noabort+0x20/0x30
[   50.862433]  memcmp+0x198/0x1d8
[   50.862988]  kasan_memcmp+0x16c/0x300
[   50.863791]  kunit_try_run_case+0x14c/0x3d0
[   50.864457]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.865287]  kthread+0x24c/0x2d0
[   50.865833]  ret_from_fork+0x10/0x20
[   50.866425] 
[   50.866798] Allocated by task 246:
[   50.867584]  kasan_save_stack+0x3c/0x68
[   50.868173]  kasan_save_track+0x20/0x40
[   50.868732]  kasan_save_alloc_info+0x40/0x58
[   50.869699]  __kasan_kmalloc+0xd4/0xd8
[   50.870248]  __kmalloc_cache_noprof+0x15c/0x3c0
[   50.870873]  kasan_memcmp+0xbc/0x300
[   50.871452]  kunit_try_run_case+0x14c/0x3d0
[   50.872071]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.872628]  kthread+0x24c/0x2d0
[   50.873115]  ret_from_fork+0x10/0x20
[   50.873744] 
[   50.874100] The buggy address belongs to the object at fff00000c616c000
[   50.874100]  which belongs to the cache kmalloc-32 of size 32
[   50.875896] The buggy address is located 0 bytes to the right of
[   50.875896]  allocated 24-byte region [fff00000c616c000, fff00000c616c018)
[   50.877729] 
[   50.878057] The buggy address belongs to the physical page:
[   50.878752] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616c
[   50.879732] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.880623] page_type: f5(slab)
[   50.881410] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   50.882352] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   50.883212] page dumped because: kasan: bad access detected
[   50.883940] 
[   50.884225] Memory state around the buggy address:
[   50.884959]  fff00000c616bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.886153]  fff00000c616bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.887123] >fff00000c616c000: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.887984]                             ^
[   50.888527]  fff00000c616c080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.889696]  fff00000c616c100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.890562] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memchr
[   50.802507] ==================================================================
[   50.803609] BUG: KASAN: slab-out-of-bounds in memchr+0x78/0x88
[   50.804446] Read of size 1 at addr fff00000c613b298 by task kunit_try_catch/244
[   50.805149] 
[   50.805549] CPU: 1 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   50.806778] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.807584] Hardware name: linux,dummy-virt (DT)
[   50.808243] Call trace:
[   50.808654]  show_stack+0x20/0x38 (C)
[   50.809736]  dump_stack_lvl+0x8c/0xd0
[   50.810319]  print_report+0x118/0x5e0
[   50.810867]  kasan_report+0xc8/0x118
[   50.811394]  __asan_report_load1_noabort+0x20/0x30
[   50.812127]  memchr+0x78/0x88
[   50.812718]  kasan_memchr+0x148/0x2d8
[   50.813213]  kunit_try_run_case+0x14c/0x3d0
[   50.813946]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.814704]  kthread+0x24c/0x2d0
[   50.815530]  ret_from_fork+0x10/0x20
[   50.816144] 
[   50.816473] Allocated by task 244:
[   50.817025]  kasan_save_stack+0x3c/0x68
[   50.817898]  kasan_save_track+0x20/0x40
[   50.818580]  kasan_save_alloc_info+0x40/0x58
[   50.819121]  __kasan_kmalloc+0xd4/0xd8
[   50.819637]  __kmalloc_cache_noprof+0x15c/0x3c0
[   50.820342]  kasan_memchr+0xb0/0x2d8
[   50.820977]  kunit_try_run_case+0x14c/0x3d0
[   50.822084]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.822968]  kthread+0x24c/0x2d0
[   50.823742]  ret_from_fork+0x10/0x20
[   50.824547] 
[   50.824926] The buggy address belongs to the object at fff00000c613b280
[   50.824926]  which belongs to the cache kmalloc-32 of size 32
[   50.826781] The buggy address is located 0 bytes to the right of
[   50.826781]  allocated 24-byte region [fff00000c613b280, fff00000c613b298)
[   50.828339] 
[   50.828692] The buggy address belongs to the physical page:
[   50.829875] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613b
[   50.830873] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.831714] page_type: f5(slab)
[   50.832186] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   50.833377] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   50.834436] page dumped because: kasan: bad access detected
[   50.835270] 
[   50.835610] Memory state around the buggy address:
[   50.836556]  fff00000c613b180: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   50.837812]  fff00000c613b200: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   50.838779] >fff00000c613b280: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.839637]                             ^
[   50.840192]  fff00000c613b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.841102]  fff00000c613b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.842620] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[   50.760680] ==================================================================
[   50.761837] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2e4/0x348
[   50.762871] Read of size 1 at addr ffff800080a87bea by task kunit_try_catch/242
[   50.764162] 
[   50.764597] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   50.766286] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.766891] Hardware name: linux,dummy-virt (DT)
[   50.767535] Call trace:
[   50.768042]  show_stack+0x20/0x38 (C)
[   50.768679]  dump_stack_lvl+0x8c/0xd0
[   50.769520]  print_report+0x2fc/0x5e0
[   50.770114]  kasan_report+0xc8/0x118
[   50.770710]  __asan_report_load1_noabort+0x20/0x30
[   50.771361]  kasan_alloca_oob_right+0x2e4/0x348
[   50.772059]  kunit_try_run_case+0x14c/0x3d0
[   50.772700]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.773546]  kthread+0x24c/0x2d0
[   50.774334]  ret_from_fork+0x10/0x20
[   50.774957] 
[   50.775490] The buggy address belongs to stack of task kunit_try_catch/242
[   50.776509] 
[   50.776818] The buggy address belongs to the virtual mapping at
[   50.776818]  [ffff800080a80000, ffff800080a89000) created by:
[   50.776818]  kernel_clone+0x140/0x788
[   50.779051] 
[   50.779538] The buggy address belongs to the physical page:
[   50.780279] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106149
[   50.781379] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.782163] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   50.783111] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   50.784461] page dumped because: kasan: bad access detected
[   50.785639] 
[   50.786078] Memory state around the buggy address:
[   50.786693]  ffff800080a87a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   50.787670]  ffff800080a87b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   50.788645] >ffff800080a87b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   50.789720]                                                           ^
[   50.790747]  ffff800080a87c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2
[   50.791562]  ffff800080a87c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00
[   50.792367] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[   50.720637] ==================================================================
[   50.722105] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   50.723176] Read of size 1 at addr ffff800080a97bdf by task kunit_try_catch/240
[   50.724542] 
[   50.725222] CPU: 1 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   50.726383] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.726913] Hardware name: linux,dummy-virt (DT)
[   50.727477] Call trace:
[   50.728022]  show_stack+0x20/0x38 (C)
[   50.728760]  dump_stack_lvl+0x8c/0xd0
[   50.729578]  print_report+0x2fc/0x5e0
[   50.730014]  kasan_report+0xc8/0x118
[   50.730636]  __asan_report_load1_noabort+0x20/0x30
[   50.731334]  kasan_alloca_oob_left+0x2b8/0x310
[   50.731839]  kunit_try_run_case+0x14c/0x3d0
[   50.732557]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.733129]  kthread+0x24c/0x2d0
[   50.733767]  ret_from_fork+0x10/0x20
[   50.734369] 
[   50.734795] The buggy address belongs to stack of task kunit_try_catch/240
[   50.735998] 
[   50.736338] The buggy address belongs to the virtual mapping at
[   50.736338]  [ffff800080a90000, ffff800080a99000) created by:
[   50.736338]  kernel_clone+0x140/0x788
[   50.738806] 
[   50.739091] The buggy address belongs to the physical page:
[   50.740037] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10613c
[   50.741010] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.742125] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   50.742980] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   50.743916] page dumped because: kasan: bad access detected
[   50.744612] 
[   50.744931] Memory state around the buggy address:
[   50.745851]  ffff800080a97a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   50.747287]  ffff800080a97b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   50.748402] >ffff800080a97b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   50.749241]                                                     ^
[   50.749999]  ffff800080a97c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2
[   50.751161]  ffff800080a97c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00
[   50.751989] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[   50.672279] ==================================================================
[   50.674582] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x230/0x268
[   50.675456] Read of size 1 at addr ffff800080a47cba by task kunit_try_catch/238
[   50.676788] 
[   50.677279] CPU: 1 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   50.678710] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.679485] Hardware name: linux,dummy-virt (DT)
[   50.680176] Call trace:
[   50.680584]  show_stack+0x20/0x38 (C)
[   50.681416]  dump_stack_lvl+0x8c/0xd0
[   50.681981]  print_report+0x2fc/0x5e0
[   50.682511]  kasan_report+0xc8/0x118
[   50.683097]  __asan_report_load1_noabort+0x20/0x30
[   50.683828]  kasan_stack_oob+0x230/0x268
[   50.684453]  kunit_try_run_case+0x14c/0x3d0
[   50.685362]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.686152]  kthread+0x24c/0x2d0
[   50.686719]  ret_from_fork+0x10/0x20
[   50.687350] 
[   50.687739] The buggy address belongs to stack of task kunit_try_catch/238
[   50.688730]  and is located at offset 138 in frame:
[   50.689730]  kasan_stack_oob+0x0/0x268
[   50.690491] 
[   50.690900] This frame has 4 objects:
[   50.691747]  [48, 49) '__assertion'
[   50.691887]  [64, 72) 'array'
[   50.692386]  [96, 112) '__assertion'
[   50.692827]  [128, 138) 'stack_array'
[   50.693488] 
[   50.694117] The buggy address belongs to the virtual mapping at
[   50.694117]  [ffff800080a40000, ffff800080a49000) created by:
[   50.694117]  kernel_clone+0x140/0x788
[   50.696322] 
[   50.696883] The buggy address belongs to the physical page:
[   50.697897] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b4
[   50.698921] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.700003] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   50.701003] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   50.701880] page dumped because: kasan: bad access detected
[   50.702863] 
[   50.703356] Memory state around the buggy address:
[   50.704168]  ffff800080a47b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   50.705236]  ffff800080a47c00: 00 00 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2
[   50.706578] >ffff800080a47c80: f2 f2 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00
[   50.707527]                                         ^
[   50.708321]  ffff800080a47d00: 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00
[   50.709432]  ffff800080a47d80: f2 f2 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00
[   50.710412] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   50.616559] ==================================================================
[   50.618332] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   50.618983] Read of size 1 at addr ffffa1fda44d906d by task kunit_try_catch/234
[   50.620093] 
[   50.620551] CPU: 1 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   50.622470] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.623249] Hardware name: linux,dummy-virt (DT)
[   50.624075] Call trace:
[   50.624421]  show_stack+0x20/0x38 (C)
[   50.625353]  dump_stack_lvl+0x8c/0xd0
[   50.626055]  print_report+0x2fc/0x5e0
[   50.626734]  kasan_report+0xc8/0x118
[   50.627351]  __asan_report_load1_noabort+0x20/0x30
[   50.628138]  kasan_global_oob_right+0x230/0x270
[   50.628847]  kunit_try_run_case+0x14c/0x3d0
[   50.630039]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.630820]  kthread+0x24c/0x2d0
[   50.631354]  ret_from_fork+0x10/0x20
[   50.631976] 
[   50.632367] The buggy address belongs to the variable:
[   50.633181]  global_array+0xd/0x40
[   50.633934] 
[   50.634738] The buggy address belongs to the virtual mapping at
[   50.634738]  [ffffa1fda2820000, ffffa1fda4591000) created by:
[   50.634738]  paging_init+0x668/0x7c8
[   50.636065] 
[   50.637480] The buggy address belongs to the physical page:
[   50.638815] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x478d9
[   50.639470] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   50.640089] raw: 03fffe0000002000 ffffc1ffc01e3648 ffffc1ffc01e3648 0000000000000000
[   50.642329] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   50.644267] page dumped because: kasan: bad access detected
[   50.645840] 
[   50.646767] Memory state around the buggy address:
[   50.648159]  ffffa1fda44d8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   50.650283]  ffffa1fda44d8f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   50.651440] >ffffa1fda44d9000: 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9
[   50.652331]                                                           ^
[   50.653161]  ffffa1fda44d9080: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9
[   50.654274]  ffffa1fda44d9100: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9
[   50.655219] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[   50.518412] ==================================================================
[   50.519648] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[   50.520503] Free of addr fff00000c615aa01 by task kunit_try_catch/230
[   50.521206] 
[   50.521967] CPU: 0 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   50.523171] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.523682] Hardware name: linux,dummy-virt (DT)
[   50.524369] Call trace:
[   50.524905]  show_stack+0x20/0x38 (C)
[   50.525560]  dump_stack_lvl+0x8c/0xd0
[   50.526477]  print_report+0x118/0x5e0
[   50.527253]  kasan_report_invalid_free+0xb0/0xd8
[   50.527958]  check_slab_allocation+0xfc/0x108
[   50.528654]  __kasan_mempool_poison_object+0x78/0x150
[   50.530176]  mempool_free+0x28c/0x328
[   50.530782]  mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[   50.531514]  mempool_kmalloc_invalid_free+0xb8/0x110
[   50.532199]  kunit_try_run_case+0x14c/0x3d0
[   50.532813]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.533718]  kthread+0x24c/0x2d0
[   50.534262]  ret_from_fork+0x10/0x20
[   50.534888] 
[   50.535249] Allocated by task 230:
[   50.536707]  kasan_save_stack+0x3c/0x68
[   50.537122]  kasan_save_track+0x20/0x40
[   50.537807]  kasan_save_alloc_info+0x40/0x58
[   50.539071]  __kasan_mempool_unpoison_object+0x11c/0x180
[   50.539931]  remove_element+0x130/0x1f8
[   50.540663]  mempool_alloc_preallocated+0x58/0xc0
[   50.541697]  mempool_kmalloc_invalid_free_helper+0x94/0x2a0
[   50.542321]  mempool_kmalloc_invalid_free+0xb8/0x110
[   50.542912]  kunit_try_run_case+0x14c/0x3d0
[   50.543659]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.544379]  kthread+0x24c/0x2d0
[   50.545026]  ret_from_fork+0x10/0x20
[   50.545932] 
[   50.546477] The buggy address belongs to the object at fff00000c615aa00
[   50.546477]  which belongs to the cache kmalloc-128 of size 128
[   50.548412] The buggy address is located 1 bytes inside of
[   50.548412]  128-byte region [fff00000c615aa00, fff00000c615aa80)
[   50.550394] 
[   50.550652] The buggy address belongs to the physical page:
[   50.551663] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10615a
[   50.552586] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.553609] page_type: f5(slab)
[   50.554158] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   50.554957] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   50.556364] page dumped because: kasan: bad access detected
[   50.556913] 
[   50.557239] Memory state around the buggy address:
[   50.558162]  fff00000c615a900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   50.558876]  fff00000c615a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.559698] >fff00000c615aa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   50.560436]                    ^
[   50.560992]  fff00000c615aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.561934]  fff00000c615ab00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   50.562916] ==================================================================
[   50.573913] ==================================================================
[   50.575104] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[   50.576073] Free of addr fff00000c66e4001 by task kunit_try_catch/232
[   50.576681] 
[   50.577376] CPU: 0 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   50.578715] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.579418] Hardware name: linux,dummy-virt (DT)
[   50.580275] Call trace:
[   50.580694]  show_stack+0x20/0x38 (C)
[   50.581585]  dump_stack_lvl+0x8c/0xd0
[   50.582566]  print_report+0x118/0x5e0
[   50.583434]  kasan_report_invalid_free+0xb0/0xd8
[   50.584211]  __kasan_mempool_poison_object+0xfc/0x150
[   50.585491]  mempool_free+0x28c/0x328
[   50.586254]  mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[   50.587186]  mempool_kmalloc_large_invalid_free+0xb8/0x110
[   50.587920]  kunit_try_run_case+0x14c/0x3d0
[   50.588583]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.589202]  kthread+0x24c/0x2d0
[   50.590024]  ret_from_fork+0x10/0x20
[   50.590518] 
[   50.591454] The buggy address belongs to the physical page:
[   50.592192] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e4
[   50.593166] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   50.594066] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   50.594922] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   50.596087] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   50.596968] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   50.597983] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   50.598600] head: 0bfffe0000000002 ffffc1ffc319b901 ffffffffffffffff 0000000000000000
[   50.599039] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   50.599652] page dumped because: kasan: bad access detected
[   50.600255] 
[   50.600572] Memory state around the buggy address:
[   50.601426]  fff00000c66e3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   50.602992]  fff00000c66e3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   50.603930] >fff00000c66e4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   50.604944]                    ^
[   50.605335]  fff00000c66e4080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   50.606710]  fff00000c66e4100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   50.607528] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[   50.372009] ==================================================================
[   50.372979] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   50.373640] Free of addr fff00000c615a300 by task kunit_try_catch/224
[   50.374181] 
[   50.375700] CPU: 0 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   50.377099] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.377622] Hardware name: linux,dummy-virt (DT)
[   50.378074] Call trace:
[   50.378367]  show_stack+0x20/0x38 (C)
[   50.379086]  dump_stack_lvl+0x8c/0xd0
[   50.381663]  print_report+0x118/0x5e0
[   50.382234]  kasan_report_invalid_free+0xb0/0xd8
[   50.382938]  check_slab_allocation+0xd4/0x108
[   50.383597]  __kasan_mempool_poison_object+0x78/0x150
[   50.384425]  mempool_free+0x28c/0x328
[   50.385015]  mempool_double_free_helper+0x150/0x2e0
[   50.385927]  mempool_kmalloc_double_free+0xb8/0x110
[   50.387176]  kunit_try_run_case+0x14c/0x3d0
[   50.388101]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.388942]  kthread+0x24c/0x2d0
[   50.389856]  ret_from_fork+0x10/0x20
[   50.390405] 
[   50.390775] Allocated by task 224:
[   50.391238]  kasan_save_stack+0x3c/0x68
[   50.391990]  kasan_save_track+0x20/0x40
[   50.392585]  kasan_save_alloc_info+0x40/0x58
[   50.393344]  __kasan_mempool_unpoison_object+0x11c/0x180
[   50.393976]  remove_element+0x130/0x1f8
[   50.394560]  mempool_alloc_preallocated+0x58/0xc0
[   50.395188]  mempool_double_free_helper+0x94/0x2e0
[   50.396010]  mempool_kmalloc_double_free+0xb8/0x110
[   50.396659]  kunit_try_run_case+0x14c/0x3d0
[   50.397536]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.398191]  kthread+0x24c/0x2d0
[   50.398827]  ret_from_fork+0x10/0x20
[   50.399283] 
[   50.399924] Freed by task 224:
[   50.400421]  kasan_save_stack+0x3c/0x68
[   50.401402]  kasan_save_track+0x20/0x40
[   50.401947]  kasan_save_free_info+0x4c/0x78
[   50.402574]  __kasan_mempool_poison_object+0xc0/0x150
[   50.403328]  mempool_free+0x28c/0x328
[   50.403865]  mempool_double_free_helper+0x100/0x2e0
[   50.404573]  mempool_kmalloc_double_free+0xb8/0x110
[   50.405553]  kunit_try_run_case+0x14c/0x3d0
[   50.406100]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.406817]  kthread+0x24c/0x2d0
[   50.407416]  ret_from_fork+0x10/0x20
[   50.408002] 
[   50.408313] The buggy address belongs to the object at fff00000c615a300
[   50.408313]  which belongs to the cache kmalloc-128 of size 128
[   50.410042] The buggy address is located 0 bytes inside of
[   50.410042]  128-byte region [fff00000c615a300, fff00000c615a380)
[   50.411339] 
[   50.411632] The buggy address belongs to the physical page:
[   50.412353] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10615a
[   50.413582] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.414477] page_type: f5(slab)
[   50.414999] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   50.415960] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   50.416835] page dumped because: kasan: bad access detected
[   50.417687] 
[   50.418039] Memory state around the buggy address:
[   50.418737]  fff00000c615a200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   50.419787]  fff00000c615a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.420695] >fff00000c615a300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   50.421849]                    ^
[   50.422429]  fff00000c615a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.423165]  fff00000c615a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   50.424462] ==================================================================
[   50.435053] ==================================================================
[   50.436167] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   50.437048] Free of addr fff00000c66e4000 by task kunit_try_catch/226
[   50.438523] 
[   50.438930] CPU: 0 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   50.440038] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.440682] Hardware name: linux,dummy-virt (DT)
[   50.441436] Call trace:
[   50.441803]  show_stack+0x20/0x38 (C)
[   50.442362]  dump_stack_lvl+0x8c/0xd0
[   50.442896]  print_report+0x118/0x5e0
[   50.443834]  kasan_report_invalid_free+0xb0/0xd8
[   50.444526]  __kasan_mempool_poison_object+0x14c/0x150
[   50.445182]  mempool_free+0x28c/0x328
[   50.446093]  mempool_double_free_helper+0x150/0x2e0
[   50.446976]  mempool_kmalloc_large_double_free+0xb8/0x110
[   50.447651]  kunit_try_run_case+0x14c/0x3d0
[   50.448360]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.449037]  kthread+0x24c/0x2d0
[   50.449664]  ret_from_fork+0x10/0x20
[   50.450362] 
[   50.450723] The buggy address belongs to the physical page:
[   50.451562] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e4
[   50.452611] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   50.453781] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   50.454877] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   50.455567] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   50.456469] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   50.457327] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   50.458612] head: 0bfffe0000000002 ffffc1ffc319b901 ffffffffffffffff 0000000000000000
[   50.459571] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   50.460622] page dumped because: kasan: bad access detected
[   50.461365] 
[   50.462097] Memory state around the buggy address:
[   50.462924]  fff00000c66e3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   50.463759]  fff00000c66e3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   50.464569] >fff00000c66e4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   50.465828]                    ^
[   50.466269]  fff00000c66e4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   50.467163]  fff00000c66e4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   50.468032] ==================================================================
[   50.476842] ==================================================================
[   50.478482] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   50.479846] Free of addr fff00000c6614000 by task kunit_try_catch/228
[   50.481333] 
[   50.482277] CPU: 1 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   50.483886] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.484609] Hardware name: linux,dummy-virt (DT)
[   50.485505] Call trace:
[   50.486116]  show_stack+0x20/0x38 (C)
[   50.486827]  dump_stack_lvl+0x8c/0xd0
[   50.487129]  print_report+0x118/0x5e0
[   50.487518]  kasan_report_invalid_free+0xb0/0xd8
[   50.488250]  __kasan_mempool_poison_pages+0xe0/0xe8
[   50.489074]  mempool_free+0x24c/0x328
[   50.489933]  mempool_double_free_helper+0x150/0x2e0
[   50.490717]  mempool_page_alloc_double_free+0xb4/0x110
[   50.491579]  kunit_try_run_case+0x14c/0x3d0
[   50.492284]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.493109]  kthread+0x24c/0x2d0
[   50.493652]  ret_from_fork+0x10/0x20
[   50.494526] 
[   50.495077] The buggy address belongs to the physical page:
[   50.495855] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106614
[   50.496746] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.497911] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   50.499523] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   50.500632] page dumped because: kasan: bad access detected
[   50.501348] 
[   50.502023] Memory state around the buggy address:
[   50.502599]  fff00000c6613f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   50.503741]  fff00000c6613f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   50.504676] >fff00000c6614000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   50.506011]                    ^
[   50.506556]  fff00000c6614080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   50.507439]  fff00000c6614100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   50.508273] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[   50.218410] ==================================================================
[   50.219617] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   50.220370] Read of size 1 at addr fff00000c66e0000 by task kunit_try_catch/218
[   50.221308] 
[   50.222233] CPU: 0 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   50.223423] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.223972] Hardware name: linux,dummy-virt (DT)
[   50.224771] Call trace:
[   50.225217]  show_stack+0x20/0x38 (C)
[   50.225771]  dump_stack_lvl+0x8c/0xd0
[   50.226700]  print_report+0x118/0x5e0
[   50.227399]  kasan_report+0xc8/0x118
[   50.227962]  __asan_report_load1_noabort+0x20/0x30
[   50.228825]  mempool_uaf_helper+0x314/0x340
[   50.229903]  mempool_kmalloc_large_uaf+0xbc/0x118
[   50.230577]  kunit_try_run_case+0x14c/0x3d0
[   50.231170]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.232003]  kthread+0x24c/0x2d0
[   50.232546]  ret_from_fork+0x10/0x20
[   50.233509] 
[   50.233795] The buggy address belongs to the physical page:
[   50.234432] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e0
[   50.235401] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   50.236281] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   50.237331] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   50.238211] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   50.239440] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   50.240387] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   50.241758] head: 0bfffe0000000002 ffffc1ffc319b801 ffffffffffffffff 0000000000000000
[   50.242555] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   50.243417] page dumped because: kasan: bad access detected
[   50.244203] 
[   50.244621] Memory state around the buggy address:
[   50.245709]  fff00000c66dff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   50.246591]  fff00000c66dff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   50.247515] >fff00000c66e0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   50.248468]                    ^
[   50.248950]  fff00000c66e0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   50.250069]  fff00000c66e0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   50.251127] ==================================================================
[   50.332202] ==================================================================
[   50.333572] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   50.335484] Read of size 1 at addr fff00000c66e4000 by task kunit_try_catch/222
[   50.336901] 
[   50.337682] CPU: 0 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   50.338870] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.339602] Hardware name: linux,dummy-virt (DT)
[   50.340252] Call trace:
[   50.340715]  show_stack+0x20/0x38 (C)
[   50.342129]  dump_stack_lvl+0x8c/0xd0
[   50.342667]  print_report+0x118/0x5e0
[   50.343168]  kasan_report+0xc8/0x118
[   50.343976]  __asan_report_load1_noabort+0x20/0x30
[   50.344598]  mempool_uaf_helper+0x314/0x340
[   50.345208]  mempool_page_alloc_uaf+0xb8/0x118
[   50.346269]  kunit_try_run_case+0x14c/0x3d0
[   50.347119]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.347733]  kthread+0x24c/0x2d0
[   50.348361]  ret_from_fork+0x10/0x20
[   50.349011] 
[   50.349453] The buggy address belongs to the physical page:
[   50.350888] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e4
[   50.352058] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.352956] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   50.354190] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   50.355106] page dumped because: kasan: bad access detected
[   50.355856] 
[   50.356185] Memory state around the buggy address:
[   50.356834]  fff00000c66e3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   50.358110]  fff00000c66e3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   50.359128] >fff00000c66e4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   50.359895]                    ^
[   50.360611]  fff00000c66e4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   50.361794]  fff00000c66e4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   50.362662] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[   50.263976] ==================================================================
[   50.265713] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   50.266914] Read of size 1 at addr fff00000c6157240 by task kunit_try_catch/220
[   50.268121] 
[   50.268427] CPU: 1 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   50.270190] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.270955] Hardware name: linux,dummy-virt (DT)
[   50.271764] Call trace:
[   50.272178]  show_stack+0x20/0x38 (C)
[   50.272759]  dump_stack_lvl+0x8c/0xd0
[   50.273755]  print_report+0x118/0x5e0
[   50.274341]  kasan_report+0xc8/0x118
[   50.274809]  __asan_report_load1_noabort+0x20/0x30
[   50.275487]  mempool_uaf_helper+0x314/0x340
[   50.276089]  mempool_slab_uaf+0xb8/0x110
[   50.276573]  kunit_try_run_case+0x14c/0x3d0
[   50.277242]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.277976]  kthread+0x24c/0x2d0
[   50.278904]  ret_from_fork+0x10/0x20
[   50.279423] 
[   50.279760] Allocated by task 220:
[   50.280270]  kasan_save_stack+0x3c/0x68
[   50.280924]  kasan_save_track+0x20/0x40
[   50.282471]  kasan_save_alloc_info+0x40/0x58
[   50.283215]  __kasan_mempool_unpoison_object+0xbc/0x180
[   50.283876]  remove_element+0x16c/0x1f8
[   50.284721]  mempool_alloc_preallocated+0x58/0xc0
[   50.285330]  mempool_uaf_helper+0xa4/0x340
[   50.285921]  mempool_slab_uaf+0xb8/0x110
[   50.286425]  kunit_try_run_case+0x14c/0x3d0
[   50.287329]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.288138]  kthread+0x24c/0x2d0
[   50.288778]  ret_from_fork+0x10/0x20
[   50.289646] 
[   50.289997] Freed by task 220:
[   50.290629]  kasan_save_stack+0x3c/0x68
[   50.291316]  kasan_save_track+0x20/0x40
[   50.291888]  kasan_save_free_info+0x4c/0x78
[   50.292525]  __kasan_mempool_poison_object+0xc0/0x150
[   50.293231]  mempool_free+0x28c/0x328
[   50.294141]  mempool_uaf_helper+0x104/0x340
[   50.294863]  mempool_slab_uaf+0xb8/0x110
[   50.295618]  kunit_try_run_case+0x14c/0x3d0
[   50.296405]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.297138]  kthread+0x24c/0x2d0
[   50.297711]  ret_from_fork+0x10/0x20
[   50.298318] 
[   50.298744] The buggy address belongs to the object at fff00000c6157240
[   50.298744]  which belongs to the cache test_cache of size 123
[   50.300186] The buggy address is located 0 bytes inside of
[   50.300186]  freed 123-byte region [fff00000c6157240, fff00000c61572bb)
[   50.301517] 
[   50.301846] The buggy address belongs to the physical page:
[   50.302520] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106157
[   50.303534] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.304587] page_type: f5(slab)
[   50.305699] raw: 0bfffe0000000000 fff00000c6181500 dead000000000122 0000000000000000
[   50.307062] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000
[   50.307903] page dumped because: kasan: bad access detected
[   50.308560] 
[   50.308928] Memory state around the buggy address:
[   50.309988]  fff00000c6157100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.310999]  fff00000c6157180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   50.311982] >fff00000c6157200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   50.312853]                                            ^
[   50.313760]  fff00000c6157280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.314675]  fff00000c6157300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.315532] ==================================================================
[   50.154619] ==================================================================
[   50.155759] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   50.156549] Read of size 1 at addr fff00000c610ac00 by task kunit_try_catch/216
[   50.157652] 
[   50.158054] CPU: 0 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   50.159176] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.159772] Hardware name: linux,dummy-virt (DT)
[   50.160462] Call trace:
[   50.160854]  show_stack+0x20/0x38 (C)
[   50.161694]  dump_stack_lvl+0x8c/0xd0
[   50.162321]  print_report+0x118/0x5e0
[   50.162815]  kasan_report+0xc8/0x118
[   50.163572]  __asan_report_load1_noabort+0x20/0x30
[   50.164202]  mempool_uaf_helper+0x314/0x340
[   50.164817]  mempool_kmalloc_uaf+0xbc/0x118
[   50.165844]  kunit_try_run_case+0x14c/0x3d0
[   50.167042]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.167806]  kthread+0x24c/0x2d0
[   50.168361]  ret_from_fork+0x10/0x20
[   50.169216] 
[   50.169717] Allocated by task 216:
[   50.170175]  kasan_save_stack+0x3c/0x68
[   50.170743]  kasan_save_track+0x20/0x40
[   50.171382]  kasan_save_alloc_info+0x40/0x58
[   50.171998]  __kasan_mempool_unpoison_object+0x11c/0x180
[   50.172793]  remove_element+0x130/0x1f8
[   50.173692]  mempool_alloc_preallocated+0x58/0xc0
[   50.174631]  mempool_uaf_helper+0xa4/0x340
[   50.175184]  mempool_kmalloc_uaf+0xbc/0x118
[   50.175964]  kunit_try_run_case+0x14c/0x3d0
[   50.176492]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.177408]  kthread+0x24c/0x2d0
[   50.178274]  ret_from_fork+0x10/0x20
[   50.179096] 
[   50.179386] Freed by task 216:
[   50.179854]  kasan_save_stack+0x3c/0x68
[   50.180607]  kasan_save_track+0x20/0x40
[   50.181527]  kasan_save_free_info+0x4c/0x78
[   50.182326]  __kasan_mempool_poison_object+0xc0/0x150
[   50.183259]  mempool_free+0x28c/0x328
[   50.183947]  mempool_uaf_helper+0x104/0x340
[   50.184645]  mempool_kmalloc_uaf+0xbc/0x118
[   50.185803]  kunit_try_run_case+0x14c/0x3d0
[   50.186404]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.187268]  kthread+0x24c/0x2d0
[   50.187915]  ret_from_fork+0x10/0x20
[   50.188538] 
[   50.188886] The buggy address belongs to the object at fff00000c610ac00
[   50.188886]  which belongs to the cache kmalloc-128 of size 128
[   50.191063] The buggy address is located 0 bytes inside of
[   50.191063]  freed 128-byte region [fff00000c610ac00, fff00000c610ac80)
[   50.192795] 
[   50.193147] The buggy address belongs to the physical page:
[   50.194361] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10610a
[   50.195376] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.196270] page_type: f5(slab)
[   50.196840] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   50.198092] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   50.199534] page dumped because: kasan: bad access detected
[   50.200307] 
[   50.200643] Memory state around the buggy address:
[   50.201542]  fff00000c610ab00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   50.202737]  fff00000c610ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.203715] >fff00000c610ac00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   50.204634]                    ^
[   50.205655]  fff00000c610ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.206711]  fff00000c610ad00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   50.207844] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[   50.046806] ==================================================================
[   50.048271] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   50.049471] Read of size 1 at addr fff00000c6612001 by task kunit_try_catch/212
[   50.050724] 
[   50.051114] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   50.052181] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.052718] Hardware name: linux,dummy-virt (DT)
[   50.053412] Call trace:
[   50.053780]  show_stack+0x20/0x38 (C)
[   50.054340]  dump_stack_lvl+0x8c/0xd0
[   50.054913]  print_report+0x118/0x5e0
[   50.055483]  kasan_report+0xc8/0x118
[   50.056059]  __asan_report_load1_noabort+0x20/0x30
[   50.056916]  mempool_oob_right_helper+0x2ac/0x2f0
[   50.057951]  mempool_kmalloc_large_oob_right+0xbc/0x118
[   50.058825]  kunit_try_run_case+0x14c/0x3d0
[   50.059438]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.059805]  kthread+0x24c/0x2d0
[   50.060094]  ret_from_fork+0x10/0x20
[   50.060750] 
[   50.061687] The buggy address belongs to the physical page:
[   50.062493] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106610
[   50.063535] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   50.064419] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   50.065786] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   50.066718] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   50.067640] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   50.068543] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   50.069590] head: 0bfffe0000000002 ffffc1ffc3198401 ffffffffffffffff 0000000000000000
[   50.070903] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   50.071792] page dumped because: kasan: bad access detected
[   50.072495] 
[   50.072797] Memory state around the buggy address:
[   50.073641]  fff00000c6611f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   50.074838]  fff00000c6611f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   50.075981] >fff00000c6612000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   50.076896]                    ^
[   50.077690]  fff00000c6612080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   50.078646]  fff00000c6612100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   50.079617] ==================================================================
[   50.091971] ==================================================================
[   50.093558] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   50.094766] Read of size 1 at addr fff00000c61042bb by task kunit_try_catch/214
[   50.095565] 
[   50.096053] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   50.097499] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.098020] Hardware name: linux,dummy-virt (DT)
[   50.098659] Call trace:
[   50.099072]  show_stack+0x20/0x38 (C)
[   50.099637]  dump_stack_lvl+0x8c/0xd0
[   50.100354]  print_report+0x118/0x5e0
[   50.101001]  kasan_report+0xc8/0x118
[   50.101903]  __asan_report_load1_noabort+0x20/0x30
[   50.102539]  mempool_oob_right_helper+0x2ac/0x2f0
[   50.103422]  mempool_slab_oob_right+0xb8/0x110
[   50.104088]  kunit_try_run_case+0x14c/0x3d0
[   50.104705]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.105628]  kthread+0x24c/0x2d0
[   50.106341]  ret_from_fork+0x10/0x20
[   50.106865] 
[   50.107218] Allocated by task 214:
[   50.107717]  kasan_save_stack+0x3c/0x68
[   50.108232]  kasan_save_track+0x20/0x40
[   50.109008]  kasan_save_alloc_info+0x40/0x58
[   50.109558]  __kasan_mempool_unpoison_object+0xbc/0x180
[   50.110271]  remove_element+0x16c/0x1f8
[   50.111075]  mempool_alloc_preallocated+0x58/0xc0
[   50.111615]  mempool_oob_right_helper+0x98/0x2f0
[   50.112234]  mempool_slab_oob_right+0xb8/0x110
[   50.112765]  kunit_try_run_case+0x14c/0x3d0
[   50.113472]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.115972]  kthread+0x24c/0x2d0
[   50.116407]  ret_from_fork+0x10/0x20
[   50.116794] 
[   50.117038] The buggy address belongs to the object at fff00000c6104240
[   50.117038]  which belongs to the cache test_cache of size 123
[   50.118700] The buggy address is located 0 bytes to the right of
[   50.118700]  allocated 123-byte region [fff00000c6104240, fff00000c61042bb)
[   50.120181] 
[   50.120601] The buggy address belongs to the physical page:
[   50.121835] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106104
[   50.122926] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.123781] page_type: f5(slab)
[   50.124407] raw: 0bfffe0000000000 fff00000c61813c0 dead000000000122 0000000000000000
[   50.125849] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000
[   50.127063] page dumped because: kasan: bad access detected
[   50.127978] 
[   50.128540] Memory state around the buggy address:
[   50.129380]  fff00000c6104180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   50.130421]  fff00000c6104200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   50.131266] >fff00000c6104280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   50.132233]                                         ^
[   50.132907]  fff00000c6104300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.134023]  fff00000c6104380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.134825] ==================================================================
[   49.990594] ==================================================================
[   49.991713] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   49.992492] Read of size 1 at addr fff00000c610a573 by task kunit_try_catch/210
[   49.993813] 
[   49.994167] CPU: 0 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   49.995261] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.996725] Hardware name: linux,dummy-virt (DT)
[   49.997483] Call trace:
[   49.998009]  show_stack+0x20/0x38 (C)
[   49.998567]  dump_stack_lvl+0x8c/0xd0
[   49.999276]  print_report+0x118/0x5e0
[   49.999813]  kasan_report+0xc8/0x118
[   50.000505]  __asan_report_load1_noabort+0x20/0x30
[   50.001264]  mempool_oob_right_helper+0x2ac/0x2f0
[   50.001856]  mempool_kmalloc_oob_right+0xbc/0x118
[   50.003340]  kunit_try_run_case+0x14c/0x3d0
[   50.004157]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.004949]  kthread+0x24c/0x2d0
[   50.005847]  ret_from_fork+0x10/0x20
[   50.006518] 
[   50.006974] Allocated by task 210:
[   50.007543]  kasan_save_stack+0x3c/0x68
[   50.008152]  kasan_save_track+0x20/0x40
[   50.008721]  kasan_save_alloc_info+0x40/0x58
[   50.009618]  __kasan_mempool_unpoison_object+0x11c/0x180
[   50.010466]  remove_element+0x130/0x1f8
[   50.011207]  mempool_alloc_preallocated+0x58/0xc0
[   50.012000]  mempool_oob_right_helper+0x98/0x2f0
[   50.012804]  mempool_kmalloc_oob_right+0xbc/0x118
[   50.013958]  kunit_try_run_case+0x14c/0x3d0
[   50.015272]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.015995]  kthread+0x24c/0x2d0
[   50.016540]  ret_from_fork+0x10/0x20
[   50.017343] 
[   50.017841] The buggy address belongs to the object at fff00000c610a500
[   50.017841]  which belongs to the cache kmalloc-128 of size 128
[   50.019366] The buggy address is located 0 bytes to the right of
[   50.019366]  allocated 115-byte region [fff00000c610a500, fff00000c610a573)
[   50.020931] 
[   50.021827] The buggy address belongs to the physical page:
[   50.022700] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10610a
[   50.024363] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.025430] page_type: f5(slab)
[   50.025977] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   50.026965] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   50.027913] page dumped because: kasan: bad access detected
[   50.028834] 
[   50.029232] Memory state around the buggy address:
[   50.029930]  fff00000c610a400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   50.030847]  fff00000c610a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.031733] >fff00000c610a500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   50.033359]                                                              ^
[   50.034585]  fff00000c610a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.035733]  fff00000c610a600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   50.036636] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[   49.371259] ==================================================================
[   49.372588] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x17c/0x2f8
[   49.373470] Read of size 1 at addr fff00000c571d780 by task kunit_try_catch/204
[   49.375056] 
[   49.375505] CPU: 0 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   49.376650] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.377466] Hardware name: linux,dummy-virt (DT)
[   49.378406] Call trace:
[   49.378748]  show_stack+0x20/0x38 (C)
[   49.379227]  dump_stack_lvl+0x8c/0xd0
[   49.380280]  print_report+0x118/0x5e0
[   49.380770]  kasan_report+0xc8/0x118
[   49.381310]  __kasan_check_byte+0x54/0x70
[   49.382201]  kmem_cache_destroy+0x34/0x218
[   49.382784]  kmem_cache_double_destroy+0x17c/0x2f8
[   49.383507]  kunit_try_run_case+0x14c/0x3d0
[   49.384140]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.384872]  kthread+0x24c/0x2d0
[   49.385538]  ret_from_fork+0x10/0x20
[   49.386123] 
[   49.386501] Allocated by task 204:
[   49.386969]  kasan_save_stack+0x3c/0x68
[   49.388284]  kasan_save_track+0x20/0x40
[   49.388801]  kasan_save_alloc_info+0x40/0x58
[   49.389808]  __kasan_slab_alloc+0xa8/0xb0
[   49.390398]  kmem_cache_alloc_noprof+0x108/0x398
[   49.390986]  __kmem_cache_create_args+0x18c/0x2b0
[   49.391616]  kmem_cache_double_destroy+0xc8/0x2f8
[   49.392247]  kunit_try_run_case+0x14c/0x3d0
[   49.392898]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.393947]  kthread+0x24c/0x2d0
[   49.394561]  ret_from_fork+0x10/0x20
[   49.395370] 
[   49.395702] Freed by task 204:
[   49.396144]  kasan_save_stack+0x3c/0x68
[   49.396760]  kasan_save_track+0x20/0x40
[   49.397476]  kasan_save_free_info+0x4c/0x78
[   49.398086]  __kasan_slab_free+0x6c/0x98
[   49.398918]  kmem_cache_free+0x118/0x470
[   49.399683]  slab_kmem_cache_release+0x38/0x50
[   49.400389]  kmem_cache_release+0x1c/0x30
[   49.400927]  kobject_put+0x17c/0x430
[   49.401482]  sysfs_slab_release+0x1c/0x30
[   49.402246]  kmem_cache_destroy+0x118/0x218
[   49.403601]  kmem_cache_double_destroy+0x130/0x2f8
[   49.404231]  kunit_try_run_case+0x14c/0x3d0
[   49.404978]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.406100]  kthread+0x24c/0x2d0
[   49.406855]  ret_from_fork+0x10/0x20
[   49.407336] 
[   49.407654] The buggy address belongs to the object at fff00000c571d780
[   49.407654]  which belongs to the cache kmem_cache of size 208
[   49.408791] The buggy address is located 0 bytes inside of
[   49.408791]  freed 208-byte region [fff00000c571d780, fff00000c571d850)
[   49.410993] 
[   49.411402] The buggy address belongs to the physical page:
[   49.412241] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10571d
[   49.413363] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.414439] page_type: f5(slab)
[   49.415001] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000
[   49.416067] raw: 0000000000000000 00000000800c000c 00000001f5000000 0000000000000000
[   49.417161] page dumped because: kasan: bad access detected
[   49.418483] 
[   49.418758] Memory state around the buggy address:
[   49.419368]  fff00000c571d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   49.420367]  fff00000c571d700: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.421821] >fff00000c571d780: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   49.422794]                    ^
[   49.423405]  fff00000c571d800: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   49.424370]  fff00000c571d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.425558] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[   49.262595] ==================================================================
[   49.263822] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x390/0x468
[   49.264484] Read of size 1 at addr fff00000c6176000 by task kunit_try_catch/202
[   49.265396] 
[   49.265769] CPU: 0 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   49.266964] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.267582] Hardware name: linux,dummy-virt (DT)
[   49.268197] Call trace:
[   49.268576]  show_stack+0x20/0x38 (C)
[   49.269237]  dump_stack_lvl+0x8c/0xd0
[   49.269730]  print_report+0x118/0x5e0
[   49.270388]  kasan_report+0xc8/0x118
[   49.270923]  __asan_report_load1_noabort+0x20/0x30
[   49.271656]  kmem_cache_rcu_uaf+0x390/0x468
[   49.272308]  kunit_try_run_case+0x14c/0x3d0
[   49.272861]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.273707]  kthread+0x24c/0x2d0
[   49.274325]  ret_from_fork+0x10/0x20
[   49.274925] 
[   49.275231] Allocated by task 202:
[   49.275836]  kasan_save_stack+0x3c/0x68
[   49.276369]  kasan_save_track+0x20/0x40
[   49.276955]  kasan_save_alloc_info+0x40/0x58
[   49.277588]  __kasan_slab_alloc+0xa8/0xb0
[   49.278141]  kmem_cache_alloc_noprof+0x108/0x398
[   49.278786]  kmem_cache_rcu_uaf+0x12c/0x468
[   49.279362]  kunit_try_run_case+0x14c/0x3d0
[   49.279950]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.280720]  kthread+0x24c/0x2d0
[   49.281203]  ret_from_fork+0x10/0x20
[   49.281837] 
[   49.282164] Freed by task 0:
[   49.282650]  kasan_save_stack+0x3c/0x68
[   49.283315]  kasan_save_track+0x20/0x40
[   49.283836]  kasan_save_free_info+0x4c/0x78
[   49.284367]  __kasan_slab_free+0x6c/0x98
[   49.284993]  slab_free_after_rcu_debug+0xd4/0x2f8
[   49.285756]  rcu_core+0x9f4/0x1e20
[   49.286360]  rcu_core_si+0x18/0x30
[   49.286900]  handle_softirqs+0x374/0xb20
[   49.287451]  __do_softirq+0x1c/0x28
[   49.287987] 
[   49.288331] Last potentially related work creation:
[   49.289027]  kasan_save_stack+0x3c/0x68
[   49.289575]  __kasan_record_aux_stack+0xbc/0xe8
[   49.290426]  kasan_record_aux_stack_noalloc+0x14/0x20
[   49.290968]  kmem_cache_free+0x28c/0x470
[   49.291696]  kmem_cache_rcu_uaf+0x16c/0x468
[   49.292272]  kunit_try_run_case+0x14c/0x3d0
[   49.292883]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.293532]  kthread+0x24c/0x2d0
[   49.294190]  ret_from_fork+0x10/0x20
[   49.294719] 
[   49.295076] The buggy address belongs to the object at fff00000c6176000
[   49.295076]  which belongs to the cache test_cache of size 200
[   49.296480] The buggy address is located 0 bytes inside of
[   49.296480]  freed 200-byte region [fff00000c6176000, fff00000c61760c8)
[   49.297772] 
[   49.298106] The buggy address belongs to the physical page:
[   49.298896] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106176
[   49.299908] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.300728] page_type: f5(slab)
[   49.301255] raw: 0bfffe0000000000 fff00000c6181280 dead000000000122 0000000000000000
[   49.302170] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000
[   49.303055] page dumped because: kasan: bad access detected
[   49.303812] 
[   49.304124] Memory state around the buggy address:
[   49.304701]  fff00000c6175f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   49.305604]  fff00000c6175f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   49.306452] >fff00000c6176000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   49.307249]                    ^
[   49.307805]  fff00000c6176080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   49.308631]  fff00000c6176100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.309497] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   49.123569] ==================================================================
[   49.124758] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3b8
[   49.125452] Free of addr fff00000c617a001 by task kunit_try_catch/200
[   49.126996] 
[   49.127317] CPU: 1 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   49.128723] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.129422] Hardware name: linux,dummy-virt (DT)
[   49.130032] Call trace:
[   49.130775]  show_stack+0x20/0x38 (C)
[   49.131384]  dump_stack_lvl+0x8c/0xd0
[   49.132095]  print_report+0x118/0x5e0
[   49.132626]  kasan_report_invalid_free+0xb0/0xd8
[   49.133473]  check_slab_allocation+0xfc/0x108
[   49.134268]  __kasan_slab_pre_free+0x2c/0x48
[   49.134819]  kmem_cache_free+0xf0/0x470
[   49.135457]  kmem_cache_invalid_free+0x184/0x3b8
[   49.136076]  kunit_try_run_case+0x14c/0x3d0
[   49.136802]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.137785]  kthread+0x24c/0x2d0
[   49.138317]  ret_from_fork+0x10/0x20
[   49.138934] 
[   49.139205] Allocated by task 200:
[   49.139928]  kasan_save_stack+0x3c/0x68
[   49.140491]  kasan_save_track+0x20/0x40
[   49.141514]  kasan_save_alloc_info+0x40/0x58
[   49.142132]  __kasan_slab_alloc+0xa8/0xb0
[   49.142767]  kmem_cache_alloc_noprof+0x108/0x398
[   49.143404]  kmem_cache_invalid_free+0x12c/0x3b8
[   49.144083]  kunit_try_run_case+0x14c/0x3d0
[   49.144770]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.145807]  kthread+0x24c/0x2d0
[   49.146394]  ret_from_fork+0x10/0x20
[   49.147094] 
[   49.147398] The buggy address belongs to the object at fff00000c617a000
[   49.147398]  which belongs to the cache test_cache of size 200
[   49.148799] The buggy address is located 1 bytes inside of
[   49.148799]  200-byte region [fff00000c617a000, fff00000c617a0c8)
[   49.150358] 
[   49.150696] The buggy address belongs to the physical page:
[   49.151397] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10617a
[   49.152382] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.154015] page_type: f5(slab)
[   49.154440] raw: 0bfffe0000000000 fff00000c6181140 dead000000000122 0000000000000000
[   49.155495] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000
[   49.156285] page dumped because: kasan: bad access detected
[   49.157028] 
[   49.157328] Memory state around the buggy address:
[   49.158899]  fff00000c6179f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   49.159754]  fff00000c6179f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   49.160591] >fff00000c617a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   49.161779]                    ^
[   49.162166]  fff00000c617a080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   49.162965]  fff00000c617a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.163902] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   49.043860] ==================================================================
[   49.045369] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   49.047393] Free of addr fff00000c617b000 by task kunit_try_catch/198
[   49.048143] 
[   49.048486] CPU: 1 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   49.049811] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.050369] Hardware name: linux,dummy-virt (DT)
[   49.051135] Call trace:
[   49.051617]  show_stack+0x20/0x38 (C)
[   49.052167]  dump_stack_lvl+0x8c/0xd0
[   49.052744]  print_report+0x118/0x5e0
[   49.053481]  kasan_report_invalid_free+0xb0/0xd8
[   49.054822]  check_slab_allocation+0xd4/0x108
[   49.055446]  __kasan_slab_pre_free+0x2c/0x48
[   49.055981]  kmem_cache_free+0xf0/0x470
[   49.056622]  kmem_cache_double_free+0x190/0x3c8
[   49.058103]  kunit_try_run_case+0x14c/0x3d0
[   49.058770]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.059504]  kthread+0x24c/0x2d0
[   49.060139]  ret_from_fork+0x10/0x20
[   49.060678] 
[   49.061037] Allocated by task 198:
[   49.061520]  kasan_save_stack+0x3c/0x68
[   49.062012]  kasan_save_track+0x20/0x40
[   49.063347]  kasan_save_alloc_info+0x40/0x58
[   49.063863]  __kasan_slab_alloc+0xa8/0xb0
[   49.065033]  kmem_cache_alloc_noprof+0x108/0x398
[   49.065521]  kmem_cache_double_free+0x12c/0x3c8
[   49.065940]  kunit_try_run_case+0x14c/0x3d0
[   49.067449]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.069640]  kthread+0x24c/0x2d0
[   49.070851]  ret_from_fork+0x10/0x20
[   49.072845] 
[   49.073616] Freed by task 198:
[   49.073945]  kasan_save_stack+0x3c/0x68
[   49.075331]  kasan_save_track+0x20/0x40
[   49.075751]  kasan_save_free_info+0x4c/0x78
[   49.076163]  __kasan_slab_free+0x6c/0x98
[   49.076587]  kmem_cache_free+0x118/0x470
[   49.076983]  kmem_cache_double_free+0x140/0x3c8
[   49.079272]  kunit_try_run_case+0x14c/0x3d0
[   49.080820]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.082040]  kthread+0x24c/0x2d0
[   49.082833]  ret_from_fork+0x10/0x20
[   49.083230] 
[   49.083952] The buggy address belongs to the object at fff00000c617b000
[   49.083952]  which belongs to the cache test_cache of size 200
[   49.085832] The buggy address is located 0 bytes inside of
[   49.085832]  200-byte region [fff00000c617b000, fff00000c617b0c8)
[   49.087217] 
[   49.087604] The buggy address belongs to the physical page:
[   49.088230] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10617b
[   49.089776] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.091126] page_type: f5(slab)
[   49.091667] raw: 0bfffe0000000000 fff00000c6181000 dead000000000122 0000000000000000
[   49.092772] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000
[   49.093821] page dumped because: kasan: bad access detected
[   49.094155] 
[   49.094353] Memory state around the buggy address:
[   49.095581]  fff00000c617af00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   49.096671]  fff00000c617af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   49.097623] >fff00000c617b000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   49.099644]                    ^
[   49.100230]  fff00000c617b080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   49.101283]  fff00000c617b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.102598] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   48.959030] ==================================================================
[   48.960223] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x33c/0x428
[   48.960988] Read of size 1 at addr fff00000c610a0c8 by task kunit_try_catch/196
[   48.962969] 
[   48.963511] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   48.964625] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.965162] Hardware name: linux,dummy-virt (DT)
[   48.966053] Call trace:
[   48.966508]  show_stack+0x20/0x38 (C)
[   48.967122]  dump_stack_lvl+0x8c/0xd0
[   48.967599]  print_report+0x118/0x5e0
[   48.968225]  kasan_report+0xc8/0x118
[   48.968765]  __asan_report_load1_noabort+0x20/0x30
[   48.969886]  kmem_cache_oob+0x33c/0x428
[   48.970755]  kunit_try_run_case+0x14c/0x3d0
[   48.971373]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.972107]  kthread+0x24c/0x2d0
[   48.972834]  ret_from_fork+0x10/0x20
[   48.973638] 
[   48.974049] Allocated by task 196:
[   48.974580]  kasan_save_stack+0x3c/0x68
[   48.975148]  kasan_save_track+0x20/0x40
[   48.975694]  kasan_save_alloc_info+0x40/0x58
[   48.976482]  __kasan_slab_alloc+0xa8/0xb0
[   48.977003]  kmem_cache_alloc_noprof+0x108/0x398
[   48.978110]  kmem_cache_oob+0x12c/0x428
[   48.978866]  kunit_try_run_case+0x14c/0x3d0
[   48.979797]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.980613]  kthread+0x24c/0x2d0
[   48.981248]  ret_from_fork+0x10/0x20
[   48.982128] 
[   48.982556] The buggy address belongs to the object at fff00000c610a000
[   48.982556]  which belongs to the cache test_cache of size 200
[   48.984039] The buggy address is located 0 bytes to the right of
[   48.984039]  allocated 200-byte region [fff00000c610a000, fff00000c610a0c8)
[   48.985977] 
[   48.986804] The buggy address belongs to the physical page:
[   48.987598] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10610a
[   48.988571] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.989660] page_type: f5(slab)
[   48.990481] raw: 0bfffe0000000000 fff00000c1bf5dc0 dead000000000122 0000000000000000
[   48.991420] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000
[   48.992401] page dumped because: kasan: bad access detected
[   48.993284] 
[   48.994134] Memory state around the buggy address:
[   48.994813]  fff00000c6109f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   48.995722]  fff00000c610a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   48.996668] >fff00000c610a080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   48.997898]                                               ^
[   48.998508]  fff00000c610a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.999422]  fff00000c610a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.000223] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[   48.874754] ==================================================================
[   48.875819] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   48.876503] Read of size 8 at addr fff00000c615ddc0 by task kunit_try_catch/189
[   48.877470] 
[   48.877940] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   48.879127] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.879927] Hardware name: linux,dummy-virt (DT)
[   48.881365] Call trace:
[   48.882142]  show_stack+0x20/0x38 (C)
[   48.882860]  dump_stack_lvl+0x8c/0xd0
[   48.883609]  print_report+0x118/0x5e0
[   48.884209]  kasan_report+0xc8/0x118
[   48.884845]  __asan_report_load8_noabort+0x20/0x30
[   48.885919]  workqueue_uaf+0x480/0x4a8
[   48.886448]  kunit_try_run_case+0x14c/0x3d0
[   48.887084]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.887841]  kthread+0x24c/0x2d0
[   48.888589]  ret_from_fork+0x10/0x20
[   48.889348] 
[   48.889637] Allocated by task 189:
[   48.890260]  kasan_save_stack+0x3c/0x68
[   48.891632]  kasan_save_track+0x20/0x40
[   48.892186]  kasan_save_alloc_info+0x40/0x58
[   48.893077]  __kasan_kmalloc+0xd4/0xd8
[   48.893794]  __kmalloc_cache_noprof+0x15c/0x3c0
[   48.894618]  workqueue_uaf+0x13c/0x4a8
[   48.895208]  kunit_try_run_case+0x14c/0x3d0
[   48.895865]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.896692]  kthread+0x24c/0x2d0
[   48.897506]  ret_from_fork+0x10/0x20
[   48.897918] 
[   48.898231] Freed by task 31:
[   48.898988]  kasan_save_stack+0x3c/0x68
[   48.899681]  kasan_save_track+0x20/0x40
[   48.899972]  kasan_save_free_info+0x4c/0x78
[   48.900264]  __kasan_slab_free+0x6c/0x98
[   48.901023]  kfree+0x114/0x3c8
[   48.902099]  workqueue_uaf_work+0x18/0x30
[   48.902765]  process_one_work+0x530/0xf98
[   48.903390]  worker_thread+0x614/0xf28
[   48.904103]  kthread+0x24c/0x2d0
[   48.904711]  ret_from_fork+0x10/0x20
[   48.905355] 
[   48.905983] Last potentially related work creation:
[   48.906688]  kasan_save_stack+0x3c/0x68
[   48.907142]  __kasan_record_aux_stack+0xbc/0xe8
[   48.907808]  kasan_record_aux_stack_noalloc+0x14/0x20
[   48.908687]  __queue_work+0x65c/0xfd8
[   48.909181]  queue_work_on+0xbc/0xf8
[   48.910188]  workqueue_uaf+0x210/0x4a8
[   48.910842]  kunit_try_run_case+0x14c/0x3d0
[   48.911440]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.912021]  kthread+0x24c/0x2d0
[   48.912622]  ret_from_fork+0x10/0x20
[   48.913210] 
[   48.913990] The buggy address belongs to the object at fff00000c615ddc0
[   48.913990]  which belongs to the cache kmalloc-32 of size 32
[   48.915284] The buggy address is located 0 bytes inside of
[   48.915284]  freed 32-byte region [fff00000c615ddc0, fff00000c615dde0)
[   48.916713] 
[   48.916996] The buggy address belongs to the physical page:
[   48.917554] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10615d
[   48.919024] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.919932] page_type: f5(slab)
[   48.920645] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   48.921721] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   48.923094] page dumped because: kasan: bad access detected
[   48.923811] 
[   48.924060] Memory state around the buggy address:
[   48.924816]  fff00000c615dc80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   48.926355]  fff00000c615dd00: 00 00 00 fc fc fc fc fc 00 00 03 fc fc fc fc fc
[   48.927257] >fff00000c615dd80: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   48.928046]                                            ^
[   48.928682]  fff00000c615de00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.929981]  fff00000c615de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.931006] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[   48.789753] ==================================================================
[   48.791213] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   48.791929] Read of size 4 at addr fff00000c615dc80 by task swapper/1/0
[   48.792669] 
[   48.792991] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G    B            N 6.12.0-next-20241127 #1
[   48.794855] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.795473] Hardware name: linux,dummy-virt (DT)
[   48.796008] Call trace:
[   48.796425]  show_stack+0x20/0x38 (C)
[   48.796953]  dump_stack_lvl+0x8c/0xd0
[   48.797995]  print_report+0x118/0x5e0
[   48.798704]  kasan_report+0xc8/0x118
[   48.799417]  __asan_report_load4_noabort+0x20/0x30
[   48.800033]  rcu_uaf_reclaim+0x64/0x70
[   48.800616]  rcu_core+0x9f4/0x1e20
[   48.801334]  rcu_core_si+0x18/0x30
[   48.801839]  handle_softirqs+0x374/0xb20
[   48.802477]  __do_softirq+0x1c/0x28
[   48.803051]  ____do_softirq+0x18/0x30
[   48.803569]  call_on_irq_stack+0x24/0x58
[   48.804232]  do_softirq_own_stack+0x24/0x38
[   48.805364]  __irq_exit_rcu+0x1fc/0x318
[   48.805769]  irq_exit_rcu+0x1c/0x80
[   48.806148]  el1_interrupt+0x38/0x58
[   48.806563]  el1h_64_irq_handler+0x18/0x28
[   48.806974]  el1h_64_irq+0x6c/0x70
[   48.808911]  arch_local_irq_enable+0x4/0x8 (P)
[   48.809875]  default_idle_call+0x6c/0x78 (L)
[   48.811392]  do_idle+0x384/0x4e8
[   48.812109]  cpu_startup_entry+0x64/0x80
[   48.812873]  secondary_start_kernel+0x288/0x340
[   48.813649]  __secondary_switched+0xc0/0xc8
[   48.814382] 
[   48.814880] Allocated by task 187:
[   48.815731]  kasan_save_stack+0x3c/0x68
[   48.816285]  kasan_save_track+0x20/0x40
[   48.816990]  kasan_save_alloc_info+0x40/0x58
[   48.817780]  __kasan_kmalloc+0xd4/0xd8
[   48.818428]  __kmalloc_cache_noprof+0x15c/0x3c0
[   48.819273]  rcu_uaf+0xb0/0x2d0
[   48.819967]  kunit_try_run_case+0x14c/0x3d0
[   48.820825]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.821859]  kthread+0x24c/0x2d0
[   48.822537]  ret_from_fork+0x10/0x20
[   48.823194] 
[   48.823545] Freed by task 0:
[   48.823967]  kasan_save_stack+0x3c/0x68
[   48.824561]  kasan_save_track+0x20/0x40
[   48.825526]  kasan_save_free_info+0x4c/0x78
[   48.826159]  __kasan_slab_free+0x6c/0x98
[   48.826877]  kfree+0x114/0x3c8
[   48.827511]  rcu_uaf_reclaim+0x28/0x70
[   48.828166]  rcu_core+0x9f4/0x1e20
[   48.828817]  rcu_core_si+0x18/0x30
[   48.829664]  handle_softirqs+0x374/0xb20
[   48.830508]  __do_softirq+0x1c/0x28
[   48.831015] 
[   48.831348] Last potentially related work creation:
[   48.832180]  kasan_save_stack+0x3c/0x68
[   48.832975]  __kasan_record_aux_stack+0xbc/0xe8
[   48.833975]  kasan_record_aux_stack_noalloc+0x14/0x20
[   48.834838]  __call_rcu_common.constprop.0+0x74/0xa10
[   48.835695]  call_rcu+0x18/0x30
[   48.836178]  rcu_uaf+0x14c/0x2d0
[   48.836908]  kunit_try_run_case+0x14c/0x3d0
[   48.837780]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.838476]  kthread+0x24c/0x2d0
[   48.838985]  ret_from_fork+0x10/0x20
[   48.839580] 
[   48.839896] The buggy address belongs to the object at fff00000c615dc80
[   48.839896]  which belongs to the cache kmalloc-32 of size 32
[   48.841664] The buggy address is located 0 bytes inside of
[   48.841664]  freed 32-byte region [fff00000c615dc80, fff00000c615dca0)
[   48.843202] 
[   48.843497] The buggy address belongs to the physical page:
[   48.844216] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10615d
[   48.845174] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.845970] page_type: f5(slab)
[   48.846569] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   48.847803] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   48.848684] page dumped because: kasan: bad access detected
[   48.849662] 
[   48.849953] Memory state around the buggy address:
[   48.850634]  fff00000c615db80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   48.851517]  fff00000c615dc00: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   48.852453] >fff00000c615dc80: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   48.853216]                    ^
[   48.854419]  fff00000c615dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.855595]  fff00000c615dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.856405] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[   48.668959] ==================================================================
[   48.670242] BUG: KASAN: slab-use-after-free in ksize_uaf+0x59c/0x600
[   48.671150] Read of size 1 at addr fff00000c61b5500 by task kunit_try_catch/185
[   48.671894] 
[   48.672233] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   48.673905] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.674760] Hardware name: linux,dummy-virt (DT)
[   48.675268] Call trace:
[   48.675742]  show_stack+0x20/0x38 (C)
[   48.676387]  dump_stack_lvl+0x8c/0xd0
[   48.676972]  print_report+0x118/0x5e0
[   48.678056]  kasan_report+0xc8/0x118
[   48.678720]  __asan_report_load1_noabort+0x20/0x30
[   48.679441]  ksize_uaf+0x59c/0x600
[   48.680071]  kunit_try_run_case+0x14c/0x3d0
[   48.680675]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.681769]  kthread+0x24c/0x2d0
[   48.682236]  ret_from_fork+0x10/0x20
[   48.683175] 
[   48.683669] Allocated by task 185:
[   48.684370]  kasan_save_stack+0x3c/0x68
[   48.685072]  kasan_save_track+0x20/0x40
[   48.685848]  kasan_save_alloc_info+0x40/0x58
[   48.686449]  __kasan_kmalloc+0xd4/0xd8
[   48.687014]  __kmalloc_cache_noprof+0x15c/0x3c0
[   48.687738]  ksize_uaf+0xb8/0x600
[   48.688347]  kunit_try_run_case+0x14c/0x3d0
[   48.689031]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.690425]  kthread+0x24c/0x2d0
[   48.690984]  ret_from_fork+0x10/0x20
[   48.691599] 
[   48.691887] Freed by task 185:
[   48.692493]  kasan_save_stack+0x3c/0x68
[   48.692950]  kasan_save_track+0x20/0x40
[   48.693882]  kasan_save_free_info+0x4c/0x78
[   48.694428]  __kasan_slab_free+0x6c/0x98
[   48.695072]  kfree+0x114/0x3c8
[   48.695603]  ksize_uaf+0x11c/0x600
[   48.696148]  kunit_try_run_case+0x14c/0x3d0
[   48.696792]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.697964]  kthread+0x24c/0x2d0
[   48.698499]  ret_from_fork+0x10/0x20
[   48.699436] 
[   48.699722] The buggy address belongs to the object at fff00000c61b5500
[   48.699722]  which belongs to the cache kmalloc-128 of size 128
[   48.701053] The buggy address is located 0 bytes inside of
[   48.701053]  freed 128-byte region [fff00000c61b5500, fff00000c61b5580)
[   48.702987] 
[   48.703255] The buggy address belongs to the physical page:
[   48.704068] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b5
[   48.704976] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.705984] page_type: f5(slab)
[   48.706517] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   48.707804] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   48.709049] page dumped because: kasan: bad access detected
[   48.710068] 
[   48.710616] Memory state around the buggy address:
[   48.711230]  fff00000c61b5400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   48.712085]  fff00000c61b5480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.712953] >fff00000c61b5500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   48.714034]                    ^
[   48.714492]  fff00000c61b5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.715994]  fff00000c61b5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.716782] ==================================================================
[   48.718553] ==================================================================
[   48.719276] BUG: KASAN: slab-use-after-free in ksize_uaf+0x548/0x600
[   48.720759] Read of size 1 at addr fff00000c61b5578 by task kunit_try_catch/185
[   48.722051] 
[   48.722533] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   48.724410] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.724912] Hardware name: linux,dummy-virt (DT)
[   48.725988] Call trace:
[   48.726605]  show_stack+0x20/0x38 (C)
[   48.727334]  dump_stack_lvl+0x8c/0xd0
[   48.728094]  print_report+0x118/0x5e0
[   48.728755]  kasan_report+0xc8/0x118
[   48.729409]  __asan_report_load1_noabort+0x20/0x30
[   48.730250]  ksize_uaf+0x548/0x600
[   48.731466]  kunit_try_run_case+0x14c/0x3d0
[   48.732081]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.732785]  kthread+0x24c/0x2d0
[   48.733880]  ret_from_fork+0x10/0x20
[   48.734766] 
[   48.735118] Allocated by task 185:
[   48.735591]  kasan_save_stack+0x3c/0x68
[   48.736108]  kasan_save_track+0x20/0x40
[   48.736661]  kasan_save_alloc_info+0x40/0x58
[   48.737679]  __kasan_kmalloc+0xd4/0xd8
[   48.738191]  __kmalloc_cache_noprof+0x15c/0x3c0
[   48.738863]  ksize_uaf+0xb8/0x600
[   48.739844]  kunit_try_run_case+0x14c/0x3d0
[   48.740470]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.741179]  kthread+0x24c/0x2d0
[   48.741696]  ret_from_fork+0x10/0x20
[   48.742276] 
[   48.742919] Freed by task 185:
[   48.743274]  kasan_save_stack+0x3c/0x68
[   48.743820]  kasan_save_track+0x20/0x40
[   48.744462]  kasan_save_free_info+0x4c/0x78
[   48.745499]  __kasan_slab_free+0x6c/0x98
[   48.745949]  kfree+0x114/0x3c8
[   48.746932]  ksize_uaf+0x11c/0x600
[   48.747509]  kunit_try_run_case+0x14c/0x3d0
[   48.748090]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.748823]  kthread+0x24c/0x2d0
[   48.749930]  ret_from_fork+0x10/0x20
[   48.750466] 
[   48.750823] The buggy address belongs to the object at fff00000c61b5500
[   48.750823]  which belongs to the cache kmalloc-128 of size 128
[   48.752277] The buggy address is located 120 bytes inside of
[   48.752277]  freed 128-byte region [fff00000c61b5500, fff00000c61b5580)
[   48.753343] 
[   48.753629] The buggy address belongs to the physical page:
[   48.754288] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b5
[   48.755233] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.756760] page_type: f5(slab)
[   48.757471] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   48.758474] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   48.759371] page dumped because: kasan: bad access detected
[   48.760202] 
[   48.760735] Memory state around the buggy address:
[   48.761669]  fff00000c61b5400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   48.762771]  fff00000c61b5480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.763643] >fff00000c61b5500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   48.764587]                                                                 ^
[   48.765415]  fff00000c61b5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.766674]  fff00000c61b5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.767454] ==================================================================
[   48.617768] ==================================================================
[   48.619140] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x600
[   48.619850] Read of size 1 at addr fff00000c61b5500 by task kunit_try_catch/185
[   48.620930] 
[   48.622044] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   48.622979] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.623587] Hardware name: linux,dummy-virt (DT)
[   48.624131] Call trace:
[   48.624699]  show_stack+0x20/0x38 (C)
[   48.625677]  dump_stack_lvl+0x8c/0xd0
[   48.626843]  print_report+0x118/0x5e0
[   48.627465]  kasan_report+0xc8/0x118
[   48.628386]  __kasan_check_byte+0x54/0x70
[   48.628919]  ksize+0x30/0x88
[   48.629701]  ksize_uaf+0x168/0x600
[   48.630372]  kunit_try_run_case+0x14c/0x3d0
[   48.631046]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.631684]  kthread+0x24c/0x2d0
[   48.632339]  ret_from_fork+0x10/0x20
[   48.632972] 
[   48.633734] Allocated by task 185:
[   48.634489]  kasan_save_stack+0x3c/0x68
[   48.635208]  kasan_save_track+0x20/0x40
[   48.635781]  kasan_save_alloc_info+0x40/0x58
[   48.636389]  __kasan_kmalloc+0xd4/0xd8
[   48.637030]  __kmalloc_cache_noprof+0x15c/0x3c0
[   48.638137]  ksize_uaf+0xb8/0x600
[   48.638813]  kunit_try_run_case+0x14c/0x3d0
[   48.639379]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.640165]  kthread+0x24c/0x2d0
[   48.640680]  ret_from_fork+0x10/0x20
[   48.641511] 
[   48.641900] Freed by task 185:
[   48.642414]  kasan_save_stack+0x3c/0x68
[   48.642993]  kasan_save_track+0x20/0x40
[   48.643509]  kasan_save_free_info+0x4c/0x78
[   48.644189]  __kasan_slab_free+0x6c/0x98
[   48.644846]  kfree+0x114/0x3c8
[   48.645383]  ksize_uaf+0x11c/0x600
[   48.645981]  kunit_try_run_case+0x14c/0x3d0
[   48.646604]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.647502]  kthread+0x24c/0x2d0
[   48.648064]  ret_from_fork+0x10/0x20
[   48.648733] 
[   48.649249] The buggy address belongs to the object at fff00000c61b5500
[   48.649249]  which belongs to the cache kmalloc-128 of size 128
[   48.650986] The buggy address is located 0 bytes inside of
[   48.650986]  freed 128-byte region [fff00000c61b5500, fff00000c61b5580)
[   48.652243] 
[   48.652570] The buggy address belongs to the physical page:
[   48.653587] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b5
[   48.654550] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.655334] page_type: f5(slab)
[   48.655886] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   48.656715] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   48.658419] page dumped because: kasan: bad access detected
[   48.659517] 
[   48.659833] Memory state around the buggy address:
[   48.660366]  fff00000c61b5400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   48.661888]  fff00000c61b5480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.662941] >fff00000c61b5500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   48.663811]                    ^
[   48.664456]  fff00000c61b5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.666149]  fff00000c61b5600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.667590] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   48.568142] ==================================================================
[   48.569161] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x6a0/0x750
[   48.570280] Read of size 1 at addr fff00000c619d67f by task kunit_try_catch/183
[   48.571683] 
[   48.572049] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   48.573489] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.574099] Hardware name: linux,dummy-virt (DT)
[   48.574783] Call trace:
[   48.575186]  show_stack+0x20/0x38 (C)
[   48.575835]  dump_stack_lvl+0x8c/0xd0
[   48.576547]  print_report+0x118/0x5e0
[   48.577226]  kasan_report+0xc8/0x118
[   48.577949]  __asan_report_load1_noabort+0x20/0x30
[   48.578768]  ksize_unpoisons_memory+0x6a0/0x750
[   48.579605]  kunit_try_run_case+0x14c/0x3d0
[   48.580286]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.581239]  kthread+0x24c/0x2d0
[   48.581860]  ret_from_fork+0x10/0x20
[   48.582653] 
[   48.582958] Allocated by task 183:
[   48.583671]  kasan_save_stack+0x3c/0x68
[   48.584213]  kasan_save_track+0x20/0x40
[   48.584938]  kasan_save_alloc_info+0x40/0x58
[   48.585769]  __kasan_kmalloc+0xd4/0xd8
[   48.586409]  __kmalloc_cache_noprof+0x15c/0x3c0
[   48.587076]  ksize_unpoisons_memory+0xc0/0x750
[   48.587780]  kunit_try_run_case+0x14c/0x3d0
[   48.588670]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.589388]  kthread+0x24c/0x2d0
[   48.590054]  ret_from_fork+0x10/0x20
[   48.590812] 
[   48.591246] The buggy address belongs to the object at fff00000c619d600
[   48.591246]  which belongs to the cache kmalloc-128 of size 128
[   48.592663] The buggy address is located 12 bytes to the right of
[   48.592663]  allocated 115-byte region [fff00000c619d600, fff00000c619d673)
[   48.594411] 
[   48.594917] The buggy address belongs to the physical page:
[   48.595637] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10619d
[   48.596746] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.598175] page_type: f5(slab)
[   48.598952] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   48.599947] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   48.600974] page dumped because: kasan: bad access detected
[   48.602092] 
[   48.602502] Memory state around the buggy address:
[   48.603379]  fff00000c619d500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   48.604406]  fff00000c619d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.605709] >fff00000c619d600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   48.606906]                                                                 ^
[   48.607562]  fff00000c619d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.608574]  fff00000c619d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.609211] ==================================================================
[   48.483605] ==================================================================
[   48.484813] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x638/0x750
[   48.485805] Read of size 1 at addr fff00000c619d673 by task kunit_try_catch/183
[   48.487125] 
[   48.487434] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   48.488943] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.489654] Hardware name: linux,dummy-virt (DT)
[   48.490402] Call trace:
[   48.491169]  show_stack+0x20/0x38 (C)
[   48.491916]  dump_stack_lvl+0x8c/0xd0
[   48.492575]  print_report+0x118/0x5e0
[   48.493315]  kasan_report+0xc8/0x118
[   48.494064]  __asan_report_load1_noabort+0x20/0x30
[   48.494985]  ksize_unpoisons_memory+0x638/0x750
[   48.495692]  kunit_try_run_case+0x14c/0x3d0
[   48.496402]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.497548]  kthread+0x24c/0x2d0
[   48.498110]  ret_from_fork+0x10/0x20
[   48.498913] 
[   48.499233] Allocated by task 183:
[   48.499820]  kasan_save_stack+0x3c/0x68
[   48.500350]  kasan_save_track+0x20/0x40
[   48.500999]  kasan_save_alloc_info+0x40/0x58
[   48.501663]  __kasan_kmalloc+0xd4/0xd8
[   48.502362]  __kmalloc_cache_noprof+0x15c/0x3c0
[   48.503215]  ksize_unpoisons_memory+0xc0/0x750
[   48.503738]  kunit_try_run_case+0x14c/0x3d0
[   48.504827]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.505952]  kthread+0x24c/0x2d0
[   48.506587]  ret_from_fork+0x10/0x20
[   48.507106] 
[   48.507463] The buggy address belongs to the object at fff00000c619d600
[   48.507463]  which belongs to the cache kmalloc-128 of size 128
[   48.508913] The buggy address is located 0 bytes to the right of
[   48.508913]  allocated 115-byte region [fff00000c619d600, fff00000c619d673)
[   48.510545] 
[   48.510821] The buggy address belongs to the physical page:
[   48.511502] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10619d
[   48.512649] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.513694] page_type: f5(slab)
[   48.514174] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   48.515086] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   48.515945] page dumped because: kasan: bad access detected
[   48.516748] 
[   48.517013] Memory state around the buggy address:
[   48.517950]  fff00000c619d500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   48.518774]  fff00000c619d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.519713] >fff00000c619d600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   48.520487]                                                              ^
[   48.521722]  fff00000c619d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.522650]  fff00000c619d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.523545] ==================================================================
[   48.526202] ==================================================================
[   48.527125] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x750
[   48.527896] Read of size 1 at addr fff00000c619d678 by task kunit_try_catch/183
[   48.528762] 
[   48.529112] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   48.530369] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.531004] Hardware name: linux,dummy-virt (DT)
[   48.531745] Call trace:
[   48.532120]  show_stack+0x20/0x38 (C)
[   48.532651]  dump_stack_lvl+0x8c/0xd0
[   48.533452]  print_report+0x118/0x5e0
[   48.535485]  kasan_report+0xc8/0x118
[   48.535883]  __asan_report_load1_noabort+0x20/0x30
[   48.536414]  ksize_unpoisons_memory+0x628/0x750
[   48.537802]  kunit_try_run_case+0x14c/0x3d0
[   48.538921]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.539836]  kthread+0x24c/0x2d0
[   48.540427]  ret_from_fork+0x10/0x20
[   48.541229] 
[   48.541629] Allocated by task 183:
[   48.542247]  kasan_save_stack+0x3c/0x68
[   48.542936]  kasan_save_track+0x20/0x40
[   48.543523]  kasan_save_alloc_info+0x40/0x58
[   48.544090]  __kasan_kmalloc+0xd4/0xd8
[   48.544533]  __kmalloc_cache_noprof+0x15c/0x3c0
[   48.545288]  ksize_unpoisons_memory+0xc0/0x750
[   48.546272]  kunit_try_run_case+0x14c/0x3d0
[   48.547804]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.549125]  kthread+0x24c/0x2d0
[   48.550075]  ret_from_fork+0x10/0x20
[   48.550602] 
[   48.550781] The buggy address belongs to the object at fff00000c619d600
[   48.550781]  which belongs to the cache kmalloc-128 of size 128
[   48.551500] The buggy address is located 5 bytes to the right of
[   48.551500]  allocated 115-byte region [fff00000c619d600, fff00000c619d673)
[   48.552833] 
[   48.553339] The buggy address belongs to the physical page:
[   48.554108] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10619d
[   48.555113] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.556045] page_type: f5(slab)
[   48.556611] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   48.557728] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   48.558621] page dumped because: kasan: bad access detected
[   48.559439] 
[   48.559778] Memory state around the buggy address:
[   48.560423]  fff00000c619d500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   48.561244]  fff00000c619d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.562108] >fff00000c619d600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   48.562960]                                                                 ^
[   48.564248]  fff00000c619d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.565307]  fff00000c619d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.566679] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
[   48.423115] ==================================================================
[   48.423791] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   48.424655] Free of addr fff00000c5f55300 by task kunit_try_catch/181
[   48.425447] 
[   48.425827] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   48.426944] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.427562] Hardware name: linux,dummy-virt (DT)
[   48.428443] Call trace:
[   48.428824]  show_stack+0x20/0x38 (C)
[   48.429506]  dump_stack_lvl+0x8c/0xd0
[   48.430089]  print_report+0x118/0x5e0
[   48.431144]  kasan_report_invalid_free+0xb0/0xd8
[   48.431795]  check_slab_allocation+0xd4/0x108
[   48.432461]  __kasan_slab_pre_free+0x2c/0x48
[   48.433566]  kfree+0xe8/0x3c8
[   48.434197]  kfree_sensitive+0x3c/0xb0
[   48.434752]  kmalloc_double_kzfree+0x168/0x308
[   48.435664]  kunit_try_run_case+0x14c/0x3d0
[   48.436125]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.437099]  kthread+0x24c/0x2d0
[   48.437675]  ret_from_fork+0x10/0x20
[   48.438240] 
[   48.438635] Allocated by task 181:
[   48.439199]  kasan_save_stack+0x3c/0x68
[   48.439787]  kasan_save_track+0x20/0x40
[   48.440357]  kasan_save_alloc_info+0x40/0x58
[   48.441284]  __kasan_kmalloc+0xd4/0xd8
[   48.441844]  __kmalloc_cache_noprof+0x15c/0x3c0
[   48.442482]  kmalloc_double_kzfree+0xb8/0x308
[   48.443044]  kunit_try_run_case+0x14c/0x3d0
[   48.444373]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.445563]  kthread+0x24c/0x2d0
[   48.446000]  ret_from_fork+0x10/0x20
[   48.446494] 
[   48.446852] Freed by task 181:
[   48.447263]  kasan_save_stack+0x3c/0x68
[   48.447991]  kasan_save_track+0x20/0x40
[   48.448542]  kasan_save_free_info+0x4c/0x78
[   48.449205]  __kasan_slab_free+0x6c/0x98
[   48.449880]  kfree+0x114/0x3c8
[   48.450442]  kfree_sensitive+0x80/0xb0
[   48.451066]  kmalloc_double_kzfree+0x11c/0x308
[   48.452670]  kunit_try_run_case+0x14c/0x3d0
[   48.453006]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.454363]  kthread+0x24c/0x2d0
[   48.454792]  ret_from_fork+0x10/0x20
[   48.455540] 
[   48.455948] The buggy address belongs to the object at fff00000c5f55300
[   48.455948]  which belongs to the cache kmalloc-16 of size 16
[   48.457634] The buggy address is located 0 bytes inside of
[   48.457634]  16-byte region [fff00000c5f55300, fff00000c5f55310)
[   48.459352] 
[   48.459799] The buggy address belongs to the physical page:
[   48.460750] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55
[   48.461958] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.462749] page_type: f5(slab)
[   48.463390] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   48.464377] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   48.465380] page dumped because: kasan: bad access detected
[   48.466729] 
[   48.467281] Memory state around the buggy address:
[   48.467966]  fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc
[   48.468908]  fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.470196] >fff00000c5f55300: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.471125]                    ^
[   48.471637]  fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.472816]  fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.473769] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[   48.369793] ==================================================================
[   48.371561] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   48.372351] Read of size 1 at addr fff00000c5f55300 by task kunit_try_catch/181
[   48.373020] 
[   48.373768] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   48.375246] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.375799] Hardware name: linux,dummy-virt (DT)
[   48.376400] Call trace:
[   48.376767]  show_stack+0x20/0x38 (C)
[   48.377627]  dump_stack_lvl+0x8c/0xd0
[   48.378179]  print_report+0x118/0x5e0
[   48.378836]  kasan_report+0xc8/0x118
[   48.379948]  __kasan_check_byte+0x54/0x70
[   48.380782]  kfree_sensitive+0x30/0xb0
[   48.381830]  kmalloc_double_kzfree+0x168/0x308
[   48.382508]  kunit_try_run_case+0x14c/0x3d0
[   48.383257]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.384188]  kthread+0x24c/0x2d0
[   48.384793]  ret_from_fork+0x10/0x20
[   48.385494] 
[   48.386491] Allocated by task 181:
[   48.387003]  kasan_save_stack+0x3c/0x68
[   48.387700]  kasan_save_track+0x20/0x40
[   48.388380]  kasan_save_alloc_info+0x40/0x58
[   48.389160]  __kasan_kmalloc+0xd4/0xd8
[   48.389915]  __kmalloc_cache_noprof+0x15c/0x3c0
[   48.390606]  kmalloc_double_kzfree+0xb8/0x308
[   48.391258]  kunit_try_run_case+0x14c/0x3d0
[   48.391917]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.392724]  kthread+0x24c/0x2d0
[   48.393427]  ret_from_fork+0x10/0x20
[   48.394664] 
[   48.395019] Freed by task 181:
[   48.395645]  kasan_save_stack+0x3c/0x68
[   48.396259]  kasan_save_track+0x20/0x40
[   48.397012]  kasan_save_free_info+0x4c/0x78
[   48.398009]  __kasan_slab_free+0x6c/0x98
[   48.398601]  kfree+0x114/0x3c8
[   48.399113]  kfree_sensitive+0x80/0xb0
[   48.399999]  kmalloc_double_kzfree+0x11c/0x308
[   48.400881]  kunit_try_run_case+0x14c/0x3d0
[   48.401726]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.402258]  kthread+0x24c/0x2d0
[   48.402885]  ret_from_fork+0x10/0x20
[   48.403635] 
[   48.404154] The buggy address belongs to the object at fff00000c5f55300
[   48.404154]  which belongs to the cache kmalloc-16 of size 16
[   48.405690] The buggy address is located 0 bytes inside of
[   48.405690]  freed 16-byte region [fff00000c5f55300, fff00000c5f55310)
[   48.407216] 
[   48.407636] The buggy address belongs to the physical page:
[   48.408421] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f55
[   48.409820] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.410667] page_type: f5(slab)
[   48.411391] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   48.412267] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   48.413638] page dumped because: kasan: bad access detected
[   48.414506] 
[   48.414985] Memory state around the buggy address:
[   48.415812]  fff00000c5f55200: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc
[   48.416668]  fff00000c5f55280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.417597] >fff00000c5f55300: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.418511]                    ^
[   48.419221]  fff00000c5f55380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.420039]  fff00000c5f55400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.421492] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[   48.243918] ==================================================================
[   48.245548] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   48.246189] Write of size 33 at addr fff00000c616ad00 by task kunit_try_catch/175
[   48.247790] 
[   48.248268] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   48.250176] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.250837] Hardware name: linux,dummy-virt (DT)
[   48.251529] Call trace:
[   48.252098]  show_stack+0x20/0x38 (C)
[   48.252795]  dump_stack_lvl+0x8c/0xd0
[   48.253641]  print_report+0x118/0x5e0
[   48.254664]  kasan_report+0xc8/0x118
[   48.255440]  kasan_check_range+0x100/0x1a8
[   48.256310]  __asan_memset+0x34/0x78
[   48.256857]  kmalloc_uaf_memset+0x170/0x310
[   48.257920]  kunit_try_run_case+0x14c/0x3d0
[   48.258697]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.259375]  kthread+0x24c/0x2d0
[   48.259987]  ret_from_fork+0x10/0x20
[   48.260544] 
[   48.260876] Allocated by task 175:
[   48.261748]  kasan_save_stack+0x3c/0x68
[   48.262379]  kasan_save_track+0x20/0x40
[   48.262934]  kasan_save_alloc_info+0x40/0x58
[   48.264226]  __kasan_kmalloc+0xd4/0xd8
[   48.264741]  __kmalloc_cache_noprof+0x15c/0x3c0
[   48.265916]  kmalloc_uaf_memset+0xb8/0x310
[   48.266523]  kunit_try_run_case+0x14c/0x3d0
[   48.267080]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.267739]  kthread+0x24c/0x2d0
[   48.268314]  ret_from_fork+0x10/0x20
[   48.268797] 
[   48.269132] Freed by task 175:
[   48.270213]  kasan_save_stack+0x3c/0x68
[   48.271044]  kasan_save_track+0x20/0x40
[   48.271588]  kasan_save_free_info+0x4c/0x78
[   48.272454]  __kasan_slab_free+0x6c/0x98
[   48.272863]  kfree+0x114/0x3c8
[   48.273965]  kmalloc_uaf_memset+0x11c/0x310
[   48.274605]  kunit_try_run_case+0x14c/0x3d0
[   48.275196]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.275849]  kthread+0x24c/0x2d0
[   48.276515]  ret_from_fork+0x10/0x20
[   48.277009] 
[   48.277319] The buggy address belongs to the object at fff00000c616ad00
[   48.277319]  which belongs to the cache kmalloc-64 of size 64
[   48.279615] The buggy address is located 0 bytes inside of
[   48.279615]  freed 64-byte region [fff00000c616ad00, fff00000c616ad40)
[   48.280851] 
[   48.281519] The buggy address belongs to the physical page:
[   48.282043] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616a
[   48.282953] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.283877] page_type: f5(slab)
[   48.284393] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   48.285406] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   48.286441] page dumped because: kasan: bad access detected
[   48.287259] 
[   48.287584] Memory state around the buggy address:
[   48.288323]  fff00000c616ac00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   48.289436]  fff00000c616ac80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.290385] >fff00000c616ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.290806]                    ^
[   48.291047]  fff00000c616ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.291972]  fff00000c616ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.292730] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   48.138541] ==================================================================
[   48.139763] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e8
[   48.140490] Read of size 64 at addr fff00000c60d3484 by task kunit_try_catch/171
[   48.141476] 
[   48.141835] CPU: 1 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   48.143008] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.143698] Hardware name: linux,dummy-virt (DT)
[   48.144266] Call trace:
[   48.145793]  show_stack+0x20/0x38 (C)
[   48.146473]  dump_stack_lvl+0x8c/0xd0
[   48.146972]  print_report+0x118/0x5e0
[   48.147549]  kasan_report+0xc8/0x118
[   48.148153]  kasan_check_range+0x100/0x1a8
[   48.148776]  __asan_memmove+0x3c/0x98
[   48.149357]  kmalloc_memmove_invalid_size+0x154/0x2e8
[   48.150372]  kunit_try_run_case+0x14c/0x3d0
[   48.151600]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.152481]  kthread+0x24c/0x2d0
[   48.152906]  ret_from_fork+0x10/0x20
[   48.153528] 
[   48.153808] Allocated by task 171:
[   48.154398]  kasan_save_stack+0x3c/0x68
[   48.154925]  kasan_save_track+0x20/0x40
[   48.155591]  kasan_save_alloc_info+0x40/0x58
[   48.156665]  __kasan_kmalloc+0xd4/0xd8
[   48.157172]  __kmalloc_cache_noprof+0x15c/0x3c0
[   48.157819]  kmalloc_memmove_invalid_size+0xb0/0x2e8
[   48.158367]  kunit_try_run_case+0x14c/0x3d0
[   48.159098]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.160004]  kthread+0x24c/0x2d0
[   48.160603]  ret_from_fork+0x10/0x20
[   48.162062] 
[   48.162469] The buggy address belongs to the object at fff00000c60d3480
[   48.162469]  which belongs to the cache kmalloc-64 of size 64
[   48.164021] The buggy address is located 4 bytes inside of
[   48.164021]  allocated 64-byte region [fff00000c60d3480, fff00000c60d34c0)
[   48.165866] 
[   48.166151] The buggy address belongs to the physical page:
[   48.166924] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060d3
[   48.167909] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.168833] page_type: f5(slab)
[   48.169277] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   48.170620] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   48.171492] page dumped because: kasan: bad access detected
[   48.172136] 
[   48.172452] Memory state around the buggy address:
[   48.173051]  fff00000c60d3380: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[   48.174352]  fff00000c60d3400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.175194] >fff00000c60d3480: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   48.176166]                                            ^
[   48.176763]  fff00000c60d3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.177921]  fff00000c60d3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.179039] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   48.086405] ==================================================================
[   48.087636] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   48.088528] Read of size 18446744073709551614 at addr fff00000c60d3304 by task kunit_try_catch/169
[   48.090953] 
[   48.091274] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   48.092471] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.092971] Hardware name: linux,dummy-virt (DT)
[   48.093584] Call trace:
[   48.093940]  show_stack+0x20/0x38 (C)
[   48.094570]  dump_stack_lvl+0x8c/0xd0
[   48.095503]  print_report+0x118/0x5e0
[   48.096021]  kasan_report+0xc8/0x118
[   48.096642]  kasan_check_range+0x100/0x1a8
[   48.097805]  __asan_memmove+0x3c/0x98
[   48.098372]  kmalloc_memmove_negative_size+0x154/0x2e0
[   48.098991]  kunit_try_run_case+0x14c/0x3d0
[   48.099694]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.100408]  kthread+0x24c/0x2d0
[   48.101021]  ret_from_fork+0x10/0x20
[   48.101888] 
[   48.102174] Allocated by task 169:
[   48.102703]  kasan_save_stack+0x3c/0x68
[   48.103342]  kasan_save_track+0x20/0x40
[   48.103873]  kasan_save_alloc_info+0x40/0x58
[   48.104439]  __kasan_kmalloc+0xd4/0xd8
[   48.105308]  __kmalloc_cache_noprof+0x15c/0x3c0
[   48.106011]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   48.106677]  kunit_try_run_case+0x14c/0x3d0
[   48.107267]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.108075]  kthread+0x24c/0x2d0
[   48.108691]  ret_from_fork+0x10/0x20
[   48.109620] 
[   48.110275] The buggy address belongs to the object at fff00000c60d3300
[   48.110275]  which belongs to the cache kmalloc-64 of size 64
[   48.112441] The buggy address is located 4 bytes inside of
[   48.112441]  64-byte region [fff00000c60d3300, fff00000c60d3340)
[   48.113794] 
[   48.114558] The buggy address belongs to the physical page:
[   48.115247] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060d3
[   48.116222] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.117207] page_type: f5(slab)
[   48.117692] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   48.118976] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   48.120121] page dumped because: kasan: bad access detected
[   48.121385] 
[   48.121777] Memory state around the buggy address:
[   48.122566]  fff00000c60d3200: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[   48.123658]  fff00000c60d3280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.124073] >fff00000c60d3300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   48.124592]                    ^
[   48.125553]  fff00000c60d3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.126722]  fff00000c60d3400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.127817] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset
[   47.982611] ==================================================================
[   47.983817] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   47.984431] Write of size 8 at addr fff00000c6189971 by task kunit_try_catch/165
[   47.985027] 
[   47.986445] CPU: 0 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   47.988239] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.989735] Hardware name: linux,dummy-virt (DT)
[   47.990793] Call trace:
[   47.991137]  show_stack+0x20/0x38 (C)
[   47.991758]  dump_stack_lvl+0x8c/0xd0
[   47.992397]  print_report+0x118/0x5e0
[   47.992932]  kasan_report+0xc8/0x118
[   47.993787]  kasan_check_range+0x100/0x1a8
[   47.994697]  __asan_memset+0x34/0x78
[   47.995502]  kmalloc_oob_memset_8+0x150/0x2f8
[   47.996457]  kunit_try_run_case+0x14c/0x3d0
[   47.997051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.997974]  kthread+0x24c/0x2d0
[   47.998375]  ret_from_fork+0x10/0x20
[   47.999444] 
[   47.999776] Allocated by task 165:
[   48.000060]  kasan_save_stack+0x3c/0x68
[   48.000403]  kasan_save_track+0x20/0x40
[   48.002101]  kasan_save_alloc_info+0x40/0x58
[   48.002798]  __kasan_kmalloc+0xd4/0xd8
[   48.003366]  __kmalloc_cache_noprof+0x15c/0x3c0
[   48.004004]  kmalloc_oob_memset_8+0xb0/0x2f8
[   48.004570]  kunit_try_run_case+0x14c/0x3d0
[   48.005090]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.006081]  kthread+0x24c/0x2d0
[   48.006480]  ret_from_fork+0x10/0x20
[   48.006825] 
[   48.007034] The buggy address belongs to the object at fff00000c6189900
[   48.007034]  which belongs to the cache kmalloc-128 of size 128
[   48.007848] The buggy address is located 113 bytes inside of
[   48.007848]  allocated 120-byte region [fff00000c6189900, fff00000c6189978)
[   48.008739] 
[   48.009012] The buggy address belongs to the physical page:
[   48.010064] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106189
[   48.012491] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.014490] page_type: f5(slab)
[   48.014829] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   48.015407] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   48.017271] page dumped because: kasan: bad access detected
[   48.018682] 
[   48.019326] Memory state around the buggy address:
[   48.020339]  fff00000c6189800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   48.021666]  fff00000c6189880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.022780] >fff00000c6189900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   48.023730]                                                                 ^
[   48.024315]  fff00000c6189980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.024913]  fff00000c6189a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.026860] ==================================================================
[   47.884213] ==================================================================
[   47.885747] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   47.886614] Write of size 2 at addr fff00000c6189577 by task kunit_try_catch/161
[   47.887913] 
[   47.888427] CPU: 0 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   47.889856] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.890669] Hardware name: linux,dummy-virt (DT)
[   47.891162] Call trace:
[   47.891601]  show_stack+0x20/0x38 (C)
[   47.892147]  dump_stack_lvl+0x8c/0xd0
[   47.892804]  print_report+0x118/0x5e0
[   47.893765]  kasan_report+0xc8/0x118
[   47.894532]  kasan_check_range+0x100/0x1a8
[   47.895133]  __asan_memset+0x34/0x78
[   47.895675]  kmalloc_oob_memset_2+0x150/0x2f8
[   47.896324]  kunit_try_run_case+0x14c/0x3d0
[   47.897007]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.897905]  kthread+0x24c/0x2d0
[   47.898711]  ret_from_fork+0x10/0x20
[   47.899201] 
[   47.899694] Allocated by task 161:
[   47.900170]  kasan_save_stack+0x3c/0x68
[   47.900946]  kasan_save_track+0x20/0x40
[   47.901900]  kasan_save_alloc_info+0x40/0x58
[   47.902655]  __kasan_kmalloc+0xd4/0xd8
[   47.903100]  __kmalloc_cache_noprof+0x15c/0x3c0
[   47.903689]  kmalloc_oob_memset_2+0xb0/0x2f8
[   47.904265]  kunit_try_run_case+0x14c/0x3d0
[   47.904887]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.905777]  kthread+0x24c/0x2d0
[   47.906336]  ret_from_fork+0x10/0x20
[   47.906898] 
[   47.907261] The buggy address belongs to the object at fff00000c6189500
[   47.907261]  which belongs to the cache kmalloc-128 of size 128
[   47.908578] The buggy address is located 119 bytes inside of
[   47.908578]  allocated 120-byte region [fff00000c6189500, fff00000c6189578)
[   47.910164] 
[   47.910501] The buggy address belongs to the physical page:
[   47.911233] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106189
[   47.912221] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.913346] page_type: f5(slab)
[   47.913811] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   47.914739] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   47.916025] page dumped because: kasan: bad access detected
[   47.916758] 
[   47.917112] Memory state around the buggy address:
[   47.917769]  fff00000c6189400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   47.918635]  fff00000c6189480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.919468] >fff00000c6189500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   47.920498]                                                                 ^
[   47.921552]  fff00000c6189580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.922538]  fff00000c6189600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.923394] ==================================================================
[   48.037880] ==================================================================
[   48.039490] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   48.040375] Write of size 16 at addr fff00000c60dcf69 by task kunit_try_catch/167
[   48.041713] 
[   48.042162] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   48.043399] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.044144] Hardware name: linux,dummy-virt (DT)
[   48.044981] Call trace:
[   48.045689]  show_stack+0x20/0x38 (C)
[   48.046533]  dump_stack_lvl+0x8c/0xd0
[   48.047166]  print_report+0x118/0x5e0
[   48.047934]  kasan_report+0xc8/0x118
[   48.048467]  kasan_check_range+0x100/0x1a8
[   48.049097]  __asan_memset+0x34/0x78
[   48.049759]  kmalloc_oob_memset_16+0x150/0x2f8
[   48.050677]  kunit_try_run_case+0x14c/0x3d0
[   48.051389]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.052168]  kthread+0x24c/0x2d0
[   48.052776]  ret_from_fork+0x10/0x20
[   48.053475] 
[   48.054036] Allocated by task 167:
[   48.054602]  kasan_save_stack+0x3c/0x68
[   48.055270]  kasan_save_track+0x20/0x40
[   48.055817]  kasan_save_alloc_info+0x40/0x58
[   48.056508]  __kasan_kmalloc+0xd4/0xd8
[   48.057456]  __kmalloc_cache_noprof+0x15c/0x3c0
[   48.058123]  kmalloc_oob_memset_16+0xb0/0x2f8
[   48.058771]  kunit_try_run_case+0x14c/0x3d0
[   48.059437]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.060189]  kthread+0x24c/0x2d0
[   48.060859]  ret_from_fork+0x10/0x20
[   48.062042] 
[   48.062498] The buggy address belongs to the object at fff00000c60dcf00
[   48.062498]  which belongs to the cache kmalloc-128 of size 128
[   48.063729] The buggy address is located 105 bytes inside of
[   48.063729]  allocated 120-byte region [fff00000c60dcf00, fff00000c60dcf78)
[   48.065184] 
[   48.065474] The buggy address belongs to the physical page:
[   48.066342] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060dc
[   48.067269] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.068131] page_type: f5(slab)
[   48.068697] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   48.069933] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   48.070777] page dumped because: kasan: bad access detected
[   48.071424] 
[   48.071754] Memory state around the buggy address:
[   48.072410]  fff00000c60dce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   48.073240]  fff00000c60dce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.074073] >fff00000c60dcf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   48.075047]                                                                 ^
[   48.076163]  fff00000c60dcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.077265]  fff00000c60dd000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   48.078192] ==================================================================
[   47.932317] ==================================================================
[   47.933607] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   47.934769] Write of size 4 at addr fff00000c60dcc75 by task kunit_try_catch/163
[   47.935934] 
[   47.936231] CPU: 1 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   47.937650] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.938268] Hardware name: linux,dummy-virt (DT)
[   47.938918] Call trace:
[   47.939282]  show_stack+0x20/0x38 (C)
[   47.940026]  dump_stack_lvl+0x8c/0xd0
[   47.940766]  print_report+0x118/0x5e0
[   47.941772]  kasan_report+0xc8/0x118
[   47.942659]  kasan_check_range+0x100/0x1a8
[   47.942973]  __asan_memset+0x34/0x78
[   47.943255]  kmalloc_oob_memset_4+0x150/0x300
[   47.943889]  kunit_try_run_case+0x14c/0x3d0
[   47.944823]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.945864]  kthread+0x24c/0x2d0
[   47.946683]  ret_from_fork+0x10/0x20
[   47.947341] 
[   47.947728] Allocated by task 163:
[   47.948394]  kasan_save_stack+0x3c/0x68
[   47.949060]  kasan_save_track+0x20/0x40
[   47.949973]  kasan_save_alloc_info+0x40/0x58
[   47.950663]  __kasan_kmalloc+0xd4/0xd8
[   47.951245]  __kmalloc_cache_noprof+0x15c/0x3c0
[   47.951948]  kmalloc_oob_memset_4+0xb0/0x300
[   47.952619]  kunit_try_run_case+0x14c/0x3d0
[   47.953288]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.954328]  kthread+0x24c/0x2d0
[   47.955015]  ret_from_fork+0x10/0x20
[   47.955720] 
[   47.956140] The buggy address belongs to the object at fff00000c60dcc00
[   47.956140]  which belongs to the cache kmalloc-128 of size 128
[   47.958015] The buggy address is located 117 bytes inside of
[   47.958015]  allocated 120-byte region [fff00000c60dcc00, fff00000c60dcc78)
[   47.959279] 
[   47.959626] The buggy address belongs to the physical page:
[   47.960273] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060dc
[   47.961471] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.962386] page_type: f5(slab)
[   47.962891] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   47.963871] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   47.964785] page dumped because: kasan: bad access detected
[   47.965689] 
[   47.966032] Memory state around the buggy address:
[   47.966691]  fff00000c60dcb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   47.967628]  fff00000c60dcb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.968416] >fff00000c60dcc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   47.969250]                                                                 ^
[   47.970704]  fff00000c60dcc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.971763]  fff00000c60dcd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.972645] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   47.831753] ==================================================================
[   47.832917] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   47.834128] Write of size 128 at addr fff00000c6189400 by task kunit_try_catch/159
[   47.834972] 
[   47.836025] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   47.838080] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.838596] Hardware name: linux,dummy-virt (DT)
[   47.839133] Call trace:
[   47.839631]  show_stack+0x20/0x38 (C)
[   47.840169]  dump_stack_lvl+0x8c/0xd0
[   47.840966]  print_report+0x118/0x5e0
[   47.841727]  kasan_report+0xc8/0x118
[   47.843098]  kasan_check_range+0x100/0x1a8
[   47.843630]  __asan_memset+0x34/0x78
[   47.844118]  kmalloc_oob_in_memset+0x144/0x2d0
[   47.844893]  kunit_try_run_case+0x14c/0x3d0
[   47.845563]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.846357]  kthread+0x24c/0x2d0
[   47.847041]  ret_from_fork+0x10/0x20
[   47.847955] 
[   47.848284] Allocated by task 159:
[   47.848747]  kasan_save_stack+0x3c/0x68
[   47.849584]  kasan_save_track+0x20/0x40
[   47.850185]  kasan_save_alloc_info+0x40/0x58
[   47.850811]  __kasan_kmalloc+0xd4/0xd8
[   47.851725]  __kmalloc_cache_noprof+0x15c/0x3c0
[   47.852667]  kmalloc_oob_in_memset+0xb0/0x2d0
[   47.853705]  kunit_try_run_case+0x14c/0x3d0
[   47.854354]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.855041]  kthread+0x24c/0x2d0
[   47.855753]  ret_from_fork+0x10/0x20
[   47.856340] 
[   47.856626] The buggy address belongs to the object at fff00000c6189400
[   47.856626]  which belongs to the cache kmalloc-128 of size 128
[   47.858688] The buggy address is located 0 bytes inside of
[   47.858688]  allocated 120-byte region [fff00000c6189400, fff00000c6189478)
[   47.860082] 
[   47.860603] The buggy address belongs to the physical page:
[   47.861896] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106189
[   47.863109] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.863923] page_type: f5(slab)
[   47.864387] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   47.865621] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   47.866681] page dumped because: kasan: bad access detected
[   47.867344] 
[   47.867791] Memory state around the buggy address:
[   47.868829]  fff00000c6189300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   47.870073]  fff00000c6189380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.871030] >fff00000c6189400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   47.871700]                                                                 ^
[   47.872788]  fff00000c6189480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.874449]  fff00000c6189500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.875167] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[   48.190367] ==================================================================
[   48.191581] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   48.192313] Read of size 1 at addr fff00000c40dc828 by task kunit_try_catch/173
[   48.192995] 
[   48.193367] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   48.195134] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.195708] Hardware name: linux,dummy-virt (DT)
[   48.196321] Call trace:
[   48.196866]  show_stack+0x20/0x38 (C)
[   48.197478]  dump_stack_lvl+0x8c/0xd0
[   48.197949]  print_report+0x118/0x5e0
[   48.199012]  kasan_report+0xc8/0x118
[   48.199652]  __asan_report_load1_noabort+0x20/0x30
[   48.200383]  kmalloc_uaf+0x300/0x338
[   48.200947]  kunit_try_run_case+0x14c/0x3d0
[   48.201558]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.202307]  kthread+0x24c/0x2d0
[   48.202934]  ret_from_fork+0x10/0x20
[   48.203740] 
[   48.204042] Allocated by task 173:
[   48.204571]  kasan_save_stack+0x3c/0x68
[   48.205052]  kasan_save_track+0x20/0x40
[   48.206060]  kasan_save_alloc_info+0x40/0x58
[   48.206702]  __kasan_kmalloc+0xd4/0xd8
[   48.207247]  __kmalloc_cache_noprof+0x15c/0x3c0
[   48.207847]  kmalloc_uaf+0xb8/0x338
[   48.208439]  kunit_try_run_case+0x14c/0x3d0
[   48.208943]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.210148]  kthread+0x24c/0x2d0
[   48.210699]  ret_from_fork+0x10/0x20
[   48.211251] 
[   48.211587] Freed by task 173:
[   48.211999]  kasan_save_stack+0x3c/0x68
[   48.212617]  kasan_save_track+0x20/0x40
[   48.213079]  kasan_save_free_info+0x4c/0x78
[   48.214132]  __kasan_slab_free+0x6c/0x98
[   48.214706]  kfree+0x114/0x3c8
[   48.215271]  kmalloc_uaf+0x11c/0x338
[   48.215840]  kunit_try_run_case+0x14c/0x3d0
[   48.216442]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.217378]  kthread+0x24c/0x2d0
[   48.217938]  ret_from_fork+0x10/0x20
[   48.218530] 
[   48.218868] The buggy address belongs to the object at fff00000c40dc820
[   48.218868]  which belongs to the cache kmalloc-16 of size 16
[   48.220397] The buggy address is located 8 bytes inside of
[   48.220397]  freed 16-byte region [fff00000c40dc820, fff00000c40dc830)
[   48.222027] 
[   48.222679] The buggy address belongs to the physical page:
[   48.223216] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1040dc
[   48.224280] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.225234] page_type: f5(slab)
[   48.225753] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   48.226738] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   48.227657] page dumped because: kasan: bad access detected
[   48.228344] 
[   48.228762] Memory state around the buggy address:
[   48.229401]  fff00000c40dc700: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc
[   48.230754]  fff00000c40dc780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   48.231618] >fff00000c40dc800: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   48.232483]                                   ^
[   48.233363]  fff00000c40dc880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.234194]  fff00000c40dc900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.235054] ==================================================================
[   48.302800] ==================================================================
[   48.304146] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   48.305362] Read of size 1 at addr fff00000c616ae28 by task kunit_try_catch/177
[   48.306730] 
[   48.307128] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   48.308546] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.309102] Hardware name: linux,dummy-virt (DT)
[   48.310525] Call trace:
[   48.310739]  show_stack+0x20/0x38 (C)
[   48.311022]  dump_stack_lvl+0x8c/0xd0
[   48.311340]  print_report+0x118/0x5e0
[   48.311645]  kasan_report+0xc8/0x118
[   48.311918]  __asan_report_load1_noabort+0x20/0x30
[   48.312246]  kmalloc_uaf2+0x3f4/0x468
[   48.314181]  kunit_try_run_case+0x14c/0x3d0
[   48.315106]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.315899]  kthread+0x24c/0x2d0
[   48.316656]  ret_from_fork+0x10/0x20
[   48.317238] 
[   48.317616] Allocated by task 177:
[   48.318024]  kasan_save_stack+0x3c/0x68
[   48.318684]  kasan_save_track+0x20/0x40
[   48.319593]  kasan_save_alloc_info+0x40/0x58
[   48.320176]  __kasan_kmalloc+0xd4/0xd8
[   48.320729]  __kmalloc_cache_noprof+0x15c/0x3c0
[   48.321504]  kmalloc_uaf2+0xc4/0x468
[   48.322013]  kunit_try_run_case+0x14c/0x3d0
[   48.323020]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.324131]  kthread+0x24c/0x2d0
[   48.324623]  ret_from_fork+0x10/0x20
[   48.325183] 
[   48.325534] Freed by task 177:
[   48.326035]  kasan_save_stack+0x3c/0x68
[   48.326610]  kasan_save_track+0x20/0x40
[   48.327125]  kasan_save_free_info+0x4c/0x78
[   48.327977]  __kasan_slab_free+0x6c/0x98
[   48.328586]  kfree+0x114/0x3c8
[   48.329796]  kmalloc_uaf2+0x134/0x468
[   48.330347]  kunit_try_run_case+0x14c/0x3d0
[   48.330935]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.331646]  kthread+0x24c/0x2d0
[   48.332118]  ret_from_fork+0x10/0x20
[   48.332868] 
[   48.333186] The buggy address belongs to the object at fff00000c616ae00
[   48.333186]  which belongs to the cache kmalloc-64 of size 64
[   48.334976] The buggy address is located 40 bytes inside of
[   48.334976]  freed 64-byte region [fff00000c616ae00, fff00000c616ae40)
[   48.336246] 
[   48.336649] The buggy address belongs to the physical page:
[   48.338027] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616a
[   48.338968] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.339980] page_type: f5(slab)
[   48.340486] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   48.341488] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   48.342373] page dumped because: kasan: bad access detected
[   48.343056] 
[   48.343654] Memory state around the buggy address:
[   48.344363]  fff00000c616ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.345324]  fff00000c616ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.346087] >fff00000c616ae00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.348113]                                   ^
[   48.349073]  fff00000c616ae80: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   48.350073]  fff00000c616af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.351353] ==================================================================
[   47.775067] ==================================================================
[   47.776212] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   47.776842] Read of size 16 at addr fff00000c40dc800 by task kunit_try_catch/157
[   47.778139] 
[   47.778623] CPU: 1 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   47.779510] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.779946] Hardware name: linux,dummy-virt (DT)
[   47.780685] Call trace:
[   47.781143]  show_stack+0x20/0x38 (C)
[   47.782258]  dump_stack_lvl+0x8c/0xd0
[   47.783388]  print_report+0x118/0x5e0
[   47.784202]  kasan_report+0xc8/0x118
[   47.784953]  __asan_report_load16_noabort+0x20/0x30
[   47.786212]  kmalloc_uaf_16+0x3bc/0x438
[   47.787069]  kunit_try_run_case+0x14c/0x3d0
[   47.787667]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.788588]  kthread+0x24c/0x2d0
[   47.789190]  ret_from_fork+0x10/0x20
[   47.790082] 
[   47.790452] Allocated by task 157:
[   47.791054]  kasan_save_stack+0x3c/0x68
[   47.791829]  kasan_save_track+0x20/0x40
[   47.792481]  kasan_save_alloc_info+0x40/0x58
[   47.793264]  __kasan_kmalloc+0xd4/0xd8
[   47.793866]  __kmalloc_cache_noprof+0x15c/0x3c0
[   47.794573]  kmalloc_uaf_16+0x140/0x438
[   47.795253]  kunit_try_run_case+0x14c/0x3d0
[   47.795895]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.796652]  kthread+0x24c/0x2d0
[   47.797313]  ret_from_fork+0x10/0x20
[   47.797880] 
[   47.798148] Freed by task 157:
[   47.798744]  kasan_save_stack+0x3c/0x68
[   47.799214]  kasan_save_track+0x20/0x40
[   47.800425]  kasan_save_free_info+0x4c/0x78
[   47.800980]  __kasan_slab_free+0x6c/0x98
[   47.801661]  kfree+0x114/0x3c8
[   47.802209]  kmalloc_uaf_16+0x190/0x438
[   47.802802]  kunit_try_run_case+0x14c/0x3d0
[   47.803625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.804399]  kthread+0x24c/0x2d0
[   47.804988]  ret_from_fork+0x10/0x20
[   47.805698] 
[   47.806035] The buggy address belongs to the object at fff00000c40dc800
[   47.806035]  which belongs to the cache kmalloc-16 of size 16
[   47.807576] The buggy address is located 0 bytes inside of
[   47.807576]  freed 16-byte region [fff00000c40dc800, fff00000c40dc810)
[   47.808957] 
[   47.809284] The buggy address belongs to the physical page:
[   47.810213] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1040dc
[   47.811037] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.811925] page_type: f5(slab)
[   47.812522] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   47.813676] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   47.814551] page dumped because: kasan: bad access detected
[   47.815204] 
[   47.815567] Memory state around the buggy address:
[   47.816194]  fff00000c40dc700: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc
[   47.816939]  fff00000c40dc780: fa fb fc fc fa fb fc fc fa fb fc fc 00 00 fc fc
[   47.818633] >fff00000c40dc800: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.819509]                    ^
[   47.819959]  fff00000c40dc880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.820947]  fff00000c40dc900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.821732] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob
[   47.727702] ==================================================================
[   47.728730] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   47.729470] Write of size 16 at addr fff00000c40dc7a0 by task kunit_try_catch/155
[   47.731327] 
[   47.731762] CPU: 1 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   47.732898] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.733690] Hardware name: linux,dummy-virt (DT)
[   47.734809] Call trace:
[   47.735351]  show_stack+0x20/0x38 (C)
[   47.735869]  dump_stack_lvl+0x8c/0xd0
[   47.736430]  print_report+0x118/0x5e0
[   47.736972]  kasan_report+0xc8/0x118
[   47.737507]  __asan_report_store16_noabort+0x20/0x30
[   47.738585]  kmalloc_oob_16+0x3a0/0x3f8
[   47.739146]  kunit_try_run_case+0x14c/0x3d0
[   47.739779]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.740518]  kthread+0x24c/0x2d0
[   47.741035]  ret_from_fork+0x10/0x20
[   47.741635] 
[   47.741942] Allocated by task 155:
[   47.742601]  kasan_save_stack+0x3c/0x68
[   47.743228]  kasan_save_track+0x20/0x40
[   47.744017]  kasan_save_alloc_info+0x40/0x58
[   47.744633]  __kasan_kmalloc+0xd4/0xd8
[   47.745075]  __kmalloc_cache_noprof+0x15c/0x3c0
[   47.746054]  kmalloc_oob_16+0xb4/0x3f8
[   47.746600]  kunit_try_run_case+0x14c/0x3d0
[   47.747238]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.747977]  kthread+0x24c/0x2d0
[   47.748520]  ret_from_fork+0x10/0x20
[   47.749380] 
[   47.749733] The buggy address belongs to the object at fff00000c40dc7a0
[   47.749733]  which belongs to the cache kmalloc-16 of size 16
[   47.751057] The buggy address is located 0 bytes inside of
[   47.751057]  allocated 13-byte region [fff00000c40dc7a0, fff00000c40dc7ad)
[   47.752577] 
[   47.752861] The buggy address belongs to the physical page:
[   47.753863] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1040dc
[   47.754883] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.755517] page_type: f5(slab)
[   47.756093] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   47.757331] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   47.758137] page dumped because: kasan: bad access detected
[   47.758828] 
[   47.759169] Memory state around the buggy address:
[   47.759767]  fff00000c40dc680: 00 00 fc fc 00 06 fc fc 00 06 fc fc fa fb fc fc
[   47.760589]  fff00000c40dc700: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc
[   47.761684] >fff00000c40dc780: fa fb fc fc 00 05 fc fc 00 00 fc fc fc fc fc fc
[   47.762675]                                   ^
[   47.763225]  fff00000c40dc800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.764176]  fff00000c40dc880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.765022] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[   47.664656] ==================================================================
[   47.666031] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   47.667107] Read of size 1 at addr fff00000c4546400 by task kunit_try_catch/153
[   47.668761] 
[   47.669353] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   47.670530] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.671105] Hardware name: linux,dummy-virt (DT)
[   47.671707] Call trace:
[   47.672051]  show_stack+0x20/0x38 (C)
[   47.672714]  dump_stack_lvl+0x8c/0xd0
[   47.673753]  print_report+0x118/0x5e0
[   47.674416]  kasan_report+0xc8/0x118
[   47.675021]  __asan_report_load1_noabort+0x20/0x30
[   47.675729]  krealloc_uaf+0x4c8/0x520
[   47.676338]  kunit_try_run_case+0x14c/0x3d0
[   47.676967]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.677909]  kthread+0x24c/0x2d0
[   47.678816]  ret_from_fork+0x10/0x20
[   47.679456] 
[   47.679789] Allocated by task 153:
[   47.680459]  kasan_save_stack+0x3c/0x68
[   47.680967]  kasan_save_track+0x20/0x40
[   47.681984]  kasan_save_alloc_info+0x40/0x58
[   47.682531]  __kasan_kmalloc+0xd4/0xd8
[   47.682989]  __kmalloc_cache_noprof+0x15c/0x3c0
[   47.683609]  krealloc_uaf+0xc8/0x520
[   47.684133]  kunit_try_run_case+0x14c/0x3d0
[   47.684663]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.685859]  kthread+0x24c/0x2d0
[   47.686323]  ret_from_fork+0x10/0x20
[   47.687421] 
[   47.687935] Freed by task 153:
[   47.688408]  kasan_save_stack+0x3c/0x68
[   47.688878]  kasan_save_track+0x20/0x40
[   47.690327]  kasan_save_free_info+0x4c/0x78
[   47.690914]  __kasan_slab_free+0x6c/0x98
[   47.691539]  kfree+0x114/0x3c8
[   47.692043]  krealloc_uaf+0x12c/0x520
[   47.692615]  kunit_try_run_case+0x14c/0x3d0
[   47.693225]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.694058]  kthread+0x24c/0x2d0
[   47.695022]  ret_from_fork+0x10/0x20
[   47.695519] 
[   47.695888] The buggy address belongs to the object at fff00000c4546400
[   47.695888]  which belongs to the cache kmalloc-256 of size 256
[   47.697315] The buggy address is located 0 bytes inside of
[   47.697315]  freed 256-byte region [fff00000c4546400, fff00000c4546500)
[   47.698885] 
[   47.699190] The buggy address belongs to the physical page:
[   47.700032] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104546
[   47.701345] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.702117] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   47.703134] page_type: f5(slab)
[   47.703658] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   47.704688] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   47.706347] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   47.707329] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   47.708310] head: 0bfffe0000000001 ffffc1ffc3115181 ffffffffffffffff 0000000000000000
[   47.709505] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   47.710270] page dumped because: kasan: bad access detected
[   47.711255] 
[   47.711802] Memory state around the buggy address:
[   47.712392]  fff00000c4546300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.713189]  fff00000c4546380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.714499] >fff00000c4546400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   47.715238]                    ^
[   47.715781]  fff00000c4546480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   47.716897]  fff00000c4546500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.718073] ==================================================================
[   47.610625] ==================================================================
[   47.611859] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   47.612658] Read of size 1 at addr fff00000c4546400 by task kunit_try_catch/153
[   47.613526] 
[   47.613924] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   47.615130] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.616077] Hardware name: linux,dummy-virt (DT)
[   47.616750] Call trace:
[   47.617563]  show_stack+0x20/0x38 (C)
[   47.618127]  dump_stack_lvl+0x8c/0xd0
[   47.618765]  print_report+0x118/0x5e0
[   47.619337]  kasan_report+0xc8/0x118
[   47.619894]  __kasan_check_byte+0x54/0x70
[   47.620512]  krealloc_noprof+0x44/0x360
[   47.621373]  krealloc_uaf+0x180/0x520
[   47.621925]  kunit_try_run_case+0x14c/0x3d0
[   47.622644]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.623486]  kthread+0x24c/0x2d0
[   47.624183]  ret_from_fork+0x10/0x20
[   47.624745] 
[   47.625330] Allocated by task 153:
[   47.625807]  kasan_save_stack+0x3c/0x68
[   47.626412]  kasan_save_track+0x20/0x40
[   47.626992]  kasan_save_alloc_info+0x40/0x58
[   47.627594]  __kasan_kmalloc+0xd4/0xd8
[   47.628065]  __kmalloc_cache_noprof+0x15c/0x3c0
[   47.628827]  krealloc_uaf+0xc8/0x520
[   47.630350]  kunit_try_run_case+0x14c/0x3d0
[   47.631162]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.631878]  kthread+0x24c/0x2d0
[   47.632454]  ret_from_fork+0x10/0x20
[   47.632841] 
[   47.633253] Freed by task 153:
[   47.633810]  kasan_save_stack+0x3c/0x68
[   47.634329]  kasan_save_track+0x20/0x40
[   47.634889]  kasan_save_free_info+0x4c/0x78
[   47.635705]  __kasan_slab_free+0x6c/0x98
[   47.636220]  kfree+0x114/0x3c8
[   47.636744]  krealloc_uaf+0x12c/0x520
[   47.637451]  kunit_try_run_case+0x14c/0x3d0
[   47.638078]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.638777]  kthread+0x24c/0x2d0
[   47.639377]  ret_from_fork+0x10/0x20
[   47.639878] 
[   47.640332] The buggy address belongs to the object at fff00000c4546400
[   47.640332]  which belongs to the cache kmalloc-256 of size 256
[   47.642057] The buggy address is located 0 bytes inside of
[   47.642057]  freed 256-byte region [fff00000c4546400, fff00000c4546500)
[   47.643532] 
[   47.643855] The buggy address belongs to the physical page:
[   47.644503] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104546
[   47.645788] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.646732] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   47.647636] page_type: f5(slab)
[   47.648148] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   47.649080] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   47.650571] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   47.651443] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   47.652497] head: 0bfffe0000000001 ffffc1ffc3115181 ffffffffffffffff 0000000000000000
[   47.653643] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   47.654751] page dumped because: kasan: bad access detected
[   47.655264] 
[   47.655656] Memory state around the buggy address:
[   47.656247]  fff00000c4546300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.657223]  fff00000c4546380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.657957] >fff00000c4546400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   47.659277]                    ^
[   47.659805]  fff00000c4546480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   47.660650]  fff00000c4546500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.661761] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   47.234330] ==================================================================
[   47.235174] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   47.237224] Write of size 1 at addr fff00000c45462ea by task kunit_try_catch/147
[   47.238997] 
[   47.239402] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   47.240601] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.241247] Hardware name: linux,dummy-virt (DT)
[   47.241882] Call trace:
[   47.242242]  show_stack+0x20/0x38 (C)
[   47.243007]  dump_stack_lvl+0x8c/0xd0
[   47.243645]  print_report+0x118/0x5e0
[   47.244224]  kasan_report+0xc8/0x118
[   47.244839]  __asan_report_store1_noabort+0x20/0x30
[   47.245585]  krealloc_less_oob_helper+0xae4/0xc50
[   47.246355]  krealloc_less_oob+0x20/0x38
[   47.246989]  kunit_try_run_case+0x14c/0x3d0
[   47.247683]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.248487]  kthread+0x24c/0x2d0
[   47.249083]  ret_from_fork+0x10/0x20
[   47.249695] 
[   47.250026] Allocated by task 147:
[   47.250584]  kasan_save_stack+0x3c/0x68
[   47.251264]  kasan_save_track+0x20/0x40
[   47.251943]  kasan_save_alloc_info+0x40/0x58
[   47.252587]  __kasan_krealloc+0x118/0x178
[   47.253229]  krealloc_noprof+0x128/0x360
[   47.253999]  krealloc_less_oob_helper+0x168/0xc50
[   47.254736]  krealloc_less_oob+0x20/0x38
[   47.255453]  kunit_try_run_case+0x14c/0x3d0
[   47.256205]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.256990]  kthread+0x24c/0x2d0
[   47.257716]  ret_from_fork+0x10/0x20
[   47.258379] 
[   47.258772] The buggy address belongs to the object at fff00000c4546200
[   47.258772]  which belongs to the cache kmalloc-256 of size 256
[   47.260222] The buggy address is located 33 bytes to the right of
[   47.260222]  allocated 201-byte region [fff00000c4546200, fff00000c45462c9)
[   47.261625] 
[   47.262070] The buggy address belongs to the physical page:
[   47.262861] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104546
[   47.263895] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.264878] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   47.265778] page_type: f5(slab)
[   47.266343] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   47.267336] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   47.268361] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   47.269334] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   47.270436] head: 0bfffe0000000001 ffffc1ffc3115181 ffffffffffffffff 0000000000000000
[   47.271414] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   47.272358] page dumped because: kasan: bad access detected
[   47.273090] 
[   47.273429] Memory state around the buggy address:
[   47.274088]  fff00000c4546180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.275066]  fff00000c4546200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.275975] >fff00000c4546280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   47.276861]                                                           ^
[   47.277750]  fff00000c4546300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.278645]  fff00000c4546380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.279548] ==================================================================
[   47.528186] ==================================================================
[   47.529366] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   47.530537] Write of size 1 at addr fff00000c65760ea by task kunit_try_catch/151
[   47.531837] 
[   47.532182] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   47.533547] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.534079] Hardware name: linux,dummy-virt (DT)
[   47.535983] Call trace:
[   47.537139]  show_stack+0x20/0x38 (C)
[   47.538319]  dump_stack_lvl+0x8c/0xd0
[   47.539386]  print_report+0x118/0x5e0
[   47.539868]  kasan_report+0xc8/0x118
[   47.540884]  __asan_report_store1_noabort+0x20/0x30
[   47.542183]  krealloc_less_oob_helper+0xae4/0xc50
[   47.543444]  krealloc_large_less_oob+0x20/0x38
[   47.544424]  kunit_try_run_case+0x14c/0x3d0
[   47.545248]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.546532]  kthread+0x24c/0x2d0
[   47.547205]  ret_from_fork+0x10/0x20
[   47.547777] 
[   47.548104] The buggy address belongs to the physical page:
[   47.548796] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106574
[   47.549602] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.551069] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   47.552457] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   47.553241] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   47.554383] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   47.555724] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   47.556422] head: 0bfffe0000000002 ffffc1ffc3195d01 ffffffffffffffff 0000000000000000
[   47.557346] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   47.558177] page dumped because: kasan: bad access detected
[   47.558879] 
[   47.559193] Memory state around the buggy address:
[   47.559979]  fff00000c6575f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.560958]  fff00000c6576000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.562061] >fff00000c6576080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   47.563105]                                                           ^
[   47.564065]  fff00000c6576100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   47.564898]  fff00000c6576180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   47.565653] ==================================================================
[   47.192643] ==================================================================
[   47.193358] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   47.194094] Write of size 1 at addr fff00000c45462da by task kunit_try_catch/147
[   47.194897] 
[   47.195370] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   47.196514] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.197058] Hardware name: linux,dummy-virt (DT)
[   47.197746] Call trace:
[   47.198145]  show_stack+0x20/0x38 (C)
[   47.198670]  dump_stack_lvl+0x8c/0xd0
[   47.199276]  print_report+0x118/0x5e0
[   47.199829]  kasan_report+0xc8/0x118
[   47.200437]  __asan_report_store1_noabort+0x20/0x30
[   47.201069]  krealloc_less_oob_helper+0xa80/0xc50
[   47.201715]  krealloc_less_oob+0x20/0x38
[   47.202224]  kunit_try_run_case+0x14c/0x3d0
[   47.202902]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.203528]  kthread+0x24c/0x2d0
[   47.204175]  ret_from_fork+0x10/0x20
[   47.204739] 
[   47.205135] Allocated by task 147:
[   47.205689]  kasan_save_stack+0x3c/0x68
[   47.206183]  kasan_save_track+0x20/0x40
[   47.206871]  kasan_save_alloc_info+0x40/0x58
[   47.207542]  __kasan_krealloc+0x118/0x178
[   47.208080]  krealloc_noprof+0x128/0x360
[   47.208687]  krealloc_less_oob_helper+0x168/0xc50
[   47.209363]  krealloc_less_oob+0x20/0x38
[   47.209851]  kunit_try_run_case+0x14c/0x3d0
[   47.210507]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.211211]  kthread+0x24c/0x2d0
[   47.211727]  ret_from_fork+0x10/0x20
[   47.212254] 
[   47.212662] The buggy address belongs to the object at fff00000c4546200
[   47.212662]  which belongs to the cache kmalloc-256 of size 256
[   47.214023] The buggy address is located 17 bytes to the right of
[   47.214023]  allocated 201-byte region [fff00000c4546200, fff00000c45462c9)
[   47.215545] 
[   47.215843] The buggy address belongs to the physical page:
[   47.216471] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104546
[   47.217391] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.218251] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   47.219081] page_type: f5(slab)
[   47.219596] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   47.220517] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   47.221500] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   47.222767] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   47.223804] head: 0bfffe0000000001 ffffc1ffc3115181 ffffffffffffffff 0000000000000000
[   47.224408] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   47.224967] page dumped because: kasan: bad access detected
[   47.226066] 
[   47.226379] Memory state around the buggy address:
[   47.227165]  fff00000c4546180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.228017]  fff00000c4546200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.228993] >fff00000c4546280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   47.229757]                                                     ^
[   47.230480]  fff00000c4546300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.231473]  fff00000c4546380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.232436] ==================================================================
[   47.567264] ==================================================================
[   47.568427] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   47.569176] Write of size 1 at addr fff00000c65760eb by task kunit_try_catch/151
[   47.570044] 
[   47.570502] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   47.572193] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.573408] Hardware name: linux,dummy-virt (DT)
[   47.574533] Call trace:
[   47.574923]  show_stack+0x20/0x38 (C)
[   47.575617]  dump_stack_lvl+0x8c/0xd0
[   47.576104]  print_report+0x118/0x5e0
[   47.576775]  kasan_report+0xc8/0x118
[   47.577764]  __asan_report_store1_noabort+0x20/0x30
[   47.578515]  krealloc_less_oob_helper+0xa58/0xc50
[   47.579158]  krealloc_large_less_oob+0x20/0x38
[   47.579734]  kunit_try_run_case+0x14c/0x3d0
[   47.580412]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.581277]  kthread+0x24c/0x2d0
[   47.581824]  ret_from_fork+0x10/0x20
[   47.582369] 
[   47.582709] The buggy address belongs to the physical page:
[   47.584152] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106574
[   47.585140] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.586150] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   47.587050] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   47.588067] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   47.589066] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   47.590411] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   47.591463] head: 0bfffe0000000002 ffffc1ffc3195d01 ffffffffffffffff 0000000000000000
[   47.592355] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   47.593412] page dumped because: kasan: bad access detected
[   47.594086] 
[   47.594482] Memory state around the buggy address:
[   47.595127]  fff00000c6575f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.596322]  fff00000c6576000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.597582] >fff00000c6576080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   47.598225]                                                           ^
[   47.598966]  fff00000c6576100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   47.600168]  fff00000c6576180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   47.600990] ==================================================================
[   47.095888] ==================================================================
[   47.098064] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   47.099235] Write of size 1 at addr fff00000c45462c9 by task kunit_try_catch/147
[   47.100314] 
[   47.100734] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   47.102725] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.103415] Hardware name: linux,dummy-virt (DT)
[   47.104013] Call trace:
[   47.104431]  show_stack+0x20/0x38 (C)
[   47.104927]  dump_stack_lvl+0x8c/0xd0
[   47.105422]  print_report+0x118/0x5e0
[   47.106233]  kasan_report+0xc8/0x118
[   47.107103]  __asan_report_store1_noabort+0x20/0x30
[   47.107809]  krealloc_less_oob_helper+0xa48/0xc50
[   47.108443]  krealloc_less_oob+0x20/0x38
[   47.109137]  kunit_try_run_case+0x14c/0x3d0
[   47.109829]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.110674]  kthread+0x24c/0x2d0
[   47.111355]  ret_from_fork+0x10/0x20
[   47.111893] 
[   47.112326] Allocated by task 147:
[   47.112843]  kasan_save_stack+0x3c/0x68
[   47.113878]  kasan_save_track+0x20/0x40
[   47.114590]  kasan_save_alloc_info+0x40/0x58
[   47.115734]  __kasan_krealloc+0x118/0x178
[   47.116383]  krealloc_noprof+0x128/0x360
[   47.117014]  krealloc_less_oob_helper+0x168/0xc50
[   47.118027]  krealloc_less_oob+0x20/0x38
[   47.118805]  kunit_try_run_case+0x14c/0x3d0
[   47.119474]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.120435]  kthread+0x24c/0x2d0
[   47.121263]  ret_from_fork+0x10/0x20
[   47.122020] 
[   47.122372] The buggy address belongs to the object at fff00000c4546200
[   47.122372]  which belongs to the cache kmalloc-256 of size 256
[   47.123770] The buggy address is located 0 bytes to the right of
[   47.123770]  allocated 201-byte region [fff00000c4546200, fff00000c45462c9)
[   47.125286] 
[   47.125925] The buggy address belongs to the physical page:
[   47.126628] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104546
[   47.127762] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.128673] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   47.129666] page_type: f5(slab)
[   47.130137] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   47.131204] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   47.132214] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   47.133262] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   47.134752] head: 0bfffe0000000001 ffffc1ffc3115181 ffffffffffffffff 0000000000000000
[   47.135612] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   47.136542] page dumped because: kasan: bad access detected
[   47.137226] 
[   47.137600] Memory state around the buggy address:
[   47.138248]  fff00000c4546180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.139374]  fff00000c4546200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.140186] >fff00000c4546280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   47.141179]                                               ^
[   47.141818]  fff00000c4546300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.142817]  fff00000c4546380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.143734] ==================================================================
[   47.447862] ==================================================================
[   47.449621] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   47.450678] Write of size 1 at addr fff00000c65760d0 by task kunit_try_catch/151
[   47.451499] 
[   47.451819] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   47.453003] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.453693] Hardware name: linux,dummy-virt (DT)
[   47.454757] Call trace:
[   47.455755]  show_stack+0x20/0x38 (C)
[   47.456413]  dump_stack_lvl+0x8c/0xd0
[   47.456875]  print_report+0x118/0x5e0
[   47.457870]  kasan_report+0xc8/0x118
[   47.458477]  __asan_report_store1_noabort+0x20/0x30
[   47.459088]  krealloc_less_oob_helper+0xb9c/0xc50
[   47.459721]  krealloc_large_less_oob+0x20/0x38
[   47.460230]  kunit_try_run_case+0x14c/0x3d0
[   47.460950]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.462568]  kthread+0x24c/0x2d0
[   47.463147]  ret_from_fork+0x10/0x20
[   47.463834] 
[   47.464199] The buggy address belongs to the physical page:
[   47.464948] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106574
[   47.466386] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.467562] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   47.468417] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   47.469422] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   47.470178] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   47.471044] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   47.472279] head: 0bfffe0000000002 ffffc1ffc3195d01 ffffffffffffffff 0000000000000000
[   47.473487] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   47.474477] page dumped because: kasan: bad access detected
[   47.475163] 
[   47.475648] Memory state around the buggy address:
[   47.476885]  fff00000c6575f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.479310]  fff00000c6576000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.479873] >fff00000c6576080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   47.480444]                                                  ^
[   47.480916]  fff00000c6576100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   47.483839]  fff00000c6576180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   47.486146] ==================================================================
[   47.148402] ==================================================================
[   47.149180] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   47.150116] Write of size 1 at addr fff00000c45462d0 by task kunit_try_catch/147
[   47.151561] 
[   47.151964] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   47.153206] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.153786] Hardware name: linux,dummy-virt (DT)
[   47.154445] Call trace:
[   47.154834]  show_stack+0x20/0x38 (C)
[   47.155377]  dump_stack_lvl+0x8c/0xd0
[   47.155902]  print_report+0x118/0x5e0
[   47.156482]  kasan_report+0xc8/0x118
[   47.157040]  __asan_report_store1_noabort+0x20/0x30
[   47.157713]  krealloc_less_oob_helper+0xb9c/0xc50
[   47.158405]  krealloc_less_oob+0x20/0x38
[   47.159008]  kunit_try_run_case+0x14c/0x3d0
[   47.159668]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.160326]  kthread+0x24c/0x2d0
[   47.160946]  ret_from_fork+0x10/0x20
[   47.161506] 
[   47.161808] Allocated by task 147:
[   47.162341]  kasan_save_stack+0x3c/0x68
[   47.162936]  kasan_save_track+0x20/0x40
[   47.163473]  kasan_save_alloc_info+0x40/0x58
[   47.164095]  __kasan_krealloc+0x118/0x178
[   47.164829]  krealloc_noprof+0x128/0x360
[   47.165356]  krealloc_less_oob_helper+0x168/0xc50
[   47.166161]  krealloc_less_oob+0x20/0x38
[   47.166674]  kunit_try_run_case+0x14c/0x3d0
[   47.167347]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.168140]  kthread+0x24c/0x2d0
[   47.168798]  ret_from_fork+0x10/0x20
[   47.169268] 
[   47.169637] The buggy address belongs to the object at fff00000c4546200
[   47.169637]  which belongs to the cache kmalloc-256 of size 256
[   47.171038] The buggy address is located 7 bytes to the right of
[   47.171038]  allocated 201-byte region [fff00000c4546200, fff00000c45462c9)
[   47.172421] 
[   47.172718] The buggy address belongs to the physical page:
[   47.173369] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104546
[   47.174257] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.175136] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   47.175990] page_type: f5(slab)
[   47.176474] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   47.177368] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   47.178357] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   47.179233] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   47.180137] head: 0bfffe0000000001 ffffc1ffc3115181 ffffffffffffffff 0000000000000000
[   47.181066] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   47.181985] page dumped because: kasan: bad access detected
[   47.182641] 
[   47.182942] Memory state around the buggy address:
[   47.183544]  fff00000c4546180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.184485]  fff00000c4546200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.185350] >fff00000c4546280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   47.186213]                                                  ^
[   47.186954]  fff00000c4546300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.188150]  fff00000c4546380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.189009] ==================================================================
[   47.411330] ==================================================================
[   47.412577] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   47.413537] Write of size 1 at addr fff00000c65760c9 by task kunit_try_catch/151
[   47.414850] 
[   47.415173] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   47.416515] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.417189] Hardware name: linux,dummy-virt (DT)
[   47.417937] Call trace:
[   47.418731]  show_stack+0x20/0x38 (C)
[   47.419251]  dump_stack_lvl+0x8c/0xd0
[   47.419857]  print_report+0x118/0x5e0
[   47.420490]  kasan_report+0xc8/0x118
[   47.421337]  __asan_report_store1_noabort+0x20/0x30
[   47.422444]  krealloc_less_oob_helper+0xa48/0xc50
[   47.423281]  krealloc_large_less_oob+0x20/0x38
[   47.424091]  kunit_try_run_case+0x14c/0x3d0
[   47.424735]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.425847]  kthread+0x24c/0x2d0
[   47.426553]  ret_from_fork+0x10/0x20
[   47.427156] 
[   47.427572] The buggy address belongs to the physical page:
[   47.428233] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106574
[   47.429285] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.430482] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   47.431386] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   47.432279] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   47.433767] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   47.434626] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   47.435625] head: 0bfffe0000000002 ffffc1ffc3195d01 ffffffffffffffff 0000000000000000
[   47.436656] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   47.437682] page dumped because: kasan: bad access detected
[   47.438703] 
[   47.438976] Memory state around the buggy address:
[   47.439656]  fff00000c6575f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.440838]  fff00000c6576000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.442053] >fff00000c6576080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   47.443105]                                               ^
[   47.443954]  fff00000c6576100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   47.444900]  fff00000c6576180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   47.445927] ==================================================================
[   47.281659] ==================================================================
[   47.282692] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   47.283867] Write of size 1 at addr fff00000c45462eb by task kunit_try_catch/147
[   47.285183] 
[   47.285736] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   47.286793] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.287069] Hardware name: linux,dummy-virt (DT)
[   47.287438] Call trace:
[   47.288027]  show_stack+0x20/0x38 (C)
[   47.288861]  dump_stack_lvl+0x8c/0xd0
[   47.289417]  print_report+0x118/0x5e0
[   47.290149]  kasan_report+0xc8/0x118
[   47.290721]  __asan_report_store1_noabort+0x20/0x30
[   47.291062]  krealloc_less_oob_helper+0xa58/0xc50
[   47.291674]  krealloc_less_oob+0x20/0x38
[   47.292554]  kunit_try_run_case+0x14c/0x3d0
[   47.293052]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.293984]  kthread+0x24c/0x2d0
[   47.294672]  ret_from_fork+0x10/0x20
[   47.295123] 
[   47.295449] Allocated by task 147:
[   47.295901]  kasan_save_stack+0x3c/0x68
[   47.296589]  kasan_save_track+0x20/0x40
[   47.297114]  kasan_save_alloc_info+0x40/0x58
[   47.297937]  __kasan_krealloc+0x118/0x178
[   47.298509]  krealloc_noprof+0x128/0x360
[   47.299006]  krealloc_less_oob_helper+0x168/0xc50
[   47.299820]  krealloc_less_oob+0x20/0x38
[   47.300386]  kunit_try_run_case+0x14c/0x3d0
[   47.301003]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.301933]  kthread+0x24c/0x2d0
[   47.302428]  ret_from_fork+0x10/0x20
[   47.303065] 
[   47.303504] The buggy address belongs to the object at fff00000c4546200
[   47.303504]  which belongs to the cache kmalloc-256 of size 256
[   47.305192] The buggy address is located 34 bytes to the right of
[   47.305192]  allocated 201-byte region [fff00000c4546200, fff00000c45462c9)
[   47.306701] 
[   47.307025] The buggy address belongs to the physical page:
[   47.308020] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104546
[   47.308903] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.309681] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   47.310671] page_type: f5(slab)
[   47.311210] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   47.312202] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   47.313133] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   47.314044] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   47.315055] head: 0bfffe0000000001 ffffc1ffc3115181 ffffffffffffffff 0000000000000000
[   47.316013] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   47.316971] page dumped because: kasan: bad access detected
[   47.317844] 
[   47.318322] Memory state around the buggy address:
[   47.319034]  fff00000c4546180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.319904]  fff00000c4546200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.320746] >fff00000c4546280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   47.321602]                                                           ^
[   47.322332]  fff00000c4546300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.323101]  fff00000c4546380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.323987] ==================================================================
[   47.491037] ==================================================================
[   47.491973] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   47.492980] Write of size 1 at addr fff00000c65760da by task kunit_try_catch/151
[   47.494762] 
[   47.495168] CPU: 0 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   47.496530] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.497156] Hardware name: linux,dummy-virt (DT)
[   47.498122] Call trace:
[   47.498589]  show_stack+0x20/0x38 (C)
[   47.499344]  dump_stack_lvl+0x8c/0xd0
[   47.499980]  print_report+0x118/0x5e0
[   47.500536]  kasan_report+0xc8/0x118
[   47.501934]  __asan_report_store1_noabort+0x20/0x30
[   47.502634]  krealloc_less_oob_helper+0xa80/0xc50
[   47.503255]  krealloc_large_less_oob+0x20/0x38
[   47.503906]  kunit_try_run_case+0x14c/0x3d0
[   47.504606]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.505549]  kthread+0x24c/0x2d0
[   47.506310]  ret_from_fork+0x10/0x20
[   47.507048] 
[   47.507466] The buggy address belongs to the physical page:
[   47.508135] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106574
[   47.509902] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.510872] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   47.511846] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   47.512810] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   47.514391] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   47.515332] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   47.516187] head: 0bfffe0000000002 ffffc1ffc3195d01 ffffffffffffffff 0000000000000000
[   47.517214] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   47.518083] page dumped because: kasan: bad access detected
[   47.518869] 
[   47.519809] Memory state around the buggy address:
[   47.520621]  fff00000c6575f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.521542]  fff00000c6576000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.522506] >fff00000c6576080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   47.523406]                                                     ^
[   47.524189]  fff00000c6576100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   47.525105]  fff00000c6576180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   47.526225] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   47.370177] ==================================================================
[   47.371036] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680
[   47.371709] Write of size 1 at addr fff00000c65fa0f0 by task kunit_try_catch/149
[   47.372477] 
[   47.372772] CPU: 1 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   47.373957] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.374695] Hardware name: linux,dummy-virt (DT)
[   47.375417] Call trace:
[   47.375817]  show_stack+0x20/0x38 (C)
[   47.376436]  dump_stack_lvl+0x8c/0xd0
[   47.376952]  print_report+0x118/0x5e0
[   47.377601]  kasan_report+0xc8/0x118
[   47.378328]  __asan_report_store1_noabort+0x20/0x30
[   47.379186]  krealloc_more_oob_helper+0x5c8/0x680
[   47.380004]  krealloc_large_more_oob+0x20/0x38
[   47.380705]  kunit_try_run_case+0x14c/0x3d0
[   47.381395]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.382165]  kthread+0x24c/0x2d0
[   47.382784]  ret_from_fork+0x10/0x20
[   47.383343] 
[   47.383687] The buggy address belongs to the physical page:
[   47.384541] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065f8
[   47.385596] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.386571] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   47.387488] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   47.388436] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   47.389385] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   47.390329] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   47.391320] head: 0bfffe0000000002 ffffc1ffc3197e01 ffffffffffffffff 0000000000000000
[   47.392250] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   47.393196] page dumped because: kasan: bad access detected
[   47.393958] 
[   47.394414] Memory state around the buggy address:
[   47.395113]  fff00000c65f9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.396048]  fff00000c65fa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.397017] >fff00000c65fa080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   47.397887]                                                              ^
[   47.398791]  fff00000c65fa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   47.399802]  fff00000c65fa180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   47.400742] ==================================================================
[   47.039752] ==================================================================
[   47.040555] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680
[   47.042209] Write of size 1 at addr fff00000c45460f0 by task kunit_try_catch/145
[   47.043074] 
[   47.043457] CPU: 1 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   47.044506] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.045497] Hardware name: linux,dummy-virt (DT)
[   47.046162] Call trace:
[   47.046573]  show_stack+0x20/0x38 (C)
[   47.047151]  dump_stack_lvl+0x8c/0xd0
[   47.047778]  print_report+0x118/0x5e0
[   47.048316]  kasan_report+0xc8/0x118
[   47.048869]  __asan_report_store1_noabort+0x20/0x30
[   47.049762]  krealloc_more_oob_helper+0x5c8/0x680
[   47.050453]  krealloc_more_oob+0x20/0x38
[   47.051012]  kunit_try_run_case+0x14c/0x3d0
[   47.051858]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.052546]  kthread+0x24c/0x2d0
[   47.053155]  ret_from_fork+0x10/0x20
[   47.054013] 
[   47.054254] Allocated by task 145:
[   47.055046]  kasan_save_stack+0x3c/0x68
[   47.055701]  kasan_save_track+0x20/0x40
[   47.056472]  kasan_save_alloc_info+0x40/0x58
[   47.057091]  __kasan_krealloc+0x118/0x178
[   47.057788]  krealloc_noprof+0x128/0x360
[   47.058445]  krealloc_more_oob_helper+0x168/0x680
[   47.059234]  krealloc_more_oob+0x20/0x38
[   47.059939]  kunit_try_run_case+0x14c/0x3d0
[   47.060685]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.061364]  kthread+0x24c/0x2d0
[   47.062606]  ret_from_fork+0x10/0x20
[   47.063091] 
[   47.063386] The buggy address belongs to the object at fff00000c4546000
[   47.063386]  which belongs to the cache kmalloc-256 of size 256
[   47.064981] The buggy address is located 5 bytes to the right of
[   47.064981]  allocated 235-byte region [fff00000c4546000, fff00000c45460eb)
[   47.066749] 
[   47.067092] The buggy address belongs to the physical page:
[   47.067942] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104546
[   47.068951] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.070153] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   47.071113] page_type: f5(slab)
[   47.071579] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   47.072377] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   47.073499] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   47.074653] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   47.075747] head: 0bfffe0000000001 ffffc1ffc3115181 ffffffffffffffff 0000000000000000
[   47.076824] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   47.078113] page dumped because: kasan: bad access detected
[   47.079004] 
[   47.079614] Memory state around the buggy address:
[   47.080218]  fff00000c4545f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.081109]  fff00000c4546000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.082587] >fff00000c4546080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   47.083399]                                                              ^
[   47.084261]  fff00000c4546100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.084887]  fff00000c4546180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.086203] ==================================================================
[   47.334063] ==================================================================
[   47.335501] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680
[   47.336439] Write of size 1 at addr fff00000c65fa0eb by task kunit_try_catch/149
[   47.337323] 
[   47.338208] CPU: 1 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   47.339441] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.339978] Hardware name: linux,dummy-virt (DT)
[   47.340723] Call trace:
[   47.341200]  show_stack+0x20/0x38 (C)
[   47.342065]  dump_stack_lvl+0x8c/0xd0
[   47.342725]  print_report+0x118/0x5e0
[   47.343350]  kasan_report+0xc8/0x118
[   47.343955]  __asan_report_store1_noabort+0x20/0x30
[   47.344673]  krealloc_more_oob_helper+0x614/0x680
[   47.345780]  krealloc_large_more_oob+0x20/0x38
[   47.346453]  kunit_try_run_case+0x14c/0x3d0
[   47.347111]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.347904]  kthread+0x24c/0x2d0
[   47.348541]  ret_from_fork+0x10/0x20
[   47.349486] 
[   47.349859] The buggy address belongs to the physical page:
[   47.350669] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065f8
[   47.351663] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.352607] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   47.353903] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   47.355026] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   47.356104] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   47.357207] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   47.358674] head: 0bfffe0000000002 ffffc1ffc3197e01 ffffffffffffffff 0000000000000000
[   47.360011] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   47.361249] page dumped because: kasan: bad access detected
[   47.361893] 
[   47.362219] Memory state around the buggy address:
[   47.362820]  fff00000c65f9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.363824]  fff00000c65fa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.364719] >fff00000c65fa080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   47.365627]                                                           ^
[   47.366537]  fff00000c65fa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   47.367510]  fff00000c65fa180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   47.368428] ==================================================================
[   46.993659] ==================================================================
[   46.994790] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680
[   46.995412] Write of size 1 at addr fff00000c45460eb by task kunit_try_catch/145
[   46.996369] 
[   46.996725] CPU: 1 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   46.997858] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.998348] Hardware name: linux,dummy-virt (DT)
[   46.998913] Call trace:
[   46.999372]  show_stack+0x20/0x38 (C)
[   47.000161]  dump_stack_lvl+0x8c/0xd0
[   47.000697]  print_report+0x118/0x5e0
[   47.001613]  kasan_report+0xc8/0x118
[   47.002195]  __asan_report_store1_noabort+0x20/0x30
[   47.002996]  krealloc_more_oob_helper+0x614/0x680
[   47.003833]  krealloc_more_oob+0x20/0x38
[   47.004392]  kunit_try_run_case+0x14c/0x3d0
[   47.005284]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.006091]  kthread+0x24c/0x2d0
[   47.006591]  ret_from_fork+0x10/0x20
[   47.007330] 
[   47.007693] Allocated by task 145:
[   47.008186]  kasan_save_stack+0x3c/0x68
[   47.008820]  kasan_save_track+0x20/0x40
[   47.009692]  kasan_save_alloc_info+0x40/0x58
[   47.010420]  __kasan_krealloc+0x118/0x178
[   47.010905]  krealloc_noprof+0x128/0x360
[   47.011640]  krealloc_more_oob_helper+0x168/0x680
[   47.012470]  krealloc_more_oob+0x20/0x38
[   47.013809]  kunit_try_run_case+0x14c/0x3d0
[   47.014499]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.015163]  kthread+0x24c/0x2d0
[   47.015697]  ret_from_fork+0x10/0x20
[   47.016234] 
[   47.016936] The buggy address belongs to the object at fff00000c4546000
[   47.016936]  which belongs to the cache kmalloc-256 of size 256
[   47.018544] The buggy address is located 0 bytes to the right of
[   47.018544]  allocated 235-byte region [fff00000c4546000, fff00000c45460eb)
[   47.019884] 
[   47.020169] The buggy address belongs to the physical page:
[   47.020938] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104546
[   47.022279] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   47.023181] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   47.024052] page_type: f5(slab)
[   47.024602] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   47.025894] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   47.026943] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   47.027820] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   47.028764] head: 0bfffe0000000001 ffffc1ffc3115181 ffffffffffffffff 0000000000000000
[   47.029970] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   47.030915] page dumped because: kasan: bad access detected
[   47.031503] 
[   47.031841] Memory state around the buggy address:
[   47.032518]  fff00000c4545f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.033972]  fff00000c4546000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   47.034594] >fff00000c4546080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   47.035543]                                                           ^
[   47.036344]  fff00000c4546100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.037178]  fff00000c4546180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.038075] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[   46.952850] ==================================================================
[   46.954601] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   46.955363] Read of size 1 at addr fff00000c6630000 by task kunit_try_catch/143
[   46.956230] 
[   46.956696] CPU: 1 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   46.957821] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.958554] Hardware name: linux,dummy-virt (DT)
[   46.959140] Call trace:
[   46.959503]  show_stack+0x20/0x38 (C)
[   46.960036]  dump_stack_lvl+0x8c/0xd0
[   46.960654]  print_report+0x118/0x5e0
[   46.961533]  kasan_report+0xc8/0x118
[   46.961989]  __asan_report_load1_noabort+0x20/0x30
[   46.962775]  page_alloc_uaf+0x328/0x350
[   46.963382]  kunit_try_run_case+0x14c/0x3d0
[   46.963972]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.964715]  kthread+0x24c/0x2d0
[   46.965313]  ret_from_fork+0x10/0x20
[   46.966013] 
[   46.966390] The buggy address belongs to the physical page:
[   46.967167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106630
[   46.968124] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.969023] page_type: f0(buddy)
[   46.969497] raw: 0bfffe0000000000 fff00000ff6150e0 fff00000ff6150e0 0000000000000000
[   46.970606] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000
[   46.971873] page dumped because: kasan: bad access detected
[   46.972636] 
[   46.973411] Memory state around the buggy address:
[   46.974013]  fff00000c662ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   46.975067]  fff00000c662ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   46.976032] >fff00000c6630000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   46.976925]                    ^
[   46.977599]  fff00000c6630080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   46.978583]  fff00000c6630100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   46.979406] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[   46.899686] ==================================================================
[   46.900942] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   46.902133] Free of addr fff00000c6574001 by task kunit_try_catch/139
[   46.903123] 
[   46.903525] CPU: 0 UID: 0 PID: 139 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   46.904779] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.905408] Hardware name: linux,dummy-virt (DT)
[   46.905954] Call trace:
[   46.906838]  show_stack+0x20/0x38 (C)
[   46.907323]  dump_stack_lvl+0x8c/0xd0
[   46.907958]  print_report+0x118/0x5e0
[   46.908532]  kasan_report_invalid_free+0xb0/0xd8
[   46.909529]  __kasan_kfree_large+0x5c/0xa8
[   46.910120]  free_large_kmalloc+0x58/0x140
[   46.910702]  kfree+0x270/0x3c8
[   46.911192]  kmalloc_large_invalid_free+0x108/0x270
[   46.912466]  kunit_try_run_case+0x14c/0x3d0
[   46.913432]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.914119]  kthread+0x24c/0x2d0
[   46.914794]  ret_from_fork+0x10/0x20
[   46.915371] 
[   46.915729] The buggy address belongs to the physical page:
[   46.916477] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106574
[   46.917579] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   46.918502] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   46.919891] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   46.920956] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   46.921828] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   46.922986] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   46.924005] head: 0bfffe0000000002 ffffc1ffc3195d01 ffffffffffffffff 0000000000000000
[   46.925205] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   46.926438] page dumped because: kasan: bad access detected
[   46.927251] 
[   46.927588] Memory state around the buggy address:
[   46.928343]  fff00000c6573f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.929157]  fff00000c6573f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.930357] >fff00000c6574000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   46.931205]                    ^
[   46.931673]  fff00000c6574080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   46.932538]  fff00000c6574100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   46.933802] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[   46.860364] ==================================================================
[   46.862355] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   46.863344] Read of size 1 at addr fff00000c6570000 by task kunit_try_catch/137
[   46.864387] 
[   46.864941] CPU: 0 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   46.866663] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.867137] Hardware name: linux,dummy-virt (DT)
[   46.867979] Call trace:
[   46.868387]  show_stack+0x20/0x38 (C)
[   46.868918]  dump_stack_lvl+0x8c/0xd0
[   46.869804]  print_report+0x118/0x5e0
[   46.870339]  kasan_report+0xc8/0x118
[   46.870918]  __asan_report_load1_noabort+0x20/0x30
[   46.871887]  kmalloc_large_uaf+0x2cc/0x2f8
[   46.872479]  kunit_try_run_case+0x14c/0x3d0
[   46.873507]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.874371]  kthread+0x24c/0x2d0
[   46.874910]  ret_from_fork+0x10/0x20
[   46.875469] 
[   46.875751] The buggy address belongs to the physical page:
[   46.877084] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106570
[   46.877978] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.878832] raw: 0bfffe0000000000 ffffc1ffc3195d08 fff00000da4e3f80 0000000000000000
[   46.880112] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   46.880990] page dumped because: kasan: bad access detected
[   46.882014] 
[   46.882390] Memory state around the buggy address:
[   46.883031]  fff00000c656ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.884421]  fff00000c656ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.885357] >fff00000c6570000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   46.886117]                    ^
[   46.886945]  fff00000c6570080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   46.887826]  fff00000c6570100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   46.888627] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   46.818408] ==================================================================
[   46.819645] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   46.820440] Write of size 1 at addr fff00000c65fa00a by task kunit_try_catch/135
[   46.821214] 
[   46.821768] CPU: 1 UID: 0 PID: 135 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   46.823116] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.823728] Hardware name: linux,dummy-virt (DT)
[   46.824419] Call trace:
[   46.824864]  show_stack+0x20/0x38 (C)
[   46.825574]  dump_stack_lvl+0x8c/0xd0
[   46.826140]  print_report+0x118/0x5e0
[   46.826731]  kasan_report+0xc8/0x118
[   46.827261]  __asan_report_store1_noabort+0x20/0x30
[   46.828007]  kmalloc_large_oob_right+0x278/0x2b8
[   46.828717]  kunit_try_run_case+0x14c/0x3d0
[   46.829445]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.830221]  kthread+0x24c/0x2d0
[   46.830852]  ret_from_fork+0x10/0x20
[   46.831465] 
[   46.831844] The buggy address belongs to the physical page:
[   46.832675] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065f8
[   46.833692] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   46.834634] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   46.835574] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   46.836586] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   46.837549] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   46.838526] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   46.839562] head: 0bfffe0000000002 ffffc1ffc3197e01 ffffffffffffffff 0000000000000000
[   46.840533] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   46.841454] page dumped because: kasan: bad access detected
[   46.842183] 
[   46.842531] Memory state around the buggy address:
[   46.843312]  fff00000c65f9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   46.844203]  fff00000c65f9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   46.845081] >fff00000c65fa000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   46.845970]                       ^
[   46.846573]  fff00000c65fa080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   46.847541]  fff00000c65fa100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   46.848406] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[   46.766945] ==================================================================
[   46.768185] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   46.768981] Write of size 1 at addr fff00000c5d15f00 by task kunit_try_catch/133
[   46.769685] 
[   46.770062] CPU: 1 UID: 0 PID: 133 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   46.771395] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.772391] Hardware name: linux,dummy-virt (DT)
[   46.773223] Call trace:
[   46.773630]  show_stack+0x20/0x38 (C)
[   46.774261]  dump_stack_lvl+0x8c/0xd0
[   46.775067]  print_report+0x118/0x5e0
[   46.775580]  kasan_report+0xc8/0x118
[   46.776231]  __asan_report_store1_noabort+0x20/0x30
[   46.776955]  kmalloc_big_oob_right+0x2a4/0x2f0
[   46.777679]  kunit_try_run_case+0x14c/0x3d0
[   46.778353]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.779134]  kthread+0x24c/0x2d0
[   46.779778]  ret_from_fork+0x10/0x20
[   46.780352] 
[   46.780652] Allocated by task 133:
[   46.781098]  kasan_save_stack+0x3c/0x68
[   46.781795]  kasan_save_track+0x20/0x40
[   46.782364]  kasan_save_alloc_info+0x40/0x58
[   46.783078]  __kasan_kmalloc+0xd4/0xd8
[   46.783718]  __kmalloc_cache_noprof+0x15c/0x3c0
[   46.784340]  kmalloc_big_oob_right+0xb8/0x2f0
[   46.784977]  kunit_try_run_case+0x14c/0x3d0
[   46.785531]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.786204]  kthread+0x24c/0x2d0
[   46.786844]  ret_from_fork+0x10/0x20
[   46.787457] 
[   46.787829] The buggy address belongs to the object at fff00000c5d14000
[   46.787829]  which belongs to the cache kmalloc-8k of size 8192
[   46.789263] The buggy address is located 0 bytes to the right of
[   46.789263]  allocated 7936-byte region [fff00000c5d14000, fff00000c5d15f00)
[   46.790659] 
[   46.790945] The buggy address belongs to the physical page:
[   46.791726] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d10
[   46.792665] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   46.793544] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   46.794334] page_type: f5(slab)
[   46.794904] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   46.795864] raw: 0000000000000000 0000000080020002 00000001f5000000 0000000000000000
[   46.796696] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   46.797700] head: 0000000000000000 0000000080020002 00000001f5000000 0000000000000000
[   46.798683] head: 0bfffe0000000003 ffffc1ffc3174401 ffffffffffffffff 0000000000000000
[   46.799572] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000
[   46.800465] page dumped because: kasan: bad access detected
[   46.801187] 
[   46.801515] Memory state around the buggy address:
[   46.802207]  fff00000c5d15e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   46.803331]  fff00000c5d15e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   46.804228] >fff00000c5d15f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.805195]                    ^
[   46.805843]  fff00000c5d15f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.806780]  fff00000c5d16000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.807650] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[   46.719802] ==================================================================
[   46.720584] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x420/0x490
[   46.721525] Write of size 1 at addr fff00000c60dc478 by task kunit_try_catch/131
[   46.722548] 
[   46.722987] CPU: 1 UID: 0 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   46.724466] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.725377] Hardware name: linux,dummy-virt (DT)
[   46.726047] Call trace:
[   46.726531]  show_stack+0x20/0x38 (C)
[   46.727058]  dump_stack_lvl+0x8c/0xd0
[   46.727697]  print_report+0x118/0x5e0
[   46.728344]  kasan_report+0xc8/0x118
[   46.728848]  __asan_report_store1_noabort+0x20/0x30
[   46.729821]  kmalloc_track_caller_oob_right+0x420/0x490
[   46.730522]  kunit_try_run_case+0x14c/0x3d0
[   46.731125]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.732082]  kthread+0x24c/0x2d0
[   46.732711]  ret_from_fork+0x10/0x20
[   46.733527] 
[   46.733876] Allocated by task 131:
[   46.734326]  kasan_save_stack+0x3c/0x68
[   46.734945]  kasan_save_track+0x20/0x40
[   46.735573]  kasan_save_alloc_info+0x40/0x58
[   46.736162]  __kasan_kmalloc+0xd4/0xd8
[   46.736680]  __kmalloc_node_track_caller_noprof+0x184/0x4b8
[   46.737461]  kmalloc_track_caller_oob_right+0x184/0x490
[   46.738095]  kunit_try_run_case+0x14c/0x3d0
[   46.738718]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.739852]  kthread+0x24c/0x2d0
[   46.740814]  ret_from_fork+0x10/0x20
[   46.741577] 
[   46.741962] The buggy address belongs to the object at fff00000c60dc400
[   46.741962]  which belongs to the cache kmalloc-128 of size 128
[   46.743270] The buggy address is located 0 bytes to the right of
[   46.743270]  allocated 120-byte region [fff00000c60dc400, fff00000c60dc478)
[   46.744966] 
[   46.745260] The buggy address belongs to the physical page:
[   46.746269] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060dc
[   46.747355] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.748129] page_type: f5(slab)
[   46.748630] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   46.749527] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   46.750262] page dumped because: kasan: bad access detected
[   46.751264] 
[   46.751562] Memory state around the buggy address:
[   46.752184]  fff00000c60dc300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   46.753283]  fff00000c60dc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.754152] >fff00000c60dc400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   46.755007]                                                                 ^
[   46.755832]  fff00000c60dc480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.756652]  fff00000c60dc500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.757673] ==================================================================
[   46.678544] ==================================================================
[   46.679710] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x414/0x490
[   46.680540] Write of size 1 at addr fff00000c60dc378 by task kunit_try_catch/131
[   46.681945] 
[   46.682261] CPU: 1 UID: 0 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   46.683406] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.683953] Hardware name: linux,dummy-virt (DT)
[   46.684947] Call trace:
[   46.685495]  show_stack+0x20/0x38 (C)
[   46.686058]  dump_stack_lvl+0x8c/0xd0
[   46.686877]  print_report+0x118/0x5e0
[   46.687935]  kasan_report+0xc8/0x118
[   46.688681]  __asan_report_store1_noabort+0x20/0x30
[   46.689700]  kmalloc_track_caller_oob_right+0x414/0x490
[   46.690508]  kunit_try_run_case+0x14c/0x3d0
[   46.691167]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.691920]  kthread+0x24c/0x2d0
[   46.692556]  ret_from_fork+0x10/0x20
[   46.693384] 
[   46.693737] Allocated by task 131:
[   46.694327]  kasan_save_stack+0x3c/0x68
[   46.694955]  kasan_save_track+0x20/0x40
[   46.695599]  kasan_save_alloc_info+0x40/0x58
[   46.696256]  __kasan_kmalloc+0xd4/0xd8
[   46.696839]  __kmalloc_node_track_caller_noprof+0x184/0x4b8
[   46.697753]  kmalloc_track_caller_oob_right+0xa8/0x490
[   46.698674]  kunit_try_run_case+0x14c/0x3d0
[   46.699122]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.699876]  kthread+0x24c/0x2d0
[   46.700438]  ret_from_fork+0x10/0x20
[   46.700960] 
[   46.701268] The buggy address belongs to the object at fff00000c60dc300
[   46.701268]  which belongs to the cache kmalloc-128 of size 128
[   46.702664] The buggy address is located 0 bytes to the right of
[   46.702664]  allocated 120-byte region [fff00000c60dc300, fff00000c60dc378)
[   46.703974] 
[   46.704289] The buggy address belongs to the physical page:
[   46.705073] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060dc
[   46.706285] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.707051] page_type: f5(slab)
[   46.707731] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   46.708647] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   46.709846] page dumped because: kasan: bad access detected
[   46.710588] 
[   46.710904] Memory state around the buggy address:
[   46.711489]  fff00000c60dc200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   46.712422]  fff00000c60dc280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.713574] >fff00000c60dc300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   46.714340]                                                                 ^
[   46.715230]  fff00000c60dc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.716106]  fff00000c60dc400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.717002] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[   46.623327] ==================================================================
[   46.624670] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   46.625861] Read of size 1 at addr fff00000c642d000 by task kunit_try_catch/129
[   46.627217] 
[   46.628122] CPU: 1 UID: 0 PID: 129 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   46.630235] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.631521] Hardware name: linux,dummy-virt (DT)
[   46.631824] Call trace:
[   46.632026]  show_stack+0x20/0x38 (C)
[   46.632340]  dump_stack_lvl+0x8c/0xd0
[   46.632962]  print_report+0x118/0x5e0
[   46.633859]  kasan_report+0xc8/0x118
[   46.634690]  __asan_report_load1_noabort+0x20/0x30
[   46.635462]  kmalloc_node_oob_right+0x2f4/0x330
[   46.636200]  kunit_try_run_case+0x14c/0x3d0
[   46.636996]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.638052]  kthread+0x24c/0x2d0
[   46.638785]  ret_from_fork+0x10/0x20
[   46.639396] 
[   46.639809] Allocated by task 129:
[   46.640345]  kasan_save_stack+0x3c/0x68
[   46.640897]  kasan_save_track+0x20/0x40
[   46.641880]  kasan_save_alloc_info+0x40/0x58
[   46.642429]  __kasan_kmalloc+0xd4/0xd8
[   46.642972]  __kmalloc_cache_node_noprof+0x168/0x3d0
[   46.643724]  kmalloc_node_oob_right+0xbc/0x330
[   46.644353]  kunit_try_run_case+0x14c/0x3d0
[   46.644919]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.645696]  kthread+0x24c/0x2d0
[   46.646233]  ret_from_fork+0x10/0x20
[   46.647246] 
[   46.647605] The buggy address belongs to the object at fff00000c642c000
[   46.647605]  which belongs to the cache kmalloc-4k of size 4096
[   46.649061] The buggy address is located 0 bytes to the right of
[   46.649061]  allocated 4096-byte region [fff00000c642c000, fff00000c642d000)
[   46.650834] 
[   46.651151] The buggy address belongs to the physical page:
[   46.651940] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106428
[   46.653086] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   46.654273] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   46.655277] page_type: f5(slab)
[   46.655760] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   46.656739] raw: 0000000000000000 0000000080040004 00000001f5000000 0000000000000000
[   46.658215] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   46.659182] head: 0000000000000000 0000000080040004 00000001f5000000 0000000000000000
[   46.660170] head: 0bfffe0000000003 ffffc1ffc3190a01 ffffffffffffffff 0000000000000000
[   46.661332] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000
[   46.662471] page dumped because: kasan: bad access detected
[   46.663356] 
[   46.663710] Memory state around the buggy address:
[   46.664173]  fff00000c642cf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   46.664986]  fff00000c642cf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   46.665975] >fff00000c642d000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.666829]                    ^
[   46.667311]  fff00000c642d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.668642]  fff00000c642d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.669696] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   46.568927] ==================================================================
[   46.570516] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   46.571658] Read of size 1 at addr fff00000c40dc77f by task kunit_try_catch/127
[   46.572403] 
[   46.572828] CPU: 1 UID: 0 PID: 127 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   46.573855] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.574486] Hardware name: linux,dummy-virt (DT)
[   46.575008] Call trace:
[   46.575535]  show_stack+0x20/0x38 (C)
[   46.576112]  dump_stack_lvl+0x8c/0xd0
[   46.577137]  print_report+0x118/0x5e0
[   46.577876]  kasan_report+0xc8/0x118
[   46.578510]  __asan_report_load1_noabort+0x20/0x30
[   46.579252]  kmalloc_oob_left+0x2ec/0x320
[   46.579836]  kunit_try_run_case+0x14c/0x3d0
[   46.580380]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.581467]  kthread+0x24c/0x2d0
[   46.582069]  ret_from_fork+0x10/0x20
[   46.582786] 
[   46.583106] Allocated by task 28:
[   46.583590]  kasan_save_stack+0x3c/0x68
[   46.584093]  kasan_save_track+0x20/0x40
[   46.584686]  kasan_save_alloc_info+0x40/0x58
[   46.585424]  __kasan_kmalloc+0xd4/0xd8
[   46.586195]  __kmalloc_node_track_caller_noprof+0x184/0x4b8
[   46.587197]  kstrdup+0x54/0xc8
[   46.587671]  devtmpfs_work_loop+0x384/0x590
[   46.588236]  devtmpfsd+0x50/0x58
[   46.588812]  kthread+0x24c/0x2d0
[   46.589343]  ret_from_fork+0x10/0x20
[   46.589864] 
[   46.590318] Freed by task 28:
[   46.590732]  kasan_save_stack+0x3c/0x68
[   46.591418]  kasan_save_track+0x20/0x40
[   46.591958]  kasan_save_free_info+0x4c/0x78
[   46.592945]  __kasan_slab_free+0x6c/0x98
[   46.593628]  kfree+0x114/0x3c8
[   46.594056]  devtmpfs_work_loop+0x498/0x590
[   46.595717]  devtmpfsd+0x50/0x58
[   46.596217]  kthread+0x24c/0x2d0
[   46.596854]  ret_from_fork+0x10/0x20
[   46.597936] 
[   46.598255] The buggy address belongs to the object at fff00000c40dc760
[   46.598255]  which belongs to the cache kmalloc-16 of size 16
[   46.599850] The buggy address is located 15 bytes to the right of
[   46.599850]  allocated 16-byte region [fff00000c40dc760, fff00000c40dc770)
[   46.601895] 
[   46.602415] The buggy address belongs to the physical page:
[   46.603202] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1040dc
[   46.604223] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.605044] page_type: f5(slab)
[   46.605620] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   46.606821] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   46.607644] page dumped because: kasan: bad access detected
[   46.608363] 
[   46.608736] Memory state around the buggy address:
[   46.609561]  fff00000c40dc600: 00 04 fc fc fa fb fc fc 00 02 fc fc 00 02 fc fc
[   46.610410]  fff00000c40dc680: 00 00 fc fc 00 06 fc fc 00 06 fc fc fa fb fc fc
[   46.611281] >fff00000c40dc700: 00 06 fc fc 00 06 fc fc fa fb fc fc fa fb fc fc
[   46.612215]                                                                 ^
[   46.613488]  fff00000c40dc780: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.614142]  fff00000c40dc800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.615210] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   46.519172] ==================================================================
[   46.520065] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   46.520919] Read of size 1 at addr fff00000c60f1880 by task kunit_try_catch/125
[   46.522589] 
[   46.523050] CPU: 0 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   46.524408] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.524934] Hardware name: linux,dummy-virt (DT)
[   46.525743] Call trace:
[   46.526214]  show_stack+0x20/0x38 (C)
[   46.526713]  dump_stack_lvl+0x8c/0xd0
[   46.527168]  print_report+0x118/0x5e0
[   46.527793]  kasan_report+0xc8/0x118
[   46.528247]  __asan_report_load1_noabort+0x20/0x30
[   46.528999]  kmalloc_oob_right+0x5d0/0x660
[   46.529658]  kunit_try_run_case+0x14c/0x3d0
[   46.530319]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.531574]  kthread+0x24c/0x2d0
[   46.532142]  ret_from_fork+0x10/0x20
[   46.532814] 
[   46.533430] Allocated by task 125:
[   46.534772]  kasan_save_stack+0x3c/0x68
[   46.535377]  kasan_save_track+0x20/0x40
[   46.535979]  kasan_save_alloc_info+0x40/0x58
[   46.536799]  __kasan_kmalloc+0xd4/0xd8
[   46.537443]  __kmalloc_cache_noprof+0x15c/0x3c0
[   46.538143]  kmalloc_oob_right+0xb0/0x660
[   46.538718]  kunit_try_run_case+0x14c/0x3d0
[   46.539547]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.540425]  kthread+0x24c/0x2d0
[   46.541000]  ret_from_fork+0x10/0x20
[   46.541511] 
[   46.541925] The buggy address belongs to the object at fff00000c60f1800
[   46.541925]  which belongs to the cache kmalloc-128 of size 128
[   46.543892] The buggy address is located 13 bytes to the right of
[   46.543892]  allocated 115-byte region [fff00000c60f1800, fff00000c60f1873)
[   46.545154] 
[   46.545539] The buggy address belongs to the physical page:
[   46.546543] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060f1
[   46.547458] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.548494] page_type: f5(slab)
[   46.548938] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   46.550189] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   46.551716] page dumped because: kasan: bad access detected
[   46.552243] 
[   46.552837] Memory state around the buggy address:
[   46.553860]  fff00000c60f1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.555228]  fff00000c60f1800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   46.556333] >fff00000c60f1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.557650]                    ^
[   46.558019]  fff00000c60f1900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.559032]  fff00000c60f1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.559811] ==================================================================
[   46.474735] ==================================================================
[   46.475501] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   46.476260] Write of size 1 at addr fff00000c60f1878 by task kunit_try_catch/125
[   46.477008] 
[   46.478001] CPU: 0 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[   46.479508] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.480055] Hardware name: linux,dummy-virt (DT)
[   46.480559] Call trace:
[   46.480979]  show_stack+0x20/0x38 (C)
[   46.482318]  dump_stack_lvl+0x8c/0xd0
[   46.482907]  print_report+0x118/0x5e0
[   46.483556]  kasan_report+0xc8/0x118
[   46.483988]  __asan_report_store1_noabort+0x20/0x30
[   46.484375]  kmalloc_oob_right+0x538/0x660
[   46.484840]  kunit_try_run_case+0x14c/0x3d0
[   46.485458]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.486572]  kthread+0x24c/0x2d0
[   46.487010]  ret_from_fork+0x10/0x20
[   46.487936] 
[   46.488393] Allocated by task 125:
[   46.488896]  kasan_save_stack+0x3c/0x68
[   46.489586]  kasan_save_track+0x20/0x40
[   46.490668]  kasan_save_alloc_info+0x40/0x58
[   46.491117]  __kasan_kmalloc+0xd4/0xd8
[   46.491768]  __kmalloc_cache_noprof+0x15c/0x3c0
[   46.492629]  kmalloc_oob_right+0xb0/0x660
[   46.493321]  kunit_try_run_case+0x14c/0x3d0
[   46.493952]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.495157]  kthread+0x24c/0x2d0
[   46.495789]  ret_from_fork+0x10/0x20
[   46.496513] 
[   46.496745] The buggy address belongs to the object at fff00000c60f1800
[   46.496745]  which belongs to the cache kmalloc-128 of size 128
[   46.498683] The buggy address is located 5 bytes to the right of
[   46.498683]  allocated 115-byte region [fff00000c60f1800, fff00000c60f1873)
[   46.500143] 
[   46.500438] The buggy address belongs to the physical page:
[   46.500909] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060f1
[   46.502620] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.503403] page_type: f5(slab)
[   46.504067] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   46.504945] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   46.506281] page dumped because: kasan: bad access detected
[   46.507354] 
[   46.507702] Memory state around the buggy address:
[   46.508247]  fff00000c60f1700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   46.508957]  fff00000c60f1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.509918] >fff00000c60f1800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   46.511316]                                                                 ^
[   46.512583]  fff00000c60f1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.513106]  fff00000c60f1900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.515452] ==================================================================
[   46.424202] ==================================================================
[   46.426189] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   46.428256] Write of size 1 at addr fff00000c60f1873 by task kunit_try_catch/125
[   46.428976] 
[   46.430717] CPU: 0 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G                 N 6.12.0-next-20241127 #1
[   46.432107] Tainted: [N]=TEST
[   46.432573] Hardware name: linux,dummy-virt (DT)
[   46.433631] Call trace:
[   46.434574]  show_stack+0x20/0x38 (C)
[   46.435238]  dump_stack_lvl+0x8c/0xd0
[   46.435836]  print_report+0x118/0x5e0
[   46.436432]  kasan_report+0xc8/0x118
[   46.436886]  __asan_report_store1_noabort+0x20/0x30
[   46.437694]  kmalloc_oob_right+0x5a4/0x660
[   46.438237]  kunit_try_run_case+0x14c/0x3d0
[   46.439268]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.440178]  kthread+0x24c/0x2d0
[   46.440667]  ret_from_fork+0x10/0x20
[   46.441431] 
[   46.441781] Allocated by task 125:
[   46.442429]  kasan_save_stack+0x3c/0x68
[   46.443380]  kasan_save_track+0x20/0x40
[   46.444087]  kasan_save_alloc_info+0x40/0x58
[   46.444573]  __kasan_kmalloc+0xd4/0xd8
[   46.445103]  __kmalloc_cache_noprof+0x15c/0x3c0
[   46.445667]  kmalloc_oob_right+0xb0/0x660
[   46.446439]  kunit_try_run_case+0x14c/0x3d0
[   46.447128]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.447749]  kthread+0x24c/0x2d0
[   46.448440]  ret_from_fork+0x10/0x20
[   46.448904] 
[   46.449341] The buggy address belongs to the object at fff00000c60f1800
[   46.449341]  which belongs to the cache kmalloc-128 of size 128
[   46.451475] The buggy address is located 0 bytes to the right of
[   46.451475]  allocated 115-byte region [fff00000c60f1800, fff00000c60f1873)
[   46.452808] 
[   46.453643] The buggy address belongs to the physical page:
[   46.454709] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060f1
[   46.455575] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.456881] page_type: f5(slab)
[   46.458161] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   46.459647] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   46.460925] page dumped because: kasan: bad access detected
[   46.461913] 
[   46.462395] Memory state around the buggy address:
[   46.463570]  fff00000c60f1700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   46.464516]  fff00000c60f1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.465601] >fff00000c60f1800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   46.467114]                                                              ^
[   46.468177]  fff00000c60f1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.469066]  fff00000c60f1900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.470025] ==================================================================
Failure - log-parser-boot - internal-error-oops-oops-preempt-smp KNOWN ISSUE - kunit_test_null_dereference internal oops on qemu-arm64 KUNIT KASAN
[  161.819265] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
[  161.820363] Modules linked in:
[  161.821260] CPU: 0 UID: 0 PID: 621 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241127 #1
[  161.822767] Tainted: [B]=BAD_PAGE, [N]=TEST
[  161.823236] Hardware name: linux,dummy-virt (DT)
[  161.823809] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  161.824928] pc : kunit_test_null_dereference+0x70/0x170
[  161.826179] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[  161.827084] sp : ffff800080fd7dc0
[  161.827610] x29: ffff800080fd7e20 x28: 0000000000000000 x27: 0000000000000000
[  161.828831] x26: 0000000000000000 x25: 0000000000000000 x24: fff00000c4109f80
[  161.830133] x23: ffffa1fd9dfc9cb0 x22: ffffa1fd9dfd2870 x21: fff00000c4109f88
[  161.831225] x20: 1ffff000101fafb8 x19: ffff8000800879f0 x18: 0000000027d536b0
[  161.832280] x17: 0000000000000000 x16: fff00000da4dfca0 x15: 00000000a3a21f61
[  161.833805] x14: 00000000b156b5a6 x13: 1ffe00001815cb44 x12: fffd800018bd3b3a
[  161.834783] x11: 1ffe000018bd3b39 x10: fffd800018bd3b39 x9 : ffffa1fd9dfc9d38
[  161.835885] x8 : ffff800080fd7cb8 x7 : 0000000000000001 x6 : 0000000041b58ab3
[  161.836910] x5 : ffff7000101fafb8 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[  161.838123] x2 : dfff800000000000 x1 : fff00000c5e9d100 x0 : ffff8000800879f0
[  161.839269] Call trace:
[  161.839684]  kunit_test_null_dereference+0x70/0x170 (P)
[  161.840414]  kunit_generic_run_threadfn_adapter+0x88/0x100 (L)
[  161.841423]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  161.842555]  kthread+0x24c/0x2d0
[  161.843005]  ret_from_fork+0x10/0x20
[  161.843832] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[  161.844729] ---[ end trace 0000000000000000 ]---