Hay
Date
Nov. 28, 2024, 2:36 a.m.
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[   33.000223] ==================================================================
[   33.001635] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   33.002453] Free of addr fff00000c406bc00 by task kunit_try_catch/223
[   33.002984] 
[   33.004488] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   33.006269] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.006698] Hardware name: linux,dummy-virt (DT)
[   33.007161] Call trace:
[   33.007484]  show_stack+0x20/0x38 (C)
[   33.009095]  dump_stack_lvl+0x8c/0xd0
[   33.009698]  print_report+0x118/0x5e0
[   33.010425]  kasan_report_invalid_free+0xb0/0xd8
[   33.011235]  check_slab_allocation+0xd4/0x108
[   33.011976]  __kasan_mempool_poison_object+0x78/0x150
[   33.012778]  mempool_free+0x28c/0x328
[   33.013813]  mempool_double_free_helper+0x150/0x2e0
[   33.014744]  mempool_kmalloc_double_free+0xb8/0x110
[   33.015359]  kunit_try_run_case+0x14c/0x3d0
[   33.015965]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.016630]  kthread+0x24c/0x2d0
[   33.017606]  ret_from_fork+0x10/0x20
[   33.018136] 
[   33.018694] Allocated by task 223:
[   33.019143]  kasan_save_stack+0x3c/0x68
[   33.019927]  kasan_save_track+0x20/0x40
[   33.020663]  kasan_save_alloc_info+0x40/0x58
[   33.021538]  __kasan_mempool_unpoison_object+0x11c/0x180
[   33.022065]  remove_element+0x130/0x1f8
[   33.022685]  mempool_alloc_preallocated+0x58/0xc0
[   33.023617]  mempool_double_free_helper+0x94/0x2e0
[   33.024261]  mempool_kmalloc_double_free+0xb8/0x110
[   33.025276]  kunit_try_run_case+0x14c/0x3d0
[   33.026044]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.026874]  kthread+0x24c/0x2d0
[   33.027371]  ret_from_fork+0x10/0x20
[   33.028157] 
[   33.028658] Freed by task 223:
[   33.029131]  kasan_save_stack+0x3c/0x68
[   33.030070]  kasan_save_track+0x20/0x40
[   33.030535]  kasan_save_free_info+0x4c/0x78
[   33.031368]  __kasan_mempool_poison_object+0xc0/0x150
[   33.031979]  mempool_free+0x28c/0x328
[   33.032475]  mempool_double_free_helper+0x100/0x2e0
[   33.033216]  mempool_kmalloc_double_free+0xb8/0x110
[   33.034268]  kunit_try_run_case+0x14c/0x3d0
[   33.034949]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.035751]  kthread+0x24c/0x2d0
[   33.036299]  ret_from_fork+0x10/0x20
[   33.036922] 
[   33.037247] The buggy address belongs to the object at fff00000c406bc00
[   33.037247]  which belongs to the cache kmalloc-128 of size 128
[   33.038366] The buggy address is located 0 bytes inside of
[   33.038366]  128-byte region [fff00000c406bc00, fff00000c406bc80)
[   33.039566] 
[   33.039913] The buggy address belongs to the physical page:
[   33.040508] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10406b
[   33.041695] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.042374] page_type: f5(slab)
[   33.042995] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.043842] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   33.045262] page dumped because: kasan: bad access detected
[   33.046701] 
[   33.047067] Memory state around the buggy address:
[   33.047679]  fff00000c406bb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.048795]  fff00000c406bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.050016] >fff00000c406bc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.050932]                    ^
[   33.051334]  fff00000c406bc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.052016]  fff00000c406bd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.052535] ==================================================================
[   33.064740] ==================================================================
[   33.066311] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   33.067213] Free of addr fff00000c6610000 by task kunit_try_catch/225
[   33.067952] 
[   33.068391] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   33.069784] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.070300] Hardware name: linux,dummy-virt (DT)
[   33.070873] Call trace:
[   33.071317]  show_stack+0x20/0x38 (C)
[   33.071913]  dump_stack_lvl+0x8c/0xd0
[   33.072477]  print_report+0x118/0x5e0
[   33.072970]  kasan_report_invalid_free+0xb0/0xd8
[   33.073654]  __kasan_mempool_poison_object+0x14c/0x150
[   33.074351]  mempool_free+0x28c/0x328
[   33.074822]  mempool_double_free_helper+0x150/0x2e0
[   33.075766]  mempool_kmalloc_large_double_free+0xb8/0x110
[   33.076509]  kunit_try_run_case+0x14c/0x3d0
[   33.077399]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.077750]  kthread+0x24c/0x2d0
[   33.077993]  ret_from_fork+0x10/0x20
[   33.078263] 
[   33.078419] The buggy address belongs to the physical page:
[   33.078698] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106610
[   33.079076] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.080599] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.081718] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.082479] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.083284] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.084061] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.084941] head: 0bfffe0000000002 ffffc1ffc3198401 ffffffffffffffff 0000000000000000
[   33.085993] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   33.086781] page dumped because: kasan: bad access detected
[   33.087499] 
[   33.087834] Memory state around the buggy address:
[   33.088390]  fff00000c660ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.089430]  fff00000c660ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.090193] >fff00000c6610000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.090921]                    ^
[   33.091412]  fff00000c6610080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.092135]  fff00000c6610100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.092964] ==================================================================
[   33.104808] ==================================================================
[   33.105957] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   33.106737] Free of addr fff00000c6610000 by task kunit_try_catch/227
[   33.108520] 
[   33.109098] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   33.110279] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.110891] Hardware name: linux,dummy-virt (DT)
[   33.111530] Call trace:
[   33.112086]  show_stack+0x20/0x38 (C)
[   33.112664]  dump_stack_lvl+0x8c/0xd0
[   33.113610]  print_report+0x118/0x5e0
[   33.114131]  kasan_report_invalid_free+0xb0/0xd8
[   33.114458]  __kasan_mempool_poison_pages+0xe0/0xe8
[   33.114757]  mempool_free+0x24c/0x328
[   33.115011]  mempool_double_free_helper+0x150/0x2e0
[   33.115671]  mempool_page_alloc_double_free+0xb4/0x110
[   33.116476]  kunit_try_run_case+0x14c/0x3d0
[   33.117315]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.118209]  kthread+0x24c/0x2d0
[   33.118734]  ret_from_fork+0x10/0x20
[   33.119296] 
[   33.119597] The buggy address belongs to the physical page:
[   33.120268] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106610
[   33.121513] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.122221] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.123054] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.123869] page dumped because: kasan: bad access detected
[   33.124489] 
[   33.124798] Memory state around the buggy address:
[   33.125348]  fff00000c660ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.126691]  fff00000c660ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.127301] >fff00000c6610000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.128160]                    ^
[   33.128732]  fff00000c6610080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.129898]  fff00000c6610100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.130773] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[   65.658886] ==================================================================
[   65.659619] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[   65.659619] 
[   65.660058] Use-after-free read at 0x0000000097358843 (in kfence-#200):
[   65.660580]  test_krealloc+0x51c/0x830
[   65.661337]  test_krealloc+0x458/0x830
[   65.661943]  kunit_try_run_case+0x14c/0x3d0
[   65.662597]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.663290]  kthread+0x24c/0x2d0
[   65.663881]  ret_from_fork+0x10/0x20
[   65.664605] 
[   65.665030] kfence-#200: 0x0000000097358843-0x00000000fae0cf03, size=32, cache=kmalloc-32
[   65.665030] 
[   65.666359] allocated by task 325 on cpu 1 at 65.657749s (0.008599s ago):
[   65.667487]  test_alloc+0x298/0x620
[   65.668432]  test_krealloc+0xc0/0x830
[   65.669402]  kunit_try_run_case+0x14c/0x3d0
[   65.670104]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.670779]  kthread+0x24c/0x2d0
[   65.671337]  ret_from_fork+0x10/0x20
[   65.671893] 
[   65.672280] freed by task 325 on cpu 1 at 65.658230s (0.014032s ago):
[   65.673094]  krealloc_noprof+0x148/0x360
[   65.673641]  test_krealloc+0x1dc/0x830
[   65.674228]  kunit_try_run_case+0x14c/0x3d0
[   65.674730]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.675459]  kthread+0x24c/0x2d0
[   65.675961]  ret_from_fork+0x10/0x20
[   65.676448] 
[   65.676797] CPU: 1 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   65.677935] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.678498] Hardware name: linux,dummy-virt (DT)
[   65.679046] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[   65.484896] ==================================================================
[   65.485700] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[   65.485700] 
[   65.486674] Use-after-free read at 0x00000000f6f9f80f (in kfence-#198):
[   65.487497]  test_memcache_typesafe_by_rcu+0x280/0x560
[   65.488188]  test_memcache_typesafe_by_rcu+0x260/0x560
[   65.488910]  kunit_try_run_case+0x14c/0x3d0
[   65.489550]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.490286]  kthread+0x24c/0x2d0
[   65.490835]  ret_from_fork+0x10/0x20
[   65.491353] 
[   65.491705] kfence-#198: 0x00000000f6f9f80f-0x0000000002e68dcf, size=32, cache=test
[   65.491705] 
[   65.492590] allocated by task 323 on cpu 0 at 65.451444s (0.041133s ago):
[   65.493402]  test_alloc+0x22c/0x620
[   65.493962]  test_memcache_typesafe_by_rcu+0x15c/0x560
[   65.494524]  kunit_try_run_case+0x14c/0x3d0
[   65.495159]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.495881]  kthread+0x24c/0x2d0
[   65.496408]  ret_from_fork+0x10/0x20
[   65.496936] 
[   65.497311] freed by task 323 on cpu 0 at 65.451650s (0.045649s ago):
[   65.498152]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[   65.498683]  kunit_try_run_case+0x14c/0x3d0
[   65.499314]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.500026]  kthread+0x24c/0x2d0
[   65.500583]  ret_from_fork+0x10/0x20
[   65.501126] 
[   65.501504] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   65.502455] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.503043] Hardware name: linux,dummy-virt (DT)
[   65.503538] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[   45.090841] ==================================================================
[   45.091981] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   45.091981] 
[   45.093581] Invalid read at 0x0000000015f0b645:
[   45.094474]  test_invalid_access+0xdc/0x1f0
[   45.095216]  kunit_try_run_case+0x14c/0x3d0
[   45.095932]  kunit_try_run_case+0x14c/0x3d0
[   45.096575]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   45.097936]  kthread+0x24c/0x2d0
[   45.098475]  ret_from_fork+0x10/0x20
[   45.099307] 
[   45.099825] CPU: 1 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   45.101489] Tainted: [B]=BAD_PAGE, [N]=TEST
[   45.102067] Hardware name: linux,dummy-virt (DT)
[   45.102654] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[   44.858324] ==================================================================
[   44.859094] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   44.859094] 
[   44.859820] Corrupted memory at 0x0000000011e8e309 [ ! . . . . . . . . . . . . . . . ] (in kfence-#193):
[   44.862362]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   44.862988]  kunit_try_run_case+0x14c/0x3d0
[   44.863608]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.864296]  kthread+0x24c/0x2d0
[   44.864847]  ret_from_fork+0x10/0x20
[   44.865431] 
[   44.865749] kfence-#193: 0x00000000f21ebe70-0x0000000027890038, size=73, cache=kmalloc-96
[   44.865749] 
[   44.866613] allocated by task 313 on cpu 0 at 44.857840s (0.008763s ago):
[   44.867472]  test_alloc+0x298/0x620
[   44.867979]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   44.868667]  kunit_try_run_case+0x14c/0x3d0
[   44.869221]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.869932]  kthread+0x24c/0x2d0
[   44.870491]  ret_from_fork+0x10/0x20
[   44.870949] 
[   44.871323] freed by task 313 on cpu 0 at 44.858082s (0.013230s ago):
[   44.872158]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   44.872806]  kunit_try_run_case+0x14c/0x3d0
[   44.873334]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.874056]  kthread+0x24c/0x2d0
[   44.874532]  ret_from_fork+0x10/0x20
[   44.875104] 
[   44.875489] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   44.876536] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.877067] Hardware name: linux,dummy-virt (DT)
[   44.877646] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[   44.754318] ==================================================================
[   44.755004] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   44.755004] 
[   44.755901] Out-of-bounds read at 0x00000000da7779b9 (105B right of kfence-#192):
[   44.756778]  test_kmalloc_aligned_oob_read+0x238/0x468
[   44.757374]  test_kmalloc_aligned_oob_read+0x100/0x468
[   44.758104]  kunit_try_run_case+0x14c/0x3d0
[   44.758758]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.759386]  kthread+0x24c/0x2d0
[   44.759945]  ret_from_fork+0x10/0x20
[   44.760554] 
[   44.760909] kfence-#192: 0x0000000075269528-0x0000000030143b88, size=73, cache=kmalloc-96
[   44.760909] 
[   44.761853] allocated by task 311 on cpu 0 at 44.753849s (0.007993s ago):
[   44.762655]  test_alloc+0x298/0x620
[   44.763228]  test_kmalloc_aligned_oob_read+0x100/0x468
[   44.763933]  kunit_try_run_case+0x14c/0x3d0
[   44.764531]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   44.765260]  kthread+0x24c/0x2d0
[   44.765697]  ret_from_fork+0x10/0x20
[   44.766269] 
[   44.766620] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   44.767698] Tainted: [B]=BAD_PAGE, [N]=TEST
[   44.768206] Hardware name: linux,dummy-virt (DT)
[   44.768707] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[   40.385969] ==================================================================
[   40.386827] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   40.386827] 
[   40.387519] Corrupted memory at 0x00000000baef86a9 [ ! . . . . . . . . . . . . . . . ] (in kfence-#150):
[   40.390039]  test_corruption+0x120/0x378
[   40.390574]  kunit_try_run_case+0x14c/0x3d0
[   40.391209]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.391891]  kthread+0x24c/0x2d0
[   40.392463]  ret_from_fork+0x10/0x20
[   40.392997] 
[   40.393312] kfence-#150: 0x00000000a07d50d6-0x0000000055df8dff, size=32, cache=test
[   40.393312] 
[   40.394286] allocated by task 301 on cpu 0 at 40.385719s (0.008557s ago):
[   40.394941]  test_alloc+0x22c/0x620
[   40.395523]  test_corruption+0xdc/0x378
[   40.396102]  kunit_try_run_case+0x14c/0x3d0
[   40.396644]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.397377]  kthread+0x24c/0x2d0
[   40.397865]  ret_from_fork+0x10/0x20
[   40.398453] 
[   40.398805] freed by task 301 on cpu 0 at 40.385815s (0.012979s ago):
[   40.399657]  test_corruption+0x120/0x378
[   40.400225]  kunit_try_run_case+0x14c/0x3d0
[   40.400838]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.401576]  kthread+0x24c/0x2d0
[   40.402130]  ret_from_fork+0x10/0x20
[   40.402639] 
[   40.403025] CPU: 0 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   40.404057] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.404595] Hardware name: linux,dummy-virt (DT)
[   40.405145] ==================================================================
[   39.970388] ==================================================================
[   39.971259] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   39.971259] 
[   39.972057] Corrupted memory at 0x00000000a5aff81e [ ! . . . . . . . . . . . . . . . ] (in kfence-#146):
[   39.975801]  test_corruption+0x278/0x378
[   39.976342]  kunit_try_run_case+0x14c/0x3d0
[   39.976840]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.977465]  kthread+0x24c/0x2d0
[   39.978062]  ret_from_fork+0x10/0x20
[   39.978649] 
[   39.978999] kfence-#146: 0x00000000d5799c5c-0x00000000a70c4600, size=32, cache=kmalloc-32
[   39.978999] 
[   39.980007] allocated by task 299 on cpu 1 at 39.969845s (0.010151s ago):
[   39.980742]  test_alloc+0x298/0x620
[   39.981311]  test_corruption+0xdc/0x378
[   39.981800]  kunit_try_run_case+0x14c/0x3d0
[   39.982441]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.983052]  kthread+0x24c/0x2d0
[   39.983601]  ret_from_fork+0x10/0x20
[   39.984167] 
[   39.984529] freed by task 299 on cpu 1 at 39.970007s (0.014511s ago):
[   39.985234]  test_corruption+0x278/0x378
[   39.985797]  kunit_try_run_case+0x14c/0x3d0
[   39.986329]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.987038]  kthread+0x24c/0x2d0
[   39.987487]  ret_from_fork+0x10/0x20
[   39.988083] 
[   39.988497] CPU: 1 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   39.989496] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.990054] Hardware name: linux,dummy-virt (DT)
[   39.990606] ==================================================================
[   40.282636] ==================================================================
[   40.283499] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   40.283499] 
[   40.284235] Corrupted memory at 0x000000008b5aeb6a [ ! ] (in kfence-#149):
[   40.285441]  test_corruption+0x284/0x378
[   40.286055]  kunit_try_run_case+0x14c/0x3d0
[   40.286657]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.287254]  kthread+0x24c/0x2d0
[   40.287842]  ret_from_fork+0x10/0x20
[   40.288431] 
[   40.288788] kfence-#149: 0x000000002ab31c26-0x00000000f3b055e0, size=32, cache=kmalloc-32
[   40.288788] 
[   40.289719] allocated by task 299 on cpu 1 at 40.282039s (0.007669s ago):
[   40.290523]  test_alloc+0x298/0x620
[   40.291075]  test_corruption+0x198/0x378
[   40.291554]  kunit_try_run_case+0x14c/0x3d0
[   40.292189]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.292911]  kthread+0x24c/0x2d0
[   40.293397]  ret_from_fork+0x10/0x20
[   40.293902] 
[   40.294263] freed by task 299 on cpu 1 at 40.282227s (0.012025s ago):
[   40.295056]  test_corruption+0x284/0x378
[   40.295651]  kunit_try_run_case+0x14c/0x3d0
[   40.296283]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.296946]  kthread+0x24c/0x2d0
[   40.297509]  ret_from_fork+0x10/0x20
[   40.298103] 
[   40.298495] CPU: 1 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   40.299420] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.299983] Hardware name: linux,dummy-virt (DT)
[   40.300623] ==================================================================
[   40.490056] ==================================================================
[   40.490887] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   40.490887] 
[   40.491675] Corrupted memory at 0x000000000dd04787 [ ! ] (in kfence-#151):
[   40.492794]  test_corruption+0x1d8/0x378
[   40.493555]  kunit_try_run_case+0x14c/0x3d0
[   40.494278]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.495063]  kthread+0x24c/0x2d0
[   40.495682]  ret_from_fork+0x10/0x20
[   40.496242] 
[   40.496594] kfence-#151: 0x000000005a7c2094-0x00000000bd65774b, size=32, cache=test
[   40.496594] 
[   40.497666] allocated by task 301 on cpu 0 at 40.489809s (0.007847s ago):
[   40.498612]  test_alloc+0x22c/0x620
[   40.499052]  test_corruption+0x198/0x378
[   40.499651]  kunit_try_run_case+0x14c/0x3d0
[   40.500230]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.500901]  kthread+0x24c/0x2d0
[   40.501387]  ret_from_fork+0x10/0x20
[   40.501945] 
[   40.502316] freed by task 301 on cpu 0 at 40.489905s (0.012400s ago):
[   40.503167]  test_corruption+0x1d8/0x378
[   40.503695]  kunit_try_run_case+0x14c/0x3d0
[   40.504290]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.504892]  kthread+0x24c/0x2d0
[   40.505456]  ret_from_fork+0x10/0x20
[   40.505999] 
[   40.506372] CPU: 0 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   40.507353] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.507950] Hardware name: linux,dummy-virt (DT)
[   40.508516] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[   39.553980] ==================================================================
[   39.554688] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   39.554688] 
[   39.555420] Invalid free of 0x00000000ad4e57f8 (in kfence-#142):
[   39.555964]  test_invalid_addr_free+0x1ac/0x238
[   39.556633]  kunit_try_run_case+0x14c/0x3d0
[   39.557240]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.557925]  kthread+0x24c/0x2d0
[   39.558479]  ret_from_fork+0x10/0x20
[   39.559051] 
[   39.559442] kfence-#142: 0x000000007d27eb8b-0x000000002e445926, size=32, cache=kmalloc-32
[   39.559442] 
[   39.560342] allocated by task 295 on cpu 1 at 39.553728s (0.006603s ago):
[   39.561179]  test_alloc+0x298/0x620
[   39.561701]  test_invalid_addr_free+0xd4/0x238
[   39.562361]  kunit_try_run_case+0x14c/0x3d0
[   39.562865]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.563601]  kthread+0x24c/0x2d0
[   39.564044]  ret_from_fork+0x10/0x20
[   39.564643] 
[   39.565038] CPU: 1 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   39.566055] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.566553] Hardware name: linux,dummy-virt (DT)
[   39.567191] ==================================================================
[   39.658001] ==================================================================
[   39.658815] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   39.658815] 
[   39.659614] Invalid free of 0x000000007eb2a3bb (in kfence-#143):
[   39.660400]  test_invalid_addr_free+0xec/0x238
[   39.661139]  kunit_try_run_case+0x14c/0x3d0
[   39.661789]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.662658]  kthread+0x24c/0x2d0
[   39.663331]  ret_from_fork+0x10/0x20
[   39.664013] 
[   39.664467] kfence-#143: 0x000000005054246f-0x00000000a8d711f6, size=32, cache=test
[   39.664467] 
[   39.665713] allocated by task 297 on cpu 0 at 39.657795s (0.007906s ago):
[   39.666726]  test_alloc+0x22c/0x620
[   39.667290]  test_invalid_addr_free+0xd4/0x238
[   39.667968]  kunit_try_run_case+0x14c/0x3d0
[   39.668587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.669237]  kthread+0x24c/0x2d0
[   39.669693]  ret_from_fork+0x10/0x20
[   39.670248] 
[   39.670679] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   39.671841] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.672510] Hardware name: linux,dummy-virt (DT)
[   39.673225] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[   39.346400] ==================================================================
[   39.347091] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   39.347091] 
[   39.347864] Invalid free of 0x0000000078e637e1 (in kfence-#140):
[   39.348668]  test_double_free+0x1bc/0x238
[   39.349834]  kunit_try_run_case+0x14c/0x3d0
[   39.350409]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.351061]  kthread+0x24c/0x2d0
[   39.351563]  ret_from_fork+0x10/0x20
[   39.352151] 
[   39.352507] kfence-#140: 0x0000000078e637e1-0x000000007f56d0a4, size=32, cache=kmalloc-32
[   39.352507] 
[   39.353439] allocated by task 291 on cpu 0 at 39.345851s (0.007578s ago):
[   39.354260]  test_alloc+0x298/0x620
[   39.354816]  test_double_free+0xd4/0x238
[   39.355369]  kunit_try_run_case+0x14c/0x3d0
[   39.356010]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.356748]  kthread+0x24c/0x2d0
[   39.357287]  ret_from_fork+0x10/0x20
[   39.357839] 
[   39.358207] freed by task 291 on cpu 0 at 39.345974s (0.012221s ago):
[   39.358899]  test_double_free+0x1ac/0x238
[   39.359501]  kunit_try_run_case+0x14c/0x3d0
[   39.360038]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.360686]  kthread+0x24c/0x2d0
[   39.361248]  ret_from_fork+0x10/0x20
[   39.361816] 
[   39.362208] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   39.363292] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.363806] Hardware name: linux,dummy-virt (DT)
[   39.364308] ==================================================================
[   39.450240] ==================================================================
[   39.450931] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   39.450931] 
[   39.451716] Invalid free of 0x00000000b4af0662 (in kfence-#141):
[   39.453303]  test_double_free+0x100/0x238
[   39.453875]  kunit_try_run_case+0x14c/0x3d0
[   39.454759]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.455589]  kthread+0x24c/0x2d0
[   39.456258]  ret_from_fork+0x10/0x20
[   39.456809] 
[   39.457380] kfence-#141: 0x00000000b4af0662-0x00000000e4e7b9ad, size=32, cache=test
[   39.457380] 
[   39.458435] allocated by task 293 on cpu 1 at 39.449803s (0.008621s ago):
[   39.459582]  test_alloc+0x22c/0x620
[   39.460302]  test_double_free+0xd4/0x238
[   39.461015]  kunit_try_run_case+0x14c/0x3d0
[   39.461617]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.462564]  kthread+0x24c/0x2d0
[   39.463253]  ret_from_fork+0x10/0x20
[   39.463760] 
[   39.464408] freed by task 293 on cpu 1 at 39.449906s (0.014495s ago):
[   39.465214]  test_double_free+0xf0/0x238
[   39.465608]  kunit_try_run_case+0x14c/0x3d0
[   39.466238]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.466936]  kthread+0x24c/0x2d0
[   39.467415]  ret_from_fork+0x10/0x20
[   39.467927] 
[   39.468337] CPU: 1 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   39.469362] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.469914] Hardware name: linux,dummy-virt (DT)
[   39.470459] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[   38.930225] ==================================================================
[   38.931072] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   38.931072] 
[   38.931898] Use-after-free read at 0x000000007af8a8e8 (in kfence-#136):
[   38.932782]  test_use_after_free_read+0x114/0x248
[   38.933546]  test_use_after_free_read+0x1c0/0x248
[   38.934270]  kunit_try_run_case+0x14c/0x3d0
[   38.934793]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.935132]  kthread+0x24c/0x2d0
[   38.935379]  ret_from_fork+0x10/0x20
[   38.935620] 
[   38.935775] kfence-#136: 0x000000007af8a8e8-0x000000005d12a081, size=32, cache=kmalloc-32
[   38.935775] 
[   38.936390] allocated by task 283 on cpu 1 at 38.929737s (0.006643s ago):
[   38.937327]  test_alloc+0x298/0x620
[   38.937920]  test_use_after_free_read+0xd0/0x248
[   38.938648]  kunit_try_run_case+0x14c/0x3d0
[   38.939322]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.940146]  kthread+0x24c/0x2d0
[   38.940753]  ret_from_fork+0x10/0x20
[   38.941297] 
[   38.941936] freed by task 283 on cpu 1 at 38.929861s (0.011880s ago):
[   38.942919]  test_use_after_free_read+0x1c0/0x248
[   38.943541]  kunit_try_run_case+0x14c/0x3d0
[   38.944128]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.944818]  kthread+0x24c/0x2d0
[   38.945330]  ret_from_fork+0x10/0x20
[   38.945824] 
[   38.946234] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   38.947306] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.947912] Hardware name: linux,dummy-virt (DT)
[   38.948513] ==================================================================
[   39.034341] ==================================================================
[   39.035052] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   39.035052] 
[   39.036017] Use-after-free read at 0x00000000f3582f11 (in kfence-#137):
[   39.036871]  test_use_after_free_read+0x114/0x248
[   39.037617]  test_use_after_free_read+0xf0/0x248
[   39.038196]  kunit_try_run_case+0x14c/0x3d0
[   39.038872]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.039546]  kthread+0x24c/0x2d0
[   39.040102]  ret_from_fork+0x10/0x20
[   39.040690] 
[   39.041047] kfence-#137: 0x00000000f3582f11-0x000000004964f453, size=32, cache=test
[   39.041047] 
[   39.042081] allocated by task 285 on cpu 1 at 39.033932s (0.008138s ago):
[   39.042888]  test_alloc+0x22c/0x620
[   39.043498]  test_use_after_free_read+0xd0/0x248
[   39.044137]  kunit_try_run_case+0x14c/0x3d0
[   39.044804]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.045487]  kthread+0x24c/0x2d0
[   39.046056]  ret_from_fork+0x10/0x20
[   39.046602] 
[   39.046961] freed by task 285 on cpu 1 at 39.034051s (0.012900s ago):
[   39.047884]  test_use_after_free_read+0xf0/0x248
[   39.048522]  kunit_try_run_case+0x14c/0x3d0
[   39.049192]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.049822]  kthread+0x24c/0x2d0
[   39.050409]  ret_from_fork+0x10/0x20
[   39.050918] 
[   39.051361] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   39.052503] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.053024] Hardware name: linux,dummy-virt (DT)
[   39.053689] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[   38.826060] ==================================================================
[   38.826898] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   38.826898] 
[   38.827627] Out-of-bounds write at 0x000000003151f4bb (1B left of kfence-#135):
[   38.828504]  test_out_of_bounds_write+0x100/0x240
[   38.829174]  test_out_of_bounds_write+0xc8/0x240
[   38.829825]  kunit_try_run_case+0x14c/0x3d0
[   38.830481]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.831159]  kthread+0x24c/0x2d0
[   38.831636]  ret_from_fork+0x10/0x20
[   38.832226] 
[   38.832577] kfence-#135: 0x0000000088e6d49b-0x0000000056e44f6e, size=32, cache=test
[   38.832577] 
[   38.833612] allocated by task 281 on cpu 0 at 38.825882s (0.007718s ago):
[   38.834405]  test_alloc+0x22c/0x620
[   38.834964]  test_out_of_bounds_write+0xc8/0x240
[   38.835648]  kunit_try_run_case+0x14c/0x3d0
[   38.836297]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.836877]  kthread+0x24c/0x2d0
[   38.837435]  ret_from_fork+0x10/0x20
[   38.837957] 
[   38.838366] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   38.839658] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.840324] Hardware name: linux,dummy-virt (DT)
[   38.841037] ==================================================================
[   38.618070] ==================================================================
[   38.618887] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   38.618887] 
[   38.619643] Out-of-bounds write at 0x00000000801e5335 (1B left of kfence-#133):
[   38.620431]  test_out_of_bounds_write+0x100/0x240
[   38.621062]  test_out_of_bounds_write+0xc8/0x240
[   38.621611]  kunit_try_run_case+0x14c/0x3d0
[   38.622259]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.622981]  kthread+0x24c/0x2d0
[   38.623550]  ret_from_fork+0x10/0x20
[   38.624075] 
[   38.624445] kfence-#133: 0x000000008a3e7939-0x000000007302ac63, size=32, cache=kmalloc-32
[   38.624445] 
[   38.625525] allocated by task 279 on cpu 1 at 38.617786s (0.007728s ago):
[   38.626313]  test_alloc+0x298/0x620
[   38.626834]  test_out_of_bounds_write+0xc8/0x240
[   38.627460]  kunit_try_run_case+0x14c/0x3d0
[   38.628032]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.628773]  kthread+0x24c/0x2d0
[   38.629338]  ret_from_fork+0x10/0x20
[   38.629871] 
[   38.630278] CPU: 1 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   38.631271] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.631776] Hardware name: linux,dummy-virt (DT)
[   38.632424] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[   38.098175] ==================================================================
[   38.098962] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   38.098962] 
[   38.099833] Out-of-bounds read at 0x00000000c873d958 (1B left of kfence-#128):
[   38.100718]  test_out_of_bounds_read+0x114/0x3e0
[   38.101325]  test_out_of_bounds_read+0xdc/0x3e0
[   38.102040]  kunit_try_run_case+0x14c/0x3d0
[   38.102732]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.103337]  kthread+0x24c/0x2d0
[   38.103925]  ret_from_fork+0x10/0x20
[   38.104601] 
[   38.104977] kfence-#128: 0x0000000053c348f8-0x000000004c5c4abd, size=32, cache=test
[   38.104977] 
[   38.105945] allocated by task 277 on cpu 0 at 38.097975s (0.007925s ago):
[   38.106910]  test_alloc+0x22c/0x620
[   38.107526]  test_out_of_bounds_read+0xdc/0x3e0
[   38.108200]  kunit_try_run_case+0x14c/0x3d0
[   38.108799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.109348]  kthread+0x24c/0x2d0
[   38.109895]  ret_from_fork+0x10/0x20
[   38.110480] 
[   38.110860] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   38.111979] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.112444] Hardware name: linux,dummy-virt (DT)
[   38.113052] ==================================================================
[   37.682947] ==================================================================
[   37.683785] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   37.683785] 
[   37.684721] Out-of-bounds read at 0x00000000cba0af09 (1B left of kfence-#124):
[   37.686214]  test_out_of_bounds_read+0x114/0x3e0
[   37.686897]  test_out_of_bounds_read+0xdc/0x3e0
[   37.687600]  kunit_try_run_case+0x14c/0x3d0
[   37.688337]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.688971]  kthread+0x24c/0x2d0
[   37.689569]  ret_from_fork+0x10/0x20
[   37.690198] 
[   37.690977] kfence-#124: 0x00000000ad559932-0x000000009c8bba09, size=32, cache=kmalloc-32
[   37.690977] 
[   37.692284] allocated by task 275 on cpu 1 at 37.681696s (0.010440s ago):
[   37.693785]  test_alloc+0x298/0x620
[   37.694294]  test_out_of_bounds_read+0xdc/0x3e0
[   37.694947]  kunit_try_run_case+0x14c/0x3d0
[   37.695544]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.696253]  kthread+0x24c/0x2d0
[   37.696796]  ret_from_fork+0x10/0x20
[   37.697570] 
[   37.698074] CPU: 1 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   37.699175] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.699713] Hardware name: linux,dummy-virt (DT)
[   37.700356] ==================================================================
[   37.786230] ==================================================================
[   37.786953] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   37.786953] 
[   37.787832] Out-of-bounds read at 0x00000000eda49ade (32B right of kfence-#125):
[   37.788685]  test_out_of_bounds_read+0x1c8/0x3e0
[   37.789230]  test_out_of_bounds_read+0x198/0x3e0
[   37.789884]  kunit_try_run_case+0x14c/0x3d0
[   37.790445]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.791158]  kthread+0x24c/0x2d0
[   37.791719]  ret_from_fork+0x10/0x20
[   37.792272] 
[   37.792641] kfence-#125: 0x00000000904cf1b3-0x000000008480aa66, size=32, cache=kmalloc-32
[   37.792641] 
[   37.793690] allocated by task 275 on cpu 1 at 37.785765s (0.007914s ago):
[   37.794571]  test_alloc+0x298/0x620
[   37.795139]  test_out_of_bounds_read+0x198/0x3e0
[   37.795804]  kunit_try_run_case+0x14c/0x3d0
[   37.796406]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.797034]  kthread+0x24c/0x2d0
[   37.797538]  ret_from_fork+0x10/0x20
[   37.798107] 
[   37.798501] CPU: 1 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   37.799494] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.800069] Hardware name: linux,dummy-virt (DT)
[   37.800603] ==================================================================
[   38.305931] ==================================================================
[   38.306810] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   38.306810] 
[   38.307644] Out-of-bounds read at 0x00000000aa410bad (32B right of kfence-#130):
[   38.308513]  test_out_of_bounds_read+0x1c8/0x3e0
[   38.309206]  test_out_of_bounds_read+0x198/0x3e0
[   38.309793]  kunit_try_run_case+0x14c/0x3d0
[   38.310333]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.311043]  kthread+0x24c/0x2d0
[   38.311627]  ret_from_fork+0x10/0x20
[   38.312201] 
[   38.312561] kfence-#130: 0x00000000f9f9b5f5-0x00000000864333b8, size=32, cache=test
[   38.312561] 
[   38.313508] allocated by task 277 on cpu 0 at 38.305774s (0.007723s ago):
[   38.314373]  test_alloc+0x22c/0x620
[   38.314865]  test_out_of_bounds_read+0x198/0x3e0
[   38.315479]  kunit_try_run_case+0x14c/0x3d0
[   38.316103]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.316860]  kthread+0x24c/0x2d0
[   38.317336]  ret_from_fork+0x10/0x20
[   38.317885] 
[   38.318284] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   38.319282] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.319766] Hardware name: linux,dummy-virt (DT)
[   38.320299] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[   37.439091] ==================================================================
[   37.439834] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   37.440566] Write of size 1 at addr fff00000c6409278 by task kunit_try_catch/273
[   37.441491] 
[   37.441866] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   37.442967] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.443484] Hardware name: linux,dummy-virt (DT)
[   37.444017] Call trace:
[   37.444778]  show_stack+0x20/0x38 (C)
[   37.445284]  dump_stack_lvl+0x8c/0xd0
[   37.445995]  print_report+0x118/0x5e0
[   37.446395]  kasan_report+0xc8/0x118
[   37.446910]  __asan_report_store1_noabort+0x20/0x30
[   37.447773]  strncpy_from_user+0x270/0x2a0
[   37.448412]  copy_user_test_oob+0x5c0/0xec0
[   37.449043]  kunit_try_run_case+0x14c/0x3d0
[   37.449747]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.450483]  kthread+0x24c/0x2d0
[   37.451038]  ret_from_fork+0x10/0x20
[   37.451640] 
[   37.452015] Allocated by task 273:
[   37.452523]  kasan_save_stack+0x3c/0x68
[   37.453157]  kasan_save_track+0x20/0x40
[   37.453743]  kasan_save_alloc_info+0x40/0x58
[   37.454400]  __kasan_kmalloc+0xd4/0xd8
[   37.455017]  __kmalloc_noprof+0x188/0x4c8
[   37.455535]  kunit_kmalloc_array+0x34/0x88
[   37.456189]  copy_user_test_oob+0xac/0xec0
[   37.456803]  kunit_try_run_case+0x14c/0x3d0
[   37.457464]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.458238]  kthread+0x24c/0x2d0
[   37.458752]  ret_from_fork+0x10/0x20
[   37.459337] 
[   37.459685] The buggy address belongs to the object at fff00000c6409200
[   37.459685]  which belongs to the cache kmalloc-128 of size 128
[   37.460921] The buggy address is located 0 bytes to the right of
[   37.460921]  allocated 120-byte region [fff00000c6409200, fff00000c6409278)
[   37.462262] 
[   37.462555] The buggy address belongs to the physical page:
[   37.463267] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106409
[   37.464140] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.464982] page_type: f5(slab)
[   37.465467] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.466376] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   37.467220] page dumped because: kasan: bad access detected
[   37.467907] 
[   37.468271] Memory state around the buggy address:
[   37.468949]  fff00000c6409100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.469782]  fff00000c6409180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.470668] >fff00000c6409200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.471456]                                                                 ^
[   37.472312]  fff00000c6409280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.473165]  fff00000c6409300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.473944] ==================================================================
[   37.401672] ==================================================================
[   37.402317] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   37.403105] Write of size 121 at addr fff00000c6409200 by task kunit_try_catch/273
[   37.404066] 
[   37.404477] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   37.405621] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.406162] Hardware name: linux,dummy-virt (DT)
[   37.406823] Call trace:
[   37.407295]  show_stack+0x20/0x38 (C)
[   37.407882]  dump_stack_lvl+0x8c/0xd0
[   37.408530]  print_report+0x118/0x5e0
[   37.409198]  kasan_report+0xc8/0x118
[   37.409829]  kasan_check_range+0x100/0x1a8
[   37.410410]  __kasan_check_write+0x20/0x30
[   37.411080]  strncpy_from_user+0x3c/0x2a0
[   37.411706]  copy_user_test_oob+0x5c0/0xec0
[   37.412361]  kunit_try_run_case+0x14c/0x3d0
[   37.412994]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.413743]  kthread+0x24c/0x2d0
[   37.414347]  ret_from_fork+0x10/0x20
[   37.414936] 
[   37.415274] Allocated by task 273:
[   37.415823]  kasan_save_stack+0x3c/0x68
[   37.416373]  kasan_save_track+0x20/0x40
[   37.416985]  kasan_save_alloc_info+0x40/0x58
[   37.417619]  __kasan_kmalloc+0xd4/0xd8
[   37.418250]  __kmalloc_noprof+0x188/0x4c8
[   37.418837]  kunit_kmalloc_array+0x34/0x88
[   37.419470]  copy_user_test_oob+0xac/0xec0
[   37.420067]  kunit_try_run_case+0x14c/0x3d0
[   37.420689]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.421425]  kthread+0x24c/0x2d0
[   37.421946]  ret_from_fork+0x10/0x20
[   37.422493] 
[   37.422875] The buggy address belongs to the object at fff00000c6409200
[   37.422875]  which belongs to the cache kmalloc-128 of size 128
[   37.424035] The buggy address is located 0 bytes inside of
[   37.424035]  allocated 120-byte region [fff00000c6409200, fff00000c6409278)
[   37.425261] 
[   37.425637] The buggy address belongs to the physical page:
[   37.426255] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106409
[   37.427231] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.428036] page_type: f5(slab)
[   37.428574] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.429481] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   37.430324] page dumped because: kasan: bad access detected
[   37.430964] 
[   37.431315] Memory state around the buggy address:
[   37.431945]  fff00000c6409100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.432772]  fff00000c6409180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.433613] >fff00000c6409200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.434426]                                                                 ^
[   37.435196]  fff00000c6409280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.435939]  fff00000c6409300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.436713] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[   37.363728] ==================================================================
[   37.364429] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec0
[   37.365023] Read of size 121 at addr fff00000c6409200 by task kunit_try_catch/273
[   37.365956] 
[   37.366396] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   37.368217] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.368805] Hardware name: linux,dummy-virt (DT)
[   37.369300] Call trace:
[   37.369727]  show_stack+0x20/0x38 (C)
[   37.370279]  dump_stack_lvl+0x8c/0xd0
[   37.370942]  print_report+0x118/0x5e0
[   37.371567]  kasan_report+0xc8/0x118
[   37.372147]  kasan_check_range+0x100/0x1a8
[   37.372762]  __kasan_check_read+0x20/0x30
[   37.373501]  copy_user_test_oob+0x4a0/0xec0
[   37.374165]  kunit_try_run_case+0x14c/0x3d0
[   37.374846]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.375593]  kthread+0x24c/0x2d0
[   37.376187]  ret_from_fork+0x10/0x20
[   37.376830] 
[   37.377172] Allocated by task 273:
[   37.377592]  kasan_save_stack+0x3c/0x68
[   37.378183]  kasan_save_track+0x20/0x40
[   37.378772]  kasan_save_alloc_info+0x40/0x58
[   37.379499]  __kasan_kmalloc+0xd4/0xd8
[   37.380084]  __kmalloc_noprof+0x188/0x4c8
[   37.380747]  kunit_kmalloc_array+0x34/0x88
[   37.381308]  copy_user_test_oob+0xac/0xec0
[   37.381956]  kunit_try_run_case+0x14c/0x3d0
[   37.382622]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.383258]  kthread+0x24c/0x2d0
[   37.383826]  ret_from_fork+0x10/0x20
[   37.384438] 
[   37.384749] The buggy address belongs to the object at fff00000c6409200
[   37.384749]  which belongs to the cache kmalloc-128 of size 128
[   37.385995] The buggy address is located 0 bytes inside of
[   37.385995]  allocated 120-byte region [fff00000c6409200, fff00000c6409278)
[   37.387257] 
[   37.387640] The buggy address belongs to the physical page:
[   37.388330] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106409
[   37.389230] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.390033] page_type: f5(slab)
[   37.390532] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.391441] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   37.392269] page dumped because: kasan: bad access detected
[   37.392926] 
[   37.393318] Memory state around the buggy address:
[   37.393913]  fff00000c6409100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.394725]  fff00000c6409180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.395577] >fff00000c6409200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.396391]                                                                 ^
[   37.397205]  fff00000c6409280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.398030]  fff00000c6409300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.398876] ==================================================================
[   37.326955] ==================================================================
[   37.327576] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec0
[   37.328440] Write of size 121 at addr fff00000c6409200 by task kunit_try_catch/273
[   37.329399] 
[   37.329814] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   37.330946] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.331576] Hardware name: linux,dummy-virt (DT)
[   37.332131] Call trace:
[   37.332571]  show_stack+0x20/0x38 (C)
[   37.333193]  dump_stack_lvl+0x8c/0xd0
[   37.333885]  print_report+0x118/0x5e0
[   37.334498]  kasan_report+0xc8/0x118
[   37.335035]  kasan_check_range+0x100/0x1a8
[   37.335680]  __kasan_check_write+0x20/0x30
[   37.336605]  copy_user_test_oob+0x434/0xec0
[   37.337277]  kunit_try_run_case+0x14c/0x3d0
[   37.337982]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.338724]  kthread+0x24c/0x2d0
[   37.339300]  ret_from_fork+0x10/0x20
[   37.339881] 
[   37.340234] Allocated by task 273:
[   37.340789]  kasan_save_stack+0x3c/0x68
[   37.341341]  kasan_save_track+0x20/0x40
[   37.341856]  kasan_save_alloc_info+0x40/0x58
[   37.342515]  __kasan_kmalloc+0xd4/0xd8
[   37.343078]  __kmalloc_noprof+0x188/0x4c8
[   37.343723]  kunit_kmalloc_array+0x34/0x88
[   37.344271]  copy_user_test_oob+0xac/0xec0
[   37.344924]  kunit_try_run_case+0x14c/0x3d0
[   37.345525]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.346264]  kthread+0x24c/0x2d0
[   37.346775]  ret_from_fork+0x10/0x20
[   37.347384] 
[   37.347759] The buggy address belongs to the object at fff00000c6409200
[   37.347759]  which belongs to the cache kmalloc-128 of size 128
[   37.348984] The buggy address is located 0 bytes inside of
[   37.348984]  allocated 120-byte region [fff00000c6409200, fff00000c6409278)
[   37.350316] 
[   37.350655] The buggy address belongs to the physical page:
[   37.351372] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106409
[   37.352316] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.353034] page_type: f5(slab)
[   37.353615] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.354499] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   37.355354] page dumped because: kasan: bad access detected
[   37.356009] 
[   37.356393] Memory state around the buggy address:
[   37.356920]  fff00000c6409100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.357845]  fff00000c6409180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.358594] >fff00000c6409200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.359453]                                                                 ^
[   37.360259]  fff00000c6409280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.361075]  fff00000c6409300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.361876] ==================================================================
[   37.208218] ==================================================================
[   37.208967] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec0
[   37.209878] Read of size 121 at addr fff00000c6409200 by task kunit_try_catch/273
[   37.210865] 
[   37.211274] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   37.212597] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.213394] Hardware name: linux,dummy-virt (DT)
[   37.214139] Call trace:
[   37.214710]  show_stack+0x20/0x38 (C)
[   37.215299]  dump_stack_lvl+0x8c/0xd0
[   37.215815]  print_report+0x118/0x5e0
[   37.216323]  kasan_report+0xc8/0x118
[   37.217021]  kasan_check_range+0x100/0x1a8
[   37.217840]  __kasan_check_read+0x20/0x30
[   37.218584]  copy_user_test_oob+0x728/0xec0
[   37.219228]  kunit_try_run_case+0x14c/0x3d0
[   37.219871]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.220616]  kthread+0x24c/0x2d0
[   37.221512]  ret_from_fork+0x10/0x20
[   37.222035] 
[   37.222268] Allocated by task 273:
[   37.222831]  kasan_save_stack+0x3c/0x68
[   37.223428]  kasan_save_track+0x20/0x40
[   37.224000]  kasan_save_alloc_info+0x40/0x58
[   37.224609]  __kasan_kmalloc+0xd4/0xd8
[   37.225640]  __kmalloc_noprof+0x188/0x4c8
[   37.226351]  kunit_kmalloc_array+0x34/0x88
[   37.226942]  copy_user_test_oob+0xac/0xec0
[   37.227363]  kunit_try_run_case+0x14c/0x3d0
[   37.228032]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.228820]  kthread+0x24c/0x2d0
[   37.229322]  ret_from_fork+0x10/0x20
[   37.229869] 
[   37.230241] The buggy address belongs to the object at fff00000c6409200
[   37.230241]  which belongs to the cache kmalloc-128 of size 128
[   37.231514] The buggy address is located 0 bytes inside of
[   37.231514]  allocated 120-byte region [fff00000c6409200, fff00000c6409278)
[   37.232762] 
[   37.233209] The buggy address belongs to the physical page:
[   37.233964] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106409
[   37.234860] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.235665] page_type: f5(slab)
[   37.236211] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.237040] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   37.237882] page dumped because: kasan: bad access detected
[   37.238634] 
[   37.238977] Memory state around the buggy address:
[   37.239611]  fff00000c6409100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.240501]  fff00000c6409180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.241164] >fff00000c6409200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.242098]                                                                 ^
[   37.242999]  fff00000c6409280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.243769]  fff00000c6409300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.244654] ==================================================================
[   37.290408] ==================================================================
[   37.291071] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec0
[   37.291969] Read of size 121 at addr fff00000c6409200 by task kunit_try_catch/273
[   37.292845] 
[   37.293293] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   37.294376] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.294942] Hardware name: linux,dummy-virt (DT)
[   37.295679] Call trace:
[   37.296052]  show_stack+0x20/0x38 (C)
[   37.296721]  dump_stack_lvl+0x8c/0xd0
[   37.297404]  print_report+0x118/0x5e0
[   37.298102]  kasan_report+0xc8/0x118
[   37.298661]  kasan_check_range+0x100/0x1a8
[   37.299348]  __kasan_check_read+0x20/0x30
[   37.300037]  copy_user_test_oob+0x3c8/0xec0
[   37.300665]  kunit_try_run_case+0x14c/0x3d0
[   37.301362]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.302022]  kthread+0x24c/0x2d0
[   37.302655]  ret_from_fork+0x10/0x20
[   37.303316] 
[   37.303691] Allocated by task 273:
[   37.304173]  kasan_save_stack+0x3c/0x68
[   37.304801]  kasan_save_track+0x20/0x40
[   37.305377]  kasan_save_alloc_info+0x40/0x58
[   37.306051]  __kasan_kmalloc+0xd4/0xd8
[   37.306600]  __kmalloc_noprof+0x188/0x4c8
[   37.307244]  kunit_kmalloc_array+0x34/0x88
[   37.307854]  copy_user_test_oob+0xac/0xec0
[   37.308452]  kunit_try_run_case+0x14c/0x3d0
[   37.309087]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.309791]  kthread+0x24c/0x2d0
[   37.310332]  ret_from_fork+0x10/0x20
[   37.310892] 
[   37.311287] The buggy address belongs to the object at fff00000c6409200
[   37.311287]  which belongs to the cache kmalloc-128 of size 128
[   37.312442] The buggy address is located 0 bytes inside of
[   37.312442]  allocated 120-byte region [fff00000c6409200, fff00000c6409278)
[   37.313631] 
[   37.314008] The buggy address belongs to the physical page:
[   37.314717] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106409
[   37.315571] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.316385] page_type: f5(slab)
[   37.316832] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.317769] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   37.318598] page dumped because: kasan: bad access detected
[   37.319210] 
[   37.319588] Memory state around the buggy address:
[   37.320229]  fff00000c6409100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.320957]  fff00000c6409180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.321840] >fff00000c6409200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.322643]                                                                 ^
[   37.323448]  fff00000c6409280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.324269]  fff00000c6409300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.325071] ==================================================================
[   37.156251] ==================================================================
[   37.157829] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec0
[   37.159155] Write of size 121 at addr fff00000c6409200 by task kunit_try_catch/273
[   37.159945] 
[   37.160338] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   37.161405] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.161927] Hardware name: linux,dummy-virt (DT)
[   37.162580] Call trace:
[   37.162967]  show_stack+0x20/0x38 (C)
[   37.163466]  dump_stack_lvl+0x8c/0xd0
[   37.164069]  print_report+0x118/0x5e0
[   37.164696]  kasan_report+0xc8/0x118
[   37.165352]  kasan_check_range+0x100/0x1a8
[   37.166005]  __kasan_check_write+0x20/0x30
[   37.166672]  copy_user_test_oob+0x234/0xec0
[   37.167812]  kunit_try_run_case+0x14c/0x3d0
[   37.168352]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.169200]  kthread+0x24c/0x2d0
[   37.169662]  ret_from_fork+0x10/0x20
[   37.170156] 
[   37.170434] Allocated by task 273:
[   37.170749]  kasan_save_stack+0x3c/0x68
[   37.171016]  kasan_save_track+0x20/0x40
[   37.171611]  kasan_save_alloc_info+0x40/0x58
[   37.172307]  __kasan_kmalloc+0xd4/0xd8
[   37.172881]  __kmalloc_noprof+0x188/0x4c8
[   37.174565]  kunit_kmalloc_array+0x34/0x88
[   37.175421]  copy_user_test_oob+0xac/0xec0
[   37.176050]  kunit_try_run_case+0x14c/0x3d0
[   37.176815]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.177866]  kthread+0x24c/0x2d0
[   37.178309]  ret_from_fork+0x10/0x20
[   37.178872] 
[   37.179234] The buggy address belongs to the object at fff00000c6409200
[   37.179234]  which belongs to the cache kmalloc-128 of size 128
[   37.180916] The buggy address is located 0 bytes inside of
[   37.180916]  allocated 120-byte region [fff00000c6409200, fff00000c6409278)
[   37.182918] 
[   37.183311] The buggy address belongs to the physical page:
[   37.183935] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106409
[   37.184821] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.185841] page_type: f5(slab)
[   37.186991] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.188035] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   37.188924] page dumped because: kasan: bad access detected
[   37.189930] 
[   37.190531] Memory state around the buggy address:
[   37.191201]  fff00000c6409100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.192190]  fff00000c6409180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.193437] >fff00000c6409200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.195174]                                                                 ^
[   37.195922]  fff00000c6409280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.196677]  fff00000c6409300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.197838] ==================================================================
[   37.253650] ==================================================================
[   37.254357] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec0
[   37.255151] Write of size 121 at addr fff00000c6409200 by task kunit_try_catch/273
[   37.255958] 
[   37.256327] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   37.257540] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.258058] Hardware name: linux,dummy-virt (DT)
[   37.258725] Call trace:
[   37.259174]  show_stack+0x20/0x38 (C)
[   37.259766]  dump_stack_lvl+0x8c/0xd0
[   37.260427]  print_report+0x118/0x5e0
[   37.261022]  kasan_report+0xc8/0x118
[   37.261692]  kasan_check_range+0x100/0x1a8
[   37.262265]  __kasan_check_write+0x20/0x30
[   37.262967]  copy_user_test_oob+0x35c/0xec0
[   37.263573]  kunit_try_run_case+0x14c/0x3d0
[   37.264254]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.265066]  kthread+0x24c/0x2d0
[   37.265737]  ret_from_fork+0x10/0x20
[   37.266347] 
[   37.266708] Allocated by task 273:
[   37.267270]  kasan_save_stack+0x3c/0x68
[   37.267863]  kasan_save_track+0x20/0x40
[   37.268493]  kasan_save_alloc_info+0x40/0x58
[   37.269195]  __kasan_kmalloc+0xd4/0xd8
[   37.269793]  __kmalloc_noprof+0x188/0x4c8
[   37.270451]  kunit_kmalloc_array+0x34/0x88
[   37.270975]  copy_user_test_oob+0xac/0xec0
[   37.271633]  kunit_try_run_case+0x14c/0x3d0
[   37.272271]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.273012]  kthread+0x24c/0x2d0
[   37.273575]  ret_from_fork+0x10/0x20
[   37.274145] 
[   37.274483] The buggy address belongs to the object at fff00000c6409200
[   37.274483]  which belongs to the cache kmalloc-128 of size 128
[   37.275684] The buggy address is located 0 bytes inside of
[   37.275684]  allocated 120-byte region [fff00000c6409200, fff00000c6409278)
[   37.276862] 
[   37.277299] The buggy address belongs to the physical page:
[   37.278011] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106409
[   37.278893] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.279808] page_type: f5(slab)
[   37.280302] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.281231] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   37.282054] page dumped because: kasan: bad access detected
[   37.282788] 
[   37.283133] Memory state around the buggy address:
[   37.283819]  fff00000c6409100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.284673]  fff00000c6409180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.285518] >fff00000c6409200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.286312]                                                                 ^
[   37.287062]  fff00000c6409280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.287921]  fff00000c6409300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.288735] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[   37.090424] ==================================================================
[   37.091225] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   37.091778] Write of size 8 at addr fff00000c641f378 by task kunit_try_catch/269
[   37.092629] 
[   37.093006] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   37.094221] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.094803] Hardware name: linux,dummy-virt (DT)
[   37.095336] Call trace:
[   37.095766]  show_stack+0x20/0x38 (C)
[   37.097339]  dump_stack_lvl+0x8c/0xd0
[   37.098247]  print_report+0x118/0x5e0
[   37.098816]  kasan_report+0xc8/0x118
[   37.099448]  kasan_check_range+0x100/0x1a8
[   37.100046]  __kasan_check_write+0x20/0x30
[   37.100745]  copy_to_kernel_nofault+0x8c/0x250
[   37.101484]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   37.102246]  kunit_try_run_case+0x14c/0x3d0
[   37.102931]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.103650]  kthread+0x24c/0x2d0
[   37.104265]  ret_from_fork+0x10/0x20
[   37.104851] 
[   37.105198] Allocated by task 269:
[   37.105833]  kasan_save_stack+0x3c/0x68
[   37.106480]  kasan_save_track+0x20/0x40
[   37.107069]  kasan_save_alloc_info+0x40/0x58
[   37.107727]  __kasan_kmalloc+0xd4/0xd8
[   37.108359]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.108971]  copy_to_kernel_nofault_oob+0xc8/0x418
[   37.109738]  kunit_try_run_case+0x14c/0x3d0
[   37.110374]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.111086]  kthread+0x24c/0x2d0
[   37.111685]  ret_from_fork+0x10/0x20
[   37.112260] 
[   37.112636] The buggy address belongs to the object at fff00000c641f300
[   37.112636]  which belongs to the cache kmalloc-128 of size 128
[   37.114041] The buggy address is located 0 bytes to the right of
[   37.114041]  allocated 120-byte region [fff00000c641f300, fff00000c641f378)
[   37.115270] 
[   37.115667] The buggy address belongs to the physical page:
[   37.116372] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10641f
[   37.117206] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.118104] page_type: f5(slab)
[   37.118701] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.119635] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   37.120584] page dumped because: kasan: bad access detected
[   37.121275] 
[   37.121733] Memory state around the buggy address:
[   37.122308]  fff00000c641f200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.123272]  fff00000c641f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.124079] >fff00000c641f300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.124893]                                                                 ^
[   37.125757]  fff00000c641f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.126610]  fff00000c641f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.127447] ==================================================================
[   37.050060] ==================================================================
[   37.051159] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   37.051791] Read of size 8 at addr fff00000c641f378 by task kunit_try_catch/269
[   37.052725] 
[   37.053928] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   37.055286] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.055935] Hardware name: linux,dummy-virt (DT)
[   37.056741] Call trace:
[   37.057454]  show_stack+0x20/0x38 (C)
[   37.058103]  dump_stack_lvl+0x8c/0xd0
[   37.058655]  print_report+0x118/0x5e0
[   37.059329]  kasan_report+0xc8/0x118
[   37.059957]  __asan_report_load8_noabort+0x20/0x30
[   37.060573]  copy_to_kernel_nofault+0x204/0x250
[   37.061487]  copy_to_kernel_nofault_oob+0x158/0x418
[   37.062347]  kunit_try_run_case+0x14c/0x3d0
[   37.062958]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.063585]  kthread+0x24c/0x2d0
[   37.064169]  ret_from_fork+0x10/0x20
[   37.064761] 
[   37.065068] Allocated by task 269:
[   37.065936]  kasan_save_stack+0x3c/0x68
[   37.066536]  kasan_save_track+0x20/0x40
[   37.067071]  kasan_save_alloc_info+0x40/0x58
[   37.067706]  __kasan_kmalloc+0xd4/0xd8
[   37.068301]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.068896]  copy_to_kernel_nofault_oob+0xc8/0x418
[   37.070059]  kunit_try_run_case+0x14c/0x3d0
[   37.070559]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.071226]  kthread+0x24c/0x2d0
[   37.071770]  ret_from_fork+0x10/0x20
[   37.072354] 
[   37.072700] The buggy address belongs to the object at fff00000c641f300
[   37.072700]  which belongs to the cache kmalloc-128 of size 128
[   37.073866] The buggy address is located 0 bytes to the right of
[   37.073866]  allocated 120-byte region [fff00000c641f300, fff00000c641f378)
[   37.075009] 
[   37.075385] The buggy address belongs to the physical page:
[   37.076476] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10641f
[   37.077601] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.078377] page_type: f5(slab)
[   37.078799] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.079675] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   37.080446] page dumped because: kasan: bad access detected
[   37.081103] 
[   37.081622] Memory state around the buggy address:
[   37.082347]  fff00000c641f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   37.083107]  fff00000c641f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.083850] >fff00000c641f300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.084708]                                                                 ^
[   37.085917]  fff00000c641f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.086698]  fff00000c641f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.087536] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[   29.732218] ==================================================================
[   29.733743] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   29.734338] Read of size 1 at addr fff00000c6570000 by task kunit_try_catch/142
[   29.735498] 
[   29.735812] CPU: 0 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   29.736677] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.737491] Hardware name: linux,dummy-virt (DT)
[   29.738192] Call trace:
[   29.738646]  show_stack+0x20/0x38 (C)
[   29.739321]  dump_stack_lvl+0x8c/0xd0
[   29.739937]  print_report+0x118/0x5e0
[   29.740597]  kasan_report+0xc8/0x118
[   29.741340]  __asan_report_load1_noabort+0x20/0x30
[   29.742045]  page_alloc_uaf+0x328/0x350
[   29.742714]  kunit_try_run_case+0x14c/0x3d0
[   29.743426]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.744185]  kthread+0x24c/0x2d0
[   29.744671]  ret_from_fork+0x10/0x20
[   29.745406] 
[   29.745757] The buggy address belongs to the physical page:
[   29.746769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106570
[   29.747565] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.748308] page_type: f0(buddy)
[   29.748783] raw: 0bfffe0000000000 fff00000ff6150e0 fff00000ff6150e0 0000000000000000
[   29.750109] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000
[   29.750889] page dumped because: kasan: bad access detected
[   29.751562] 
[   29.751938] Memory state around the buggy address:
[   29.752524]  fff00000c656ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.753446]  fff00000c656ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.754624] >fff00000c6570000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.755394]                    ^
[   29.755914]  fff00000c6570080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.756676]  fff00000c6570100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.757808] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[   36.938827] ==================================================================
[   36.940407] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   36.941235] Read of size 1 at addr ffff80008010b7f3 by task kunit_try_catch/257
[   36.942968] 
[   36.943597] CPU: 1 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   36.944786] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.946072] Hardware name: linux,dummy-virt (DT)
[   36.946703] Call trace:
[   36.947193]  show_stack+0x20/0x38 (C)
[   36.947778]  dump_stack_lvl+0x8c/0xd0
[   36.948424]  print_report+0x2fc/0x5e0
[   36.949062]  kasan_report+0xc8/0x118
[   36.949651]  __asan_report_load1_noabort+0x20/0x30
[   36.950306]  vmalloc_oob+0x578/0x5d0
[   36.950810]  kunit_try_run_case+0x14c/0x3d0
[   36.951364]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.952001]  kthread+0x24c/0x2d0
[   36.952616]  ret_from_fork+0x10/0x20
[   36.953157] 
[   36.953526] The buggy address belongs to the virtual mapping at
[   36.953526]  [ffff80008010b000, ffff80008010d000) created by:
[   36.953526]  vmalloc_oob+0x98/0x5d0
[   36.955746] 
[   36.956157] The buggy address belongs to the physical page:
[   36.956805] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063de
[   36.958196] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.958994] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   36.959914] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   36.960783] page dumped because: kasan: bad access detected
[   36.961954] 
[   36.962256] Memory state around the buggy address:
[   36.962909]  ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.963973]  ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.964756] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   36.965961]                                                              ^
[   36.966784]  ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   36.967699]  ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   36.968539] ==================================================================
[   36.971134] ==================================================================
[   36.971874] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   36.972710] Read of size 1 at addr ffff80008010b7f8 by task kunit_try_catch/257
[   36.973996] 
[   36.974410] CPU: 1 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   36.975528] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.976148] Hardware name: linux,dummy-virt (DT)
[   36.976688] Call trace:
[   36.977466]  show_stack+0x20/0x38 (C)
[   36.978021]  dump_stack_lvl+0x8c/0xd0
[   36.978548]  print_report+0x2fc/0x5e0
[   36.978991]  kasan_report+0xc8/0x118
[   36.979383]  __asan_report_load1_noabort+0x20/0x30
[   36.980200]  vmalloc_oob+0x51c/0x5d0
[   36.980913]  kunit_try_run_case+0x14c/0x3d0
[   36.981903]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.982521]  kthread+0x24c/0x2d0
[   36.983182]  ret_from_fork+0x10/0x20
[   36.983868] 
[   36.984395] The buggy address belongs to the virtual mapping at
[   36.984395]  [ffff80008010b000, ffff80008010d000) created by:
[   36.984395]  vmalloc_oob+0x98/0x5d0
[   36.986654] 
[   36.987012] The buggy address belongs to the physical page:
[   36.987686] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063de
[   36.988618] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.989388] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   36.990301] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   36.991189] page dumped because: kasan: bad access detected
[   36.991919] 
[   36.992195] Memory state around the buggy address:
[   36.992908]  ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.994303]  ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.995269] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   36.995867]                                                                 ^
[   36.996752]  ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   36.998027]  ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   36.998852] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   35.494805] ==================================================================
[   35.495509] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   35.496351] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   35.496912] 
[   35.497834] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   35.499173] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.499878] Hardware name: linux,dummy-virt (DT)
[   35.500657] Call trace:
[   35.501254]  show_stack+0x20/0x38 (C)
[   35.501964]  dump_stack_lvl+0x8c/0xd0
[   35.502696]  print_report+0x118/0x5e0
[   35.503232]  kasan_report+0xc8/0x118
[   35.503774]  kasan_check_range+0x100/0x1a8
[   35.504355]  __kasan_check_write+0x20/0x30
[   35.504997]  kasan_atomics_helper+0xad4/0x4858
[   35.505571]  kasan_atomics+0x198/0x2e8
[   35.506182]  kunit_try_run_case+0x14c/0x3d0
[   35.506769]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.507523]  kthread+0x24c/0x2d0
[   35.508048]  ret_from_fork+0x10/0x20
[   35.508638] 
[   35.508997] Allocated by task 253:
[   35.509533]  kasan_save_stack+0x3c/0x68
[   35.510014]  kasan_save_track+0x20/0x40
[   35.510617]  kasan_save_alloc_info+0x40/0x58
[   35.511229]  __kasan_kmalloc+0xd4/0xd8
[   35.511824]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.512486]  kasan_atomics+0xb8/0x2e8
[   35.513019]  kunit_try_run_case+0x14c/0x3d0
[   35.513661]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.514342]  kthread+0x24c/0x2d0
[   35.514831]  ret_from_fork+0x10/0x20
[   35.515380] 
[   35.515682] The buggy address belongs to the object at fff00000c63df000
[   35.515682]  which belongs to the cache kmalloc-64 of size 64
[   35.516906] The buggy address is located 0 bytes to the right of
[   35.516906]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   35.518099] 
[   35.518426] The buggy address belongs to the physical page:
[   35.519046] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   35.519998] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.520715] page_type: f5(slab)
[   35.521224] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.522047] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.522865] page dumped because: kasan: bad access detected
[   35.523404] 
[   35.523749] Memory state around the buggy address:
[   35.524428]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.525141]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.526031] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.526806]                                      ^
[   35.527432]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.528169]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.529031] ==================================================================
[   35.564570] ==================================================================
[   35.565316] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   35.566061] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   35.566892] 
[   35.567247] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   35.568361] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.568904] Hardware name: linux,dummy-virt (DT)
[   35.569527] Call trace:
[   35.569924]  show_stack+0x20/0x38 (C)
[   35.571679]  dump_stack_lvl+0x8c/0xd0
[   35.572148]  print_report+0x118/0x5e0
[   35.573010]  kasan_report+0xc8/0x118
[   35.573556]  kasan_check_range+0x100/0x1a8
[   35.574103]  __kasan_check_write+0x20/0x30
[   35.574757]  kasan_atomics_helper+0xb70/0x4858
[   35.575357]  kasan_atomics+0x198/0x2e8
[   35.575965]  kunit_try_run_case+0x14c/0x3d0
[   35.576607]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.577218]  kthread+0x24c/0x2d0
[   35.577814]  ret_from_fork+0x10/0x20
[   35.578429] 
[   35.578773] Allocated by task 253:
[   35.579279]  kasan_save_stack+0x3c/0x68
[   35.579827]  kasan_save_track+0x20/0x40
[   35.580319]  kasan_save_alloc_info+0x40/0x58
[   35.580951]  __kasan_kmalloc+0xd4/0xd8
[   35.581484]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.582156]  kasan_atomics+0xb8/0x2e8
[   35.582723]  kunit_try_run_case+0x14c/0x3d0
[   35.583281]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.583924]  kthread+0x24c/0x2d0
[   35.584475]  ret_from_fork+0x10/0x20
[   35.585038] 
[   35.585878] The buggy address belongs to the object at fff00000c63df000
[   35.585878]  which belongs to the cache kmalloc-64 of size 64
[   35.587002] The buggy address is located 0 bytes to the right of
[   35.587002]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   35.588259] 
[   35.588624] The buggy address belongs to the physical page:
[   35.589280] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   35.590243] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.591026] page_type: f5(slab)
[   35.591577] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.592453] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.593236] page dumped because: kasan: bad access detected
[   35.593918] 
[   35.594265] Memory state around the buggy address:
[   35.594921]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.595701]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.596555] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.597379]                                      ^
[   35.598051]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.598817]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.599510] ==================================================================
[   35.278513] ==================================================================
[   35.279825] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   35.280715] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   35.281725] 
[   35.282073] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   35.283054] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.283639] Hardware name: linux,dummy-virt (DT)
[   35.284203] Call trace:
[   35.284609]  show_stack+0x20/0x38 (C)
[   35.285166]  dump_stack_lvl+0x8c/0xd0
[   35.285785]  print_report+0x118/0x5e0
[   35.286402]  kasan_report+0xc8/0x118
[   35.286980]  kasan_check_range+0x100/0x1a8
[   35.287627]  __kasan_check_write+0x20/0x30
[   35.288240]  kasan_atomics_helper+0x894/0x4858
[   35.288913]  kasan_atomics+0x198/0x2e8
[   35.289534]  kunit_try_run_case+0x14c/0x3d0
[   35.290348]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.291071]  kthread+0x24c/0x2d0
[   35.291555]  ret_from_fork+0x10/0x20
[   35.292054] 
[   35.292461] Allocated by task 253:
[   35.292985]  kasan_save_stack+0x3c/0x68
[   35.293685]  kasan_save_track+0x20/0x40
[   35.294355]  kasan_save_alloc_info+0x40/0x58
[   35.295038]  __kasan_kmalloc+0xd4/0xd8
[   35.295699]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.296434]  kasan_atomics+0xb8/0x2e8
[   35.297020]  kunit_try_run_case+0x14c/0x3d0
[   35.297742]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.298506]  kthread+0x24c/0x2d0
[   35.299103]  ret_from_fork+0x10/0x20
[   35.299726] 
[   35.300144] The buggy address belongs to the object at fff00000c63df000
[   35.300144]  which belongs to the cache kmalloc-64 of size 64
[   35.301433] The buggy address is located 0 bytes to the right of
[   35.301433]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   35.302801] 
[   35.303201] The buggy address belongs to the physical page:
[   35.303857] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   35.304853] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.305691] page_type: f5(slab)
[   35.306267] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.307213] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.308133] page dumped because: kasan: bad access detected
[   35.308844] 
[   35.309233] Memory state around the buggy address:
[   35.309891]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.310798]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.311659] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.312390]                                      ^
[   35.312919]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.313663]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.314588] ==================================================================
[   35.846720] ==================================================================
[   35.847523] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   35.849212] Read of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   35.850389] 
[   35.850966] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   35.852195] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.852661] Hardware name: linux,dummy-virt (DT)
[   35.853230] Call trace:
[   35.853617]  show_stack+0x20/0x38 (C)
[   35.854205]  dump_stack_lvl+0x8c/0xd0
[   35.854753]  print_report+0x118/0x5e0
[   35.855327]  kasan_report+0xc8/0x118
[   35.855921]  kasan_check_range+0x100/0x1a8
[   35.856507]  __kasan_check_read+0x20/0x30
[   35.857100]  kasan_atomics_helper+0xdd4/0x4858
[   35.857731]  kasan_atomics+0x198/0x2e8
[   35.858346]  kunit_try_run_case+0x14c/0x3d0
[   35.858921]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.859684]  kthread+0x24c/0x2d0
[   35.860225]  ret_from_fork+0x10/0x20
[   35.860768] 
[   35.861107] Allocated by task 253:
[   35.861594]  kasan_save_stack+0x3c/0x68
[   35.862187]  kasan_save_track+0x20/0x40
[   35.862734]  kasan_save_alloc_info+0x40/0x58
[   35.863345]  __kasan_kmalloc+0xd4/0xd8
[   35.863934]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.864609]  kasan_atomics+0xb8/0x2e8
[   35.865107]  kunit_try_run_case+0x14c/0x3d0
[   35.865678]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.866425]  kthread+0x24c/0x2d0
[   35.866858]  ret_from_fork+0x10/0x20
[   35.867437] 
[   35.867804] The buggy address belongs to the object at fff00000c63df000
[   35.867804]  which belongs to the cache kmalloc-64 of size 64
[   35.868873] The buggy address is located 0 bytes to the right of
[   35.868873]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   35.870130] 
[   35.870493] The buggy address belongs to the physical page:
[   35.871137] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   35.872025] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.872859] page_type: f5(slab)
[   35.873346] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.874212] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.875056] page dumped because: kasan: bad access detected
[   35.875660] 
[   35.876009] Memory state around the buggy address:
[   35.876587]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.877373]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.878196] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.878946]                                      ^
[   35.879525]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.880340]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.881041] ==================================================================
[   36.666244] ==================================================================
[   36.667105] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   36.667907] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   36.668846] 
[   36.669293] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   36.670465] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.671075] Hardware name: linux,dummy-virt (DT)
[   36.671756] Call trace:
[   36.672263]  show_stack+0x20/0x38 (C)
[   36.672939]  dump_stack_lvl+0x8c/0xd0
[   36.673528]  print_report+0x118/0x5e0
[   36.674214]  kasan_report+0xc8/0x118
[   36.674842]  kasan_check_range+0x100/0x1a8
[   36.675525]  __kasan_check_write+0x20/0x30
[   36.676209]  kasan_atomics_helper+0x1644/0x4858
[   36.676923]  kasan_atomics+0x198/0x2e8
[   36.677595]  kunit_try_run_case+0x14c/0x3d0
[   36.678299]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.679086]  kthread+0x24c/0x2d0
[   36.679698]  ret_from_fork+0x10/0x20
[   36.680360] 
[   36.680747] Allocated by task 253:
[   36.681300]  kasan_save_stack+0x3c/0x68
[   36.681941]  kasan_save_track+0x20/0x40
[   36.682533]  kasan_save_alloc_info+0x40/0x58
[   36.683225]  __kasan_kmalloc+0xd4/0xd8
[   36.683832]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.684500]  kasan_atomics+0xb8/0x2e8
[   36.685090]  kunit_try_run_case+0x14c/0x3d0
[   36.685741]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.686482]  kthread+0x24c/0x2d0
[   36.687034]  ret_from_fork+0x10/0x20
[   36.687619] 
[   36.688023] The buggy address belongs to the object at fff00000c63df000
[   36.688023]  which belongs to the cache kmalloc-64 of size 64
[   36.689245] The buggy address is located 0 bytes to the right of
[   36.689245]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   36.690565] 
[   36.690885] The buggy address belongs to the physical page:
[   36.691610] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   36.692569] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.693399] page_type: f5(slab)
[   36.693932] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.694878] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.695769] page dumped because: kasan: bad access detected
[   36.696479] 
[   36.696865] Memory state around the buggy address:
[   36.697562]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.698479]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.699292] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.700152]                                      ^
[   36.700803]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.701664]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.702468] ==================================================================
[   36.590889] ==================================================================
[   36.591559] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   36.592415] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   36.594392] 
[   36.594782] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   36.596138] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.596886] Hardware name: linux,dummy-virt (DT)
[   36.597448] Call trace:
[   36.597815]  show_stack+0x20/0x38 (C)
[   36.598647]  dump_stack_lvl+0x8c/0xd0
[   36.599247]  print_report+0x118/0x5e0
[   36.600035]  kasan_report+0xc8/0x118
[   36.600608]  kasan_check_range+0x100/0x1a8
[   36.601457]  __kasan_check_write+0x20/0x30
[   36.602222]  kasan_atomics_helper+0x15b4/0x4858
[   36.603003]  kasan_atomics+0x198/0x2e8
[   36.603588]  kunit_try_run_case+0x14c/0x3d0
[   36.604445]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.605317]  kthread+0x24c/0x2d0
[   36.606028]  ret_from_fork+0x10/0x20
[   36.606629] 
[   36.607195] Allocated by task 253:
[   36.607819]  kasan_save_stack+0x3c/0x68
[   36.608564]  kasan_save_track+0x20/0x40
[   36.609098]  kasan_save_alloc_info+0x40/0x58
[   36.609944]  __kasan_kmalloc+0xd4/0xd8
[   36.610661]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.611432]  kasan_atomics+0xb8/0x2e8
[   36.611984]  kunit_try_run_case+0x14c/0x3d0
[   36.612769]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.613463]  kthread+0x24c/0x2d0
[   36.613958]  ret_from_fork+0x10/0x20
[   36.614569] 
[   36.614903] The buggy address belongs to the object at fff00000c63df000
[   36.614903]  which belongs to the cache kmalloc-64 of size 64
[   36.616151] The buggy address is located 0 bytes to the right of
[   36.616151]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   36.617410] 
[   36.617770] The buggy address belongs to the physical page:
[   36.618414] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   36.619309] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.620094] page_type: f5(slab)
[   36.620694] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.621571] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.622428] page dumped because: kasan: bad access detected
[   36.623078] 
[   36.623461] Memory state around the buggy address:
[   36.624082]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.624856]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.625789] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.626700]                                      ^
[   36.627252]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.628152]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.628933] ==================================================================
[   35.459642] ==================================================================
[   35.460446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   35.461096] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   35.462108] 
[   35.462664] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   35.463709] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.464320] Hardware name: linux,dummy-virt (DT)
[   35.464904] Call trace:
[   35.465858]  show_stack+0x20/0x38 (C)
[   35.466429]  dump_stack_lvl+0x8c/0xd0
[   35.467017]  print_report+0x118/0x5e0
[   35.467595]  kasan_report+0xc8/0x118
[   35.468096]  kasan_check_range+0x100/0x1a8
[   35.468643]  __kasan_check_write+0x20/0x30
[   35.469280]  kasan_atomics_helper+0xa6c/0x4858
[   35.469889]  kasan_atomics+0x198/0x2e8
[   35.470385]  kunit_try_run_case+0x14c/0x3d0
[   35.471031]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.471796]  kthread+0x24c/0x2d0
[   35.472380]  ret_from_fork+0x10/0x20
[   35.472924] 
[   35.473285] Allocated by task 253:
[   35.473809]  kasan_save_stack+0x3c/0x68
[   35.474393]  kasan_save_track+0x20/0x40
[   35.474920]  kasan_save_alloc_info+0x40/0x58
[   35.475504]  __kasan_kmalloc+0xd4/0xd8
[   35.476013]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.476557]  kasan_atomics+0xb8/0x2e8
[   35.477147]  kunit_try_run_case+0x14c/0x3d0
[   35.477764]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.478367]  kthread+0x24c/0x2d0
[   35.478915]  ret_from_fork+0x10/0x20
[   35.479493] 
[   35.479842] The buggy address belongs to the object at fff00000c63df000
[   35.479842]  which belongs to the cache kmalloc-64 of size 64
[   35.480922] The buggy address is located 0 bytes to the right of
[   35.480922]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   35.482165] 
[   35.482514] The buggy address belongs to the physical page:
[   35.483204] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   35.484131] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.484942] page_type: f5(slab)
[   35.485449] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.486228] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.486980] page dumped because: kasan: bad access detected
[   35.487695] 
[   35.488009] Memory state around the buggy address:
[   35.488681]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.489487]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.490225] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.490959]                                      ^
[   35.491542]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.492287]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.493024] ==================================================================
[   35.742170] ==================================================================
[   35.742946] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   35.743731] Read of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   35.745554] 
[   35.745989] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   35.746986] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.747598] Hardware name: linux,dummy-virt (DT)
[   35.748128] Call trace:
[   35.748564]  show_stack+0x20/0x38 (C)
[   35.749161]  dump_stack_lvl+0x8c/0xd0
[   35.749769]  print_report+0x118/0x5e0
[   35.750392]  kasan_report+0xc8/0x118
[   35.750899]  __asan_report_load4_noabort+0x20/0x30
[   35.751604]  kasan_atomics_helper+0x3dd8/0x4858
[   35.752288]  kasan_atomics+0x198/0x2e8
[   35.752822]  kunit_try_run_case+0x14c/0x3d0
[   35.753459]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.754211]  kthread+0x24c/0x2d0
[   35.754776]  ret_from_fork+0x10/0x20
[   35.755341] 
[   35.755694] Allocated by task 253:
[   35.756193]  kasan_save_stack+0x3c/0x68
[   35.756678]  kasan_save_track+0x20/0x40
[   35.757261]  kasan_save_alloc_info+0x40/0x58
[   35.757940]  __kasan_kmalloc+0xd4/0xd8
[   35.758532]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.759212]  kasan_atomics+0xb8/0x2e8
[   35.759739]  kunit_try_run_case+0x14c/0x3d0
[   35.760408]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.761162]  kthread+0x24c/0x2d0
[   35.761607]  ret_from_fork+0x10/0x20
[   35.762194] 
[   35.762501] The buggy address belongs to the object at fff00000c63df000
[   35.762501]  which belongs to the cache kmalloc-64 of size 64
[   35.763700] The buggy address is located 0 bytes to the right of
[   35.763700]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   35.764812] 
[   35.765186] The buggy address belongs to the physical page:
[   35.765860] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   35.766688] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.767356] page_type: f5(slab)
[   35.767911] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.768820] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.769618] page dumped because: kasan: bad access detected
[   35.770332] 
[   35.770637] Memory state around the buggy address:
[   35.771156]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.771998]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.772777] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.773414]                                      ^
[   35.774057]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.774845]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.775649] ==================================================================
[   36.704511] ==================================================================
[   36.705300] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   36.706316] Read of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   36.706898] 
[   36.708088] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   36.709293] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.709743] Hardware name: linux,dummy-virt (DT)
[   36.710362] Call trace:
[   36.710733]  show_stack+0x20/0x38 (C)
[   36.711304]  dump_stack_lvl+0x8c/0xd0
[   36.711846]  print_report+0x118/0x5e0
[   36.712426]  kasan_report+0xc8/0x118
[   36.712898]  __asan_report_load8_noabort+0x20/0x30
[   36.713722]  kasan_atomics_helper+0x3df4/0x4858
[   36.714377]  kasan_atomics+0x198/0x2e8
[   36.714968]  kunit_try_run_case+0x14c/0x3d0
[   36.715549]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.716250]  kthread+0x24c/0x2d0
[   36.716820]  ret_from_fork+0x10/0x20
[   36.717356] 
[   36.717711] Allocated by task 253:
[   36.718237]  kasan_save_stack+0x3c/0x68
[   36.718820]  kasan_save_track+0x20/0x40
[   36.719330]  kasan_save_alloc_info+0x40/0x58
[   36.719974]  __kasan_kmalloc+0xd4/0xd8
[   36.720526]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.721095]  kasan_atomics+0xb8/0x2e8
[   36.721625]  kunit_try_run_case+0x14c/0x3d0
[   36.722131]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.722873]  kthread+0x24c/0x2d0
[   36.723384]  ret_from_fork+0x10/0x20
[   36.723861] 
[   36.724216] The buggy address belongs to the object at fff00000c63df000
[   36.724216]  which belongs to the cache kmalloc-64 of size 64
[   36.725272] The buggy address is located 0 bytes to the right of
[   36.725272]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   36.726627] 
[   36.726978] The buggy address belongs to the physical page:
[   36.727588] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   36.728341] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.729171] page_type: f5(slab)
[   36.729706] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.730641] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.731423] page dumped because: kasan: bad access detected
[   36.732076] 
[   36.732872] Memory state around the buggy address:
[   36.733506]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.734475]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.735415] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.736335]                                      ^
[   36.736913]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.737677]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.738410] ==================================================================
[   36.230826] ==================================================================
[   36.231693] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   36.232535] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   36.233358] 
[   36.233720] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   36.234624] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.235219] Hardware name: linux,dummy-virt (DT)
[   36.235831] Call trace:
[   36.236250]  show_stack+0x20/0x38 (C)
[   36.236847]  dump_stack_lvl+0x8c/0xd0
[   36.237413]  print_report+0x118/0x5e0
[   36.238054]  kasan_report+0xc8/0x118
[   36.238649]  kasan_check_range+0x100/0x1a8
[   36.239323]  __kasan_check_write+0x20/0x30
[   36.239986]  kasan_atomics_helper+0x1190/0x4858
[   36.240621]  kasan_atomics+0x198/0x2e8
[   36.241238]  kunit_try_run_case+0x14c/0x3d0
[   36.241806]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.242463]  kthread+0x24c/0x2d0
[   36.243031]  ret_from_fork+0x10/0x20
[   36.243591] 
[   36.243938] Allocated by task 253:
[   36.244462]  kasan_save_stack+0x3c/0x68
[   36.244997]  kasan_save_track+0x20/0x40
[   36.245539]  kasan_save_alloc_info+0x40/0x58
[   36.246088]  __kasan_kmalloc+0xd4/0xd8
[   36.246662]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.247228]  kasan_atomics+0xb8/0x2e8
[   36.247830]  kunit_try_run_case+0x14c/0x3d0
[   36.248464]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.249223]  kthread+0x24c/0x2d0
[   36.249763]  ret_from_fork+0x10/0x20
[   36.250256] 
[   36.250607] The buggy address belongs to the object at fff00000c63df000
[   36.250607]  which belongs to the cache kmalloc-64 of size 64
[   36.251625] The buggy address is located 0 bytes to the right of
[   36.251625]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   36.252950] 
[   36.253324] The buggy address belongs to the physical page:
[   36.253945] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   36.254790] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.255621] page_type: f5(slab)
[   36.256040] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.256937] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.257706] page dumped because: kasan: bad access detected
[   36.258427] 
[   36.258745] Memory state around the buggy address:
[   36.259300]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.260088]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.260968] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.261628]                                      ^
[   36.262297]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.263078]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.263891] ==================================================================
[   35.530817] ==================================================================
[   35.531551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   35.533645] Read of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   35.534415] 
[   35.534776] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   35.535837] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.536440] Hardware name: linux,dummy-virt (DT)
[   35.536993] Call trace:
[   35.537217]  show_stack+0x20/0x38 (C)
[   35.537493]  dump_stack_lvl+0x8c/0xd0
[   35.537761]  print_report+0x118/0x5e0
[   35.538013]  kasan_report+0xc8/0x118
[   35.538280]  __asan_report_load4_noabort+0x20/0x30
[   35.538577]  kasan_atomics_helper+0x3dcc/0x4858
[   35.538857]  kasan_atomics+0x198/0x2e8
[   35.539110]  kunit_try_run_case+0x14c/0x3d0
[   35.539402]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.539712]  kthread+0x24c/0x2d0
[   35.539952]  ret_from_fork+0x10/0x20
[   35.540326] 
[   35.540628] Allocated by task 253:
[   35.541033]  kasan_save_stack+0x3c/0x68
[   35.541589]  kasan_save_track+0x20/0x40
[   35.542213]  kasan_save_alloc_info+0x40/0x58
[   35.542908]  __kasan_kmalloc+0xd4/0xd8
[   35.543547]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.544256]  kasan_atomics+0xb8/0x2e8
[   35.544854]  kunit_try_run_case+0x14c/0x3d0
[   35.545560]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.546241]  kthread+0x24c/0x2d0
[   35.546691]  ret_from_fork+0x10/0x20
[   35.547156] 
[   35.547504] The buggy address belongs to the object at fff00000c63df000
[   35.547504]  which belongs to the cache kmalloc-64 of size 64
[   35.548917] The buggy address is located 0 bytes to the right of
[   35.548917]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   35.550355] 
[   35.550719] The buggy address belongs to the physical page:
[   35.551750] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   35.552806] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.553660] page_type: f5(slab)
[   35.554149] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.555004] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.555866] page dumped because: kasan: bad access detected
[   35.556658] 
[   35.556970] Memory state around the buggy address:
[   35.557578]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.558323]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.559134] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.560021]                                      ^
[   35.560690]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.561595]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.562332] ==================================================================
[   36.160875] ==================================================================
[   36.161619] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   36.162513] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   36.163373] 
[   36.163668] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   36.164600] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.165256] Hardware name: linux,dummy-virt (DT)
[   36.165746] Call trace:
[   36.166226]  show_stack+0x20/0x38 (C)
[   36.166840]  dump_stack_lvl+0x8c/0xd0
[   36.167380]  print_report+0x118/0x5e0
[   36.168021]  kasan_report+0xc8/0x118
[   36.168633]  kasan_check_range+0x100/0x1a8
[   36.169277]  __kasan_check_write+0x20/0x30
[   36.169914]  kasan_atomics_helper+0x10c0/0x4858
[   36.170676]  kasan_atomics+0x198/0x2e8
[   36.171193]  kunit_try_run_case+0x14c/0x3d0
[   36.171855]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.172647]  kthread+0x24c/0x2d0
[   36.173226]  ret_from_fork+0x10/0x20
[   36.173785] 
[   36.174082] Allocated by task 253:
[   36.174662]  kasan_save_stack+0x3c/0x68
[   36.175261]  kasan_save_track+0x20/0x40
[   36.175858]  kasan_save_alloc_info+0x40/0x58
[   36.176496]  __kasan_kmalloc+0xd4/0xd8
[   36.177084]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.177640]  kasan_atomics+0xb8/0x2e8
[   36.178220]  kunit_try_run_case+0x14c/0x3d0
[   36.178834]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.179568]  kthread+0x24c/0x2d0
[   36.180030]  ret_from_fork+0x10/0x20
[   36.180618] 
[   36.180965] The buggy address belongs to the object at fff00000c63df000
[   36.180965]  which belongs to the cache kmalloc-64 of size 64
[   36.181957] The buggy address is located 0 bytes to the right of
[   36.181957]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   36.183337] 
[   36.183692] The buggy address belongs to the physical page:
[   36.184288] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   36.185205] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.185892] page_type: f5(slab)
[   36.186441] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.187268] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.187963] page dumped because: kasan: bad access detected
[   36.188671] 
[   36.189008] Memory state around the buggy address:
[   36.189648]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.190457]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.191168] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.192000]                                      ^
[   36.192671]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.193452]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.194141] ==================================================================
[   36.844717] ==================================================================
[   36.845502] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   36.846522] Read of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   36.847412] 
[   36.847864] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   36.849095] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.849756] Hardware name: linux,dummy-virt (DT)
[   36.850432] Call trace:
[   36.850928]  show_stack+0x20/0x38 (C)
[   36.851597]  dump_stack_lvl+0x8c/0xd0
[   36.852247]  print_report+0x118/0x5e0
[   36.852922]  kasan_report+0xc8/0x118
[   36.853569]  __asan_report_load8_noabort+0x20/0x30
[   36.854313]  kasan_atomics_helper+0x3e20/0x4858
[   36.855016]  kasan_atomics+0x198/0x2e8
[   36.855655]  kunit_try_run_case+0x14c/0x3d0
[   36.856363]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.857142]  kthread+0x24c/0x2d0
[   36.857784]  ret_from_fork+0x10/0x20
[   36.858432] 
[   36.858792] Allocated by task 253:
[   36.859403]  kasan_save_stack+0x3c/0x68
[   36.860049]  kasan_save_track+0x20/0x40
[   36.860694]  kasan_save_alloc_info+0x40/0x58
[   36.861367]  __kasan_kmalloc+0xd4/0xd8
[   36.861974]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.862653]  kasan_atomics+0xb8/0x2e8
[   36.863266]  kunit_try_run_case+0x14c/0x3d0
[   36.863978]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.864735]  kthread+0x24c/0x2d0
[   36.865302]  ret_from_fork+0x10/0x20
[   36.865770] 
[   36.866077] The buggy address belongs to the object at fff00000c63df000
[   36.866077]  which belongs to the cache kmalloc-64 of size 64
[   36.867225] The buggy address is located 0 bytes to the right of
[   36.867225]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   36.868732] 
[   36.869093] The buggy address belongs to the physical page:
[   36.869746] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   36.870759] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.871656] page_type: f5(slab)
[   36.872293] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.873239] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.874164] page dumped because: kasan: bad access detected
[   36.874866] 
[   36.875272] Memory state around the buggy address:
[   36.875916]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.876822]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.877672] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.878564]                                      ^
[   36.879218]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.880171]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.881006] ==================================================================
[   34.808196] ==================================================================
[   34.808893] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   34.809646] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   34.810538] 
[   34.810927] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   34.813366] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.813851] Hardware name: linux,dummy-virt (DT)
[   34.814478] Call trace:
[   34.814915]  show_stack+0x20/0x38 (C)
[   34.815445]  dump_stack_lvl+0x8c/0xd0
[   34.816040]  print_report+0x118/0x5e0
[   34.816663]  kasan_report+0xc8/0x118
[   34.817523]  __asan_report_store4_noabort+0x20/0x30
[   34.818147]  kasan_atomics_helper+0x3f94/0x4858
[   34.818716]  kasan_atomics+0x198/0x2e8
[   34.819775]  kunit_try_run_case+0x14c/0x3d0
[   34.820140]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.820603]  kthread+0x24c/0x2d0
[   34.821197]  ret_from_fork+0x10/0x20
[   34.822224] 
[   34.822619] Allocated by task 253:
[   34.823129]  kasan_save_stack+0x3c/0x68
[   34.823798]  kasan_save_track+0x20/0x40
[   34.824419]  kasan_save_alloc_info+0x40/0x58
[   34.825348]  __kasan_kmalloc+0xd4/0xd8
[   34.826263]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.826842]  kasan_atomics+0xb8/0x2e8
[   34.827356]  kunit_try_run_case+0x14c/0x3d0
[   34.827980]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.828831]  kthread+0x24c/0x2d0
[   34.829610]  ret_from_fork+0x10/0x20
[   34.830193] 
[   34.830535] The buggy address belongs to the object at fff00000c63df000
[   34.830535]  which belongs to the cache kmalloc-64 of size 64
[   34.831669] The buggy address is located 0 bytes to the right of
[   34.831669]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   34.832846] 
[   34.833983] The buggy address belongs to the physical page:
[   34.834758] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   34.835579] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.836299] page_type: f5(slab)
[   34.836827] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.838144] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   34.839076] page dumped because: kasan: bad access detected
[   34.839766] 
[   34.840087] Memory state around the buggy address:
[   34.840742]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.842631]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.843434] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.844199]                                      ^
[   34.844735]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.845939]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.846639] ==================================================================
[   35.811652] ==================================================================
[   35.812454] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   35.813249] Read of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   35.814012] 
[   35.814409] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   35.815367] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.815930] Hardware name: linux,dummy-virt (DT)
[   35.816531] Call trace:
[   35.816895]  show_stack+0x20/0x38 (C)
[   35.817524]  dump_stack_lvl+0x8c/0xd0
[   35.818158]  print_report+0x118/0x5e0
[   35.818691]  kasan_report+0xc8/0x118
[   35.819431]  __asan_report_load4_noabort+0x20/0x30
[   35.820070]  kasan_atomics_helper+0x3e04/0x4858
[   35.820846]  kasan_atomics+0x198/0x2e8
[   35.821542]  kunit_try_run_case+0x14c/0x3d0
[   35.822270]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.823077]  kthread+0x24c/0x2d0
[   35.823629]  ret_from_fork+0x10/0x20
[   35.824201] 
[   35.824568] Allocated by task 253:
[   35.825147]  kasan_save_stack+0x3c/0x68
[   35.825703]  kasan_save_track+0x20/0x40
[   35.826368]  kasan_save_alloc_info+0x40/0x58
[   35.826948]  __kasan_kmalloc+0xd4/0xd8
[   35.827618]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.828262]  kasan_atomics+0xb8/0x2e8
[   35.828813]  kunit_try_run_case+0x14c/0x3d0
[   35.829492]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.830243]  kthread+0x24c/0x2d0
[   35.830775]  ret_from_fork+0x10/0x20
[   35.831295] 
[   35.831678] The buggy address belongs to the object at fff00000c63df000
[   35.831678]  which belongs to the cache kmalloc-64 of size 64
[   35.832897] The buggy address is located 0 bytes to the right of
[   35.832897]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   35.834179] 
[   35.834561] The buggy address belongs to the physical page:
[   35.835149] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   35.836107] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.836901] page_type: f5(slab)
[   35.837511] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.838407] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.839095] page dumped because: kasan: bad access detected
[   35.839720] 
[   35.840079] Memory state around the buggy address:
[   35.840615]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.841404]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.842167] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.842859]                                      ^
[   35.843519]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.844257]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.844950] ==================================================================
[   34.648131] ==================================================================
[   34.649240] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   34.650003] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   34.650690] 
[   34.651077] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   34.652366] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.652874] Hardware name: linux,dummy-virt (DT)
[   34.654338] Call trace:
[   34.654805]  show_stack+0x20/0x38 (C)
[   34.655449]  dump_stack_lvl+0x8c/0xd0
[   34.656095]  print_report+0x118/0x5e0
[   34.656730]  kasan_report+0xc8/0x118
[   34.657659]  kasan_check_range+0x100/0x1a8
[   34.658278]  __kasan_check_write+0x20/0x30
[   34.658829]  kasan_atomics_helper+0x24c/0x4858
[   34.659391]  kasan_atomics+0x198/0x2e8
[   34.660032]  kunit_try_run_case+0x14c/0x3d0
[   34.660618]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.661466]  kthread+0x24c/0x2d0
[   34.661955]  ret_from_fork+0x10/0x20
[   34.662721] 
[   34.663058] Allocated by task 253:
[   34.664263]  kasan_save_stack+0x3c/0x68
[   34.664762]  kasan_save_track+0x20/0x40
[   34.665694]  kasan_save_alloc_info+0x40/0x58
[   34.666278]  __kasan_kmalloc+0xd4/0xd8
[   34.666897]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.667535]  kasan_atomics+0xb8/0x2e8
[   34.668152]  kunit_try_run_case+0x14c/0x3d0
[   34.668774]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.670242]  kthread+0x24c/0x2d0
[   34.670798]  ret_from_fork+0x10/0x20
[   34.671410] 
[   34.671786] The buggy address belongs to the object at fff00000c63df000
[   34.671786]  which belongs to the cache kmalloc-64 of size 64
[   34.673076] The buggy address is located 0 bytes to the right of
[   34.673076]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   34.674672] 
[   34.675052] The buggy address belongs to the physical page:
[   34.675747] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   34.676638] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.678366] page_type: f5(slab)
[   34.678874] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.679741] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   34.680630] page dumped because: kasan: bad access detected
[   34.681644] 
[   34.681992] Memory state around the buggy address:
[   34.682791]  fff00000c63def00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.683549]  fff00000c63def80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.684367] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.685162]                                      ^
[   34.686393]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.687182]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.688294] ==================================================================
[   34.972140] ==================================================================
[   34.973018] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   34.973892] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   34.975039] 
[   34.975438] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   34.976720] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.977552] Hardware name: linux,dummy-virt (DT)
[   34.978106] Call trace:
[   34.978481]  show_stack+0x20/0x38 (C)
[   34.978988]  dump_stack_lvl+0x8c/0xd0
[   34.979607]  print_report+0x118/0x5e0
[   34.980203]  kasan_report+0xc8/0x118
[   34.980747]  kasan_check_range+0x100/0x1a8
[   34.982271]  __kasan_check_write+0x20/0x30
[   34.982923]  kasan_atomics_helper+0x4e4/0x4858
[   34.983633]  kasan_atomics+0x198/0x2e8
[   34.984231]  kunit_try_run_case+0x14c/0x3d0
[   34.984870]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.985645]  kthread+0x24c/0x2d0
[   34.986554]  ret_from_fork+0x10/0x20
[   34.987167] 
[   34.987535] Allocated by task 253:
[   34.987982]  kasan_save_stack+0x3c/0x68
[   34.988640]  kasan_save_track+0x20/0x40
[   34.989405]  kasan_save_alloc_info+0x40/0x58
[   34.990622]  __kasan_kmalloc+0xd4/0xd8
[   34.991181]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.991854]  kasan_atomics+0xb8/0x2e8
[   34.992461]  kunit_try_run_case+0x14c/0x3d0
[   34.992991]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.993967]  kthread+0x24c/0x2d0
[   34.994537]  ret_from_fork+0x10/0x20
[   34.995132] 
[   34.995536] The buggy address belongs to the object at fff00000c63df000
[   34.995536]  which belongs to the cache kmalloc-64 of size 64
[   34.996850] The buggy address is located 0 bytes to the right of
[   34.996850]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   34.998998] 
[   34.999366] The buggy address belongs to the physical page:
[   35.000014] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   35.000852] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.002077] page_type: f5(slab)
[   35.002701] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.003651] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.004479] page dumped because: kasan: bad access detected
[   35.005286] 
[   35.005670] Memory state around the buggy address:
[   35.006580]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.007407]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.008488] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.009685]                                      ^
[   35.010280]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.011004]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.011931] ==================================================================
[   36.630357] ==================================================================
[   36.631238] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   36.632180] Read of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   36.632828] 
[   36.633216] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   36.634307] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.634825] Hardware name: linux,dummy-virt (DT)
[   36.635334] Call trace:
[   36.635685]  show_stack+0x20/0x38 (C)
[   36.636345]  dump_stack_lvl+0x8c/0xd0
[   36.637002]  print_report+0x118/0x5e0
[   36.637600]  kasan_report+0xc8/0x118
[   36.638264]  __asan_report_load8_noabort+0x20/0x30
[   36.638990]  kasan_atomics_helper+0x3db0/0x4858
[   36.639707]  kasan_atomics+0x198/0x2e8
[   36.640367]  kunit_try_run_case+0x14c/0x3d0
[   36.640955]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.641690]  kthread+0x24c/0x2d0
[   36.642307]  ret_from_fork+0x10/0x20
[   36.642845] 
[   36.643237] Allocated by task 253:
[   36.643717]  kasan_save_stack+0x3c/0x68
[   36.644334]  kasan_save_track+0x20/0x40
[   36.644932]  kasan_save_alloc_info+0x40/0x58
[   36.645614]  __kasan_kmalloc+0xd4/0xd8
[   36.646206]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.646889]  kasan_atomics+0xb8/0x2e8
[   36.647464]  kunit_try_run_case+0x14c/0x3d0
[   36.648131]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.648804]  kthread+0x24c/0x2d0
[   36.649398]  ret_from_fork+0x10/0x20
[   36.649915] 
[   36.650314] The buggy address belongs to the object at fff00000c63df000
[   36.650314]  which belongs to the cache kmalloc-64 of size 64
[   36.651631] The buggy address is located 0 bytes to the right of
[   36.651631]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   36.652938] 
[   36.653312] The buggy address belongs to the physical page:
[   36.653937] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   36.654766] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.655567] page_type: f5(slab)
[   36.655990] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.657032] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.657972] page dumped because: kasan: bad access detected
[   36.658702] 
[   36.659128] Memory state around the buggy address:
[   36.659683]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.660611]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.661470] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.662267]                                      ^
[   36.662870]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.663624]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.664541] ==================================================================
[   36.334827] ==================================================================
[   36.335547] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   36.336201] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   36.337130] 
[   36.337550] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   36.338605] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.339185] Hardware name: linux,dummy-virt (DT)
[   36.339748] Call trace:
[   36.340184]  show_stack+0x20/0x38 (C)
[   36.340803]  dump_stack_lvl+0x8c/0xd0
[   36.341337]  print_report+0x118/0x5e0
[   36.341937]  kasan_report+0xc8/0x118
[   36.342508]  kasan_check_range+0x100/0x1a8
[   36.343027]  __kasan_check_write+0x20/0x30
[   36.343684]  kasan_atomics_helper+0x12d8/0x4858
[   36.344373]  kasan_atomics+0x198/0x2e8
[   36.345025]  kunit_try_run_case+0x14c/0x3d0
[   36.345653]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.346401]  kthread+0x24c/0x2d0
[   36.346996]  ret_from_fork+0x10/0x20
[   36.347561] 
[   36.347914] Allocated by task 253:
[   36.348460]  kasan_save_stack+0x3c/0x68
[   36.349039]  kasan_save_track+0x20/0x40
[   36.349842]  kasan_save_alloc_info+0x40/0x58
[   36.350354]  __kasan_kmalloc+0xd4/0xd8
[   36.350929]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.351562]  kasan_atomics+0xb8/0x2e8
[   36.352084]  kunit_try_run_case+0x14c/0x3d0
[   36.352656]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.353277]  kthread+0x24c/0x2d0
[   36.353816]  ret_from_fork+0x10/0x20
[   36.354391] 
[   36.354721] The buggy address belongs to the object at fff00000c63df000
[   36.354721]  which belongs to the cache kmalloc-64 of size 64
[   36.355854] The buggy address is located 0 bytes to the right of
[   36.355854]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   36.357043] 
[   36.357401] The buggy address belongs to the physical page:
[   36.358131] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   36.358910] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.359730] page_type: f5(slab)
[   36.360293] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.361045] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.361929] page dumped because: kasan: bad access detected
[   36.362539] 
[   36.362879] Memory state around the buggy address:
[   36.363475]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.364300]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.364968] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.365815]                                      ^
[   36.366345]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.367142]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.367972] ==================================================================
[   34.889715] ==================================================================
[   34.890361] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   34.891059] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   34.892698] 
[   34.893159] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   34.894684] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.895074] Hardware name: linux,dummy-virt (DT)
[   34.895708] Call trace:
[   34.896194]  show_stack+0x20/0x38 (C)
[   34.896791]  dump_stack_lvl+0x8c/0xd0
[   34.897841]  print_report+0x118/0x5e0
[   34.898853]  kasan_report+0xc8/0x118
[   34.899176]  kasan_check_range+0x100/0x1a8
[   34.899785]  __kasan_check_write+0x20/0x30
[   34.900392]  kasan_atomics_helper+0x414/0x4858
[   34.901015]  kasan_atomics+0x198/0x2e8
[   34.901580]  kunit_try_run_case+0x14c/0x3d0
[   34.902156]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.902846]  kthread+0x24c/0x2d0
[   34.903463]  ret_from_fork+0x10/0x20
[   34.904350] 
[   34.904699] Allocated by task 253:
[   34.905279]  kasan_save_stack+0x3c/0x68
[   34.905779]  kasan_save_track+0x20/0x40
[   34.906775]  kasan_save_alloc_info+0x40/0x58
[   34.907792]  __kasan_kmalloc+0xd4/0xd8
[   34.908520]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.909595]  kasan_atomics+0xb8/0x2e8
[   34.910309]  kunit_try_run_case+0x14c/0x3d0
[   34.910922]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.911816]  kthread+0x24c/0x2d0
[   34.912510]  ret_from_fork+0x10/0x20
[   34.913422] 
[   34.914197] The buggy address belongs to the object at fff00000c63df000
[   34.914197]  which belongs to the cache kmalloc-64 of size 64
[   34.915358] The buggy address is located 0 bytes to the right of
[   34.915358]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   34.917554] 
[   34.917964] The buggy address belongs to the physical page:
[   34.918636] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   34.919497] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.920177] page_type: f5(slab)
[   34.920686] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.921620] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   34.923323] page dumped because: kasan: bad access detected
[   34.923922] 
[   34.924287] Memory state around the buggy address:
[   34.924864]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.926149]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.926881] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.927639]                                      ^
[   34.928227]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.929436]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.930103] ==================================================================
[   35.388679] ==================================================================
[   35.389928] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   35.390722] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   35.391521] 
[   35.391860] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   35.392941] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.393526] Hardware name: linux,dummy-virt (DT)
[   35.394045] Call trace:
[   35.394504]  show_stack+0x20/0x38 (C)
[   35.395140]  dump_stack_lvl+0x8c/0xd0
[   35.395755]  print_report+0x118/0x5e0
[   35.396273]  kasan_report+0xc8/0x118
[   35.396885]  kasan_check_range+0x100/0x1a8
[   35.397568]  __kasan_check_write+0x20/0x30
[   35.398172]  kasan_atomics_helper+0x99c/0x4858
[   35.398755]  kasan_atomics+0x198/0x2e8
[   35.399384]  kunit_try_run_case+0x14c/0x3d0
[   35.399958]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.400729]  kthread+0x24c/0x2d0
[   35.401238]  ret_from_fork+0x10/0x20
[   35.401801] 
[   35.402097] Allocated by task 253:
[   35.402633]  kasan_save_stack+0x3c/0x68
[   35.403229]  kasan_save_track+0x20/0x40
[   35.403797]  kasan_save_alloc_info+0x40/0x58
[   35.404456]  __kasan_kmalloc+0xd4/0xd8
[   35.404980]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.405585]  kasan_atomics+0xb8/0x2e8
[   35.406181]  kunit_try_run_case+0x14c/0x3d0
[   35.406798]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.407414]  kthread+0x24c/0x2d0
[   35.407985]  ret_from_fork+0x10/0x20
[   35.408565] 
[   35.408909] The buggy address belongs to the object at fff00000c63df000
[   35.408909]  which belongs to the cache kmalloc-64 of size 64
[   35.410097] The buggy address is located 0 bytes to the right of
[   35.410097]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   35.411188] 
[   35.411538] The buggy address belongs to the physical page:
[   35.412233] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   35.413156] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.413798] page_type: f5(slab)
[   35.414348] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.415165] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.416054] page dumped because: kasan: bad access detected
[   35.416584] 
[   35.416929] Memory state around the buggy address:
[   35.417610]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.418387]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.419160] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.419988]                                      ^
[   35.420549]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.421407]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.422150] ==================================================================
[   36.369566] ==================================================================
[   36.370381] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   36.371317] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   36.372070] 
[   36.372470] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   36.373600] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.374063] Hardware name: linux,dummy-virt (DT)
[   36.374681] Call trace:
[   36.375013]  show_stack+0x20/0x38 (C)
[   36.375612]  dump_stack_lvl+0x8c/0xd0
[   36.376254]  print_report+0x118/0x5e0
[   36.376875]  kasan_report+0xc8/0x118
[   36.377519]  kasan_check_range+0x100/0x1a8
[   36.378094]  __kasan_check_write+0x20/0x30
[   36.378734]  kasan_atomics_helper+0x1384/0x4858
[   36.379381]  kasan_atomics+0x198/0x2e8
[   36.379985]  kunit_try_run_case+0x14c/0x3d0
[   36.380741]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.381795]  kthread+0x24c/0x2d0
[   36.382971]  ret_from_fork+0x10/0x20
[   36.383753] 
[   36.384189] Allocated by task 253:
[   36.384651]  kasan_save_stack+0x3c/0x68
[   36.384922]  kasan_save_track+0x20/0x40
[   36.385252]  kasan_save_alloc_info+0x40/0x58
[   36.386093]  __kasan_kmalloc+0xd4/0xd8
[   36.386786]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.387550]  kasan_atomics+0xb8/0x2e8
[   36.388102]  kunit_try_run_case+0x14c/0x3d0
[   36.388734]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.389469]  kthread+0x24c/0x2d0
[   36.390031]  ret_from_fork+0x10/0x20
[   36.390522] 
[   36.390872] The buggy address belongs to the object at fff00000c63df000
[   36.390872]  which belongs to the cache kmalloc-64 of size 64
[   36.392096] The buggy address is located 0 bytes to the right of
[   36.392096]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   36.393390] 
[   36.393743] The buggy address belongs to the physical page:
[   36.394466] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   36.395428] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.396213] page_type: f5(slab)
[   36.396757] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.397614] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.398359] page dumped because: kasan: bad access detected
[   36.399081] 
[   36.399434] Memory state around the buggy address:
[   36.400043]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.400897]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.401758] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.402591]                                      ^
[   36.403211]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.404044]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.404844] ==================================================================
[   35.777546] ==================================================================
[   35.778155] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   35.779008] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   35.779860] 
[   35.780239] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   35.781161] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.781746] Hardware name: linux,dummy-virt (DT)
[   35.782394] Call trace:
[   35.782823]  show_stack+0x20/0x38 (C)
[   35.783361]  dump_stack_lvl+0x8c/0xd0
[   35.783969]  print_report+0x118/0x5e0
[   35.784570]  kasan_report+0xc8/0x118
[   35.785076]  kasan_check_range+0x100/0x1a8
[   35.785738]  __kasan_check_write+0x20/0x30
[   35.786335]  kasan_atomics_helper+0xd3c/0x4858
[   35.786920]  kasan_atomics+0x198/0x2e8
[   35.787515]  kunit_try_run_case+0x14c/0x3d0
[   35.788417]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.789126]  kthread+0x24c/0x2d0
[   35.789642]  ret_from_fork+0x10/0x20
[   35.790249] 
[   35.790568] Allocated by task 253:
[   35.790972]  kasan_save_stack+0x3c/0x68
[   35.791572]  kasan_save_track+0x20/0x40
[   35.792098]  kasan_save_alloc_info+0x40/0x58
[   35.792732]  __kasan_kmalloc+0xd4/0xd8
[   35.793335]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.793980]  kasan_atomics+0xb8/0x2e8
[   35.794506]  kunit_try_run_case+0x14c/0x3d0
[   35.795060]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.795808]  kthread+0x24c/0x2d0
[   35.796336]  ret_from_fork+0x10/0x20
[   35.796777] 
[   35.797145] The buggy address belongs to the object at fff00000c63df000
[   35.797145]  which belongs to the cache kmalloc-64 of size 64
[   35.798261] The buggy address is located 0 bytes to the right of
[   35.798261]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   35.799480] 
[   35.799828] The buggy address belongs to the physical page:
[   35.800542] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   35.801332] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.802068] page_type: f5(slab)
[   35.802609] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.803402] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.804230] page dumped because: kasan: bad access detected
[   35.804870] 
[   35.805224] Memory state around the buggy address:
[   35.805795]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.806572]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.807325] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.808155]                                      ^
[   35.808799]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.809520]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.810316] ==================================================================
[   35.423778] ==================================================================
[   35.424586] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   35.426596] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   35.427403] 
[   35.427929] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   35.428972] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.429497] Hardware name: linux,dummy-virt (DT)
[   35.430003] Call trace:
[   35.430451]  show_stack+0x20/0x38 (C)
[   35.430962]  dump_stack_lvl+0x8c/0xd0
[   35.431588]  print_report+0x118/0x5e0
[   35.432127]  kasan_report+0xc8/0x118
[   35.432729]  kasan_check_range+0x100/0x1a8
[   35.433264]  __kasan_check_write+0x20/0x30
[   35.433871]  kasan_atomics_helper+0xa04/0x4858
[   35.434553]  kasan_atomics+0x198/0x2e8
[   35.435182]  kunit_try_run_case+0x14c/0x3d0
[   35.435789]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.436410]  kthread+0x24c/0x2d0
[   35.436980]  ret_from_fork+0x10/0x20
[   35.437623] 
[   35.437953] Allocated by task 253:
[   35.438396]  kasan_save_stack+0x3c/0x68
[   35.438983]  kasan_save_track+0x20/0x40
[   35.439567]  kasan_save_alloc_info+0x40/0x58
[   35.440215]  __kasan_kmalloc+0xd4/0xd8
[   35.440724]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.441357]  kasan_atomics+0xb8/0x2e8
[   35.441927]  kunit_try_run_case+0x14c/0x3d0
[   35.442470]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.443166]  kthread+0x24c/0x2d0
[   35.443709]  ret_from_fork+0x10/0x20
[   35.444190] 
[   35.444549] The buggy address belongs to the object at fff00000c63df000
[   35.444549]  which belongs to the cache kmalloc-64 of size 64
[   35.445656] The buggy address is located 0 bytes to the right of
[   35.445656]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   35.446811] 
[   35.447175] The buggy address belongs to the physical page:
[   35.447877] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   35.448724] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.449550] page_type: f5(slab)
[   35.450076] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.450920] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.451653] page dumped because: kasan: bad access detected
[   35.452334] 
[   35.452681] Memory state around the buggy address:
[   35.453277]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.454053]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.454820] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.455470]                                      ^
[   35.456135]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.456884]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.457655] ==================================================================
[   36.808021] ==================================================================
[   36.808879] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   36.809804] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   36.810710] 
[   36.811110] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   36.812107] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.812590] Hardware name: linux,dummy-virt (DT)
[   36.813219] Call trace:
[   36.813564]  show_stack+0x20/0x38 (C)
[   36.814251]  dump_stack_lvl+0x8c/0xd0
[   36.814901]  print_report+0x118/0x5e0
[   36.815515]  kasan_report+0xc8/0x118
[   36.816132]  kasan_check_range+0x100/0x1a8
[   36.816743]  __kasan_check_write+0x20/0x30
[   36.817448]  kasan_atomics_helper+0x175c/0x4858
[   36.818097]  kasan_atomics+0x198/0x2e8
[   36.818625]  kunit_try_run_case+0x14c/0x3d0
[   36.819276]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.820038]  kthread+0x24c/0x2d0
[   36.820584]  ret_from_fork+0x10/0x20
[   36.821098] 
[   36.821466] Allocated by task 253:
[   36.821997]  kasan_save_stack+0x3c/0x68
[   36.822525]  kasan_save_track+0x20/0x40
[   36.823051]  kasan_save_alloc_info+0x40/0x58
[   36.823681]  __kasan_kmalloc+0xd4/0xd8
[   36.824289]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.824934]  kasan_atomics+0xb8/0x2e8
[   36.825342]  kunit_try_run_case+0x14c/0x3d0
[   36.826316]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.826896]  kthread+0x24c/0x2d0
[   36.827306]  ret_from_fork+0x10/0x20
[   36.827700] 
[   36.827938] The buggy address belongs to the object at fff00000c63df000
[   36.827938]  which belongs to the cache kmalloc-64 of size 64
[   36.829702] The buggy address is located 0 bytes to the right of
[   36.829702]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   36.831065] 
[   36.831486] The buggy address belongs to the physical page:
[   36.832324] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   36.833349] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.834026] page_type: f5(slab)
[   36.834472] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.835307] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.836090] page dumped because: kasan: bad access detected
[   36.836879] 
[   36.837241] Memory state around the buggy address:
[   36.837993]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.838811]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.839735] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.840609]                                      ^
[   36.841311]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.842237]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.843056] ==================================================================
[   35.052137] ==================================================================
[   35.053429] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   35.054226] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   35.055126] 
[   35.055581] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   35.056760] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.057419] Hardware name: linux,dummy-virt (DT)
[   35.058174] Call trace:
[   35.058636]  show_stack+0x20/0x38 (C)
[   35.059319]  dump_stack_lvl+0x8c/0xd0
[   35.060007]  print_report+0x118/0x5e0
[   35.060688]  kasan_report+0xc8/0x118
[   35.061334]  kasan_check_range+0x100/0x1a8
[   35.062064]  __kasan_check_write+0x20/0x30
[   35.062765]  kasan_atomics_helper+0x5b4/0x4858
[   35.063526]  kasan_atomics+0x198/0x2e8
[   35.064188]  kunit_try_run_case+0x14c/0x3d0
[   35.064925]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.065732]  kthread+0x24c/0x2d0
[   35.066377]  ret_from_fork+0x10/0x20
[   35.067029] 
[   35.067440] Allocated by task 253:
[   35.067965]  kasan_save_stack+0x3c/0x68
[   35.068642]  kasan_save_track+0x20/0x40
[   35.069275]  kasan_save_alloc_info+0x40/0x58
[   35.069925]  __kasan_kmalloc+0xd4/0xd8
[   35.070614]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.071298]  kasan_atomics+0xb8/0x2e8
[   35.071889]  kunit_try_run_case+0x14c/0x3d0
[   35.072652]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.073344]  kthread+0x24c/0x2d0
[   35.073919]  ret_from_fork+0x10/0x20
[   35.074481] 
[   35.074877] The buggy address belongs to the object at fff00000c63df000
[   35.074877]  which belongs to the cache kmalloc-64 of size 64
[   35.076214] The buggy address is located 0 bytes to the right of
[   35.076214]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   35.077579] 
[   35.077962] The buggy address belongs to the physical page:
[   35.078711] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   35.079663] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.080501] page_type: f5(slab)
[   35.081060] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.082010] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.082886] page dumped because: kasan: bad access detected
[   35.083495] 
[   35.083804] Memory state around the buggy address:
[   35.084387]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.085102]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.085992] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.086902]                                      ^
[   35.087602]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.088547]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.089381] ==================================================================
[   35.202211] ==================================================================
[   35.203275] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[   35.203637] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   35.203983] 
[   35.204187] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   35.206096] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.206548] Hardware name: linux,dummy-virt (DT)
[   35.207181] Call trace:
[   35.207642]  show_stack+0x20/0x38 (C)
[   35.208217]  dump_stack_lvl+0x8c/0xd0
[   35.208785]  print_report+0x118/0x5e0
[   35.209373]  kasan_report+0xc8/0x118
[   35.209960]  kasan_check_range+0x100/0x1a8
[   35.210547]  __kasan_check_write+0x20/0x30
[   35.211202]  kasan_atomics_helper+0x760/0x4858
[   35.211826]  kasan_atomics+0x198/0x2e8
[   35.212414]  kunit_try_run_case+0x14c/0x3d0
[   35.212995]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.213748]  kthread+0x24c/0x2d0
[   35.214334]  ret_from_fork+0x10/0x20
[   35.214897] 
[   35.215221] Allocated by task 253:
[   35.215750]  kasan_save_stack+0x3c/0x68
[   35.216305]  kasan_save_track+0x20/0x40
[   35.216902]  kasan_save_alloc_info+0x40/0x58
[   35.217575]  __kasan_kmalloc+0xd4/0xd8
[   35.218159]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.218725]  kasan_atomics+0xb8/0x2e8
[   35.219284]  kunit_try_run_case+0x14c/0x3d0
[   35.219797]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.220499]  kthread+0x24c/0x2d0
[   35.221023]  ret_from_fork+0x10/0x20
[   35.221552] 
[   35.221848] The buggy address belongs to the object at fff00000c63df000
[   35.221848]  which belongs to the cache kmalloc-64 of size 64
[   35.223059] The buggy address is located 0 bytes to the right of
[   35.223059]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   35.224263] 
[   35.224576] The buggy address belongs to the physical page:
[   35.225246] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   35.226072] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.226802] page_type: f5(slab)
[   35.227360] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.228076] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.228976] page dumped because: kasan: bad access detected
[   35.229637] 
[   35.229953] Memory state around the buggy address:
[   35.230571]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.231374]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.232154] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.232911]                                      ^
[   35.233495]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.234267]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.234957] ==================================================================
[   36.091335] ==================================================================
[   36.092145] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   36.093019] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   36.093765] 
[   36.094165] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   36.095163] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.095659] Hardware name: linux,dummy-virt (DT)
[   36.096222] Call trace:
[   36.096653]  show_stack+0x20/0x38 (C)
[   36.097257]  dump_stack_lvl+0x8c/0xd0
[   36.097894]  print_report+0x118/0x5e0
[   36.098462]  kasan_report+0xc8/0x118
[   36.098969]  kasan_check_range+0x100/0x1a8
[   36.099634]  __kasan_check_write+0x20/0x30
[   36.100352]  kasan_atomics_helper+0xff0/0x4858
[   36.100960]  kasan_atomics+0x198/0x2e8
[   36.101573]  kunit_try_run_case+0x14c/0x3d0
[   36.102231]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.102912]  kthread+0x24c/0x2d0
[   36.103401]  ret_from_fork+0x10/0x20
[   36.104004] 
[   36.104366] Allocated by task 253:
[   36.104827]  kasan_save_stack+0x3c/0x68
[   36.105431]  kasan_save_track+0x20/0x40
[   36.105923]  kasan_save_alloc_info+0x40/0x58
[   36.106575]  __kasan_kmalloc+0xd4/0xd8
[   36.107162]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.107798]  kasan_atomics+0xb8/0x2e8
[   36.108396]  kunit_try_run_case+0x14c/0x3d0
[   36.109000]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.109710]  kthread+0x24c/0x2d0
[   36.110276]  ret_from_fork+0x10/0x20
[   36.110825] 
[   36.111183] The buggy address belongs to the object at fff00000c63df000
[   36.111183]  which belongs to the cache kmalloc-64 of size 64
[   36.112252] The buggy address is located 0 bytes to the right of
[   36.112252]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   36.113506] 
[   36.113814] The buggy address belongs to the physical page:
[   36.114511] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   36.115294] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.116083] page_type: f5(slab)
[   36.116571] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.117527] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.118301] page dumped because: kasan: bad access detected
[   36.118927] 
[   36.119297] Memory state around the buggy address:
[   36.119795]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.120625]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.121497] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.122214]                                      ^
[   36.122847]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.123578]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.124364] ==================================================================
[   34.604891] ==================================================================
[   34.605628] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   34.607129] Read of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   34.608736] 
[   34.609199] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   34.610614] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.611169] Hardware name: linux,dummy-virt (DT)
[   34.611780] Call trace:
[   34.612222]  show_stack+0x20/0x38 (C)
[   34.612864]  dump_stack_lvl+0x8c/0xd0
[   34.614193]  print_report+0x118/0x5e0
[   34.614789]  kasan_report+0xc8/0x118
[   34.615448]  kasan_check_range+0x100/0x1a8
[   34.616094]  __kasan_check_read+0x20/0x30
[   34.616745]  kasan_atomics_helper+0x1ec/0x4858
[   34.617746]  kasan_atomics+0x198/0x2e8
[   34.618369]  kunit_try_run_case+0x14c/0x3d0
[   34.619003]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.619807]  kthread+0x24c/0x2d0
[   34.620298]  ret_from_fork+0x10/0x20
[   34.620893] 
[   34.621256] Allocated by task 253:
[   34.622647]  kasan_save_stack+0x3c/0x68
[   34.623374]  kasan_save_track+0x20/0x40
[   34.623929]  kasan_save_alloc_info+0x40/0x58
[   34.624487]  __kasan_kmalloc+0xd4/0xd8
[   34.625635]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.626180]  kasan_atomics+0xb8/0x2e8
[   34.626902]  kunit_try_run_case+0x14c/0x3d0
[   34.627652]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.628517]  kthread+0x24c/0x2d0
[   34.629280]  ret_from_fork+0x10/0x20
[   34.630069] 
[   34.630406] The buggy address belongs to the object at fff00000c63df000
[   34.630406]  which belongs to the cache kmalloc-64 of size 64
[   34.632108] The buggy address is located 0 bytes to the right of
[   34.632108]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   34.633940] 
[   34.634306] The buggy address belongs to the physical page:
[   34.634845] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   34.635725] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.636557] page_type: f5(slab)
[   34.637303] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.638311] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   34.639139] page dumped because: kasan: bad access detected
[   34.639766] 
[   34.640162] Memory state around the buggy address:
[   34.640814]  fff00000c63def00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.641496]  fff00000c63def80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.642256] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.642937]                                      ^
[   34.643871]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.644659]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.645602] ==================================================================
[   35.601368] ==================================================================
[   35.602039] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   35.602802] Read of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   35.603648] 
[   35.604056] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   35.605062] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.605710] Hardware name: linux,dummy-virt (DT)
[   35.606246] Call trace:
[   35.606749]  show_stack+0x20/0x38 (C)
[   35.607375]  dump_stack_lvl+0x8c/0xd0
[   35.608047]  print_report+0x118/0x5e0
[   35.608659]  kasan_report+0xc8/0x118
[   35.609303]  __asan_report_load4_noabort+0x20/0x30
[   35.609945]  kasan_atomics_helper+0x3dbc/0x4858
[   35.610638]  kasan_atomics+0x198/0x2e8
[   35.611261]  kunit_try_run_case+0x14c/0x3d0
[   35.611937]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.612680]  kthread+0x24c/0x2d0
[   35.613257]  ret_from_fork+0x10/0x20
[   35.613845] 
[   35.614198] Allocated by task 253:
[   35.614762]  kasan_save_stack+0x3c/0x68
[   35.615349]  kasan_save_track+0x20/0x40
[   35.615973]  kasan_save_alloc_info+0x40/0x58
[   35.616580]  __kasan_kmalloc+0xd4/0xd8
[   35.617214]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.617841]  kasan_atomics+0xb8/0x2e8
[   35.618444]  kunit_try_run_case+0x14c/0x3d0
[   35.619049]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.619792]  kthread+0x24c/0x2d0
[   35.620353]  ret_from_fork+0x10/0x20
[   35.620922] 
[   35.621308] The buggy address belongs to the object at fff00000c63df000
[   35.621308]  which belongs to the cache kmalloc-64 of size 64
[   35.622506] The buggy address is located 0 bytes to the right of
[   35.622506]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   35.623819] 
[   35.624237] The buggy address belongs to the physical page:
[   35.625059] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   35.625988] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.626780] page_type: f5(slab)
[   35.627276] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.628222] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.629067] page dumped because: kasan: bad access detected
[   35.629735] 
[   35.630096] Memory state around the buggy address:
[   35.630795]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.631557]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.632423] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.633230]                                      ^
[   35.633834]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.634661]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.635433] ==================================================================
[   36.300339] ==================================================================
[   36.301229] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   36.302172] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   36.303050] 
[   36.303433] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   36.304471] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.305033] Hardware name: linux,dummy-virt (DT)
[   36.305673] Call trace:
[   36.306094]  show_stack+0x20/0x38 (C)
[   36.306712]  dump_stack_lvl+0x8c/0xd0
[   36.307223]  print_report+0x118/0x5e0
[   36.307858]  kasan_report+0xc8/0x118
[   36.308417]  kasan_check_range+0x100/0x1a8
[   36.308963]  __kasan_check_write+0x20/0x30
[   36.309617]  kasan_atomics_helper+0x126c/0x4858
[   36.310220]  kasan_atomics+0x198/0x2e8
[   36.310814]  kunit_try_run_case+0x14c/0x3d0
[   36.311477]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.312101]  kthread+0x24c/0x2d0
[   36.312691]  ret_from_fork+0x10/0x20
[   36.313280] 
[   36.313630] Allocated by task 253:
[   36.314134]  kasan_save_stack+0x3c/0x68
[   36.314719]  kasan_save_track+0x20/0x40
[   36.315261]  kasan_save_alloc_info+0x40/0x58
[   36.315901]  __kasan_kmalloc+0xd4/0xd8
[   36.316499]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.317048]  kasan_atomics+0xb8/0x2e8
[   36.317668]  kunit_try_run_case+0x14c/0x3d0
[   36.318246]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.318864]  kthread+0x24c/0x2d0
[   36.319413]  ret_from_fork+0x10/0x20
[   36.319971] 
[   36.320301] The buggy address belongs to the object at fff00000c63df000
[   36.320301]  which belongs to the cache kmalloc-64 of size 64
[   36.321544] The buggy address is located 0 bytes to the right of
[   36.321544]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   36.322728] 
[   36.323077] The buggy address belongs to the physical page:
[   36.323597] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   36.324541] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.325263] page_type: f5(slab)
[   36.325775] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.326624] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.327450] page dumped because: kasan: bad access detected
[   36.328082] 
[   36.328434] Memory state around the buggy address:
[   36.328983]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.329755]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.330524] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.331285]                                      ^
[   36.331885]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.332692]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.333441] ==================================================================
[   34.566759] ==================================================================
[   34.567569] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   34.568214] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   34.569000] 
[   34.569404] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   34.570449] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.571018] Hardware name: linux,dummy-virt (DT)
[   34.572646] Call trace:
[   34.573402]  show_stack+0x20/0x38 (C)
[   34.573937]  dump_stack_lvl+0x8c/0xd0
[   34.574560]  print_report+0x118/0x5e0
[   34.575050]  kasan_report+0xc8/0x118
[   34.575654]  __asan_report_store4_noabort+0x20/0x30
[   34.576330]  kasan_atomics_helper+0x3f7c/0x4858
[   34.577020]  kasan_atomics+0x198/0x2e8
[   34.577611]  kunit_try_run_case+0x14c/0x3d0
[   34.578255]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.578895]  kthread+0x24c/0x2d0
[   34.579694]  ret_from_fork+0x10/0x20
[   34.580285] 
[   34.580580] Allocated by task 253:
[   34.581843]  kasan_save_stack+0x3c/0x68
[   34.582479]  kasan_save_track+0x20/0x40
[   34.583144]  kasan_save_alloc_info+0x40/0x58
[   34.583442]  __kasan_kmalloc+0xd4/0xd8
[   34.583691]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.583961]  kasan_atomics+0xb8/0x2e8
[   34.584425]  kunit_try_run_case+0x14c/0x3d0
[   34.585768]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.586731]  kthread+0x24c/0x2d0
[   34.587288]  ret_from_fork+0x10/0x20
[   34.587882] 
[   34.588258] The buggy address belongs to the object at fff00000c63df000
[   34.588258]  which belongs to the cache kmalloc-64 of size 64
[   34.589908] The buggy address is located 0 bytes to the right of
[   34.589908]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   34.591373] 
[   34.591897] The buggy address belongs to the physical page:
[   34.592698] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   34.593518] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.594331] page_type: f5(slab)
[   34.594870] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.595618] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   34.596493] page dumped because: kasan: bad access detected
[   34.597298] 
[   34.597719] Memory state around the buggy address:
[   34.598302]  fff00000c63def00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.599241]  fff00000c63def80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.599945] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.600850]                                      ^
[   34.601516]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.602540]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.603368] ==================================================================
[   36.479005] ==================================================================
[   36.479661] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   36.480561] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   36.482202] 
[   36.482620] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   36.483727] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.484360] Hardware name: linux,dummy-virt (DT)
[   36.484911] Call trace:
[   36.485392]  show_stack+0x20/0x38 (C)
[   36.486071]  dump_stack_lvl+0x8c/0xd0
[   36.486678]  print_report+0x118/0x5e0
[   36.487328]  kasan_report+0xc8/0x118
[   36.487941]  kasan_check_range+0x100/0x1a8
[   36.488637]  __kasan_check_write+0x20/0x30
[   36.489238]  kasan_atomics_helper+0x147c/0x4858
[   36.489928]  kasan_atomics+0x198/0x2e8
[   36.490527]  kunit_try_run_case+0x14c/0x3d0
[   36.491192]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.491910]  kthread+0x24c/0x2d0
[   36.492504]  ret_from_fork+0x10/0x20
[   36.493092] 
[   36.493527] Allocated by task 253:
[   36.494014]  kasan_save_stack+0x3c/0x68
[   36.494654]  kasan_save_track+0x20/0x40
[   36.495226]  kasan_save_alloc_info+0x40/0x58
[   36.495893]  __kasan_kmalloc+0xd4/0xd8
[   36.496400]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.497041]  kasan_atomics+0xb8/0x2e8
[   36.497637]  kunit_try_run_case+0x14c/0x3d0
[   36.498279]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.498878]  kthread+0x24c/0x2d0
[   36.499471]  ret_from_fork+0x10/0x20
[   36.500032] 
[   36.500439] The buggy address belongs to the object at fff00000c63df000
[   36.500439]  which belongs to the cache kmalloc-64 of size 64
[   36.501678] The buggy address is located 0 bytes to the right of
[   36.501678]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   36.502953] 
[   36.503324] The buggy address belongs to the physical page:
[   36.503973] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   36.504965] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.505758] page_type: f5(slab)
[   36.506291] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.507191] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.508019] page dumped because: kasan: bad access detected
[   36.508689] 
[   36.509071] Memory state around the buggy address:
[   36.509704]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.510474]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.511314] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.512110]                                      ^
[   36.512720]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.513570]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.514367] ==================================================================
[   34.768825] ==================================================================
[   34.770575] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   34.771425] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   34.772289] 
[   34.772646] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   34.773784] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.774771] Hardware name: linux,dummy-virt (DT)
[   34.775320] Call trace:
[   34.775742]  show_stack+0x20/0x38 (C)
[   34.776340]  dump_stack_lvl+0x8c/0xd0
[   34.776949]  print_report+0x118/0x5e0
[   34.777862]  kasan_report+0xc8/0x118
[   34.778257]  kasan_check_range+0x100/0x1a8
[   34.778905]  __kasan_check_write+0x20/0x30
[   34.780053]  kasan_atomics_helper+0x32c/0x4858
[   34.780737]  kasan_atomics+0x198/0x2e8
[   34.781619]  kunit_try_run_case+0x14c/0x3d0
[   34.782033]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.782814]  kthread+0x24c/0x2d0
[   34.783395]  ret_from_fork+0x10/0x20
[   34.783979] 
[   34.784356] Allocated by task 253:
[   34.784887]  kasan_save_stack+0x3c/0x68
[   34.785531]  kasan_save_track+0x20/0x40
[   34.786351]  kasan_save_alloc_info+0x40/0x58
[   34.786975]  __kasan_kmalloc+0xd4/0xd8
[   34.787558]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.788078]  kasan_atomics+0xb8/0x2e8
[   34.789343]  kunit_try_run_case+0x14c/0x3d0
[   34.789859]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.790207]  kthread+0x24c/0x2d0
[   34.790444]  ret_from_fork+0x10/0x20
[   34.790681] 
[   34.790834] The buggy address belongs to the object at fff00000c63df000
[   34.790834]  which belongs to the cache kmalloc-64 of size 64
[   34.792834] The buggy address is located 0 bytes to the right of
[   34.792834]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   34.794017] 
[   34.795092] The buggy address belongs to the physical page:
[   34.795720] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   34.796534] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.797639] page_type: f5(slab)
[   34.798091] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.799018] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   34.799875] page dumped because: kasan: bad access detected
[   34.800465] 
[   34.800801] Memory state around the buggy address:
[   34.802022]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.802941]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.803636] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.804428]                                      ^
[   34.805077]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.806270]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.807030] ==================================================================
[   34.931313] ==================================================================
[   34.932094] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   34.932773] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   34.933855] 
[   34.934798] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   34.935946] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.936998] Hardware name: linux,dummy-virt (DT)
[   34.937544] Call trace:
[   34.937880]  show_stack+0x20/0x38 (C)
[   34.939021]  dump_stack_lvl+0x8c/0xd0
[   34.939544]  print_report+0x118/0x5e0
[   34.939992]  kasan_report+0xc8/0x118
[   34.940452]  kasan_check_range+0x100/0x1a8
[   34.941529]  __kasan_check_write+0x20/0x30
[   34.942405]  kasan_atomics_helper+0x47c/0x4858
[   34.943109]  kasan_atomics+0x198/0x2e8
[   34.943633]  kunit_try_run_case+0x14c/0x3d0
[   34.944447]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.945678]  kthread+0x24c/0x2d0
[   34.946141]  ret_from_fork+0x10/0x20
[   34.946868] 
[   34.947196] Allocated by task 253:
[   34.947680]  kasan_save_stack+0x3c/0x68
[   34.948171]  kasan_save_track+0x20/0x40
[   34.948763]  kasan_save_alloc_info+0x40/0x58
[   34.949418]  __kasan_kmalloc+0xd4/0xd8
[   34.949867]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.950986]  kasan_atomics+0xb8/0x2e8
[   34.951402]  kunit_try_run_case+0x14c/0x3d0
[   34.951685]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.951983]  kthread+0x24c/0x2d0
[   34.952229]  ret_from_fork+0x10/0x20
[   34.952481] 
[   34.952636] The buggy address belongs to the object at fff00000c63df000
[   34.952636]  which belongs to the cache kmalloc-64 of size 64
[   34.955023] The buggy address is located 0 bytes to the right of
[   34.955023]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   34.956471] 
[   34.956983] The buggy address belongs to the physical page:
[   34.957795] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   34.959181] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.960023] page_type: f5(slab)
[   34.960604] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.961432] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   34.962169] page dumped because: kasan: bad access detected
[   34.963073] 
[   34.963398] Memory state around the buggy address:
[   34.963960]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.965200]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.966199] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.967401]                                      ^
[   34.968203]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.969386]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.970657] ==================================================================
[   35.015245] ==================================================================
[   35.015946] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   35.016801] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   35.017552] 
[   35.017927] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   35.019093] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.019652] Hardware name: linux,dummy-virt (DT)
[   35.020255] Call trace:
[   35.020612]  show_stack+0x20/0x38 (C)
[   35.021296]  dump_stack_lvl+0x8c/0xd0
[   35.021956]  print_report+0x118/0x5e0
[   35.022620]  kasan_report+0xc8/0x118
[   35.023281]  kasan_check_range+0x100/0x1a8
[   35.023877]  __kasan_check_write+0x20/0x30
[   35.024572]  kasan_atomics_helper+0x54c/0x4858
[   35.025241]  kasan_atomics+0x198/0x2e8
[   35.025866]  kunit_try_run_case+0x14c/0x3d0
[   35.026495]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.027255]  kthread+0x24c/0x2d0
[   35.027898]  ret_from_fork+0x10/0x20
[   35.028499] 
[   35.028880] Allocated by task 253:
[   35.029385]  kasan_save_stack+0x3c/0x68
[   35.029985]  kasan_save_track+0x20/0x40
[   35.030653]  kasan_save_alloc_info+0x40/0x58
[   35.031338]  __kasan_kmalloc+0xd4/0xd8
[   35.031935]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.032644]  kasan_atomics+0xb8/0x2e8
[   35.033214]  kunit_try_run_case+0x14c/0x3d0
[   35.033808]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.034584]  kthread+0x24c/0x2d0
[   35.035073]  ret_from_fork+0x10/0x20
[   35.035690] 
[   35.036068] The buggy address belongs to the object at fff00000c63df000
[   35.036068]  which belongs to the cache kmalloc-64 of size 64
[   35.037281] The buggy address is located 0 bytes to the right of
[   35.037281]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   35.038623] 
[   35.039017] The buggy address belongs to the physical page:
[   35.039686] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   35.040530] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.041394] page_type: f5(slab)
[   35.041895] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.042834] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.043508] page dumped because: kasan: bad access detected
[   35.044375] 
[   35.044878] Memory state around the buggy address:
[   35.045618]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.046357]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.047085] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.047922]                                      ^
[   35.048660]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.049540]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.050473] ==================================================================
[   35.951240] ==================================================================
[   35.952021] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   35.952827] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   35.953973] 
[   35.954322] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   35.956104] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.957062] Hardware name: linux,dummy-virt (DT)
[   35.957747] Call trace:
[   35.958158]  show_stack+0x20/0x38 (C)
[   35.958767]  dump_stack_lvl+0x8c/0xd0
[   35.959373]  print_report+0x118/0x5e0
[   35.959925]  kasan_report+0xc8/0x118
[   35.960422]  __asan_report_store8_noabort+0x20/0x30
[   35.961106]  kasan_atomics_helper+0x3e5c/0x4858
[   35.961782]  kasan_atomics+0x198/0x2e8
[   35.962345]  kunit_try_run_case+0x14c/0x3d0
[   35.962893]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.963568]  kthread+0x24c/0x2d0
[   35.964145]  ret_from_fork+0x10/0x20
[   35.964732] 
[   35.965086] Allocated by task 253:
[   35.965622]  kasan_save_stack+0x3c/0x68
[   35.966163]  kasan_save_track+0x20/0x40
[   35.966765]  kasan_save_alloc_info+0x40/0x58
[   35.967420]  __kasan_kmalloc+0xd4/0xd8
[   35.967973]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.968625]  kasan_atomics+0xb8/0x2e8
[   35.969104]  kunit_try_run_case+0x14c/0x3d0
[   35.969752]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.970438]  kthread+0x24c/0x2d0
[   35.970889]  ret_from_fork+0x10/0x20
[   35.971475] 
[   35.971824] The buggy address belongs to the object at fff00000c63df000
[   35.971824]  which belongs to the cache kmalloc-64 of size 64
[   35.972908] The buggy address is located 0 bytes to the right of
[   35.972908]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   35.974153] 
[   35.974520] The buggy address belongs to the physical page:
[   35.975080] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   35.976168] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.976872] page_type: f5(slab)
[   35.977363] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.978208] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.979025] page dumped because: kasan: bad access detected
[   35.979639] 
[   35.979982] Memory state around the buggy address:
[   35.980542]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.981385]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.982100] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.982883]                                      ^
[   35.983542]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.984284]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.985089] ==================================================================
[   36.516532] ==================================================================
[   36.517183] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   36.518048] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   36.518903] 
[   36.519275] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   36.520436] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.520921] Hardware name: linux,dummy-virt (DT)
[   36.521558] Call trace:
[   36.522029]  show_stack+0x20/0x38 (C)
[   36.522609]  dump_stack_lvl+0x8c/0xd0
[   36.523292]  print_report+0x118/0x5e0
[   36.523874]  kasan_report+0xc8/0x118
[   36.524505]  kasan_check_range+0x100/0x1a8
[   36.525072]  __kasan_check_write+0x20/0x30
[   36.525773]  kasan_atomics_helper+0x14e4/0x4858
[   36.526471]  kasan_atomics+0x198/0x2e8
[   36.527140]  kunit_try_run_case+0x14c/0x3d0
[   36.527809]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.528625]  kthread+0x24c/0x2d0
[   36.529188]  ret_from_fork+0x10/0x20
[   36.529829] 
[   36.530130] Allocated by task 253:
[   36.530595]  kasan_save_stack+0x3c/0x68
[   36.531199]  kasan_save_track+0x20/0x40
[   36.531737]  kasan_save_alloc_info+0x40/0x58
[   36.532252]  __kasan_kmalloc+0xd4/0xd8
[   36.532836]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.533468]  kasan_atomics+0xb8/0x2e8
[   36.534038]  kunit_try_run_case+0x14c/0x3d0
[   36.534612]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.535355]  kthread+0x24c/0x2d0
[   36.535895]  ret_from_fork+0x10/0x20
[   36.536455] 
[   36.536802] The buggy address belongs to the object at fff00000c63df000
[   36.536802]  which belongs to the cache kmalloc-64 of size 64
[   36.537952] The buggy address is located 0 bytes to the right of
[   36.537952]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   36.539037] 
[   36.539408] The buggy address belongs to the physical page:
[   36.540092] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   36.540905] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.541682] page_type: f5(slab)
[   36.542155] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.542997] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.544097] page dumped because: kasan: bad access detected
[   36.544735] 
[   36.545041] Memory state around the buggy address:
[   36.546008]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.546795]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.547568] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.548342]                                      ^
[   36.548918]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.549672]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.550490] ==================================================================
[   35.986621] ==================================================================
[   35.987409] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   35.988045] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   35.988959] 
[   35.989353] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   35.990314] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.990791] Hardware name: linux,dummy-virt (DT)
[   35.991425] Call trace:
[   35.991773]  show_stack+0x20/0x38 (C)
[   35.992398]  dump_stack_lvl+0x8c/0xd0
[   35.993006]  print_report+0x118/0x5e0
[   35.993710]  kasan_report+0xc8/0x118
[   35.994315]  kasan_check_range+0x100/0x1a8
[   35.994837]  __kasan_check_write+0x20/0x30
[   35.995489]  kasan_atomics_helper+0xeb8/0x4858
[   35.996134]  kasan_atomics+0x198/0x2e8
[   35.996718]  kunit_try_run_case+0x14c/0x3d0
[   35.997258]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.998039]  kthread+0x24c/0x2d0
[   35.998559]  ret_from_fork+0x10/0x20
[   35.999186] 
[   35.999544] Allocated by task 253:
[   36.000063]  kasan_save_stack+0x3c/0x68
[   36.000648]  kasan_save_track+0x20/0x40
[   36.001226]  kasan_save_alloc_info+0x40/0x58
[   36.001851]  __kasan_kmalloc+0xd4/0xd8
[   36.002395]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.003027]  kasan_atomics+0xb8/0x2e8
[   36.003548]  kunit_try_run_case+0x14c/0x3d0
[   36.004191]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.004938]  kthread+0x24c/0x2d0
[   36.005489]  ret_from_fork+0x10/0x20
[   36.006044] 
[   36.006655] The buggy address belongs to the object at fff00000c63df000
[   36.006655]  which belongs to the cache kmalloc-64 of size 64
[   36.007839] The buggy address is located 0 bytes to the right of
[   36.007839]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   36.009019] 
[   36.009389] The buggy address belongs to the physical page:
[   36.009947] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   36.010836] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.011536] page_type: f5(slab)
[   36.012018] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.012886] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.013682] page dumped because: kasan: bad access detected
[   36.014206] 
[   36.014559] Memory state around the buggy address:
[   36.015207]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.015969]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.016853] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.017561]                                      ^
[   36.018213]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.018926]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.019746] ==================================================================
[   36.774151] ==================================================================
[   36.774979] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   36.775686] Read of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   36.776449] 
[   36.776813] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   36.777936] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.778420] Hardware name: linux,dummy-virt (DT)
[   36.779035] Call trace:
[   36.779488]  show_stack+0x20/0x38 (C)
[   36.780047]  dump_stack_lvl+0x8c/0xd0
[   36.780664]  print_report+0x118/0x5e0
[   36.781273]  kasan_report+0xc8/0x118
[   36.781860]  __asan_report_load8_noabort+0x20/0x30
[   36.782501]  kasan_atomics_helper+0x3e10/0x4858
[   36.783156]  kasan_atomics+0x198/0x2e8
[   36.783719]  kunit_try_run_case+0x14c/0x3d0
[   36.784389]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.785150]  kthread+0x24c/0x2d0
[   36.785639]  ret_from_fork+0x10/0x20
[   36.786251] 
[   36.786561] Allocated by task 253:
[   36.787014]  kasan_save_stack+0x3c/0x68
[   36.787599]  kasan_save_track+0x20/0x40
[   36.788142]  kasan_save_alloc_info+0x40/0x58
[   36.788666]  __kasan_kmalloc+0xd4/0xd8
[   36.789267]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.789927]  kasan_atomics+0xb8/0x2e8
[   36.790483]  kunit_try_run_case+0x14c/0x3d0
[   36.791125]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.791729]  kthread+0x24c/0x2d0
[   36.792308]  ret_from_fork+0x10/0x20
[   36.792794] 
[   36.793162] The buggy address belongs to the object at fff00000c63df000
[   36.793162]  which belongs to the cache kmalloc-64 of size 64
[   36.794287] The buggy address is located 0 bytes to the right of
[   36.794287]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   36.795551] 
[   36.795897] The buggy address belongs to the physical page:
[   36.796509] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   36.797441] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.798058] page_type: f5(slab)
[   36.798612] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.799513] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.800250] page dumped because: kasan: bad access detected
[   36.800957] 
[   36.801316] Memory state around the buggy address:
[   36.801806]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.802665]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.803405] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.804182]                                      ^
[   36.804758]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.805536]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.806290] ==================================================================
[   34.526854] ==================================================================
[   34.527999] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   34.528714] Read of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   34.530509] 
[   34.531205] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   34.532422] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.534174] Hardware name: linux,dummy-virt (DT)
[   34.534996] Call trace:
[   34.535533]  show_stack+0x20/0x38 (C)
[   34.536180]  dump_stack_lvl+0x8c/0xd0
[   34.536736]  print_report+0x118/0x5e0
[   34.537314]  kasan_report+0xc8/0x118
[   34.537986]  __asan_report_load4_noabort+0x20/0x30
[   34.538526]  kasan_atomics_helper+0x40a8/0x4858
[   34.539052]  kasan_atomics+0x198/0x2e8
[   34.539782]  kunit_try_run_case+0x14c/0x3d0
[   34.540533]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.541336]  kthread+0x24c/0x2d0
[   34.541934]  ret_from_fork+0x10/0x20
[   34.542607] 
[   34.542960] Allocated by task 253:
[   34.543459]  kasan_save_stack+0x3c/0x68
[   34.544123]  kasan_save_track+0x20/0x40
[   34.544663]  kasan_save_alloc_info+0x40/0x58
[   34.545330]  __kasan_kmalloc+0xd4/0xd8
[   34.545862]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.546522]  kasan_atomics+0xb8/0x2e8
[   34.547096]  kunit_try_run_case+0x14c/0x3d0
[   34.547899]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.548685]  kthread+0x24c/0x2d0
[   34.549321]  ret_from_fork+0x10/0x20
[   34.549925] 
[   34.550598] The buggy address belongs to the object at fff00000c63df000
[   34.550598]  which belongs to the cache kmalloc-64 of size 64
[   34.551797] The buggy address is located 0 bytes to the right of
[   34.551797]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   34.553055] 
[   34.553480] The buggy address belongs to the physical page:
[   34.554367] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   34.555110] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.555944] page_type: f5(slab)
[   34.556527] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.557398] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   34.558272] page dumped because: kasan: bad access detected
[   34.558927] 
[   34.559334] Memory state around the buggy address:
[   34.559858]  fff00000c63def00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.560721]  fff00000c63def80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.561779] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.562931]                                      ^
[   34.563432]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.564168]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.564994] ==================================================================
[   35.882552] ==================================================================
[   35.883341] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   35.884063] Read of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   35.884964] 
[   35.885359] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   35.886403] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.886979] Hardware name: linux,dummy-virt (DT)
[   35.887590] Call trace:
[   35.888020]  show_stack+0x20/0x38 (C)
[   35.888613]  dump_stack_lvl+0x8c/0xd0
[   35.889130]  print_report+0x118/0x5e0
[   35.889726]  kasan_report+0xc8/0x118
[   35.890268]  __asan_report_load8_noabort+0x20/0x30
[   35.890969]  kasan_atomics_helper+0x3f58/0x4858
[   35.891578]  kasan_atomics+0x198/0x2e8
[   35.892064]  kunit_try_run_case+0x14c/0x3d0
[   35.892717]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.893479]  kthread+0x24c/0x2d0
[   35.894054]  ret_from_fork+0x10/0x20
[   35.894664] 
[   35.895003] Allocated by task 253:
[   35.895532]  kasan_save_stack+0x3c/0x68
[   35.896008]  kasan_save_track+0x20/0x40
[   35.896617]  kasan_save_alloc_info+0x40/0x58
[   35.897242]  __kasan_kmalloc+0xd4/0xd8
[   35.897863]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.898529]  kasan_atomics+0xb8/0x2e8
[   35.899126]  kunit_try_run_case+0x14c/0x3d0
[   35.899617]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.900380]  kthread+0x24c/0x2d0
[   35.900928]  ret_from_fork+0x10/0x20
[   35.901511] 
[   35.901852] The buggy address belongs to the object at fff00000c63df000
[   35.901852]  which belongs to the cache kmalloc-64 of size 64
[   35.903007] The buggy address is located 0 bytes to the right of
[   35.903007]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   35.904177] 
[   35.904541] The buggy address belongs to the physical page:
[   35.905179] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   35.906137] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.906852] page_type: f5(slab)
[   35.907398] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.908189] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.909066] page dumped because: kasan: bad access detected
[   35.909666] 
[   35.910022] Memory state around the buggy address:
[   35.910568]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.911403]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.912169] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.912891]                                      ^
[   35.913558]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.914292]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.915098] ==================================================================
[   35.638436] ==================================================================
[   35.639032] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   35.639693] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   35.640571] 
[   35.640949] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   35.641840] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.642440] Hardware name: linux,dummy-virt (DT)
[   35.643062] Call trace:
[   35.643511]  show_stack+0x20/0x38 (C)
[   35.644067]  dump_stack_lvl+0x8c/0xd0
[   35.644612]  print_report+0x118/0x5e0
[   35.645229]  kasan_report+0xc8/0x118
[   35.645816]  kasan_check_range+0x100/0x1a8
[   35.646428]  __kasan_check_write+0x20/0x30
[   35.647072]  kasan_atomics_helper+0xc08/0x4858
[   35.647778]  kasan_atomics+0x198/0x2e8
[   35.648361]  kunit_try_run_case+0x14c/0x3d0
[   35.648938]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.649709]  kthread+0x24c/0x2d0
[   35.650288]  ret_from_fork+0x10/0x20
[   35.650889] 
[   35.651211] Allocated by task 253:
[   35.651720]  kasan_save_stack+0x3c/0x68
[   35.652316]  kasan_save_track+0x20/0x40
[   35.653067]  kasan_save_alloc_info+0x40/0x58
[   35.653715]  __kasan_kmalloc+0xd4/0xd8
[   35.654253]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.654767]  kasan_atomics+0xb8/0x2e8
[   35.655367]  kunit_try_run_case+0x14c/0x3d0
[   35.655883]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.656638]  kthread+0x24c/0x2d0
[   35.657183]  ret_from_fork+0x10/0x20
[   35.657756] 
[   35.658071] The buggy address belongs to the object at fff00000c63df000
[   35.658071]  which belongs to the cache kmalloc-64 of size 64
[   35.659191] The buggy address is located 0 bytes to the right of
[   35.659191]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   35.660362] 
[   35.660721] The buggy address belongs to the physical page:
[   35.661297] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   35.662207] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.662973] page_type: f5(slab)
[   35.663470] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.664564] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.665379] page dumped because: kasan: bad access detected
[   35.665937] 
[   35.666295] Memory state around the buggy address:
[   35.666923]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.667668]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.668538] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.669238]                                      ^
[   35.669881]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.670608]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.671310] ==================================================================
[   36.882856] ==================================================================
[   36.883475] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   36.884410] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   36.885407] 
[   36.885853] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   36.887011] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.887638] Hardware name: linux,dummy-virt (DT)
[   36.888296] Call trace:
[   36.888725]  show_stack+0x20/0x38 (C)
[   36.889364]  dump_stack_lvl+0x8c/0xd0
[   36.890050]  print_report+0x118/0x5e0
[   36.890744]  kasan_report+0xc8/0x118
[   36.891415]  kasan_check_range+0x100/0x1a8
[   36.892142]  __kasan_check_write+0x20/0x30
[   36.892827]  kasan_atomics_helper+0x17ec/0x4858
[   36.893596]  kasan_atomics+0x198/0x2e8
[   36.894255]  kunit_try_run_case+0x14c/0x3d0
[   36.894982]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.895756]  kthread+0x24c/0x2d0
[   36.896426]  ret_from_fork+0x10/0x20
[   36.897052] 
[   36.897476] Allocated by task 253:
[   36.898016]  kasan_save_stack+0x3c/0x68
[   36.898660]  kasan_save_track+0x20/0x40
[   36.899328]  kasan_save_alloc_info+0x40/0x58
[   36.899974]  __kasan_kmalloc+0xd4/0xd8
[   36.900651]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.901349]  kasan_atomics+0xb8/0x2e8
[   36.901944]  kunit_try_run_case+0x14c/0x3d0
[   36.902646]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.903407]  kthread+0x24c/0x2d0
[   36.903969]  ret_from_fork+0x10/0x20
[   36.904636] 
[   36.905007] The buggy address belongs to the object at fff00000c63df000
[   36.905007]  which belongs to the cache kmalloc-64 of size 64
[   36.906333] The buggy address is located 0 bytes to the right of
[   36.906333]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   36.907666] 
[   36.908020] The buggy address belongs to the physical page:
[   36.908786] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   36.909787] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.910551] page_type: f5(slab)
[   36.910983] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.911692] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.912623] page dumped because: kasan: bad access detected
[   36.913361] 
[   36.913737] Memory state around the buggy address:
[   36.914329]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.915131]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.915976] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.916799]                                      ^
[   36.917413]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.918208]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.918990] ==================================================================
[   35.092134] ==================================================================
[   35.092857] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   35.093996] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   35.095188] 
[   35.095661] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   35.096815] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.097496] Hardware name: linux,dummy-virt (DT)
[   35.098090] Call trace:
[   35.098606]  show_stack+0x20/0x38 (C)
[   35.099324]  dump_stack_lvl+0x8c/0xd0
[   35.099980]  print_report+0x118/0x5e0
[   35.100688]  kasan_report+0xc8/0x118
[   35.101347]  kasan_check_range+0x100/0x1a8
[   35.102032]  __kasan_check_write+0x20/0x30
[   35.102752]  kasan_atomics_helper+0x61c/0x4858
[   35.103395]  kasan_atomics+0x198/0x2e8
[   35.103955]  kunit_try_run_case+0x14c/0x3d0
[   35.104664]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.105325]  kthread+0x24c/0x2d0
[   35.105945]  ret_from_fork+0x10/0x20
[   35.106601] 
[   35.106961] Allocated by task 253:
[   35.107482]  kasan_save_stack+0x3c/0x68
[   35.108025]  kasan_save_track+0x20/0x40
[   35.108644]  kasan_save_alloc_info+0x40/0x58
[   35.109313]  __kasan_kmalloc+0xd4/0xd8
[   35.109888]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.110445]  kasan_atomics+0xb8/0x2e8
[   35.111064]  kunit_try_run_case+0x14c/0x3d0
[   35.111704]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.112413]  kthread+0x24c/0x2d0
[   35.113000]  ret_from_fork+0x10/0x20
[   35.113534] 
[   35.113915] The buggy address belongs to the object at fff00000c63df000
[   35.113915]  which belongs to the cache kmalloc-64 of size 64
[   35.115163] The buggy address is located 0 bytes to the right of
[   35.115163]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   35.116447] 
[   35.116809] The buggy address belongs to the physical page:
[   35.117467] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   35.118447] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.119216] page_type: f5(slab)
[   35.119729] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.120653] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.121453] page dumped because: kasan: bad access detected
[   35.122170] 
[   35.122504] Memory state around the buggy address:
[   35.123215]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.124138]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.124971] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.125811]                                      ^
[   35.126452]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.127202]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.127884] ==================================================================
[   36.551799] ==================================================================
[   36.553472] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   36.554183] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   36.555222] 
[   36.555681] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   36.556882] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.557509] Hardware name: linux,dummy-virt (DT)
[   36.558057] Call trace:
[   36.558434]  show_stack+0x20/0x38 (C)
[   36.558934]  dump_stack_lvl+0x8c/0xd0
[   36.559449]  print_report+0x118/0x5e0
[   36.560056]  kasan_report+0xc8/0x118
[   36.560813]  kasan_check_range+0x100/0x1a8
[   36.561526]  __kasan_check_write+0x20/0x30
[   36.562299]  kasan_atomics_helper+0x154c/0x4858
[   36.562996]  kasan_atomics+0x198/0x2e8
[   36.563652]  kunit_try_run_case+0x14c/0x3d0
[   36.564366]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.565163]  kthread+0x24c/0x2d0
[   36.565803]  ret_from_fork+0x10/0x20
[   36.566458] 
[   36.566826] Allocated by task 253:
[   36.567446]  kasan_save_stack+0x3c/0x68
[   36.568021]  kasan_save_track+0x20/0x40
[   36.568680]  kasan_save_alloc_info+0x40/0x58
[   36.569361]  __kasan_kmalloc+0xd4/0xd8
[   36.570012]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.570701]  kasan_atomics+0xb8/0x2e8
[   36.571313]  kunit_try_run_case+0x14c/0x3d0
[   36.572021]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.572781]  kthread+0x24c/0x2d0
[   36.573359]  ret_from_fork+0x10/0x20
[   36.573955] 
[   36.574381] The buggy address belongs to the object at fff00000c63df000
[   36.574381]  which belongs to the cache kmalloc-64 of size 64
[   36.575625] The buggy address is located 0 bytes to the right of
[   36.575625]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   36.576986] 
[   36.577415] The buggy address belongs to the physical page:
[   36.577985] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   36.578991] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.579844] page_type: f5(slab)
[   36.580413] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.581350] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.582255] page dumped because: kasan: bad access detected
[   36.582932] 
[   36.583302] Memory state around the buggy address:
[   36.584001]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.584806]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.585734] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.586574]                                      ^
[   36.587216]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.588079]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.588911] ==================================================================
[   34.689589] ==================================================================
[   34.691059] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   34.692012] Read of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   34.693024] 
[   34.693781] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   34.695301] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.695981] Hardware name: linux,dummy-virt (DT)
[   34.696823] Call trace:
[   34.697438]  show_stack+0x20/0x38 (C)
[   34.698277]  dump_stack_lvl+0x8c/0xd0
[   34.698784]  print_report+0x118/0x5e0
[   34.699714]  kasan_report+0xc8/0x118
[   34.700342]  kasan_check_range+0x100/0x1a8
[   34.700970]  __kasan_check_read+0x20/0x30
[   34.701690]  kasan_atomics_helper+0x2b0/0x4858
[   34.702317]  kasan_atomics+0x198/0x2e8
[   34.702876]  kunit_try_run_case+0x14c/0x3d0
[   34.703802]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.704462]  kthread+0x24c/0x2d0
[   34.705552]  ret_from_fork+0x10/0x20
[   34.706094] 
[   34.706463] Allocated by task 253:
[   34.707000]  kasan_save_stack+0x3c/0x68
[   34.707514]  kasan_save_track+0x20/0x40
[   34.708109]  kasan_save_alloc_info+0x40/0x58
[   34.708825]  __kasan_kmalloc+0xd4/0xd8
[   34.709828]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.710364]  kasan_atomics+0xb8/0x2e8
[   34.710939]  kunit_try_run_case+0x14c/0x3d0
[   34.711569]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.712129]  kthread+0x24c/0x2d0
[   34.712667]  ret_from_fork+0x10/0x20
[   34.713672] 
[   34.714038] The buggy address belongs to the object at fff00000c63df000
[   34.714038]  which belongs to the cache kmalloc-64 of size 64
[   34.715054] The buggy address is located 0 bytes to the right of
[   34.715054]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   34.716143] 
[   34.716505] The buggy address belongs to the physical page:
[   34.717549] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   34.718487] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.719091] page_type: f5(slab)
[   34.719651] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.720553] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   34.721714] page dumped because: kasan: bad access detected
[   34.722260] 
[   34.722542] Memory state around the buggy address:
[   34.723081]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.723878]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.724677] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.725432]                                      ^
[   34.726553]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.727327]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.728099] ==================================================================
[   36.021829] ==================================================================
[   36.022472] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   36.023321] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   36.024074] 
[   36.024420] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   36.025475] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.026030] Hardware name: linux,dummy-virt (DT)
[   36.026525] Call trace:
[   36.026949]  show_stack+0x20/0x38 (C)
[   36.027600]  dump_stack_lvl+0x8c/0xd0
[   36.028096]  print_report+0x118/0x5e0
[   36.028727]  kasan_report+0xc8/0x118
[   36.029328]  kasan_check_range+0x100/0x1a8
[   36.029883]  __kasan_check_write+0x20/0x30
[   36.030535]  kasan_atomics_helper+0xf20/0x4858
[   36.031178]  kasan_atomics+0x198/0x2e8
[   36.031773]  kunit_try_run_case+0x14c/0x3d0
[   36.032421]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.033176]  kthread+0x24c/0x2d0
[   36.033747]  ret_from_fork+0x10/0x20
[   36.034269] 
[   36.034618] Allocated by task 253:
[   36.035149]  kasan_save_stack+0x3c/0x68
[   36.035733]  kasan_save_track+0x20/0x40
[   36.036314]  kasan_save_alloc_info+0x40/0x58
[   36.036920]  __kasan_kmalloc+0xd4/0xd8
[   36.037560]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.038214]  kasan_atomics+0xb8/0x2e8
[   36.038710]  kunit_try_run_case+0x14c/0x3d0
[   36.039271]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.039990]  kthread+0x24c/0x2d0
[   36.040552]  ret_from_fork+0x10/0x20
[   36.041070] 
[   36.041414] The buggy address belongs to the object at fff00000c63df000
[   36.041414]  which belongs to the cache kmalloc-64 of size 64
[   36.042624] The buggy address is located 0 bytes to the right of
[   36.042624]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   36.043749] 
[   36.044105] The buggy address belongs to the physical page:
[   36.044781] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   36.045594] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.046403] page_type: f5(slab)
[   36.046867] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.047819] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.048602] page dumped because: kasan: bad access detected
[   36.049224] 
[   36.049524] Memory state around the buggy address:
[   36.050172]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.050809]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.051675] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.052429]                                      ^
[   36.053001]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.053714]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.054504] ==================================================================
[   36.125771] ==================================================================
[   36.126475] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   36.127144] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   36.127995] 
[   36.128352] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   36.129514] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.129946] Hardware name: linux,dummy-virt (DT)
[   36.130592] Call trace:
[   36.131034]  show_stack+0x20/0x38 (C)
[   36.132029]  dump_stack_lvl+0x8c/0xd0
[   36.132619]  print_report+0x118/0x5e0
[   36.133243]  kasan_report+0xc8/0x118
[   36.133847]  kasan_check_range+0x100/0x1a8
[   36.134403]  __kasan_check_write+0x20/0x30
[   36.135045]  kasan_atomics_helper+0x1058/0x4858
[   36.135720]  kasan_atomics+0x198/0x2e8
[   36.136353]  kunit_try_run_case+0x14c/0x3d0
[   36.136992]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.137748]  kthread+0x24c/0x2d0
[   36.138262]  ret_from_fork+0x10/0x20
[   36.138813] 
[   36.139164] Allocated by task 253:
[   36.139685]  kasan_save_stack+0x3c/0x68
[   36.140296]  kasan_save_track+0x20/0x40
[   36.140826]  kasan_save_alloc_info+0x40/0x58
[   36.141357]  __kasan_kmalloc+0xd4/0xd8
[   36.141936]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.142567]  kasan_atomics+0xb8/0x2e8
[   36.143097]  kunit_try_run_case+0x14c/0x3d0
[   36.143727]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.144453]  kthread+0x24c/0x2d0
[   36.144922]  ret_from_fork+0x10/0x20
[   36.145509] 
[   36.145830] The buggy address belongs to the object at fff00000c63df000
[   36.145830]  which belongs to the cache kmalloc-64 of size 64
[   36.147024] The buggy address is located 0 bytes to the right of
[   36.147024]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   36.148219] 
[   36.148584] The buggy address belongs to the physical page:
[   36.149272] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   36.150128] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.150753] page_type: f5(slab)
[   36.151298] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.152137] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.153030] page dumped because: kasan: bad access detected
[   36.153631] 
[   36.153974] Memory state around the buggy address:
[   36.154570]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.155353]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.156066] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.156849]                                      ^
[   36.157528]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.158215]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.159003] ==================================================================
[   36.739961] ==================================================================
[   36.740825] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   36.741685] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   36.742575] 
[   36.742910] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   36.743942] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.744543] Hardware name: linux,dummy-virt (DT)
[   36.745032] Call trace:
[   36.745474]  show_stack+0x20/0x38 (C)
[   36.746023]  dump_stack_lvl+0x8c/0xd0
[   36.746669]  print_report+0x118/0x5e0
[   36.747293]  kasan_report+0xc8/0x118
[   36.747885]  kasan_check_range+0x100/0x1a8
[   36.748496]  __kasan_check_write+0x20/0x30
[   36.749152]  kasan_atomics_helper+0x16d0/0x4858
[   36.749845]  kasan_atomics+0x198/0x2e8
[   36.750460]  kunit_try_run_case+0x14c/0x3d0
[   36.751125]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.751741]  kthread+0x24c/0x2d0
[   36.752327]  ret_from_fork+0x10/0x20
[   36.752852] 
[   36.753220] Allocated by task 253:
[   36.753714]  kasan_save_stack+0x3c/0x68
[   36.754321]  kasan_save_track+0x20/0x40
[   36.754897]  kasan_save_alloc_info+0x40/0x58
[   36.755490]  __kasan_kmalloc+0xd4/0xd8
[   36.755950]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.756621]  kasan_atomics+0xb8/0x2e8
[   36.757162]  kunit_try_run_case+0x14c/0x3d0
[   36.757794]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.758422]  kthread+0x24c/0x2d0
[   36.758966]  ret_from_fork+0x10/0x20
[   36.759539] 
[   36.759884] The buggy address belongs to the object at fff00000c63df000
[   36.759884]  which belongs to the cache kmalloc-64 of size 64
[   36.760947] The buggy address is located 0 bytes to the right of
[   36.760947]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   36.762187] 
[   36.762543] The buggy address belongs to the physical page:
[   36.763238] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   36.764098] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.764792] page_type: f5(slab)
[   36.765334] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.766169] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.766891] page dumped because: kasan: bad access detected
[   36.767579] 
[   36.767930] Memory state around the buggy address:
[   36.768563]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.769335]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.770081] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.770822]                                      ^
[   36.771431]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.772163]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.772966] ==================================================================
[   35.916464] ==================================================================
[   35.917252] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   35.918167] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   35.919050] 
[   35.919458] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   35.920466] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.921028] Hardware name: linux,dummy-virt (DT)
[   35.921660] Call trace:
[   35.922073]  show_stack+0x20/0x38 (C)
[   35.922691]  dump_stack_lvl+0x8c/0xd0
[   35.923328]  print_report+0x118/0x5e0
[   35.923916]  kasan_report+0xc8/0x118
[   35.924416]  kasan_check_range+0x100/0x1a8
[   35.925057]  __kasan_check_write+0x20/0x30
[   35.925658]  kasan_atomics_helper+0xe44/0x4858
[   35.926238]  kasan_atomics+0x198/0x2e8
[   35.926854]  kunit_try_run_case+0x14c/0x3d0
[   35.927551]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.928326]  kthread+0x24c/0x2d0
[   35.928802]  ret_from_fork+0x10/0x20
[   35.929414] 
[   35.929761] Allocated by task 253:
[   35.930303]  kasan_save_stack+0x3c/0x68
[   35.930832]  kasan_save_track+0x20/0x40
[   35.931348]  kasan_save_alloc_info+0x40/0x58
[   35.931979]  __kasan_kmalloc+0xd4/0xd8
[   35.932577]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.933223]  kasan_atomics+0xb8/0x2e8
[   35.933710]  kunit_try_run_case+0x14c/0x3d0
[   35.934352]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.934948]  kthread+0x24c/0x2d0
[   35.935505]  ret_from_fork+0x10/0x20
[   35.936014] 
[   35.936384] The buggy address belongs to the object at fff00000c63df000
[   35.936384]  which belongs to the cache kmalloc-64 of size 64
[   35.937524] The buggy address is located 0 bytes to the right of
[   35.937524]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   35.938696] 
[   35.939048] The buggy address belongs to the physical page:
[   35.939625] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   35.940520] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.941241] page_type: f5(slab)
[   35.941758] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.942668] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.943445] page dumped because: kasan: bad access detected
[   35.944045] 
[   35.944428] Memory state around the buggy address:
[   35.945032]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.945828]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.946545] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.947321]                                      ^
[   35.948001]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.948717]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.949504] ==================================================================
[   36.406320] ==================================================================
[   36.406988] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   36.407912] Read of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   36.408754] 
[   36.409224] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   36.410260] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.410877] Hardware name: linux,dummy-virt (DT)
[   36.411437] Call trace:
[   36.411904]  show_stack+0x20/0x38 (C)
[   36.412562]  dump_stack_lvl+0x8c/0xd0
[   36.413180]  print_report+0x118/0x5e0
[   36.413821]  kasan_report+0xc8/0x118
[   36.414449]  __asan_report_load8_noabort+0x20/0x30
[   36.415082]  kasan_atomics_helper+0x3f04/0x4858
[   36.415810]  kasan_atomics+0x198/0x2e8
[   36.416474]  kunit_try_run_case+0x14c/0x3d0
[   36.417009]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.417944]  kthread+0x24c/0x2d0
[   36.418480]  ret_from_fork+0x10/0x20
[   36.418972] 
[   36.419280] Allocated by task 253:
[   36.419733]  kasan_save_stack+0x3c/0x68
[   36.420408]  kasan_save_track+0x20/0x40
[   36.421359]  kasan_save_alloc_info+0x40/0x58
[   36.421961]  __kasan_kmalloc+0xd4/0xd8
[   36.422576]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.423241]  kasan_atomics+0xb8/0x2e8
[   36.423846]  kunit_try_run_case+0x14c/0x3d0
[   36.424462]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.425499]  kthread+0x24c/0x2d0
[   36.425849]  ret_from_fork+0x10/0x20
[   36.426499] 
[   36.426856] The buggy address belongs to the object at fff00000c63df000
[   36.426856]  which belongs to the cache kmalloc-64 of size 64
[   36.428129] The buggy address is located 0 bytes to the right of
[   36.428129]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   36.429388] 
[   36.429787] The buggy address belongs to the physical page:
[   36.430539] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   36.431462] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.432441] page_type: f5(slab)
[   36.433093] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.433890] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.434648] page dumped because: kasan: bad access detected
[   36.435278] 
[   36.435612] Memory state around the buggy address:
[   36.436312]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.437001]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.437930] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.438621]                                      ^
[   36.439326]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.440041]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.440898] ==================================================================
[   36.196302] ==================================================================
[   36.197132] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   36.198002] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   36.198711] 
[   36.199093] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   36.200146] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.200686] Hardware name: linux,dummy-virt (DT)
[   36.201205] Call trace:
[   36.201635]  show_stack+0x20/0x38 (C)
[   36.202255]  dump_stack_lvl+0x8c/0xd0
[   36.202818]  print_report+0x118/0x5e0
[   36.203384]  kasan_report+0xc8/0x118
[   36.203892]  kasan_check_range+0x100/0x1a8
[   36.204569]  __kasan_check_write+0x20/0x30
[   36.205230]  kasan_atomics_helper+0x1128/0x4858
[   36.205907]  kasan_atomics+0x198/0x2e8
[   36.206474]  kunit_try_run_case+0x14c/0x3d0
[   36.207049]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.207745]  kthread+0x24c/0x2d0
[   36.208321]  ret_from_fork+0x10/0x20
[   36.208888] 
[   36.209254] Allocated by task 253:
[   36.209761]  kasan_save_stack+0x3c/0x68
[   36.210307]  kasan_save_track+0x20/0x40
[   36.210890]  kasan_save_alloc_info+0x40/0x58
[   36.211510]  __kasan_kmalloc+0xd4/0xd8
[   36.212086]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.212688]  kasan_atomics+0xb8/0x2e8
[   36.213225]  kunit_try_run_case+0x14c/0x3d0
[   36.213851]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.214453]  kthread+0x24c/0x2d0
[   36.214998]  ret_from_fork+0x10/0x20
[   36.215499] 
[   36.215851] The buggy address belongs to the object at fff00000c63df000
[   36.215851]  which belongs to the cache kmalloc-64 of size 64
[   36.216913] The buggy address is located 0 bytes to the right of
[   36.216913]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   36.218270] 
[   36.218630] The buggy address belongs to the physical page:
[   36.219183] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   36.220127] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.220873] page_type: f5(slab)
[   36.221330] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.222225] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.223083] page dumped because: kasan: bad access detected
[   36.223607] 
[   36.223948] Memory state around the buggy address:
[   36.224677]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.225489]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.226351] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.227161]                                      ^
[   36.227748]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.228516]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.229194] ==================================================================
[   35.166342] ==================================================================
[   35.167191] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   35.167887] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   35.168797] 
[   35.169228] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   35.170128] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.170709] Hardware name: linux,dummy-virt (DT)
[   35.171345] Call trace:
[   35.171780]  show_stack+0x20/0x38 (C)
[   35.172343]  dump_stack_lvl+0x8c/0xd0
[   35.172963]  print_report+0x118/0x5e0
[   35.173484]  kasan_report+0xc8/0x118
[   35.174074]  kasan_check_range+0x100/0x1a8
[   35.174697]  __kasan_check_write+0x20/0x30
[   35.175272]  kasan_atomics_helper+0x6ec/0x4858
[   35.175932]  kasan_atomics+0x198/0x2e8
[   35.176552]  kunit_try_run_case+0x14c/0x3d0
[   35.177174]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.177830]  kthread+0x24c/0x2d0
[   35.178403]  ret_from_fork+0x10/0x20
[   35.179012] 
[   35.179326] Allocated by task 253:
[   35.179833]  kasan_save_stack+0x3c/0x68
[   35.180449]  kasan_save_track+0x20/0x40
[   35.181033]  kasan_save_alloc_info+0x40/0x58
[   35.181689]  __kasan_kmalloc+0xd4/0xd8
[   35.182212]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.182859]  kasan_atomics+0xb8/0x2e8
[   35.183441]  kunit_try_run_case+0x14c/0x3d0
[   35.184007]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.184632]  kthread+0x24c/0x2d0
[   35.185202]  ret_from_fork+0x10/0x20
[   35.185678] 
[   35.186033] The buggy address belongs to the object at fff00000c63df000
[   35.186033]  which belongs to the cache kmalloc-64 of size 64
[   35.187146] The buggy address is located 0 bytes to the right of
[   35.187146]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   35.188356] 
[   35.188704] The buggy address belongs to the physical page:
[   35.189401] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   35.190201] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.190963] page_type: f5(slab)
[   35.191503] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.192297] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.193194] page dumped because: kasan: bad access detected
[   35.193805] 
[   35.194175] Memory state around the buggy address:
[   35.194733]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.195461]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.196299] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.196995]                                      ^
[   35.197681]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.198466]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.199156] ==================================================================
[   35.318392] ==================================================================
[   35.319289] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   35.319654] Read of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   35.319990] 
[   35.320201] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   35.321585] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.322083] Hardware name: linux,dummy-virt (DT)
[   35.322819] Call trace:
[   35.323319]  show_stack+0x20/0x38 (C)
[   35.324036]  dump_stack_lvl+0x8c/0xd0
[   35.324779]  print_report+0x118/0x5e0
[   35.325716]  kasan_report+0xc8/0x118
[   35.326255]  __asan_report_load4_noabort+0x20/0x30
[   35.326985]  kasan_atomics_helper+0x42d8/0x4858
[   35.327684]  kasan_atomics+0x198/0x2e8
[   35.328298]  kunit_try_run_case+0x14c/0x3d0
[   35.328931]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.329625]  kthread+0x24c/0x2d0
[   35.330107]  ret_from_fork+0x10/0x20
[   35.330680] 
[   35.331028] Allocated by task 253:
[   35.331541]  kasan_save_stack+0x3c/0x68
[   35.332028]  kasan_save_track+0x20/0x40
[   35.332634]  kasan_save_alloc_info+0x40/0x58
[   35.333155]  __kasan_kmalloc+0xd4/0xd8
[   35.333740]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.334345]  kasan_atomics+0xb8/0x2e8
[   35.334861]  kunit_try_run_case+0x14c/0x3d0
[   35.335432]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.336173]  kthread+0x24c/0x2d0
[   35.336634]  ret_from_fork+0x10/0x20
[   35.337220] 
[   35.337529] The buggy address belongs to the object at fff00000c63df000
[   35.337529]  which belongs to the cache kmalloc-64 of size 64
[   35.338730] The buggy address is located 0 bytes to the right of
[   35.338730]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   35.339985] 
[   35.340354] The buggy address belongs to the physical page:
[   35.340954] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   35.341767] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.342554] page_type: f5(slab)
[   35.343051] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.343921] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.344722] page dumped because: kasan: bad access detected
[   35.345355] 
[   35.345662] Memory state around the buggy address:
[   35.346190]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.347011]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.347822] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.348604]                                      ^
[   35.349260]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.349981]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.350732] ==================================================================
[   34.848735] ==================================================================
[   34.849627] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[   34.851035] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   34.852352] 
[   34.852818] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   34.853782] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.854431] Hardware name: linux,dummy-virt (DT)
[   34.854908] Call trace:
[   34.855334]  show_stack+0x20/0x38 (C)
[   34.855940]  dump_stack_lvl+0x8c/0xd0
[   34.857384]  print_report+0x118/0x5e0
[   34.857906]  kasan_report+0xc8/0x118
[   34.858866]  kasan_check_range+0x100/0x1a8
[   34.859604]  __kasan_check_write+0x20/0x30
[   34.860218]  kasan_atomics_helper+0x3ac/0x4858
[   34.860832]  kasan_atomics+0x198/0x2e8
[   34.861605]  kunit_try_run_case+0x14c/0x3d0
[   34.862218]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.862973]  kthread+0x24c/0x2d0
[   34.863757]  ret_from_fork+0x10/0x20
[   34.864259] 
[   34.864607] Allocated by task 253:
[   34.866088]  kasan_save_stack+0x3c/0x68
[   34.866703]  kasan_save_track+0x20/0x40
[   34.867251]  kasan_save_alloc_info+0x40/0x58
[   34.867841]  __kasan_kmalloc+0xd4/0xd8
[   34.868437]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.869422]  kasan_atomics+0xb8/0x2e8
[   34.869909]  kunit_try_run_case+0x14c/0x3d0
[   34.870497]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.871154]  kthread+0x24c/0x2d0
[   34.871688]  ret_from_fork+0x10/0x20
[   34.872217] 
[   34.872576] The buggy address belongs to the object at fff00000c63df000
[   34.872576]  which belongs to the cache kmalloc-64 of size 64
[   34.874561] The buggy address is located 0 bytes to the right of
[   34.874561]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   34.875808] 
[   34.876177] The buggy address belongs to the physical page:
[   34.876707] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   34.878053] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.878802] page_type: f5(slab)
[   34.879302] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.880099] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   34.880929] page dumped because: kasan: bad access detected
[   34.881585] 
[   34.881927] Memory state around the buggy address:
[   34.882564]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.883851]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.884769] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.885511]                                      ^
[   34.886168]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.886888]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.888051] ==================================================================
[   35.352426] ==================================================================
[   35.354021] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   35.354869] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   35.355594] 
[   35.355850] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   35.357707] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.358320] Hardware name: linux,dummy-virt (DT)
[   35.358936] Call trace:
[   35.359474]  show_stack+0x20/0x38 (C)
[   35.360016]  dump_stack_lvl+0x8c/0xd0
[   35.360606]  print_report+0x118/0x5e0
[   35.361253]  kasan_report+0xc8/0x118
[   35.361828]  kasan_check_range+0x100/0x1a8
[   35.362559]  __kasan_check_write+0x20/0x30
[   35.363092]  kasan_atomics_helper+0x934/0x4858
[   35.363772]  kasan_atomics+0x198/0x2e8
[   35.364291]  kunit_try_run_case+0x14c/0x3d0
[   35.364937]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.365611]  kthread+0x24c/0x2d0
[   35.366200]  ret_from_fork+0x10/0x20
[   35.366724] 
[   35.367079] Allocated by task 253:
[   35.367654]  kasan_save_stack+0x3c/0x68
[   35.368150]  kasan_save_track+0x20/0x40
[   35.368733]  kasan_save_alloc_info+0x40/0x58
[   35.369292]  __kasan_kmalloc+0xd4/0xd8
[   35.369874]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.370441]  kasan_atomics+0xb8/0x2e8
[   35.370984]  kunit_try_run_case+0x14c/0x3d0
[   35.371537]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.372282]  kthread+0x24c/0x2d0
[   35.372820]  ret_from_fork+0x10/0x20
[   35.373404] 
[   35.373754] The buggy address belongs to the object at fff00000c63df000
[   35.373754]  which belongs to the cache kmalloc-64 of size 64
[   35.374901] The buggy address is located 0 bytes to the right of
[   35.374901]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   35.376070] 
[   35.376446] The buggy address belongs to the physical page:
[   35.377065] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   35.378004] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.378704] page_type: f5(slab)
[   35.379262] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.380077] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.380884] page dumped because: kasan: bad access detected
[   35.381483] 
[   35.381837] Memory state around the buggy address:
[   35.382422]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.383292]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.384081] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.384898]                                      ^
[   35.385559]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.386280]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.387092] ==================================================================
[   35.707180] ==================================================================
[   35.708170] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   35.709023] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   35.709766] 
[   35.710156] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   35.711133] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.711718] Hardware name: linux,dummy-virt (DT)
[   35.712335] Call trace:
[   35.712726]  show_stack+0x20/0x38 (C)
[   35.713353]  dump_stack_lvl+0x8c/0xd0
[   35.713967]  print_report+0x118/0x5e0
[   35.714580]  kasan_report+0xc8/0x118
[   35.715165]  kasan_check_range+0x100/0x1a8
[   35.715807]  __kasan_check_write+0x20/0x30
[   35.716367]  kasan_atomics_helper+0xca0/0x4858
[   35.717027]  kasan_atomics+0x198/0x2e8
[   35.717620]  kunit_try_run_case+0x14c/0x3d0
[   35.718285]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.719044]  kthread+0x24c/0x2d0
[   35.719580]  ret_from_fork+0x10/0x20
[   35.720150] 
[   35.720495] Allocated by task 253:
[   35.721022]  kasan_save_stack+0x3c/0x68
[   35.721621]  kasan_save_track+0x20/0x40
[   35.722167]  kasan_save_alloc_info+0x40/0x58
[   35.722729]  __kasan_kmalloc+0xd4/0xd8
[   35.723324]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.723968]  kasan_atomics+0xb8/0x2e8
[   35.724489]  kunit_try_run_case+0x14c/0x3d0
[   35.725072]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.725704]  kthread+0x24c/0x2d0
[   35.726320]  ret_from_fork+0x10/0x20
[   35.726861] 
[   35.727208] The buggy address belongs to the object at fff00000c63df000
[   35.727208]  which belongs to the cache kmalloc-64 of size 64
[   35.728492] The buggy address is located 0 bytes to the right of
[   35.728492]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   35.729606] 
[   35.729957] The buggy address belongs to the physical page:
[   35.730656] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   35.731612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.732271] page_type: f5(slab)
[   35.732801] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.733629] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.734478] page dumped because: kasan: bad access detected
[   35.735042] 
[   35.735406] Memory state around the buggy address:
[   35.736039]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.736787]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.737531] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.738325]                                      ^
[   35.738954]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.739678]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.740466] ==================================================================
[   35.130595] ==================================================================
[   35.131803] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   35.132554] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   35.133890] 
[   35.134409] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   35.135154] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.135597] Hardware name: linux,dummy-virt (DT)
[   35.136226] Call trace:
[   35.136639]  show_stack+0x20/0x38 (C)
[   35.137141]  dump_stack_lvl+0x8c/0xd0
[   35.137784]  print_report+0x118/0x5e0
[   35.138367]  kasan_report+0xc8/0x118
[   35.138963]  kasan_check_range+0x100/0x1a8
[   35.139562]  __kasan_check_write+0x20/0x30
[   35.140095]  kasan_atomics_helper+0x684/0x4858
[   35.140776]  kasan_atomics+0x198/0x2e8
[   35.141372]  kunit_try_run_case+0x14c/0x3d0
[   35.141890]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.142662]  kthread+0x24c/0x2d0
[   35.143245]  ret_from_fork+0x10/0x20
[   35.143780] 
[   35.144100] Allocated by task 253:
[   35.144599]  kasan_save_stack+0x3c/0x68
[   35.145130]  kasan_save_track+0x20/0x40
[   35.145715]  kasan_save_alloc_info+0x40/0x58
[   35.146241]  __kasan_kmalloc+0xd4/0xd8
[   35.146820]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.147426]  kasan_atomics+0xb8/0x2e8
[   35.147951]  kunit_try_run_case+0x14c/0x3d0
[   35.148598]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.149177]  kthread+0x24c/0x2d0
[   35.149709]  ret_from_fork+0x10/0x20
[   35.150275] 
[   35.150620] The buggy address belongs to the object at fff00000c63df000
[   35.150620]  which belongs to the cache kmalloc-64 of size 64
[   35.151738] The buggy address is located 0 bytes to the right of
[   35.151738]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   35.152874] 
[   35.153240] The buggy address belongs to the physical page:
[   35.153915] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   35.154741] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.155602] page_type: f5(slab)
[   35.156184] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.157047] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.157991] page dumped because: kasan: bad access detected
[   35.158611] 
[   35.158987] Memory state around the buggy address:
[   35.159676]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.160430]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.161331] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.162054]                                      ^
[   35.162752]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.163525]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.164356] ==================================================================
[   35.672910] ==================================================================
[   35.674006] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   35.674918] Read of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   35.675657] 
[   35.676034] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   35.677059] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.677626] Hardware name: linux,dummy-virt (DT)
[   35.678159] Call trace:
[   35.678574]  show_stack+0x20/0x38 (C)
[   35.679190]  dump_stack_lvl+0x8c/0xd0
[   35.679788]  print_report+0x118/0x5e0
[   35.680325]  kasan_report+0xc8/0x118
[   35.680908]  __asan_report_load4_noabort+0x20/0x30
[   35.681574]  kasan_atomics_helper+0x3de4/0x4858
[   35.682256]  kasan_atomics+0x198/0x2e8
[   35.682786]  kunit_try_run_case+0x14c/0x3d0
[   35.683448]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.684127]  kthread+0x24c/0x2d0
[   35.684687]  ret_from_fork+0x10/0x20
[   35.685271] 
[   35.685572] Allocated by task 253:
[   35.686091]  kasan_save_stack+0x3c/0x68
[   35.686622]  kasan_save_track+0x20/0x40
[   35.687224]  kasan_save_alloc_info+0x40/0x58
[   35.687755]  __kasan_kmalloc+0xd4/0xd8
[   35.688362]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.688957]  kasan_atomics+0xb8/0x2e8
[   35.689463]  kunit_try_run_case+0x14c/0x3d0
[   35.690081]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.690776]  kthread+0x24c/0x2d0
[   35.691278]  ret_from_fork+0x10/0x20
[   35.691859] 
[   35.692229] The buggy address belongs to the object at fff00000c63df000
[   35.692229]  which belongs to the cache kmalloc-64 of size 64
[   35.693371] The buggy address is located 0 bytes to the right of
[   35.693371]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   35.694565] 
[   35.694911] The buggy address belongs to the physical page:
[   35.695618] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   35.696460] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.697331] page_type: f5(slab)
[   35.697928] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.698816] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.699667] page dumped because: kasan: bad access detected
[   35.700343] 
[   35.700649] Memory state around the buggy address:
[   35.701162]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.702005]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.702769] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.703473]                                      ^
[   35.704141]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.704892]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.705642] ==================================================================
[   35.238084] ==================================================================
[   35.238810] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   35.239552] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   35.240106] 
[   35.240989] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   35.242283] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.242994] Hardware name: linux,dummy-virt (DT)
[   35.243710] Call trace:
[   35.244070]  show_stack+0x20/0x38 (C)
[   35.244594]  dump_stack_lvl+0x8c/0xd0
[   35.245093]  print_report+0x118/0x5e0
[   35.246014]  kasan_report+0xc8/0x118
[   35.246768]  kasan_check_range+0x100/0x1a8
[   35.247517]  __kasan_check_write+0x20/0x30
[   35.248299]  kasan_atomics_helper+0x7cc/0x4858
[   35.249067]  kasan_atomics+0x198/0x2e8
[   35.249799]  kunit_try_run_case+0x14c/0x3d0
[   35.250570]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.251404]  kthread+0x24c/0x2d0
[   35.251883]  ret_from_fork+0x10/0x20
[   35.252713] 
[   35.253207] Allocated by task 253:
[   35.253810]  kasan_save_stack+0x3c/0x68
[   35.254539]  kasan_save_track+0x20/0x40
[   35.255247]  kasan_save_alloc_info+0x40/0x58
[   35.255991]  __kasan_kmalloc+0xd4/0xd8
[   35.256700]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.257271]  kasan_atomics+0xb8/0x2e8
[   35.257713]  kunit_try_run_case+0x14c/0x3d0
[   35.258246]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.258868]  kthread+0x24c/0x2d0
[   35.259854]  ret_from_fork+0x10/0x20
[   35.260603] 
[   35.261100] The buggy address belongs to the object at fff00000c63df000
[   35.261100]  which belongs to the cache kmalloc-64 of size 64
[   35.262579] The buggy address is located 0 bytes to the right of
[   35.262579]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   35.264096] 
[   35.264646] The buggy address belongs to the physical page:
[   35.265402] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   35.266411] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.267262] page_type: f5(slab)
[   35.267774] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.268855] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   35.269822] page dumped because: kasan: bad access detected
[   35.270624] 
[   35.270942] Memory state around the buggy address:
[   35.271779]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.272723]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   35.273543] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.274461]                                      ^
[   35.275015]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.276034]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.276959] ==================================================================
[   36.056159] ==================================================================
[   36.056907] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   36.057851] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   36.058571] 
[   36.058936] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   36.060063] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.060678] Hardware name: linux,dummy-virt (DT)
[   36.061356] Call trace:
[   36.061784]  show_stack+0x20/0x38 (C)
[   36.062408]  dump_stack_lvl+0x8c/0xd0
[   36.063005]  print_report+0x118/0x5e0
[   36.063602]  kasan_report+0xc8/0x118
[   36.064211]  kasan_check_range+0x100/0x1a8
[   36.064853]  __kasan_check_write+0x20/0x30
[   36.065508]  kasan_atomics_helper+0xf88/0x4858
[   36.066090]  kasan_atomics+0x198/0x2e8
[   36.066737]  kunit_try_run_case+0x14c/0x3d0
[   36.067315]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.068033]  kthread+0x24c/0x2d0
[   36.068634]  ret_from_fork+0x10/0x20
[   36.069240] 
[   36.069583] Allocated by task 253:
[   36.070087]  kasan_save_stack+0x3c/0x68
[   36.070708]  kasan_save_track+0x20/0x40
[   36.071269]  kasan_save_alloc_info+0x40/0x58
[   36.071896]  __kasan_kmalloc+0xd4/0xd8
[   36.072497]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.073087]  kasan_atomics+0xb8/0x2e8
[   36.073675]  kunit_try_run_case+0x14c/0x3d0
[   36.074274]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.075009]  kthread+0x24c/0x2d0
[   36.075562]  ret_from_fork+0x10/0x20
[   36.076130] 
[   36.076467] The buggy address belongs to the object at fff00000c63df000
[   36.076467]  which belongs to the cache kmalloc-64 of size 64
[   36.077579] The buggy address is located 0 bytes to the right of
[   36.077579]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   36.078737] 
[   36.079091] The buggy address belongs to the physical page:
[   36.079654] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   36.080550] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.081376] page_type: f5(slab)
[   36.081915] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.082730] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.083586] page dumped because: kasan: bad access detected
[   36.084318] 
[   36.084667] Memory state around the buggy address:
[   36.085166]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.086031]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.086796] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.087600]                                      ^
[   36.088143]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.088965]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.089796] ==================================================================
[   36.265156] ==================================================================
[   36.265897] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   36.266758] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   36.267678] 
[   36.268070] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   36.269064] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.269632] Hardware name: linux,dummy-virt (DT)
[   36.270213] Call trace:
[   36.270568]  show_stack+0x20/0x38 (C)
[   36.271207]  dump_stack_lvl+0x8c/0xd0
[   36.271816]  print_report+0x118/0x5e0
[   36.272374]  kasan_report+0xc8/0x118
[   36.272994]  kasan_check_range+0x100/0x1a8
[   36.273562]  __kasan_check_write+0x20/0x30
[   36.274252]  kasan_atomics_helper+0x11f8/0x4858
[   36.274981]  kasan_atomics+0x198/0x2e8
[   36.275606]  kunit_try_run_case+0x14c/0x3d0
[   36.276171]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.276987]  kthread+0x24c/0x2d0
[   36.277631]  ret_from_fork+0x10/0x20
[   36.278295] 
[   36.278631] Allocated by task 253:
[   36.279091]  kasan_save_stack+0x3c/0x68
[   36.279697]  kasan_save_track+0x20/0x40
[   36.280212]  kasan_save_alloc_info+0x40/0x58
[   36.280839]  __kasan_kmalloc+0xd4/0xd8
[   36.281445]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.282023]  kasan_atomics+0xb8/0x2e8
[   36.282580]  kunit_try_run_case+0x14c/0x3d0
[   36.283147]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.283764]  kthread+0x24c/0x2d0
[   36.284331]  ret_from_fork+0x10/0x20
[   36.284913] 
[   36.285277] The buggy address belongs to the object at fff00000c63df000
[   36.285277]  which belongs to the cache kmalloc-64 of size 64
[   36.286351] The buggy address is located 0 bytes to the right of
[   36.286351]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   36.287726] 
[   36.288026] The buggy address belongs to the physical page:
[   36.288740] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   36.289549] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.290368] page_type: f5(slab)
[   36.290910] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.291796] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.292443] page dumped because: kasan: bad access detected
[   36.293154] 
[   36.293495] Memory state around the buggy address:
[   36.294164]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.294831]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.295715] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.296561]                                      ^
[   36.297215]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.298011]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.298856] ==================================================================
[   34.729502] ==================================================================
[   34.730876] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   34.731598] Read of size 4 at addr fff00000c63df030 by task kunit_try_catch/253
[   34.732469] 
[   34.732870] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   34.734436] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.734996] Hardware name: linux,dummy-virt (DT)
[   34.735661] Call trace:
[   34.736109]  show_stack+0x20/0x38 (C)
[   34.736702]  dump_stack_lvl+0x8c/0xd0
[   34.737664]  print_report+0x118/0x5e0
[   34.738153]  kasan_report+0xc8/0x118
[   34.738764]  __asan_report_load4_noabort+0x20/0x30
[   34.739893]  kasan_atomics_helper+0x40fc/0x4858
[   34.740375]  kasan_atomics+0x198/0x2e8
[   34.741474]  kunit_try_run_case+0x14c/0x3d0
[   34.742062]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.742870]  kthread+0x24c/0x2d0
[   34.743486]  ret_from_fork+0x10/0x20
[   34.744135] 
[   34.744472] Allocated by task 253:
[   34.745488]  kasan_save_stack+0x3c/0x68
[   34.745983]  kasan_save_track+0x20/0x40
[   34.746508]  kasan_save_alloc_info+0x40/0x58
[   34.747047]  __kasan_kmalloc+0xd4/0xd8
[   34.748091]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.748732]  kasan_atomics+0xb8/0x2e8
[   34.749790]  kunit_try_run_case+0x14c/0x3d0
[   34.750380]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.751166]  kthread+0x24c/0x2d0
[   34.751787]  ret_from_fork+0x10/0x20
[   34.752391] 
[   34.752882] The buggy address belongs to the object at fff00000c63df000
[   34.752882]  which belongs to the cache kmalloc-64 of size 64
[   34.754061] The buggy address is located 0 bytes to the right of
[   34.754061]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   34.755615] 
[   34.756224] The buggy address belongs to the physical page:
[   34.757394] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   34.758354] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.758941] page_type: f5(slab)
[   34.759527] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.760392] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   34.761721] page dumped because: kasan: bad access detected
[   34.762737] 
[   34.763142] Memory state around the buggy address:
[   34.763451]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.763802]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.764184] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.764782]                                      ^
[   34.765445]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.766663]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.767359] ==================================================================
[   36.442389] ==================================================================
[   36.442903] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   36.443854] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253
[   36.444658] 
[   36.444996] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   36.446311] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.446908] Hardware name: linux,dummy-virt (DT)
[   36.447559] Call trace:
[   36.447863]  show_stack+0x20/0x38 (C)
[   36.448552]  dump_stack_lvl+0x8c/0xd0
[   36.449191]  print_report+0x118/0x5e0
[   36.449765]  kasan_report+0xc8/0x118
[   36.450406]  kasan_check_range+0x100/0x1a8
[   36.451051]  __kasan_check_write+0x20/0x30
[   36.451694]  kasan_atomics_helper+0x1414/0x4858
[   36.452381]  kasan_atomics+0x198/0x2e8
[   36.452988]  kunit_try_run_case+0x14c/0x3d0
[   36.453620]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.454363]  kthread+0x24c/0x2d0
[   36.454974]  ret_from_fork+0x10/0x20
[   36.455578] 
[   36.455966] Allocated by task 253:
[   36.456495]  kasan_save_stack+0x3c/0x68
[   36.457148]  kasan_save_track+0x20/0x40
[   36.457686]  kasan_save_alloc_info+0x40/0x58
[   36.458401]  __kasan_kmalloc+0xd4/0xd8
[   36.458944]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.459644]  kasan_atomics+0xb8/0x2e8
[   36.460223]  kunit_try_run_case+0x14c/0x3d0
[   36.460884]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.461584]  kthread+0x24c/0x2d0
[   36.462085]  ret_from_fork+0x10/0x20
[   36.462716] 
[   36.463105] The buggy address belongs to the object at fff00000c63df000
[   36.463105]  which belongs to the cache kmalloc-64 of size 64
[   36.464420] The buggy address is located 0 bytes to the right of
[   36.464420]  allocated 48-byte region [fff00000c63df000, fff00000c63df030)
[   36.465662] 
[   36.466069] The buggy address belongs to the physical page:
[   36.466818] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df
[   36.467710] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.468553] page_type: f5(slab)
[   36.469072] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.469992] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   36.470823] page dumped because: kasan: bad access detected
[   36.471497] 
[   36.471852] Memory state around the buggy address:
[   36.472504]  fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.473364]  fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.474155] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.474968]                                      ^
[   36.475546]  fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.476422]  fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.477281] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   34.189910] ==================================================================
[   34.190665] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[   34.191473] Write of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249
[   34.192712] 
[   34.192994] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   34.194249] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.194932] Hardware name: linux,dummy-virt (DT)
[   34.195675] Call trace:
[   34.196283]  show_stack+0x20/0x38 (C)
[   34.196970]  dump_stack_lvl+0x8c/0xd0
[   34.197566]  print_report+0x118/0x5e0
[   34.198109]  kasan_report+0xc8/0x118
[   34.198652]  kasan_check_range+0x100/0x1a8
[   34.199531]  __kasan_check_write+0x20/0x30
[   34.200095]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[   34.200871]  kasan_bitops_generic+0x11c/0x1c8
[   34.201523]  kunit_try_run_case+0x14c/0x3d0
[   34.202081]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.202854]  kthread+0x24c/0x2d0
[   34.203347]  ret_from_fork+0x10/0x20
[   34.203950] 
[   34.204312] Allocated by task 249:
[   34.204748]  kasan_save_stack+0x3c/0x68
[   34.205355]  kasan_save_track+0x20/0x40
[   34.205899]  kasan_save_alloc_info+0x40/0x58
[   34.206444]  __kasan_kmalloc+0xd4/0xd8
[   34.207028]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.207557]  kasan_bitops_generic+0xa0/0x1c8
[   34.208187]  kunit_try_run_case+0x14c/0x3d0
[   34.208771]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.209451]  kthread+0x24c/0x2d0
[   34.209944]  ret_from_fork+0x10/0x20
[   34.210484] 
[   34.210836] The buggy address belongs to the object at fff00000c4005ea0
[   34.210836]  which belongs to the cache kmalloc-16 of size 16
[   34.211918] The buggy address is located 8 bytes inside of
[   34.211918]  allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9)
[   34.213108] 
[   34.213478] The buggy address belongs to the physical page:
[   34.214038] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005
[   34.215000] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.215654] page_type: f5(slab)
[   34.216212] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.217143] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.217907] page dumped because: kasan: bad access detected
[   34.218558] 
[   34.218875] Memory state around the buggy address:
[   34.219521]  fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   34.220260]  fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.221057] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.222016]                                   ^
[   34.222579]  fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.223290]  fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.224063] ==================================================================
[   34.260533] ==================================================================
[   34.261305] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[   34.262163] Write of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249
[   34.262830] 
[   34.263217] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   34.264272] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.264814] Hardware name: linux,dummy-virt (DT)
[   34.265309] Call trace:
[   34.265737]  show_stack+0x20/0x38 (C)
[   34.266374]  dump_stack_lvl+0x8c/0xd0
[   34.266931]  print_report+0x118/0x5e0
[   34.267488]  kasan_report+0xc8/0x118
[   34.268070]  kasan_check_range+0x100/0x1a8
[   34.268707]  __kasan_check_write+0x20/0x30
[   34.269373]  kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[   34.270139]  kasan_bitops_generic+0x11c/0x1c8
[   34.270690]  kunit_try_run_case+0x14c/0x3d0
[   34.271354]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.272065]  kthread+0x24c/0x2d0
[   34.272660]  ret_from_fork+0x10/0x20
[   34.273257] 
[   34.273567] Allocated by task 249:
[   34.274094]  kasan_save_stack+0x3c/0x68
[   34.274695]  kasan_save_track+0x20/0x40
[   34.275268]  kasan_save_alloc_info+0x40/0x58
[   34.275776]  __kasan_kmalloc+0xd4/0xd8
[   34.276374]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.276941]  kasan_bitops_generic+0xa0/0x1c8
[   34.277500]  kunit_try_run_case+0x14c/0x3d0
[   34.278094]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.278816]  kthread+0x24c/0x2d0
[   34.279376]  ret_from_fork+0x10/0x20
[   34.279932] 
[   34.280303] The buggy address belongs to the object at fff00000c4005ea0
[   34.280303]  which belongs to the cache kmalloc-16 of size 16
[   34.281495] The buggy address is located 8 bytes inside of
[   34.281495]  allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9)
[   34.282589] 
[   34.282947] The buggy address belongs to the physical page:
[   34.283806] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005
[   34.284616] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.285610] page_type: f5(slab)
[   34.286095] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.287026] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.287790] page dumped because: kasan: bad access detected
[   34.288507] 
[   34.288847] Memory state around the buggy address:
[   34.289391]  fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   34.290229]  fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.291091] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.291787]                                   ^
[   34.292424]  fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.293125]  fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.293929] ==================================================================
[   34.296652] ==================================================================
[   34.297680] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8
[   34.298528] Read of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249
[   34.298906] 
[   34.299083] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   34.299825] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.300367] Hardware name: linux,dummy-virt (DT)
[   34.300911] Call trace:
[   34.301416]  show_stack+0x20/0x38 (C)
[   34.302037]  dump_stack_lvl+0x8c/0xd0
[   34.302758]  print_report+0x118/0x5e0
[   34.303423]  kasan_report+0xc8/0x118
[   34.304097]  __asan_report_load8_noabort+0x20/0x30
[   34.304859]  kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8
[   34.305703]  kasan_bitops_generic+0x11c/0x1c8
[   34.306008]  kunit_try_run_case+0x14c/0x3d0
[   34.306486]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.307278]  kthread+0x24c/0x2d0
[   34.307753]  ret_from_fork+0x10/0x20
[   34.308415] 
[   34.308799] Allocated by task 249:
[   34.309320]  kasan_save_stack+0x3c/0x68
[   34.309958]  kasan_save_track+0x20/0x40
[   34.310555]  kasan_save_alloc_info+0x40/0x58
[   34.311248]  __kasan_kmalloc+0xd4/0xd8
[   34.311831]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.312485]  kasan_bitops_generic+0xa0/0x1c8
[   34.313137]  kunit_try_run_case+0x14c/0x3d0
[   34.313692]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.314356]  kthread+0x24c/0x2d0
[   34.314907]  ret_from_fork+0x10/0x20
[   34.315494] 
[   34.315794] The buggy address belongs to the object at fff00000c4005ea0
[   34.315794]  which belongs to the cache kmalloc-16 of size 16
[   34.316945] The buggy address is located 8 bytes inside of
[   34.316945]  allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9)
[   34.318104] 
[   34.318460] The buggy address belongs to the physical page:
[   34.319159] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005
[   34.320075] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.320773] page_type: f5(slab)
[   34.321309] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.322085] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.322985] page dumped because: kasan: bad access detected
[   34.323647] 
[   34.324004] Memory state around the buggy address:
[   34.324654]  fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   34.325340]  fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.326203] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.326822]                                   ^
[   34.327457]  fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.328229]  fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.328997] ==================================================================
[   34.473439] ==================================================================
[   34.474588] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8
[   34.475470] Read of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249
[   34.476481] 
[   34.477385] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   34.478737] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.479319] Hardware name: linux,dummy-virt (DT)
[   34.479882] Call trace:
[   34.480289]  show_stack+0x20/0x38 (C)
[   34.480798]  dump_stack_lvl+0x8c/0xd0
[   34.481424]  print_report+0x118/0x5e0
[   34.481945]  kasan_report+0xc8/0x118
[   34.482544]  __asan_report_load8_noabort+0x20/0x30
[   34.483174]  kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8
[   34.483828]  kasan_bitops_generic+0x11c/0x1c8
[   34.484498]  kunit_try_run_case+0x14c/0x3d0
[   34.485146]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.485991]  kthread+0x24c/0x2d0
[   34.486565]  ret_from_fork+0x10/0x20
[   34.486845] 
[   34.487000] Allocated by task 249:
[   34.487322]  kasan_save_stack+0x3c/0x68
[   34.487917]  kasan_save_track+0x20/0x40
[   34.488441]  kasan_save_alloc_info+0x40/0x58
[   34.489087]  __kasan_kmalloc+0xd4/0xd8
[   34.489689]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.490333]  kasan_bitops_generic+0xa0/0x1c8
[   34.490823]  kunit_try_run_case+0x14c/0x3d0
[   34.491453]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.492194]  kthread+0x24c/0x2d0
[   34.492745]  ret_from_fork+0x10/0x20
[   34.493239] 
[   34.493574] The buggy address belongs to the object at fff00000c4005ea0
[   34.493574]  which belongs to the cache kmalloc-16 of size 16
[   34.494750] The buggy address is located 8 bytes inside of
[   34.494750]  allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9)
[   34.495834] 
[   34.496198] The buggy address belongs to the physical page:
[   34.496865] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005
[   34.497790] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.498513] page_type: f5(slab)
[   34.499049] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.499817] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.500698] page dumped because: kasan: bad access detected
[   34.501411] 
[   34.501751] Memory state around the buggy address:
[   34.502257]  fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   34.503444]  fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.504590] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.505389]                                   ^
[   34.505907]  fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.507130]  fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.507899] ==================================================================
[   34.366136] ==================================================================
[   34.366944] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8
[   34.367706] Read of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249
[   34.368525] 
[   34.368904] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   34.369927] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.370480] Hardware name: linux,dummy-virt (DT)
[   34.371101] Call trace:
[   34.371546]  show_stack+0x20/0x38 (C)
[   34.372149]  dump_stack_lvl+0x8c/0xd0
[   34.372698]  print_report+0x118/0x5e0
[   34.373207]  kasan_report+0xc8/0x118
[   34.373793]  __asan_report_load8_noabort+0x20/0x30
[   34.374449]  kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8
[   34.375276]  kasan_bitops_generic+0x11c/0x1c8
[   34.375919]  kunit_try_run_case+0x14c/0x3d0
[   34.376546]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.377290]  kthread+0x24c/0x2d0
[   34.377813]  ret_from_fork+0x10/0x20
[   34.378372] 
[   34.378708] Allocated by task 249:
[   34.379139]  kasan_save_stack+0x3c/0x68
[   34.379741]  kasan_save_track+0x20/0x40
[   34.380296]  kasan_save_alloc_info+0x40/0x58
[   34.380852]  __kasan_kmalloc+0xd4/0xd8
[   34.381446]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.381968]  kasan_bitops_generic+0xa0/0x1c8
[   34.382614]  kunit_try_run_case+0x14c/0x3d0
[   34.383229]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.383970]  kthread+0x24c/0x2d0
[   34.384528]  ret_from_fork+0x10/0x20
[   34.385041] 
[   34.385373] The buggy address belongs to the object at fff00000c4005ea0
[   34.385373]  which belongs to the cache kmalloc-16 of size 16
[   34.386614] The buggy address is located 8 bytes inside of
[   34.386614]  allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9)
[   34.387750] 
[   34.388109] The buggy address belongs to the physical page:
[   34.388669] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005
[   34.389561] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.390353] page_type: f5(slab)
[   34.390887] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.391605] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.392565] page dumped because: kasan: bad access detected
[   34.393396] 
[   34.393905] Memory state around the buggy address:
[   34.394485]  fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   34.395475]  fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.396432] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.397359]                                   ^
[   34.398106]  fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.399053]  fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.400006] ==================================================================
[   34.225640] ==================================================================
[   34.226414] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8
[   34.227737] Read of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249
[   34.228603] 
[   34.228977] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   34.230231] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.230579] Hardware name: linux,dummy-virt (DT)
[   34.230945] Call trace:
[   34.232211]  show_stack+0x20/0x38 (C)
[   34.233026]  dump_stack_lvl+0x8c/0xd0
[   34.233632]  print_report+0x118/0x5e0
[   34.234223]  kasan_report+0xc8/0x118
[   34.234799]  __asan_report_load8_noabort+0x20/0x30
[   34.235442]  kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8
[   34.236187]  kasan_bitops_generic+0x11c/0x1c8
[   34.236778]  kunit_try_run_case+0x14c/0x3d0
[   34.237368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.238105]  kthread+0x24c/0x2d0
[   34.238627]  ret_from_fork+0x10/0x20
[   34.239190] 
[   34.239513] Allocated by task 249:
[   34.239995]  kasan_save_stack+0x3c/0x68
[   34.240611]  kasan_save_track+0x20/0x40
[   34.241168]  kasan_save_alloc_info+0x40/0x58
[   34.241808]  __kasan_kmalloc+0xd4/0xd8
[   34.242405]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.243049]  kasan_bitops_generic+0xa0/0x1c8
[   34.243608]  kunit_try_run_case+0x14c/0x3d0
[   34.244234]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.244880]  kthread+0x24c/0x2d0
[   34.245444]  ret_from_fork+0x10/0x20
[   34.245897] 
[   34.246257] The buggy address belongs to the object at fff00000c4005ea0
[   34.246257]  which belongs to the cache kmalloc-16 of size 16
[   34.247260] The buggy address is located 8 bytes inside of
[   34.247260]  allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9)
[   34.248559] 
[   34.248911] The buggy address belongs to the physical page:
[   34.249466] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005
[   34.250390] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.251061] page_type: f5(slab)
[   34.251585] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.252427] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.253199] page dumped because: kasan: bad access detected
[   34.253878] 
[   34.254246] Memory state around the buggy address:
[   34.254822]  fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   34.255621]  fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.256363] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.257076]                                   ^
[   34.257681]  fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.258407]  fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.259198] ==================================================================
[   34.402042] ==================================================================
[   34.402927] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[   34.404368] Write of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249
[   34.406332] 
[   34.406679] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   34.407621] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.408749] Hardware name: linux,dummy-virt (DT)
[   34.409622] Call trace:
[   34.410183]  show_stack+0x20/0x38 (C)
[   34.410857]  dump_stack_lvl+0x8c/0xd0
[   34.411463]  print_report+0x118/0x5e0
[   34.412062]  kasan_report+0xc8/0x118
[   34.412667]  kasan_check_range+0x100/0x1a8
[   34.413253]  __kasan_check_write+0x20/0x30
[   34.413875]  kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[   34.414647]  kasan_bitops_generic+0x11c/0x1c8
[   34.415239]  kunit_try_run_case+0x14c/0x3d0
[   34.415796]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.416591]  kthread+0x24c/0x2d0
[   34.417162]  ret_from_fork+0x10/0x20
[   34.417836] 
[   34.418236] Allocated by task 249:
[   34.418865]  kasan_save_stack+0x3c/0x68
[   34.419535]  kasan_save_track+0x20/0x40
[   34.420179]  kasan_save_alloc_info+0x40/0x58
[   34.420844]  __kasan_kmalloc+0xd4/0xd8
[   34.421351]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.421712]  kasan_bitops_generic+0xa0/0x1c8
[   34.421980]  kunit_try_run_case+0x14c/0x3d0
[   34.422398]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.423194]  kthread+0x24c/0x2d0
[   34.423806]  ret_from_fork+0x10/0x20
[   34.424432] 
[   34.424809] The buggy address belongs to the object at fff00000c4005ea0
[   34.424809]  which belongs to the cache kmalloc-16 of size 16
[   34.426036] The buggy address is located 8 bytes inside of
[   34.426036]  allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9)
[   34.427274] 
[   34.427607] The buggy address belongs to the physical page:
[   34.428244] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005
[   34.429087] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.429780] page_type: f5(slab)
[   34.430224] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.431162] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.432060] page dumped because: kasan: bad access detected
[   34.432763] 
[   34.433077] Memory state around the buggy address:
[   34.433572]  fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   34.434423]  fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.435161] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.435907]                                   ^
[   34.436563]  fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.437381]  fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.438227] ==================================================================
[   34.439640] ==================================================================
[   34.440385] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8
[   34.441284] Read of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249
[   34.442165] 
[   34.442556] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   34.443615] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.444095] Hardware name: linux,dummy-virt (DT)
[   34.444723] Call trace:
[   34.445166]  show_stack+0x20/0x38 (C)
[   34.445755]  dump_stack_lvl+0x8c/0xd0
[   34.446301]  print_report+0x118/0x5e0
[   34.446878]  kasan_report+0xc8/0x118
[   34.447390]  __asan_report_load8_noabort+0x20/0x30
[   34.448059]  kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8
[   34.448880]  kasan_bitops_generic+0x11c/0x1c8
[   34.449413]  kunit_try_run_case+0x14c/0x3d0
[   34.450062]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.450831]  kthread+0x24c/0x2d0
[   34.451344]  ret_from_fork+0x10/0x20
[   34.451935] 
[   34.452311] Allocated by task 249:
[   34.452723]  kasan_save_stack+0x3c/0x68
[   34.453326]  kasan_save_track+0x20/0x40
[   34.453826]  kasan_save_alloc_info+0x40/0x58
[   34.454468]  __kasan_kmalloc+0xd4/0xd8
[   34.454983]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.455660]  kasan_bitops_generic+0xa0/0x1c8
[   34.456294]  kunit_try_run_case+0x14c/0x3d0
[   34.456837]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.457549]  kthread+0x24c/0x2d0
[   34.458106]  ret_from_fork+0x10/0x20
[   34.458675] 
[   34.459005] The buggy address belongs to the object at fff00000c4005ea0
[   34.459005]  which belongs to the cache kmalloc-16 of size 16
[   34.460270] The buggy address is located 8 bytes inside of
[   34.460270]  allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9)
[   34.461245] 
[   34.461594] The buggy address belongs to the physical page:
[   34.462293] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005
[   34.463196] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.463974] page_type: f5(slab)
[   34.464517] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.465336] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.466181] page dumped because: kasan: bad access detected
[   34.466715] 
[   34.467066] Memory state around the buggy address:
[   34.467697]  fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   34.468434]  fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.469239] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.469891]                                   ^
[   34.470524]  fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.471282]  fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.471999] ==================================================================
[   34.330381] ==================================================================
[   34.331108] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[   34.332482] Write of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249
[   34.333344] 
[   34.333726] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   34.334812] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.335291] Hardware name: linux,dummy-virt (DT)
[   34.335905] Call trace:
[   34.336327]  show_stack+0x20/0x38 (C)
[   34.336882]  dump_stack_lvl+0x8c/0xd0
[   34.337509]  print_report+0x118/0x5e0
[   34.338129]  kasan_report+0xc8/0x118
[   34.338725]  kasan_check_range+0x100/0x1a8
[   34.339340]  __kasan_check_write+0x20/0x30
[   34.339973]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[   34.340733]  kasan_bitops_generic+0x11c/0x1c8
[   34.341316]  kunit_try_run_case+0x14c/0x3d0
[   34.341966]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.342657]  kthread+0x24c/0x2d0
[   34.343212]  ret_from_fork+0x10/0x20
[   34.343706] 
[   34.344061] Allocated by task 249:
[   34.344608]  kasan_save_stack+0x3c/0x68
[   34.345155]  kasan_save_track+0x20/0x40
[   34.345721]  kasan_save_alloc_info+0x40/0x58
[   34.346299]  __kasan_kmalloc+0xd4/0xd8
[   34.346854]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.347519]  kasan_bitops_generic+0xa0/0x1c8
[   34.348155]  kunit_try_run_case+0x14c/0x3d0
[   34.348729]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.349347]  kthread+0x24c/0x2d0
[   34.349888]  ret_from_fork+0x10/0x20
[   34.350461] 
[   34.350793] The buggy address belongs to the object at fff00000c4005ea0
[   34.350793]  which belongs to the cache kmalloc-16 of size 16
[   34.351928] The buggy address is located 8 bytes inside of
[   34.351928]  allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9)
[   34.353194] 
[   34.353535] The buggy address belongs to the physical page:
[   34.354141] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005
[   34.355014] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.355660] page_type: f5(slab)
[   34.356216] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.357108] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.358006] page dumped because: kasan: bad access detected
[   34.358650] 
[   34.358999] Memory state around the buggy address:
[   34.359627]  fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   34.360434]  fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.361213] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.361980]                                   ^
[   34.362620]  fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.363314]  fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.364168] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[   33.995981] ==================================================================
[   33.996747] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc8
[   33.997608] Write of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249
[   33.998463] 
[   33.998856] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   33.999975] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.000537] Hardware name: linux,dummy-virt (DT)
[   34.001157] Call trace:
[   34.001616]  show_stack+0x20/0x38 (C)
[   34.002272]  dump_stack_lvl+0x8c/0xd0
[   34.002835]  print_report+0x118/0x5e0
[   34.003342]  kasan_report+0xc8/0x118
[   34.003826]  kasan_check_range+0x100/0x1a8
[   34.004390]  __kasan_check_write+0x20/0x30
[   34.004930]  kasan_bitops_modify.constprop.0+0x320/0xbc8
[   34.005759]  kasan_bitops_generic+0x110/0x1c8
[   34.006470]  kunit_try_run_case+0x14c/0x3d0
[   34.007173]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.007927]  kthread+0x24c/0x2d0
[   34.008544]  ret_from_fork+0x10/0x20
[   34.009106] 
[   34.009502] Allocated by task 249:
[   34.010008]  kasan_save_stack+0x3c/0x68
[   34.010641]  kasan_save_track+0x20/0x40
[   34.011174]  kasan_save_alloc_info+0x40/0x58
[   34.011837]  __kasan_kmalloc+0xd4/0xd8
[   34.012482]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.013331]  kasan_bitops_generic+0xa0/0x1c8
[   34.014071]  kunit_try_run_case+0x14c/0x3d0
[   34.014687]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.015581]  kthread+0x24c/0x2d0
[   34.016267]  ret_from_fork+0x10/0x20
[   34.016809] 
[   34.017467] The buggy address belongs to the object at fff00000c4005ea0
[   34.017467]  which belongs to the cache kmalloc-16 of size 16
[   34.018573] The buggy address is located 8 bytes inside of
[   34.018573]  allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9)
[   34.019474] 
[   34.019834] The buggy address belongs to the physical page:
[   34.020548] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005
[   34.021551] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.022340] page_type: f5(slab)
[   34.022915] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.023781] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.024643] page dumped because: kasan: bad access detected
[   34.025324] 
[   34.025659] Memory state around the buggy address:
[   34.026329]  fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   34.027133]  fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.027989] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.028780]                                   ^
[   34.029357]  fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.030197]  fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.030989] ==================================================================
[   33.804395] ==================================================================
[   33.805618] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8
[   33.806587] Write of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249
[   33.807490] 
[   33.807830] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   33.808718] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.809330] Hardware name: linux,dummy-virt (DT)
[   33.810082] Call trace:
[   33.810661]  show_stack+0x20/0x38 (C)
[   33.811354]  dump_stack_lvl+0x8c/0xd0
[   33.812052]  print_report+0x118/0x5e0
[   33.812755]  kasan_report+0xc8/0x118
[   33.813413]  kasan_check_range+0x100/0x1a8
[   33.814092]  __kasan_check_write+0x20/0x30
[   33.814789]  kasan_bitops_modify.constprop.0+0x100/0xbc8
[   33.815546]  kasan_bitops_generic+0x110/0x1c8
[   33.816248]  kunit_try_run_case+0x14c/0x3d0
[   33.816940]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.817746]  kthread+0x24c/0x2d0
[   33.818263]  ret_from_fork+0x10/0x20
[   33.818830] 
[   33.819228] Allocated by task 249:
[   33.819779]  kasan_save_stack+0x3c/0x68
[   33.820422]  kasan_save_track+0x20/0x40
[   33.820981]  kasan_save_alloc_info+0x40/0x58
[   33.821606]  __kasan_kmalloc+0xd4/0xd8
[   33.822158]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.822841]  kasan_bitops_generic+0xa0/0x1c8
[   33.823453]  kunit_try_run_case+0x14c/0x3d0
[   33.824100]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.824840]  kthread+0x24c/0x2d0
[   33.825420]  ret_from_fork+0x10/0x20
[   33.826015] 
[   33.826360] The buggy address belongs to the object at fff00000c4005ea0
[   33.826360]  which belongs to the cache kmalloc-16 of size 16
[   33.827649] The buggy address is located 8 bytes inside of
[   33.827649]  allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9)
[   33.828867] 
[   33.829353] The buggy address belongs to the physical page:
[   33.830303] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005
[   33.831361] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.832320] page_type: f5(slab)
[   33.833003] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.834017] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   33.834973] page dumped because: kasan: bad access detected
[   33.835550] 
[   33.835785] Memory state around the buggy address:
[   33.836302]  fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   33.837008]  fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.837782] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   33.838703]                                   ^
[   33.839385]  fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.840269]  fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.840963] ==================================================================
[   33.842915] ==================================================================
[   33.843897] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[   33.844528] Read of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249
[   33.845210] 
[   33.846848] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   33.848078] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.848787] Hardware name: linux,dummy-virt (DT)
[   33.849543] Call trace:
[   33.850123]  show_stack+0x20/0x38 (C)
[   33.850821]  dump_stack_lvl+0x8c/0xd0
[   33.851546]  print_report+0x118/0x5e0
[   33.852264]  kasan_report+0xc8/0x118
[   33.852819]  __asan_report_load8_noabort+0x20/0x30
[   33.853720]  kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[   33.854564]  kasan_bitops_generic+0x110/0x1c8
[   33.855334]  kunit_try_run_case+0x14c/0x3d0
[   33.855936]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.856590]  kthread+0x24c/0x2d0
[   33.857058]  ret_from_fork+0x10/0x20
[   33.858007] 
[   33.858467] Allocated by task 249:
[   33.858935]  kasan_save_stack+0x3c/0x68
[   33.859443]  kasan_save_track+0x20/0x40
[   33.859945]  kasan_save_alloc_info+0x40/0x58
[   33.860510]  __kasan_kmalloc+0xd4/0xd8
[   33.861015]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.861619]  kasan_bitops_generic+0xa0/0x1c8
[   33.862536]  kunit_try_run_case+0x14c/0x3d0
[   33.863166]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.863815]  kthread+0x24c/0x2d0
[   33.864326]  ret_from_fork+0x10/0x20
[   33.864822] 
[   33.865199] The buggy address belongs to the object at fff00000c4005ea0
[   33.865199]  which belongs to the cache kmalloc-16 of size 16
[   33.866346] The buggy address is located 8 bytes inside of
[   33.866346]  allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9)
[   33.867488] 
[   33.867839] The buggy address belongs to the physical page:
[   33.868485] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005
[   33.869324] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.870089] page_type: f5(slab)
[   33.870648] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.871561] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   33.872436] page dumped because: kasan: bad access detected
[   33.873015] 
[   33.873377] Memory state around the buggy address:
[   33.873986]  fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   33.874767]  fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.875460] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   33.876304]                                   ^
[   33.876867]  fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.877601]  fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.878396] ==================================================================
[   33.882576] ==================================================================
[   33.883324] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[   33.884079] Write of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249
[   33.885024] 
[   33.885414] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   33.886441] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.886951] Hardware name: linux,dummy-virt (DT)
[   33.887570] Call trace:
[   33.888101]  show_stack+0x20/0x38 (C)
[   33.888722]  dump_stack_lvl+0x8c/0xd0
[   33.889316]  print_report+0x118/0x5e0
[   33.889948]  kasan_report+0xc8/0x118
[   33.890526]  kasan_check_range+0x100/0x1a8
[   33.891191]  __kasan_check_write+0x20/0x30
[   33.891821]  kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[   33.892537]  kasan_bitops_generic+0x110/0x1c8
[   33.893154]  kunit_try_run_case+0x14c/0x3d0
[   33.893757]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.894493]  kthread+0x24c/0x2d0
[   33.895070]  ret_from_fork+0x10/0x20
[   33.895650] 
[   33.896035] Allocated by task 249:
[   33.896559]  kasan_save_stack+0x3c/0x68
[   33.897208]  kasan_save_track+0x20/0x40
[   33.897778]  kasan_save_alloc_info+0x40/0x58
[   33.898457]  __kasan_kmalloc+0xd4/0xd8
[   33.899012]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.899701]  kasan_bitops_generic+0xa0/0x1c8
[   33.900251]  kunit_try_run_case+0x14c/0x3d0
[   33.900918]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.901610]  kthread+0x24c/0x2d0
[   33.902185]  ret_from_fork+0x10/0x20
[   33.902769] 
[   33.903136] The buggy address belongs to the object at fff00000c4005ea0
[   33.903136]  which belongs to the cache kmalloc-16 of size 16
[   33.904389] The buggy address is located 8 bytes inside of
[   33.904389]  allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9)
[   33.905604] 
[   33.906013] The buggy address belongs to the physical page:
[   33.906604] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005
[   33.907601] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.908353] page_type: f5(slab)
[   33.908903] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.909779] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   33.910622] page dumped because: kasan: bad access detected
[   33.911304] 
[   33.911640] Memory state around the buggy address:
[   33.912327]  fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   33.913066]  fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.913920] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   33.914739]                                   ^
[   33.915484]  fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.916221]  fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.917067] ==================================================================
[   34.032728] ==================================================================
[   34.033418] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[   34.034401] Read of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249
[   34.035258] 
[   34.035622] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   34.036788] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.037344] Hardware name: linux,dummy-virt (DT)
[   34.037960] Call trace:
[   34.038449]  show_stack+0x20/0x38 (C)
[   34.039008]  dump_stack_lvl+0x8c/0xd0
[   34.039665]  print_report+0x118/0x5e0
[   34.040214]  kasan_report+0xc8/0x118
[   34.040848]  __asan_report_load8_noabort+0x20/0x30
[   34.041599]  kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[   34.042346]  kasan_bitops_generic+0x110/0x1c8
[   34.043004]  kunit_try_run_case+0x14c/0x3d0
[   34.043637]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.044404]  kthread+0x24c/0x2d0
[   34.044953]  ret_from_fork+0x10/0x20
[   34.045522] 
[   34.045910] Allocated by task 249:
[   34.046451]  kasan_save_stack+0x3c/0x68
[   34.047084]  kasan_save_track+0x20/0x40
[   34.047684]  kasan_save_alloc_info+0x40/0x58
[   34.048448]  __kasan_kmalloc+0xd4/0xd8
[   34.049204]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.049944]  kasan_bitops_generic+0xa0/0x1c8
[   34.050656]  kunit_try_run_case+0x14c/0x3d0
[   34.051377]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.052050]  kthread+0x24c/0x2d0
[   34.052546]  ret_from_fork+0x10/0x20
[   34.053025] 
[   34.053614] The buggy address belongs to the object at fff00000c4005ea0
[   34.053614]  which belongs to the cache kmalloc-16 of size 16
[   34.054685] The buggy address is located 8 bytes inside of
[   34.054685]  allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9)
[   34.055678] 
[   34.056028] The buggy address belongs to the physical page:
[   34.056712] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005
[   34.057605] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.058360] page_type: f5(slab)
[   34.058901] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.059755] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.060546] page dumped because: kasan: bad access detected
[   34.061255] 
[   34.061549] Memory state around the buggy address:
[   34.062164]  fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   34.062992]  fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.063771] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.064500]                                   ^
[   34.065069]  fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.065817]  fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.066540] ==================================================================
[   34.068292] ==================================================================
[   34.069181] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc8
[   34.070242] Write of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249
[   34.071142] 
[   34.071642] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   34.072887] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.073748] Hardware name: linux,dummy-virt (DT)
[   34.074372] Call trace:
[   34.074824]  show_stack+0x20/0x38 (C)
[   34.075529]  dump_stack_lvl+0x8c/0xd0
[   34.076576]  print_report+0x118/0x5e0
[   34.077273]  kasan_report+0xc8/0x118
[   34.077982]  kasan_check_range+0x100/0x1a8
[   34.078717]  __kasan_check_write+0x20/0x30
[   34.079289]  kasan_bitops_modify.constprop.0+0x344/0xbc8
[   34.079962]  kasan_bitops_generic+0x110/0x1c8
[   34.080563]  kunit_try_run_case+0x14c/0x3d0
[   34.081649]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.082272]  kthread+0x24c/0x2d0
[   34.082972]  ret_from_fork+0x10/0x20
[   34.083699] 
[   34.084180] Allocated by task 249:
[   34.084808]  kasan_save_stack+0x3c/0x68
[   34.085545]  kasan_save_track+0x20/0x40
[   34.086261]  kasan_save_alloc_info+0x40/0x58
[   34.086985]  __kasan_kmalloc+0xd4/0xd8
[   34.087669]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.088431]  kasan_bitops_generic+0xa0/0x1c8
[   34.089197]  kunit_try_run_case+0x14c/0x3d0
[   34.089900]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.090558]  kthread+0x24c/0x2d0
[   34.091012]  ret_from_fork+0x10/0x20
[   34.091504] 
[   34.091814] The buggy address belongs to the object at fff00000c4005ea0
[   34.091814]  which belongs to the cache kmalloc-16 of size 16
[   34.093374] The buggy address is located 8 bytes inside of
[   34.093374]  allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9)
[   34.094847] 
[   34.095360] The buggy address belongs to the physical page:
[   34.096100] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005
[   34.097150] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.098044] page_type: f5(slab)
[   34.098731] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.099749] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.100728] page dumped because: kasan: bad access detected
[   34.101549] 
[   34.101867] Memory state around the buggy address:
[   34.102447]  fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   34.103546]  fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.104447] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.105234]                                   ^
[   34.105855]  fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.106632]  fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.107343] ==================================================================
[   34.146822] ==================================================================
[   34.147576] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8
[   34.149151] Read of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249
[   34.149928] 
[   34.150286] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   34.151511] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.152159] Hardware name: linux,dummy-virt (DT)
[   34.152898] Call trace:
[   34.153471]  show_stack+0x20/0x38 (C)
[   34.154193]  dump_stack_lvl+0x8c/0xd0
[   34.154893]  print_report+0x118/0x5e0
[   34.155575]  kasan_report+0xc8/0x118
[   34.156085]  __asan_report_load8_noabort+0x20/0x30
[   34.156735]  kasan_bitops_modify.constprop.0+0xa28/0xbc8
[   34.157405]  kasan_bitops_generic+0x110/0x1c8
[   34.157972]  kunit_try_run_case+0x14c/0x3d0
[   34.159220]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.160049]  kthread+0x24c/0x2d0
[   34.160729]  ret_from_fork+0x10/0x20
[   34.161446] 
[   34.161911] Allocated by task 249:
[   34.162383]  kasan_save_stack+0x3c/0x68
[   34.163172]  kasan_save_track+0x20/0x40
[   34.163881]  kasan_save_alloc_info+0x40/0x58
[   34.164645]  __kasan_kmalloc+0xd4/0xd8
[   34.165345]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.166073]  kasan_bitops_generic+0xa0/0x1c8
[   34.166814]  kunit_try_run_case+0x14c/0x3d0
[   34.167607]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.168463]  kthread+0x24c/0x2d0
[   34.168922]  ret_from_fork+0x10/0x20
[   34.169688] 
[   34.170190] The buggy address belongs to the object at fff00000c4005ea0
[   34.170190]  which belongs to the cache kmalloc-16 of size 16
[   34.171450] The buggy address is located 8 bytes inside of
[   34.171450]  allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9)
[   34.172620] 
[   34.172934] The buggy address belongs to the physical page:
[   34.174013] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005
[   34.175035] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.175942] page_type: f5(slab)
[   34.176623] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.177602] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.178587] page dumped because: kasan: bad access detected
[   34.179391] 
[   34.179877] Memory state around the buggy address:
[   34.180416]  fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   34.181454]  fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.182363] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.183313]                                   ^
[   34.184048]  fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.184826]  fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.185795] ==================================================================
[   34.108706] ==================================================================
[   34.109650] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[   34.111211] Write of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249
[   34.112163] 
[   34.112575] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   34.113755] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.114463] Hardware name: linux,dummy-virt (DT)
[   34.115054] Call trace:
[   34.115425]  show_stack+0x20/0x38 (C)
[   34.116017]  dump_stack_lvl+0x8c/0xd0
[   34.116697]  print_report+0x118/0x5e0
[   34.117349]  kasan_report+0xc8/0x118
[   34.117939]  kasan_check_range+0x100/0x1a8
[   34.118566]  __kasan_check_write+0x20/0x30
[   34.119249]  kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[   34.119972]  kasan_bitops_generic+0x110/0x1c8
[   34.120610]  kunit_try_run_case+0x14c/0x3d0
[   34.121296]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.122029]  kthread+0x24c/0x2d0
[   34.122607]  ret_from_fork+0x10/0x20
[   34.123198] 
[   34.123537] Allocated by task 249:
[   34.124108]  kasan_save_stack+0x3c/0x68
[   34.124735]  kasan_save_track+0x20/0x40
[   34.125266]  kasan_save_alloc_info+0x40/0x58
[   34.125930]  __kasan_kmalloc+0xd4/0xd8
[   34.126546]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.127251]  kasan_bitops_generic+0xa0/0x1c8
[   34.127849]  kunit_try_run_case+0x14c/0x3d0
[   34.128521]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.129175]  kthread+0x24c/0x2d0
[   34.129748]  ret_from_fork+0x10/0x20
[   34.130315] 
[   34.130701] The buggy address belongs to the object at fff00000c4005ea0
[   34.130701]  which belongs to the cache kmalloc-16 of size 16
[   34.131892] The buggy address is located 8 bytes inside of
[   34.131892]  allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9)
[   34.133109] 
[   34.133477] The buggy address belongs to the physical page:
[   34.134057] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005
[   34.135040] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.135797] page_type: f5(slab)
[   34.136342] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.137238] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   34.138065] page dumped because: kasan: bad access detected
[   34.138722] 
[   34.139064] Memory state around the buggy address:
[   34.139750]  fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   34.140537]  fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.141408] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   34.142227]                                   ^
[   34.142815]  fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.143679]  fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.144677] ==================================================================
[   33.919537] ==================================================================
[   33.920528] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8
[   33.921446] Read of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249
[   33.922739] 
[   33.923189] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   33.924427] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.924974] Hardware name: linux,dummy-virt (DT)
[   33.925556] Call trace:
[   33.925986]  show_stack+0x20/0x38 (C)
[   33.926619]  dump_stack_lvl+0x8c/0xd0
[   33.927232]  print_report+0x118/0x5e0
[   33.927812]  kasan_report+0xc8/0x118
[   33.928417]  __asan_report_load8_noabort+0x20/0x30
[   33.929140]  kasan_bitops_modify.constprop.0+0xa88/0xbc8
[   33.929856]  kasan_bitops_generic+0x110/0x1c8
[   33.930528]  kunit_try_run_case+0x14c/0x3d0
[   33.931167]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.931914]  kthread+0x24c/0x2d0
[   33.932490]  ret_from_fork+0x10/0x20
[   33.933073] 
[   33.933428] Allocated by task 249:
[   33.933991]  kasan_save_stack+0x3c/0x68
[   33.934513]  kasan_save_track+0x20/0x40
[   33.935156]  kasan_save_alloc_info+0x40/0x58
[   33.935788]  __kasan_kmalloc+0xd4/0xd8
[   33.936397]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.937047]  kasan_bitops_generic+0xa0/0x1c8
[   33.937656]  kunit_try_run_case+0x14c/0x3d0
[   33.938304]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.939022]  kthread+0x24c/0x2d0
[   33.939527]  ret_from_fork+0x10/0x20
[   33.940066] 
[   33.940468] The buggy address belongs to the object at fff00000c4005ea0
[   33.940468]  which belongs to the cache kmalloc-16 of size 16
[   33.941672] The buggy address is located 8 bytes inside of
[   33.941672]  allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9)
[   33.942909] 
[   33.943287] The buggy address belongs to the physical page:
[   33.943965] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005
[   33.944933] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.945718] page_type: f5(slab)
[   33.946226] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.947100] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   33.947905] page dumped because: kasan: bad access detected
[   33.948568] 
[   33.948952] Memory state around the buggy address:
[   33.949575]  fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   33.950442]  fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.951275] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   33.952065]                                   ^
[   33.952667]  fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.953513]  fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.954309] ==================================================================
[   33.957312] ==================================================================
[   33.958039] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[   33.959420] Write of size 8 at addr fff00000c4005ea8 by task kunit_try_catch/249
[   33.960069] 
[   33.960507] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   33.961957] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.962681] Hardware name: linux,dummy-virt (DT)
[   33.963422] Call trace:
[   33.963801]  show_stack+0x20/0x38 (C)
[   33.964384]  dump_stack_lvl+0x8c/0xd0
[   33.964937]  print_report+0x118/0x5e0
[   33.965848]  kasan_report+0xc8/0x118
[   33.966553]  kasan_check_range+0x100/0x1a8
[   33.967310]  __kasan_check_write+0x20/0x30
[   33.968050]  kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[   33.968892]  kasan_bitops_generic+0x110/0x1c8
[   33.969629]  kunit_try_run_case+0x14c/0x3d0
[   33.970387]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.971238]  kthread+0x24c/0x2d0
[   33.971914]  ret_from_fork+0x10/0x20
[   33.972589] 
[   33.972928] Allocated by task 249:
[   33.973412]  kasan_save_stack+0x3c/0x68
[   33.973919]  kasan_save_track+0x20/0x40
[   33.975040]  kasan_save_alloc_info+0x40/0x58
[   33.975598]  __kasan_kmalloc+0xd4/0xd8
[   33.976188]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.976788]  kasan_bitops_generic+0xa0/0x1c8
[   33.977418]  kunit_try_run_case+0x14c/0x3d0
[   33.977988]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.978622]  kthread+0x24c/0x2d0
[   33.979153]  ret_from_fork+0x10/0x20
[   33.979612] 
[   33.979967] The buggy address belongs to the object at fff00000c4005ea0
[   33.979967]  which belongs to the cache kmalloc-16 of size 16
[   33.981189] The buggy address is located 8 bytes inside of
[   33.981189]  allocated 9-byte region [fff00000c4005ea0, fff00000c4005ea9)
[   33.982385] 
[   33.982779] The buggy address belongs to the physical page:
[   33.983474] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005
[   33.984419] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.985093] page_type: f5(slab)
[   33.985646] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.986620] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   33.987489] page dumped because: kasan: bad access detected
[   33.988184] 
[   33.988567] Memory state around the buggy address:
[   33.989094]  fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   33.990002]  fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.990784] >fff00000c4005e80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   33.991592]                                   ^
[   33.992215]  fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.993039]  fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.993835] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen
[   33.749770] ==================================================================
[   33.750506] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88
[   33.751314] Read of size 1 at addr fff00000c4081c10 by task kunit_try_catch/247
[   33.751677] 
[   33.751847] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   33.752895] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.754619] Hardware name: linux,dummy-virt (DT)
[   33.755373] Call trace:
[   33.755865]  show_stack+0x20/0x38 (C)
[   33.756550]  dump_stack_lvl+0x8c/0xd0
[   33.757335]  print_report+0x118/0x5e0
[   33.757940]  kasan_report+0xc8/0x118
[   33.758511]  __asan_report_load1_noabort+0x20/0x30
[   33.759225]  strnlen+0x80/0x88
[   33.759777]  kasan_strings+0x380/0x8f8
[   33.760419]  kunit_try_run_case+0x14c/0x3d0
[   33.761157]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.762051]  kthread+0x24c/0x2d0
[   33.762624]  ret_from_fork+0x10/0x20
[   33.763232] 
[   33.763618] Allocated by task 247:
[   33.764083]  kasan_save_stack+0x3c/0x68
[   33.764733]  kasan_save_track+0x20/0x40
[   33.765524]  kasan_save_alloc_info+0x40/0x58
[   33.766165]  __kasan_kmalloc+0xd4/0xd8
[   33.766734]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.767395]  kasan_strings+0xb4/0x8f8
[   33.767958]  kunit_try_run_case+0x14c/0x3d0
[   33.768600]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.769629]  kthread+0x24c/0x2d0
[   33.770046]  ret_from_fork+0x10/0x20
[   33.770486] 
[   33.770722] Freed by task 247:
[   33.771079]  kasan_save_stack+0x3c/0x68
[   33.771676]  kasan_save_track+0x20/0x40
[   33.772491]  kasan_save_free_info+0x4c/0x78
[   33.773690]  __kasan_slab_free+0x6c/0x98
[   33.774405]  kfree+0x114/0x3c8
[   33.774919]  kasan_strings+0x128/0x8f8
[   33.775512]  kunit_try_run_case+0x14c/0x3d0
[   33.776221]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.776936]  kthread+0x24c/0x2d0
[   33.777721]  ret_from_fork+0x10/0x20
[   33.778212] 
[   33.778565] The buggy address belongs to the object at fff00000c4081c00
[   33.778565]  which belongs to the cache kmalloc-32 of size 32
[   33.779796] The buggy address is located 16 bytes inside of
[   33.779796]  freed 32-byte region [fff00000c4081c00, fff00000c4081c20)
[   33.781320] 
[   33.781663] The buggy address belongs to the physical page:
[   33.782417] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104081
[   33.783303] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.784036] page_type: f5(slab)
[   33.784579] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   33.785740] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   33.786598] page dumped because: kasan: bad access detected
[   33.787240] 
[   33.787654] Memory state around the buggy address:
[   33.788266]  fff00000c4081b00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   33.789263]  fff00000c4081b80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   33.789975] >fff00000c4081c00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.790831]                          ^
[   33.791383]  fff00000c4081c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.792386]  fff00000c4081d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.793338] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen
[   33.703072] ==================================================================
[   33.703800] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   33.704556] Read of size 1 at addr fff00000c4081c10 by task kunit_try_catch/247
[   33.705717] 
[   33.706060] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   33.707072] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.707667] Hardware name: linux,dummy-virt (DT)
[   33.708294] Call trace:
[   33.708707]  show_stack+0x20/0x38 (C)
[   33.709588]  dump_stack_lvl+0x8c/0xd0
[   33.710223]  print_report+0x118/0x5e0
[   33.710818]  kasan_report+0xc8/0x118
[   33.711423]  __asan_report_load1_noabort+0x20/0x30
[   33.712088]  strlen+0xa8/0xb0
[   33.712653]  kasan_strings+0x320/0x8f8
[   33.713473]  kunit_try_run_case+0x14c/0x3d0
[   33.714029]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.714835]  kthread+0x24c/0x2d0
[   33.715385]  ret_from_fork+0x10/0x20
[   33.715890] 
[   33.716214] Allocated by task 247:
[   33.716686]  kasan_save_stack+0x3c/0x68
[   33.717845]  kasan_save_track+0x20/0x40
[   33.718506]  kasan_save_alloc_info+0x40/0x58
[   33.719212]  __kasan_kmalloc+0xd4/0xd8
[   33.719688]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.720302]  kasan_strings+0xb4/0x8f8
[   33.720778]  kunit_try_run_case+0x14c/0x3d0
[   33.721291]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.721976]  kthread+0x24c/0x2d0
[   33.723622]  ret_from_fork+0x10/0x20
[   33.724251] 
[   33.724638] Freed by task 247:
[   33.725543]  kasan_save_stack+0x3c/0x68
[   33.726206]  kasan_save_track+0x20/0x40
[   33.726844]  kasan_save_free_info+0x4c/0x78
[   33.727464]  __kasan_slab_free+0x6c/0x98
[   33.728108]  kfree+0x114/0x3c8
[   33.728682]  kasan_strings+0x128/0x8f8
[   33.729697]  kunit_try_run_case+0x14c/0x3d0
[   33.730247]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.731058]  kthread+0x24c/0x2d0
[   33.731581]  ret_from_fork+0x10/0x20
[   33.732289] 
[   33.732736] The buggy address belongs to the object at fff00000c4081c00
[   33.732736]  which belongs to the cache kmalloc-32 of size 32
[   33.734170] The buggy address is located 16 bytes inside of
[   33.734170]  freed 32-byte region [fff00000c4081c00, fff00000c4081c20)
[   33.735420] 
[   33.735845] The buggy address belongs to the physical page:
[   33.736585] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104081
[   33.737779] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.738491] page_type: f5(slab)
[   33.738918] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   33.739677] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   33.740640] page dumped because: kasan: bad access detected
[   33.741646] 
[   33.741998] Memory state around the buggy address:
[   33.743085]  fff00000c4081b00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   33.744236]  fff00000c4081b80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   33.745334] >fff00000c4081c00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.746141]                          ^
[   33.746685]  fff00000c4081c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.747482]  fff00000c4081d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.748391] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[   33.658537] ==================================================================
[   33.659315] BUG: KASAN: slab-use-after-free in kasan_strings+0x858/0x8f8
[   33.660088] Read of size 1 at addr fff00000c4081c10 by task kunit_try_catch/247
[   33.660857] 
[   33.661398] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   33.662425] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.662923] Hardware name: linux,dummy-virt (DT)
[   33.663575] Call trace:
[   33.663930]  show_stack+0x20/0x38 (C)
[   33.664601]  dump_stack_lvl+0x8c/0xd0
[   33.665504]  print_report+0x118/0x5e0
[   33.666105]  kasan_report+0xc8/0x118
[   33.666666]  __asan_report_load1_noabort+0x20/0x30
[   33.667413]  kasan_strings+0x858/0x8f8
[   33.668043]  kunit_try_run_case+0x14c/0x3d0
[   33.668718]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.669710]  kthread+0x24c/0x2d0
[   33.670299]  ret_from_fork+0x10/0x20
[   33.670908] 
[   33.671252] Allocated by task 247:
[   33.671810]  kasan_save_stack+0x3c/0x68
[   33.672416]  kasan_save_track+0x20/0x40
[   33.673278]  kasan_save_alloc_info+0x40/0x58
[   33.673854]  __kasan_kmalloc+0xd4/0xd8
[   33.674444]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.675068]  kasan_strings+0xb4/0x8f8
[   33.675673]  kunit_try_run_case+0x14c/0x3d0
[   33.676265]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.677831]  kthread+0x24c/0x2d0
[   33.678204]  ret_from_fork+0x10/0x20
[   33.678926] 
[   33.679296] Freed by task 247:
[   33.679723]  kasan_save_stack+0x3c/0x68
[   33.680363]  kasan_save_track+0x20/0x40
[   33.680964]  kasan_save_free_info+0x4c/0x78
[   33.681538]  __kasan_slab_free+0x6c/0x98
[   33.682098]  kfree+0x114/0x3c8
[   33.682840]  kasan_strings+0x128/0x8f8
[   33.683459]  kunit_try_run_case+0x14c/0x3d0
[   33.684133]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.684802]  kthread+0x24c/0x2d0
[   33.685530]  ret_from_fork+0x10/0x20
[   33.686099] 
[   33.686496] The buggy address belongs to the object at fff00000c4081c00
[   33.686496]  which belongs to the cache kmalloc-32 of size 32
[   33.687724] The buggy address is located 16 bytes inside of
[   33.687724]  freed 32-byte region [fff00000c4081c00, fff00000c4081c20)
[   33.689234] 
[   33.689589] The buggy address belongs to the physical page:
[   33.690216] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104081
[   33.691175] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.691954] page_type: f5(slab)
[   33.692441] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   33.693404] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   33.694417] page dumped because: kasan: bad access detected
[   33.695065] 
[   33.695448] Memory state around the buggy address:
[   33.696046]  fff00000c4081b00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   33.697159]  fff00000c4081b80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   33.697967] >fff00000c4081c00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.699392]                          ^
[   33.699949]  fff00000c4081c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.700693]  fff00000c4081d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.701497] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
[   33.611457] ==================================================================
[   33.612751] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   33.613678] Read of size 1 at addr fff00000c4081c10 by task kunit_try_catch/247
[   33.615461] 
[   33.615837] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   33.617432] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.617951] Hardware name: linux,dummy-virt (DT)
[   33.618592] Call trace:
[   33.619009]  show_stack+0x20/0x38 (C)
[   33.619609]  dump_stack_lvl+0x8c/0xd0
[   33.620260]  print_report+0x118/0x5e0
[   33.620861]  kasan_report+0xc8/0x118
[   33.621723]  __asan_report_load1_noabort+0x20/0x30
[   33.622239]  strcmp+0xc0/0xc8
[   33.622829]  kasan_strings+0x248/0x8f8
[   33.623403]  kunit_try_run_case+0x14c/0x3d0
[   33.624099]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.624853]  kthread+0x24c/0x2d0
[   33.625459]  ret_from_fork+0x10/0x20
[   33.626241] 
[   33.626630] Allocated by task 247:
[   33.627159]  kasan_save_stack+0x3c/0x68
[   33.627809]  kasan_save_track+0x20/0x40
[   33.628458]  kasan_save_alloc_info+0x40/0x58
[   33.629093]  __kasan_kmalloc+0xd4/0xd8
[   33.629891]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.630520]  kasan_strings+0xb4/0x8f8
[   33.631090]  kunit_try_run_case+0x14c/0x3d0
[   33.631735]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.632466]  kthread+0x24c/0x2d0
[   33.633295]  ret_from_fork+0x10/0x20
[   33.633854] 
[   33.634171] Freed by task 247:
[   33.634664]  kasan_save_stack+0x3c/0x68
[   33.635750]  kasan_save_track+0x20/0x40
[   33.636406]  kasan_save_free_info+0x4c/0x78
[   33.636924]  __kasan_slab_free+0x6c/0x98
[   33.637509]  kfree+0x114/0x3c8
[   33.637908]  kasan_strings+0x128/0x8f8
[   33.638676]  kunit_try_run_case+0x14c/0x3d0
[   33.639438]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.640083]  kthread+0x24c/0x2d0
[   33.640542]  ret_from_fork+0x10/0x20
[   33.641343] 
[   33.641714] The buggy address belongs to the object at fff00000c4081c00
[   33.641714]  which belongs to the cache kmalloc-32 of size 32
[   33.642873] The buggy address is located 16 bytes inside of
[   33.642873]  freed 32-byte region [fff00000c4081c00, fff00000c4081c20)
[   33.643997] 
[   33.644436] The buggy address belongs to the physical page:
[   33.645447] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104081
[   33.646309] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.647087] page_type: f5(slab)
[   33.647600] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   33.648536] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   33.649510] page dumped because: kasan: bad access detected
[   33.650180] 
[   33.650559] Memory state around the buggy address:
[   33.651110]  fff00000c4081b00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   33.651940]  fff00000c4081b80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   33.652745] >fff00000c4081c00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.654272]                          ^
[   33.654866]  fff00000c4081c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.655660]  fff00000c4081d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.656447] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strrchr
[   33.563934] ==================================================================
[   33.564637] BUG: KASAN: slab-use-after-free in strrchr+0x6c/0x78
[   33.565694] Read of size 1 at addr fff00000c4081c10 by task kunit_try_catch/247
[   33.566698] 
[   33.567372] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   33.568764] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.569591] Hardware name: linux,dummy-virt (DT)
[   33.570306] Call trace:
[   33.570735]  show_stack+0x20/0x38 (C)
[   33.571271]  dump_stack_lvl+0x8c/0xd0
[   33.571910]  print_report+0x118/0x5e0
[   33.572506]  kasan_report+0xc8/0x118
[   33.573359]  __asan_report_load1_noabort+0x20/0x30
[   33.574029]  strrchr+0x6c/0x78
[   33.574613]  kasan_strings+0x1e0/0x8f8
[   33.575234]  kunit_try_run_case+0x14c/0x3d0
[   33.575919]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.576679]  kthread+0x24c/0x2d0
[   33.577410]  ret_from_fork+0x10/0x20
[   33.577971] 
[   33.578340] Allocated by task 247:
[   33.578870]  kasan_save_stack+0x3c/0x68
[   33.579469]  kasan_save_track+0x20/0x40
[   33.580046]  kasan_save_alloc_info+0x40/0x58
[   33.580749]  __kasan_kmalloc+0xd4/0xd8
[   33.582128]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.582749]  kasan_strings+0xb4/0x8f8
[   33.583353]  kunit_try_run_case+0x14c/0x3d0
[   33.583916]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.584694]  kthread+0x24c/0x2d0
[   33.585543]  ret_from_fork+0x10/0x20
[   33.586104] 
[   33.586463] Freed by task 247:
[   33.586909]  kasan_save_stack+0x3c/0x68
[   33.587448]  kasan_save_track+0x20/0x40
[   33.587951]  kasan_save_free_info+0x4c/0x78
[   33.588638]  __kasan_slab_free+0x6c/0x98
[   33.589267]  kfree+0x114/0x3c8
[   33.590151]  kasan_strings+0x128/0x8f8
[   33.590737]  kunit_try_run_case+0x14c/0x3d0
[   33.591367]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.592149]  kthread+0x24c/0x2d0
[   33.592646]  ret_from_fork+0x10/0x20
[   33.593530] 
[   33.593914] The buggy address belongs to the object at fff00000c4081c00
[   33.593914]  which belongs to the cache kmalloc-32 of size 32
[   33.595130] The buggy address is located 16 bytes inside of
[   33.595130]  freed 32-byte region [fff00000c4081c00, fff00000c4081c20)
[   33.596293] 
[   33.596640] The buggy address belongs to the physical page:
[   33.597696] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104081
[   33.598556] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.599426] page_type: f5(slab)
[   33.599954] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   33.600831] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   33.602438] page dumped because: kasan: bad access detected
[   33.603151] 
[   33.603533] Memory state around the buggy address:
[   33.604210]  fff00000c4081b00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   33.605015]  fff00000c4081b80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   33.605873] >fff00000c4081c00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.606858]                          ^
[   33.607319]  fff00000c4081c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.607997]  fff00000c4081d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.608846] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strchr
[   33.515448] ==================================================================
[   33.516470] BUG: KASAN: slab-use-after-free in strchr+0xcc/0xd8
[   33.517497] Read of size 1 at addr fff00000c4081c10 by task kunit_try_catch/247
[   33.518860] 
[   33.519204] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   33.520662] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.521318] Hardware name: linux,dummy-virt (DT)
[   33.521598] Call trace:
[   33.521783]  show_stack+0x20/0x38 (C)
[   33.522052]  dump_stack_lvl+0x8c/0xd0
[   33.522341]  print_report+0x118/0x5e0
[   33.522602]  kasan_report+0xc8/0x118
[   33.522857]  __asan_report_load1_noabort+0x20/0x30
[   33.523234]  strchr+0xcc/0xd8
[   33.524919]  kasan_strings+0x180/0x8f8
[   33.526164]  kunit_try_run_case+0x14c/0x3d0
[   33.526825]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.527603]  kthread+0x24c/0x2d0
[   33.527876]  ret_from_fork+0x10/0x20
[   33.528180] 
[   33.528608] Allocated by task 247:
[   33.529450]  kasan_save_stack+0x3c/0x68
[   33.530418]  kasan_save_track+0x20/0x40
[   33.531138]  kasan_save_alloc_info+0x40/0x58
[   33.531868]  __kasan_kmalloc+0xd4/0xd8
[   33.532578]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.533483]  kasan_strings+0xb4/0x8f8
[   33.534057]  kunit_try_run_case+0x14c/0x3d0
[   33.534601]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.535565]  kthread+0x24c/0x2d0
[   33.536183]  ret_from_fork+0x10/0x20
[   33.536727] 
[   33.537090] Freed by task 247:
[   33.537588]  kasan_save_stack+0x3c/0x68
[   33.538759]  kasan_save_track+0x20/0x40
[   33.539263]  kasan_save_free_info+0x4c/0x78
[   33.539784]  __kasan_slab_free+0x6c/0x98
[   33.540926]  kfree+0x114/0x3c8
[   33.541621]  kasan_strings+0x128/0x8f8
[   33.542316]  kunit_try_run_case+0x14c/0x3d0
[   33.542943]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.543659]  kthread+0x24c/0x2d0
[   33.544191]  ret_from_fork+0x10/0x20
[   33.544783] 
[   33.545260] The buggy address belongs to the object at fff00000c4081c00
[   33.545260]  which belongs to the cache kmalloc-32 of size 32
[   33.546373] The buggy address is located 16 bytes inside of
[   33.546373]  freed 32-byte region [fff00000c4081c00, fff00000c4081c20)
[   33.547490] 
[   33.547879] The buggy address belongs to the physical page:
[   33.548620] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104081
[   33.549717] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.550626] page_type: f5(slab)
[   33.551163] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   33.552068] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   33.552928] page dumped because: kasan: bad access detected
[   33.553746] 
[   33.554049] Memory state around the buggy address:
[   33.554682]  fff00000c4081b00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   33.555540]  fff00000c4081b80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   33.556419] >fff00000c4081c00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   33.557258]                          ^
[   33.558751]  fff00000c4081c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.559669]  fff00000c4081d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.560613] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[   33.466372] ==================================================================
[   33.467461] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   33.468172] Read of size 1 at addr fff00000c4081ad8 by task kunit_try_catch/245
[   33.469219] 
[   33.469566] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   33.470816] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.471456] Hardware name: linux,dummy-virt (DT)
[   33.472147] Call trace:
[   33.472604]  show_stack+0x20/0x38 (C)
[   33.473437]  dump_stack_lvl+0x8c/0xd0
[   33.473934]  print_report+0x118/0x5e0
[   33.474548]  kasan_report+0xc8/0x118
[   33.475052]  __asan_report_load1_noabort+0x20/0x30
[   33.475760]  memcmp+0x198/0x1d8
[   33.476299]  kasan_memcmp+0x16c/0x300
[   33.476842]  kunit_try_run_case+0x14c/0x3d0
[   33.477558]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.478246]  kthread+0x24c/0x2d0
[   33.478737]  ret_from_fork+0x10/0x20
[   33.479541] 
[   33.480099] Allocated by task 245:
[   33.480659]  kasan_save_stack+0x3c/0x68
[   33.481665]  kasan_save_track+0x20/0x40
[   33.482264]  kasan_save_alloc_info+0x40/0x58
[   33.482845]  __kasan_kmalloc+0xd4/0xd8
[   33.483140]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.483814]  kasan_memcmp+0xbc/0x300
[   33.484499]  kunit_try_run_case+0x14c/0x3d0
[   33.485089]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.486051]  kthread+0x24c/0x2d0
[   33.486591]  ret_from_fork+0x10/0x20
[   33.487180] 
[   33.487545] The buggy address belongs to the object at fff00000c4081ac0
[   33.487545]  which belongs to the cache kmalloc-32 of size 32
[   33.488671] The buggy address is located 0 bytes to the right of
[   33.488671]  allocated 24-byte region [fff00000c4081ac0, fff00000c4081ad8)
[   33.490715] 
[   33.490994] The buggy address belongs to the physical page:
[   33.491505] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104081
[   33.492633] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.493806] page_type: f5(slab)
[   33.494533] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   33.495673] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   33.496505] page dumped because: kasan: bad access detected
[   33.497191] 
[   33.497574] Memory state around the buggy address:
[   33.498219]  fff00000c4081980: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   33.499181]  fff00000c4081a00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   33.500154] >fff00000c4081a80: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   33.501287]                                                     ^
[   33.501945]  fff00000c4081b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.502762]  fff00000c4081b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.503546] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memchr
[   33.415296] ==================================================================
[   33.416409] BUG: KASAN: slab-out-of-bounds in memchr+0x78/0x88
[   33.417070] Read of size 1 at addr fff00000c4081998 by task kunit_try_catch/243
[   33.418562] 
[   33.418958] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   33.420537] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.421014] Hardware name: linux,dummy-virt (DT)
[   33.421949] Call trace:
[   33.422549]  show_stack+0x20/0x38 (C)
[   33.423297]  dump_stack_lvl+0x8c/0xd0
[   33.423999]  print_report+0x118/0x5e0
[   33.424733]  kasan_report+0xc8/0x118
[   33.425508]  __asan_report_load1_noabort+0x20/0x30
[   33.426329]  memchr+0x78/0x88
[   33.426999]  kasan_memchr+0x148/0x2d8
[   33.427707]  kunit_try_run_case+0x14c/0x3d0
[   33.428282]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.428900]  kthread+0x24c/0x2d0
[   33.429849]  ret_from_fork+0x10/0x20
[   33.430592] 
[   33.431097] Allocated by task 243:
[   33.431793]  kasan_save_stack+0x3c/0x68
[   33.432531]  kasan_save_track+0x20/0x40
[   33.433431]  kasan_save_alloc_info+0x40/0x58
[   33.434211]  __kasan_kmalloc+0xd4/0xd8
[   33.434939]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.435693]  kasan_memchr+0xb0/0x2d8
[   33.436435]  kunit_try_run_case+0x14c/0x3d0
[   33.437233]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.437799]  kthread+0x24c/0x2d0
[   33.438224]  ret_from_fork+0x10/0x20
[   33.438934] 
[   33.439484] The buggy address belongs to the object at fff00000c4081980
[   33.439484]  which belongs to the cache kmalloc-32 of size 32
[   33.440585] The buggy address is located 0 bytes to the right of
[   33.440585]  allocated 24-byte region [fff00000c4081980, fff00000c4081998)
[   33.442514] 
[   33.443021] The buggy address belongs to the physical page:
[   33.443824] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104081
[   33.444884] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.445964] page_type: f5(slab)
[   33.446390] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   33.446779] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   33.447181] page dumped because: kasan: bad access detected
[   33.447709] 
[   33.447997] Memory state around the buggy address:
[   33.448517]  fff00000c4081880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   33.449588]  fff00000c4081900: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   33.450396] >fff00000c4081980: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.451091]                             ^
[   33.451693]  fff00000c4081a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.452469]  fff00000c4081a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.453558] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[   33.373912] ==================================================================
[   33.375026] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2e4/0x348
[   33.375912] Read of size 1 at addr ffff800080b67bea by task kunit_try_catch/241
[   33.376580] 
[   33.376989] CPU: 0 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   33.378256] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.378818] Hardware name: linux,dummy-virt (DT)
[   33.379458] Call trace:
[   33.379877]  show_stack+0x20/0x38 (C)
[   33.380741]  dump_stack_lvl+0x8c/0xd0
[   33.382142]  print_report+0x2fc/0x5e0
[   33.382675]  kasan_report+0xc8/0x118
[   33.383270]  __asan_report_load1_noabort+0x20/0x30
[   33.383940]  kasan_alloca_oob_right+0x2e4/0x348
[   33.384631]  kunit_try_run_case+0x14c/0x3d0
[   33.385226]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.385804]  kthread+0x24c/0x2d0
[   33.386573]  ret_from_fork+0x10/0x20
[   33.387343] 
[   33.387852] The buggy address belongs to stack of task kunit_try_catch/241
[   33.388647] 
[   33.389869] The buggy address belongs to the virtual mapping at
[   33.389869]  [ffff800080b60000, ffff800080b69000) created by:
[   33.389869]  kernel_clone+0x140/0x788
[   33.391172] 
[   33.391521] The buggy address belongs to the physical page:
[   33.392074] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106387
[   33.393409] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.394231] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.395073] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.395882] page dumped because: kasan: bad access detected
[   33.396505] 
[   33.396845] Memory state around the buggy address:
[   33.398333]  ffff800080b67a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.399130]  ffff800080b67b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.399901] >ffff800080b67b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   33.400628]                                                           ^
[   33.401778]  ffff800080b67c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2
[   33.402541]  ffff800080b67c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00
[   33.403289] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[   33.332959] ==================================================================
[   33.334388] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   33.335308] Read of size 1 at addr ffff800080b47bdf by task kunit_try_catch/239
[   33.336225] 
[   33.336626] CPU: 1 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   33.338174] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.338665] Hardware name: linux,dummy-virt (DT)
[   33.339330] Call trace:
[   33.339750]  show_stack+0x20/0x38 (C)
[   33.340410]  dump_stack_lvl+0x8c/0xd0
[   33.341063]  print_report+0x2fc/0x5e0
[   33.341949]  kasan_report+0xc8/0x118
[   33.342596]  __asan_report_load1_noabort+0x20/0x30
[   33.343295]  kasan_alloca_oob_left+0x2b8/0x310
[   33.343927]  kunit_try_run_case+0x14c/0x3d0
[   33.344548]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.345360]  kthread+0x24c/0x2d0
[   33.346170]  ret_from_fork+0x10/0x20
[   33.346749] 
[   33.347150] The buggy address belongs to stack of task kunit_try_catch/239
[   33.347921] 
[   33.348349] The buggy address belongs to the virtual mapping at
[   33.348349]  [ffff800080b40000, ffff800080b49000) created by:
[   33.348349]  kernel_clone+0x140/0x788
[   33.350177] 
[   33.350434] The buggy address belongs to the physical page:
[   33.350979] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10404d
[   33.352101] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.353223] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.354130] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.355221] page dumped because: kasan: bad access detected
[   33.355951] 
[   33.356215] Memory state around the buggy address:
[   33.356720]  ffff800080b47a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.358352]  ffff800080b47b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.359163] >ffff800080b47b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   33.360012]                                                     ^
[   33.360590]  ffff800080b47c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2
[   33.361233]  ffff800080b47c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00
[   33.362335] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[   33.286339] ==================================================================
[   33.287649] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x230/0x268
[   33.288506] Read of size 1 at addr ffff800080b47cba by task kunit_try_catch/237
[   33.289078] 
[   33.289436] CPU: 0 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   33.290628] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.291104] Hardware name: linux,dummy-virt (DT)
[   33.291957] Call trace:
[   33.293180]  show_stack+0x20/0x38 (C)
[   33.294076]  dump_stack_lvl+0x8c/0xd0
[   33.294627]  print_report+0x2fc/0x5e0
[   33.295207]  kasan_report+0xc8/0x118
[   33.295801]  __asan_report_load1_noabort+0x20/0x30
[   33.296458]  kasan_stack_oob+0x230/0x268
[   33.297177]  kunit_try_run_case+0x14c/0x3d0
[   33.298554]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.299328]  kthread+0x24c/0x2d0
[   33.299859]  ret_from_fork+0x10/0x20
[   33.300525] 
[   33.301047] The buggy address belongs to stack of task kunit_try_catch/237
[   33.302301]  and is located at offset 138 in frame:
[   33.302847]  kasan_stack_oob+0x0/0x268
[   33.303662] 
[   33.304049] This frame has 4 objects:
[   33.304626]  [48, 49) '__assertion'
[   33.304836]  [64, 72) 'array'
[   33.305556]  [96, 112) '__assertion'
[   33.306002]  [128, 138) 'stack_array'
[   33.306484] 
[   33.307770] The buggy address belongs to the virtual mapping at
[   33.307770]  [ffff800080b40000, ffff800080b49000) created by:
[   33.307770]  kernel_clone+0x140/0x788
[   33.309596] 
[   33.309971] The buggy address belongs to the physical page:
[   33.310682] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10404d
[   33.311676] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.312650] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.313751] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.315264] page dumped because: kasan: bad access detected
[   33.315895] 
[   33.316299] Memory state around the buggy address:
[   33.316938]  ffff800080b47b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.317833]  ffff800080b47c00: 00 00 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2
[   33.319076] >ffff800080b47c80: f2 f2 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00
[   33.319972]                                         ^
[   33.320687]  ffff800080b47d00: 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00
[   33.322304]  ffff800080b47d80: f2 f2 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00
[   33.323075] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   33.238857] ==================================================================
[   33.239931] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   33.240766] Read of size 1 at addr ffffaee4804da06d by task kunit_try_catch/233
[   33.242026] 
[   33.242436] CPU: 1 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   33.243994] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.244676] Hardware name: linux,dummy-virt (DT)
[   33.245246] Call trace:
[   33.245674]  show_stack+0x20/0x38 (C)
[   33.246204]  dump_stack_lvl+0x8c/0xd0
[   33.246695]  print_report+0x2fc/0x5e0
[   33.247162]  kasan_report+0xc8/0x118
[   33.247742]  __asan_report_load1_noabort+0x20/0x30
[   33.248577]  kasan_global_oob_right+0x230/0x270
[   33.249704]  kunit_try_run_case+0x14c/0x3d0
[   33.250421]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.251066]  kthread+0x24c/0x2d0
[   33.251617]  ret_from_fork+0x10/0x20
[   33.252309] 
[   33.252798] The buggy address belongs to the variable:
[   33.253551]  global_array+0xd/0x40
[   33.254028] 
[   33.254516] The buggy address belongs to the virtual mapping at
[   33.254516]  [ffffaee47e820000, ffffaee480591000) created by:
[   33.254516]  paging_init+0x668/0x7c8
[   33.256198] 
[   33.256874] The buggy address belongs to the physical page:
[   33.257907] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x478da
[   33.258936] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   33.259911] raw: 03fffe0000002000 ffffc1ffc01e3688 ffffc1ffc01e3688 0000000000000000
[   33.260737] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.262304] page dumped because: kasan: bad access detected
[   33.262931] 
[   33.263288] Memory state around the buggy address:
[   33.263937]  ffffaee4804d9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.264701]  ffffaee4804d9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.265799] >ffffaee4804da000: 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9
[   33.266566]                                                           ^
[   33.267303]  ffffaee4804da080: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9
[   33.268090]  ffffaee4804da100: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9
[   33.268897] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[   33.196044] ==================================================================
[   33.197103] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[   33.197880] Free of addr fff00000c653c001 by task kunit_try_catch/231
[   33.199692] 
[   33.200067] CPU: 0 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   33.201067] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.201567] Hardware name: linux,dummy-virt (DT)
[   33.202040] Call trace:
[   33.202863]  show_stack+0x20/0x38 (C)
[   33.203365]  dump_stack_lvl+0x8c/0xd0
[   33.203967]  print_report+0x118/0x5e0
[   33.204574]  kasan_report_invalid_free+0xb0/0xd8
[   33.205984]  __kasan_mempool_poison_object+0xfc/0x150
[   33.206592]  mempool_free+0x28c/0x328
[   33.207176]  mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[   33.207877]  mempool_kmalloc_large_invalid_free+0xb8/0x110
[   33.208594]  kunit_try_run_case+0x14c/0x3d0
[   33.209271]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.209914]  kthread+0x24c/0x2d0
[   33.210487]  ret_from_fork+0x10/0x20
[   33.211018] 
[   33.211810] The buggy address belongs to the physical page:
[   33.212437] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653c
[   33.214141] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.214939] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.215732] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.216559] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.217694] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.218522] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.219545] head: 0bfffe0000000002 ffffc1ffc3194f01 ffffffffffffffff 0000000000000000
[   33.220421] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   33.221197] page dumped because: kasan: bad access detected
[   33.221800] 
[   33.222150] Memory state around the buggy address:
[   33.222730]  fff00000c653bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.223981]  fff00000c653bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.224783] >fff00000c653c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.225568]                    ^
[   33.226027]  fff00000c653c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.227289]  fff00000c653c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.228071] ==================================================================
[   33.142041] ==================================================================
[   33.143199] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[   33.144002] Free of addr fff00000c6362501 by task kunit_try_catch/229
[   33.144622] 
[   33.145060] CPU: 0 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   33.146306] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.147407] Hardware name: linux,dummy-virt (DT)
[   33.147958] Call trace:
[   33.148378]  show_stack+0x20/0x38 (C)
[   33.149092]  dump_stack_lvl+0x8c/0xd0
[   33.149660]  print_report+0x118/0x5e0
[   33.150561]  kasan_report_invalid_free+0xb0/0xd8
[   33.151413]  check_slab_allocation+0xfc/0x108
[   33.152141]  __kasan_mempool_poison_object+0x78/0x150
[   33.152955]  mempool_free+0x28c/0x328
[   33.153479]  mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[   33.155010]  mempool_kmalloc_invalid_free+0xb8/0x110
[   33.155695]  kunit_try_run_case+0x14c/0x3d0
[   33.156317]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.157012]  kthread+0x24c/0x2d0
[   33.157772]  ret_from_fork+0x10/0x20
[   33.159485] 
[   33.159859] Allocated by task 229:
[   33.160387]  kasan_save_stack+0x3c/0x68
[   33.160989]  kasan_save_track+0x20/0x40
[   33.161874]  kasan_save_alloc_info+0x40/0x58
[   33.162424]  __kasan_mempool_unpoison_object+0x11c/0x180
[   33.163511]  remove_element+0x130/0x1f8
[   33.163947]  mempool_alloc_preallocated+0x58/0xc0
[   33.164878]  mempool_kmalloc_invalid_free_helper+0x94/0x2a0
[   33.165592]  mempool_kmalloc_invalid_free+0xb8/0x110
[   33.166641]  kunit_try_run_case+0x14c/0x3d0
[   33.167217]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.168149]  kthread+0x24c/0x2d0
[   33.168820]  ret_from_fork+0x10/0x20
[   33.169428] 
[   33.170104] The buggy address belongs to the object at fff00000c6362500
[   33.170104]  which belongs to the cache kmalloc-128 of size 128
[   33.171484] The buggy address is located 1 bytes inside of
[   33.171484]  128-byte region [fff00000c6362500, fff00000c6362580)
[   33.173283] 
[   33.173566] The buggy address belongs to the physical page:
[   33.174031] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106362
[   33.175182] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.175831] page_type: f5(slab)
[   33.176374] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.177239] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   33.178069] page dumped because: kasan: bad access detected
[   33.178739] 
[   33.179057] Memory state around the buggy address:
[   33.180405]  fff00000c6362400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.181215]  fff00000c6362480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.181900] >fff00000c6362500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.183171]                    ^
[   33.183616]  fff00000c6362580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.184478]  fff00000c6362600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.185917] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[   32.851785] ==================================================================
[   32.852750] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   32.853811] Read of size 1 at addr fff00000c660c000 by task kunit_try_catch/217
[   32.854617] 
[   32.854999] CPU: 1 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   32.856777] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.857360] Hardware name: linux,dummy-virt (DT)
[   32.858004] Call trace:
[   32.858688]  show_stack+0x20/0x38 (C)
[   32.859522]  dump_stack_lvl+0x8c/0xd0
[   32.860077]  print_report+0x118/0x5e0
[   32.860745]  kasan_report+0xc8/0x118
[   32.861604]  __asan_report_load1_noabort+0x20/0x30
[   32.862144]  mempool_uaf_helper+0x314/0x340
[   32.862852]  mempool_kmalloc_large_uaf+0xbc/0x118
[   32.863451]  kunit_try_run_case+0x14c/0x3d0
[   32.864188]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.865041]  kthread+0x24c/0x2d0
[   32.865540]  ret_from_fork+0x10/0x20
[   32.866311] 
[   32.866627] The buggy address belongs to the physical page:
[   32.867227] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10660c
[   32.868031] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.868882] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.869699] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.870566] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.871655] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.872687] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.873887] head: 0bfffe0000000002 ffffc1ffc3198301 ffffffffffffffff 0000000000000000
[   32.874975] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   32.875803] page dumped because: kasan: bad access detected
[   32.876706] 
[   32.877287] Memory state around the buggy address:
[   32.878197]  fff00000c660bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.878938]  fff00000c660bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.879695] >fff00000c660c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.880782]                    ^
[   32.882049]  fff00000c660c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.882987]  fff00000c660c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.883749] ==================================================================
[   32.967177] ==================================================================
[   32.967960] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   32.968762] Read of size 1 at addr fff00000c6610000 by task kunit_try_catch/221
[   32.969439] 
[   32.969803] CPU: 1 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   32.970928] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.971445] Hardware name: linux,dummy-virt (DT)
[   32.972024] Call trace:
[   32.972467]  show_stack+0x20/0x38 (C)
[   32.973064]  dump_stack_lvl+0x8c/0xd0
[   32.973575]  print_report+0x118/0x5e0
[   32.974177]  kasan_report+0xc8/0x118
[   32.974753]  __asan_report_load1_noabort+0x20/0x30
[   32.975365]  mempool_uaf_helper+0x314/0x340
[   32.975944]  mempool_page_alloc_uaf+0xb8/0x118
[   32.976616]  kunit_try_run_case+0x14c/0x3d0
[   32.977256]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.977980]  kthread+0x24c/0x2d0
[   32.978545]  ret_from_fork+0x10/0x20
[   32.979058] 
[   32.979407] The buggy address belongs to the physical page:
[   32.980063] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106610
[   32.980997] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.981798] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   32.982595] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.983432] page dumped because: kasan: bad access detected
[   32.984032] 
[   32.984353] Memory state around the buggy address:
[   32.984932]  fff00000c660ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.985707]  fff00000c660ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.986456] >fff00000c6610000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.987179]                    ^
[   32.987621]  fff00000c6610080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.988489]  fff00000c6610100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.989148] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[   32.896223] ==================================================================
[   32.897677] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   32.898760] Read of size 1 at addr fff00000c407e240 by task kunit_try_catch/219
[   32.899167] 
[   32.899487] CPU: 0 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   32.900521] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.901160] Hardware name: linux,dummy-virt (DT)
[   32.902098] Call trace:
[   32.902529]  show_stack+0x20/0x38 (C)
[   32.903218]  dump_stack_lvl+0x8c/0xd0
[   32.903827]  print_report+0x118/0x5e0
[   32.904444]  kasan_report+0xc8/0x118
[   32.905298]  __asan_report_load1_noabort+0x20/0x30
[   32.905909]  mempool_uaf_helper+0x314/0x340
[   32.906572]  mempool_slab_uaf+0xb8/0x110
[   32.907169]  kunit_try_run_case+0x14c/0x3d0
[   32.907810]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.908515]  kthread+0x24c/0x2d0
[   32.909133]  ret_from_fork+0x10/0x20
[   32.909883] 
[   32.910248] Allocated by task 219:
[   32.910832]  kasan_save_stack+0x3c/0x68
[   32.911436]  kasan_save_track+0x20/0x40
[   32.912023]  kasan_save_alloc_info+0x40/0x58
[   32.912619]  __kasan_mempool_unpoison_object+0xbc/0x180
[   32.913619]  remove_element+0x16c/0x1f8
[   32.914318]  mempool_alloc_preallocated+0x58/0xc0
[   32.914934]  mempool_uaf_helper+0xa4/0x340
[   32.915747]  mempool_slab_uaf+0xb8/0x110
[   32.916255]  kunit_try_run_case+0x14c/0x3d0
[   32.916771]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.918703]  kthread+0x24c/0x2d0
[   32.919267]  ret_from_fork+0x10/0x20
[   32.919821] 
[   32.920412] Freed by task 219:
[   32.920890]  kasan_save_stack+0x3c/0x68
[   32.921759]  kasan_save_track+0x20/0x40
[   32.922302]  kasan_save_free_info+0x4c/0x78
[   32.922819]  __kasan_mempool_poison_object+0xc0/0x150
[   32.923633]  mempool_free+0x28c/0x328
[   32.924040]  mempool_uaf_helper+0x104/0x340
[   32.924751]  mempool_slab_uaf+0xb8/0x110
[   32.925677]  kunit_try_run_case+0x14c/0x3d0
[   32.926393]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.927199]  kthread+0x24c/0x2d0
[   32.927789]  ret_from_fork+0x10/0x20
[   32.928403] 
[   32.928845] The buggy address belongs to the object at fff00000c407e240
[   32.928845]  which belongs to the cache test_cache of size 123
[   32.930487] The buggy address is located 0 bytes inside of
[   32.930487]  freed 123-byte region [fff00000c407e240, fff00000c407e2bb)
[   32.931729] 
[   32.932137] The buggy address belongs to the physical page:
[   32.932876] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10407e
[   32.933853] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.934616] page_type: f5(slab)
[   32.935180] raw: 0bfffe0000000000 fff00000c5b9f8c0 dead000000000122 0000000000000000
[   32.936005] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000
[   32.936844] page dumped because: kasan: bad access detected
[   32.938019] 
[   32.938310] Memory state around the buggy address:
[   32.938940]  fff00000c407e100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.939707]  fff00000c407e180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.941253] >fff00000c407e200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   32.942330]                                            ^
[   32.942900]  fff00000c407e280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.943641]  fff00000c407e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.944657] ==================================================================
[   32.795024] ==================================================================
[   32.796287] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   32.797147] Read of size 1 at addr fff00000c406b300 by task kunit_try_catch/215
[   32.797888] 
[   32.798282] CPU: 0 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   32.799401] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.799964] Hardware name: linux,dummy-virt (DT)
[   32.800609] Call trace:
[   32.801235]  show_stack+0x20/0x38 (C)
[   32.801838]  dump_stack_lvl+0x8c/0xd0
[   32.802346]  print_report+0x118/0x5e0
[   32.802923]  kasan_report+0xc8/0x118
[   32.803521]  __asan_report_load1_noabort+0x20/0x30
[   32.804162]  mempool_uaf_helper+0x314/0x340
[   32.804802]  mempool_kmalloc_uaf+0xbc/0x118
[   32.805646]  kunit_try_run_case+0x14c/0x3d0
[   32.806319]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.807051]  kthread+0x24c/0x2d0
[   32.807616]  ret_from_fork+0x10/0x20
[   32.808196] 
[   32.808513] Allocated by task 215:
[   32.809639]  kasan_save_stack+0x3c/0x68
[   32.810161]  kasan_save_track+0x20/0x40
[   32.810700]  kasan_save_alloc_info+0x40/0x58
[   32.811363]  __kasan_mempool_unpoison_object+0x11c/0x180
[   32.812028]  remove_element+0x130/0x1f8
[   32.812651]  mempool_alloc_preallocated+0x58/0xc0
[   32.813591]  mempool_uaf_helper+0xa4/0x340
[   32.814008]  mempool_kmalloc_uaf+0xbc/0x118
[   32.814638]  kunit_try_run_case+0x14c/0x3d0
[   32.815314]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.815929]  kthread+0x24c/0x2d0
[   32.816513]  ret_from_fork+0x10/0x20
[   32.817232] 
[   32.817827] Freed by task 215:
[   32.818181]  kasan_save_stack+0x3c/0x68
[   32.818604]  kasan_save_track+0x20/0x40
[   32.819025]  kasan_save_free_info+0x4c/0x78
[   32.819766]  __kasan_mempool_poison_object+0xc0/0x150
[   32.820994]  mempool_free+0x28c/0x328
[   32.821455]  mempool_uaf_helper+0x104/0x340
[   32.822050]  mempool_kmalloc_uaf+0xbc/0x118
[   32.822608]  kunit_try_run_case+0x14c/0x3d0
[   32.823247]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.823991]  kthread+0x24c/0x2d0
[   32.824504]  ret_from_fork+0x10/0x20
[   32.824970] 
[   32.825330] The buggy address belongs to the object at fff00000c406b300
[   32.825330]  which belongs to the cache kmalloc-128 of size 128
[   32.826474] The buggy address is located 0 bytes inside of
[   32.826474]  freed 128-byte region [fff00000c406b300, fff00000c406b380)
[   32.827641] 
[   32.827977] The buggy address belongs to the physical page:
[   32.828689] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10406b
[   32.829510] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.830210] page_type: f5(slab)
[   32.830729] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.831579] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   32.832434] page dumped because: kasan: bad access detected
[   32.833077] 
[   32.833434] Memory state around the buggy address:
[   32.834056]  fff00000c406b200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.834778]  fff00000c406b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.835575] >fff00000c406b300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.836386]                    ^
[   32.836895]  fff00000c406b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.837683]  fff00000c406b400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.838463] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[   32.635884] ==================================================================
[   32.636913] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   32.638289] Read of size 1 at addr fff00000c6347a73 by task kunit_try_catch/209
[   32.639453] 
[   32.639950] CPU: 1 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   32.641467] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.641966] Hardware name: linux,dummy-virt (DT)
[   32.642566] Call trace:
[   32.642893]  show_stack+0x20/0x38 (C)
[   32.643491]  dump_stack_lvl+0x8c/0xd0
[   32.644156]  print_report+0x118/0x5e0
[   32.644773]  kasan_report+0xc8/0x118
[   32.645432]  __asan_report_load1_noabort+0x20/0x30
[   32.646187]  mempool_oob_right_helper+0x2ac/0x2f0
[   32.646881]  mempool_kmalloc_oob_right+0xbc/0x118
[   32.647652]  kunit_try_run_case+0x14c/0x3d0
[   32.648379]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.649333]  kthread+0x24c/0x2d0
[   32.650131]  ret_from_fork+0x10/0x20
[   32.650724] 
[   32.651038] Allocated by task 209:
[   32.651464]  kasan_save_stack+0x3c/0x68
[   32.652036]  kasan_save_track+0x20/0x40
[   32.652828]  kasan_save_alloc_info+0x40/0x58
[   32.653805]  __kasan_mempool_unpoison_object+0x11c/0x180
[   32.654427]  remove_element+0x130/0x1f8
[   32.654942]  mempool_alloc_preallocated+0x58/0xc0
[   32.655540]  mempool_oob_right_helper+0x98/0x2f0
[   32.656153]  mempool_kmalloc_oob_right+0xbc/0x118
[   32.656794]  kunit_try_run_case+0x14c/0x3d0
[   32.657458]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.658062]  kthread+0x24c/0x2d0
[   32.658595]  ret_from_fork+0x10/0x20
[   32.659038] 
[   32.660151] The buggy address belongs to the object at fff00000c6347a00
[   32.660151]  which belongs to the cache kmalloc-128 of size 128
[   32.661381] The buggy address is located 0 bytes to the right of
[   32.661381]  allocated 115-byte region [fff00000c6347a00, fff00000c6347a73)
[   32.662582] 
[   32.662932] The buggy address belongs to the physical page:
[   32.663525] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106347
[   32.664579] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.666130] page_type: f5(slab)
[   32.666644] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.667435] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   32.668634] page dumped because: kasan: bad access detected
[   32.669256] 
[   32.669953] Memory state around the buggy address:
[   32.670654]  fff00000c6347900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.671555]  fff00000c6347980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.672332] >fff00000c6347a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.673162]                                                              ^
[   32.674299]  fff00000c6347a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.674946]  fff00000c6347b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.675846] ==================================================================
[   32.688263] ==================================================================
[   32.689764] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   32.690728] Read of size 1 at addr fff00000c653a001 by task kunit_try_catch/211
[   32.692011] 
[   32.692408] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   32.693544] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.694220] Hardware name: linux,dummy-virt (DT)
[   32.694796] Call trace:
[   32.695268]  show_stack+0x20/0x38 (C)
[   32.695875]  dump_stack_lvl+0x8c/0xd0
[   32.696549]  print_report+0x118/0x5e0
[   32.697404]  kasan_report+0xc8/0x118
[   32.697900]  __asan_report_load1_noabort+0x20/0x30
[   32.698442]  mempool_oob_right_helper+0x2ac/0x2f0
[   32.698955]  mempool_kmalloc_large_oob_right+0xbc/0x118
[   32.699526]  kunit_try_run_case+0x14c/0x3d0
[   32.700392]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.701330]  kthread+0x24c/0x2d0
[   32.701721]  ret_from_fork+0x10/0x20
[   32.702180] 
[   32.702415] The buggy address belongs to the physical page:
[   32.702957] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106538
[   32.704483] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.705678] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.706604] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.707484] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.708358] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.709302] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.710489] head: 0bfffe0000000002 ffffc1ffc3194e01 ffffffffffffffff 0000000000000000
[   32.711361] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   32.712715] page dumped because: kasan: bad access detected
[   32.713905] 
[   32.714306] Memory state around the buggy address:
[   32.715034]  fff00000c6539f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.715777]  fff00000c6539f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.716547] >fff00000c653a000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.717392]                    ^
[   32.717902]  fff00000c653a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.718615]  fff00000c653a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.719446] ==================================================================
[   32.735493] ==================================================================
[   32.736544] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   32.737248] Read of size 1 at addr fff00000c638c2bb by task kunit_try_catch/213
[   32.737991] 
[   32.738389] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   32.739365] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.740130] Hardware name: linux,dummy-virt (DT)
[   32.740792] Call trace:
[   32.741444]  show_stack+0x20/0x38 (C)
[   32.741911]  dump_stack_lvl+0x8c/0xd0
[   32.742429]  print_report+0x118/0x5e0
[   32.743006]  kasan_report+0xc8/0x118
[   32.743514]  __asan_report_load1_noabort+0x20/0x30
[   32.744164]  mempool_oob_right_helper+0x2ac/0x2f0
[   32.744726]  mempool_slab_oob_right+0xb8/0x110
[   32.745784]  kunit_try_run_case+0x14c/0x3d0
[   32.746527]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.747178]  kthread+0x24c/0x2d0
[   32.747761]  ret_from_fork+0x10/0x20
[   32.748377] 
[   32.748660] Allocated by task 213:
[   32.749274]  kasan_save_stack+0x3c/0x68
[   32.750150]  kasan_save_track+0x20/0x40
[   32.750744]  kasan_save_alloc_info+0x40/0x58
[   32.751388]  __kasan_mempool_unpoison_object+0xbc/0x180
[   32.752072]  remove_element+0x16c/0x1f8
[   32.752655]  mempool_alloc_preallocated+0x58/0xc0
[   32.753417]  mempool_oob_right_helper+0x98/0x2f0
[   32.754372]  mempool_slab_oob_right+0xb8/0x110
[   32.755165]  kunit_try_run_case+0x14c/0x3d0
[   32.755870]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.756759]  kthread+0x24c/0x2d0
[   32.757502]  ret_from_fork+0x10/0x20
[   32.757894] 
[   32.758238] The buggy address belongs to the object at fff00000c638c240
[   32.758238]  which belongs to the cache test_cache of size 123
[   32.759284] The buggy address is located 0 bytes to the right of
[   32.759284]  allocated 123-byte region [fff00000c638c240, fff00000c638c2bb)
[   32.760601] 
[   32.760950] The buggy address belongs to the physical page:
[   32.761622] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10638c
[   32.762744] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.763597] page_type: f5(slab)
[   32.764152] raw: 0bfffe0000000000 fff00000c5b9f780 dead000000000122 0000000000000000
[   32.764970] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000
[   32.765926] page dumped because: kasan: bad access detected
[   32.766601] 
[   32.766916] Memory state around the buggy address:
[   32.767519]  fff00000c638c180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.768309]  fff00000c638c200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   32.769219] >fff00000c638c280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   32.770237]                                         ^
[   32.770994]  fff00000c638c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.771785]  fff00000c638c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.772542] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[   32.013788] ==================================================================
[   32.014685] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x17c/0x2f8
[   32.015481] Read of size 1 at addr fff00000c5b7b500 by task kunit_try_catch/203
[   32.016338] 
[   32.016708] CPU: 1 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   32.018565] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.019093] Hardware name: linux,dummy-virt (DT)
[   32.019639] Call trace:
[   32.019989]  show_stack+0x20/0x38 (C)
[   32.020563]  dump_stack_lvl+0x8c/0xd0
[   32.021535]  print_report+0x118/0x5e0
[   32.022405]  kasan_report+0xc8/0x118
[   32.022868]  __kasan_check_byte+0x54/0x70
[   32.023560]  kmem_cache_destroy+0x34/0x218
[   32.024161]  kmem_cache_double_destroy+0x17c/0x2f8
[   32.024834]  kunit_try_run_case+0x14c/0x3d0
[   32.025709]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.027092]  kthread+0x24c/0x2d0
[   32.027752]  ret_from_fork+0x10/0x20
[   32.028382] 
[   32.028756] Allocated by task 203:
[   32.029293]  kasan_save_stack+0x3c/0x68
[   32.030224]  kasan_save_track+0x20/0x40
[   32.031197]  kasan_save_alloc_info+0x40/0x58
[   32.031910]  __kasan_slab_alloc+0xa8/0xb0
[   32.032655]  kmem_cache_alloc_noprof+0x108/0x398
[   32.034209]  __kmem_cache_create_args+0x18c/0x2b0
[   32.034809]  kmem_cache_double_destroy+0xc8/0x2f8
[   32.035416]  kunit_try_run_case+0x14c/0x3d0
[   32.035929]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.036645]  kthread+0x24c/0x2d0
[   32.037086]  ret_from_fork+0x10/0x20
[   32.038197] 
[   32.038697] Freed by task 203:
[   32.039101]  kasan_save_stack+0x3c/0x68
[   32.039938]  kasan_save_track+0x20/0x40
[   32.040485]  kasan_save_free_info+0x4c/0x78
[   32.041660]  __kasan_slab_free+0x6c/0x98
[   32.042632]  kmem_cache_free+0x118/0x470
[   32.043238]  slab_kmem_cache_release+0x38/0x50
[   32.043760]  kmem_cache_release+0x1c/0x30
[   32.044427]  kobject_put+0x17c/0x430
[   32.045717]  sysfs_slab_release+0x1c/0x30
[   32.046319]  kmem_cache_destroy+0x118/0x218
[   32.046839]  kmem_cache_double_destroy+0x130/0x2f8
[   32.047431]  kunit_try_run_case+0x14c/0x3d0
[   32.048019]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.048674]  kthread+0x24c/0x2d0
[   32.049481]  ret_from_fork+0x10/0x20
[   32.050015] 
[   32.050339] The buggy address belongs to the object at fff00000c5b7b500
[   32.050339]  which belongs to the cache kmem_cache of size 208
[   32.051858] The buggy address is located 0 bytes inside of
[   32.051858]  freed 208-byte region [fff00000c5b7b500, fff00000c5b7b5d0)
[   32.053977] 
[   32.054278] The buggy address belongs to the physical page:
[   32.055042] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b7b
[   32.055987] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.056890] page_type: f5(slab)
[   32.058092] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000
[   32.059043] raw: 0000000000000000 00000000800c000c 00000001f5000000 0000000000000000
[   32.059922] page dumped because: kasan: bad access detected
[   32.060555] 
[   32.060847] Memory state around the buggy address:
[   32.061495]  fff00000c5b7b400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.062155]  fff00000c5b7b480: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.063016] >fff00000c5b7b500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.064234]                    ^
[   32.064706]  fff00000c5b7b580: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   32.066326]  fff00000c5b7b600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.067075] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[   31.894024] ==================================================================
[   31.894936] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x390/0x468
[   31.895771] Read of size 1 at addr fff00000c4074000 by task kunit_try_catch/201
[   31.896421] 
[   31.896790] CPU: 1 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   31.897704] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.898457] Hardware name: linux,dummy-virt (DT)
[   31.899037] Call trace:
[   31.899464]  show_stack+0x20/0x38 (C)
[   31.899935]  dump_stack_lvl+0x8c/0xd0
[   31.900531]  print_report+0x118/0x5e0
[   31.901161]  kasan_report+0xc8/0x118
[   31.902169]  __asan_report_load1_noabort+0x20/0x30
[   31.902847]  kmem_cache_rcu_uaf+0x390/0x468
[   31.903384]  kunit_try_run_case+0x14c/0x3d0
[   31.903983]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.904663]  kthread+0x24c/0x2d0
[   31.905289]  ret_from_fork+0x10/0x20
[   31.905877] 
[   31.906192] Allocated by task 201:
[   31.906684]  kasan_save_stack+0x3c/0x68
[   31.907235]  kasan_save_track+0x20/0x40
[   31.907816]  kasan_save_alloc_info+0x40/0x58
[   31.908428]  __kasan_slab_alloc+0xa8/0xb0
[   31.909047]  kmem_cache_alloc_noprof+0x108/0x398
[   31.909743]  kmem_cache_rcu_uaf+0x12c/0x468
[   31.910437]  kunit_try_run_case+0x14c/0x3d0
[   31.910993]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.911646]  kthread+0x24c/0x2d0
[   31.912199]  ret_from_fork+0x10/0x20
[   31.912692] 
[   31.913328] Freed by task 0:
[   31.913778]  kasan_save_stack+0x3c/0x68
[   31.914344]  kasan_save_track+0x20/0x40
[   31.914813]  kasan_save_free_info+0x4c/0x78
[   31.915446]  __kasan_slab_free+0x6c/0x98
[   31.915982]  slab_free_after_rcu_debug+0xd4/0x2f8
[   31.916577]  rcu_core+0x9f4/0x1e20
[   31.917735]  rcu_core_si+0x18/0x30
[   31.918269]  handle_softirqs+0x374/0xb20
[   31.918793]  __do_softirq+0x1c/0x28
[   31.919251] 
[   31.919601] Last potentially related work creation:
[   31.920228]  kasan_save_stack+0x3c/0x68
[   31.920822]  __kasan_record_aux_stack+0xbc/0xe8
[   31.921647]  kasan_record_aux_stack_noalloc+0x14/0x20
[   31.922247]  kmem_cache_free+0x28c/0x470
[   31.922830]  kmem_cache_rcu_uaf+0x16c/0x468
[   31.923483]  kunit_try_run_case+0x14c/0x3d0
[   31.924104]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.924774]  kthread+0x24c/0x2d0
[   31.925596]  ret_from_fork+0x10/0x20
[   31.926125] 
[   31.926474] The buggy address belongs to the object at fff00000c4074000
[   31.926474]  which belongs to the cache test_cache of size 200
[   31.927543] The buggy address is located 0 bytes inside of
[   31.927543]  freed 200-byte region [fff00000c4074000, fff00000c40740c8)
[   31.928696] 
[   31.929352] The buggy address belongs to the physical page:
[   31.929997] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104074
[   31.930940] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.931670] page_type: f5(slab)
[   31.932232] raw: 0bfffe0000000000 fff00000c5b7b3c0 dead000000000122 0000000000000000
[   31.933441] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000
[   31.934148] page dumped because: kasan: bad access detected
[   31.934832] 
[   31.935159] Memory state around the buggy address:
[   31.935778]  fff00000c4073f00: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc
[   31.936533]  fff00000c4073f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.937350] >fff00000c4074000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.938488]                    ^
[   31.938859]  fff00000c4074080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   31.939699]  fff00000c4074100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.940400] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   31.768833] ==================================================================
[   31.769891] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3b8
[   31.770622] Free of addr fff00000c406f001 by task kunit_try_catch/199
[   31.771270] 
[   31.771672] CPU: 0 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   31.772870] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.773705] Hardware name: linux,dummy-virt (DT)
[   31.774366] Call trace:
[   31.774822]  show_stack+0x20/0x38 (C)
[   31.775437]  dump_stack_lvl+0x8c/0xd0
[   31.776047]  print_report+0x118/0x5e0
[   31.776711]  kasan_report_invalid_free+0xb0/0xd8
[   31.777612]  check_slab_allocation+0xfc/0x108
[   31.778239]  __kasan_slab_pre_free+0x2c/0x48
[   31.778883]  kmem_cache_free+0xf0/0x470
[   31.779453]  kmem_cache_invalid_free+0x184/0x3b8
[   31.780029]  kunit_try_run_case+0x14c/0x3d0
[   31.780632]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.781353]  kthread+0x24c/0x2d0
[   31.782129]  ret_from_fork+0x10/0x20
[   31.782649] 
[   31.782960] Allocated by task 199:
[   31.783432]  kasan_save_stack+0x3c/0x68
[   31.783969]  kasan_save_track+0x20/0x40
[   31.784470]  kasan_save_alloc_info+0x40/0x58
[   31.785008]  __kasan_slab_alloc+0xa8/0xb0
[   31.785671]  kmem_cache_alloc_noprof+0x108/0x398
[   31.786352]  kmem_cache_invalid_free+0x12c/0x3b8
[   31.787024]  kunit_try_run_case+0x14c/0x3d0
[   31.787699]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.788468]  kthread+0x24c/0x2d0
[   31.788972]  ret_from_fork+0x10/0x20
[   31.789748] 
[   31.790493] The buggy address belongs to the object at fff00000c406f000
[   31.790493]  which belongs to the cache test_cache of size 200
[   31.791498] The buggy address is located 1 bytes inside of
[   31.791498]  200-byte region [fff00000c406f000, fff00000c406f0c8)
[   31.792692] 
[   31.793069] The buggy address belongs to the physical page:
[   31.794193] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10406f
[   31.795072] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.795847] page_type: f5(slab)
[   31.796364] raw: 0bfffe0000000000 fff00000ffeca000 dead000000000122 0000000000000000
[   31.797250] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000
[   31.798133] page dumped because: kasan: bad access detected
[   31.798847] 
[   31.799210] Memory state around the buggy address:
[   31.799886]  fff00000c406ef00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.800676]  fff00000c406ef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.801881] >fff00000c406f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.802668]                    ^
[   31.803202]  fff00000c406f080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   31.803955]  fff00000c406f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.804636] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   31.702659] ==================================================================
[   31.703454] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   31.704244] Free of addr fff00000c4074000 by task kunit_try_catch/197
[   31.704984] 
[   31.705506] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   31.707158] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.707773] Hardware name: linux,dummy-virt (DT)
[   31.708411] Call trace:
[   31.708876]  show_stack+0x20/0x38 (C)
[   31.709841]  dump_stack_lvl+0x8c/0xd0
[   31.710433]  print_report+0x118/0x5e0
[   31.711004]  kasan_report_invalid_free+0xb0/0xd8
[   31.711668]  check_slab_allocation+0xd4/0x108
[   31.712304]  __kasan_slab_pre_free+0x2c/0x48
[   31.713041]  kmem_cache_free+0xf0/0x470
[   31.713840]  kmem_cache_double_free+0x190/0x3c8
[   31.714574]  kunit_try_run_case+0x14c/0x3d0
[   31.715140]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.715794]  kthread+0x24c/0x2d0
[   31.716254]  ret_from_fork+0x10/0x20
[   31.716848] 
[   31.717214] Allocated by task 197:
[   31.717609]  kasan_save_stack+0x3c/0x68
[   31.718239]  kasan_save_track+0x20/0x40
[   31.718742]  kasan_save_alloc_info+0x40/0x58
[   31.719381]  __kasan_slab_alloc+0xa8/0xb0
[   31.719944]  kmem_cache_alloc_noprof+0x108/0x398
[   31.720488]  kmem_cache_double_free+0x12c/0x3c8
[   31.721626]  kunit_try_run_case+0x14c/0x3d0
[   31.722245]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.722882]  kthread+0x24c/0x2d0
[   31.723384]  ret_from_fork+0x10/0x20
[   31.723839] 
[   31.724204] Freed by task 197:
[   31.724671]  kasan_save_stack+0x3c/0x68
[   31.725662]  kasan_save_track+0x20/0x40
[   31.726255]  kasan_save_free_info+0x4c/0x78
[   31.726802]  __kasan_slab_free+0x6c/0x98
[   31.727324]  kmem_cache_free+0x118/0x470
[   31.727878]  kmem_cache_double_free+0x140/0x3c8
[   31.728403]  kunit_try_run_case+0x14c/0x3d0
[   31.729366]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.730004]  kthread+0x24c/0x2d0
[   31.730464]  ret_from_fork+0x10/0x20
[   31.730994] 
[   31.731367] The buggy address belongs to the object at fff00000c4074000
[   31.731367]  which belongs to the cache test_cache of size 200
[   31.732510] The buggy address is located 0 bytes inside of
[   31.732510]  200-byte region [fff00000c4074000, fff00000c40740c8)
[   31.733897] 
[   31.734244] The buggy address belongs to the physical page:
[   31.734861] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104074
[   31.735842] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.736673] page_type: f5(slab)
[   31.737634] raw: 0bfffe0000000000 fff00000c5b7b280 dead000000000122 0000000000000000
[   31.738445] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000
[   31.739234] page dumped because: kasan: bad access detected
[   31.739806] 
[   31.740166] Memory state around the buggy address:
[   31.740799]  fff00000c4073f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.741969]  fff00000c4073f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.742742] >fff00000c4074000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.743501]                    ^
[   31.744009]  fff00000c4074080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   31.744771]  fff00000c4074100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.745904] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   31.623439] ==================================================================
[   31.624401] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x33c/0x428
[   31.625229] Read of size 1 at addr fff00000c40660c8 by task kunit_try_catch/195
[   31.625924] 
[   31.626317] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   31.627369] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.627823] Hardware name: linux,dummy-virt (DT)
[   31.628458] Call trace:
[   31.628865]  show_stack+0x20/0x38 (C)
[   31.630570]  dump_stack_lvl+0x8c/0xd0
[   31.631069]  print_report+0x118/0x5e0
[   31.631682]  kasan_report+0xc8/0x118
[   31.632244]  __asan_report_load1_noabort+0x20/0x30
[   31.632885]  kmem_cache_oob+0x33c/0x428
[   31.633878]  kunit_try_run_case+0x14c/0x3d0
[   31.634463]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.635209]  kthread+0x24c/0x2d0
[   31.635737]  ret_from_fork+0x10/0x20
[   31.636307] 
[   31.636597] Allocated by task 195:
[   31.638032]  kasan_save_stack+0x3c/0x68
[   31.638503]  kasan_save_track+0x20/0x40
[   31.639059]  kasan_save_alloc_info+0x40/0x58
[   31.639661]  __kasan_slab_alloc+0xa8/0xb0
[   31.640241]  kmem_cache_alloc_noprof+0x108/0x398
[   31.640784]  kmem_cache_oob+0x12c/0x428
[   31.641820]  kunit_try_run_case+0x14c/0x3d0
[   31.642447]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.643184]  kthread+0x24c/0x2d0
[   31.643689]  ret_from_fork+0x10/0x20
[   31.644159] 
[   31.644513] The buggy address belongs to the object at fff00000c4066000
[   31.644513]  which belongs to the cache test_cache of size 200
[   31.646049] The buggy address is located 0 bytes to the right of
[   31.646049]  allocated 200-byte region [fff00000c4066000, fff00000c40660c8)
[   31.647416] 
[   31.647768] The buggy address belongs to the physical page:
[   31.648393] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104066
[   31.649194] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.649994] page_type: f5(slab)
[   31.650847] raw: 0bfffe0000000000 fff00000c5b7b140 dead000000000122 0000000000000000
[   31.651765] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000
[   31.652608] page dumped because: kasan: bad access detected
[   31.653994] 
[   31.654319] Memory state around the buggy address:
[   31.655059]  fff00000c4065f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.656020]  fff00000c4066000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.656940] >fff00000c4066080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   31.658005]                                               ^
[   31.658840]  fff00000c4066100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.659591]  fff00000c4066180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.660602] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[   31.542980] ==================================================================
[   31.543918] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   31.545564] Read of size 8 at addr fff00000c63af680 by task kunit_try_catch/188
[   31.546442] 
[   31.546810] CPU: 1 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   31.548039] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.548509] Hardware name: linux,dummy-virt (DT)
[   31.549679] Call trace:
[   31.550221]  show_stack+0x20/0x38 (C)
[   31.550827]  dump_stack_lvl+0x8c/0xd0
[   31.551433]  print_report+0x118/0x5e0
[   31.552043]  kasan_report+0xc8/0x118
[   31.552665]  __asan_report_load8_noabort+0x20/0x30
[   31.553371]  workqueue_uaf+0x480/0x4a8
[   31.554153]  kunit_try_run_case+0x14c/0x3d0
[   31.554794]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.555565]  kthread+0x24c/0x2d0
[   31.556104]  ret_from_fork+0x10/0x20
[   31.556727] 
[   31.557347] Allocated by task 188:
[   31.557824]  kasan_save_stack+0x3c/0x68
[   31.558433]  kasan_save_track+0x20/0x40
[   31.558985]  kasan_save_alloc_info+0x40/0x58
[   31.559508]  __kasan_kmalloc+0xd4/0xd8
[   31.560084]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.560651]  workqueue_uaf+0x13c/0x4a8
[   31.561565]  kunit_try_run_case+0x14c/0x3d0
[   31.562236]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.562807]  kthread+0x24c/0x2d0
[   31.563351]  ret_from_fork+0x10/0x20
[   31.563867] 
[   31.564210] Freed by task 8:
[   31.564614]  kasan_save_stack+0x3c/0x68
[   31.565552]  kasan_save_track+0x20/0x40
[   31.566232]  kasan_save_free_info+0x4c/0x78
[   31.567095]  __kasan_slab_free+0x6c/0x98
[   31.567602]  kfree+0x114/0x3c8
[   31.568070]  workqueue_uaf_work+0x18/0x30
[   31.568627]  process_one_work+0x530/0xf98
[   31.569237]  worker_thread+0x614/0xf28
[   31.570185]  kthread+0x24c/0x2d0
[   31.570809]  ret_from_fork+0x10/0x20
[   31.571497] 
[   31.571839] Last potentially related work creation:
[   31.572415]  kasan_save_stack+0x3c/0x68
[   31.572907]  __kasan_record_aux_stack+0xbc/0xe8
[   31.573756]  kasan_record_aux_stack_noalloc+0x14/0x20
[   31.574643]  __queue_work+0x65c/0xfd8
[   31.575342]  queue_work_on+0xbc/0xf8
[   31.575835]  workqueue_uaf+0x210/0x4a8
[   31.576351]  kunit_try_run_case+0x14c/0x3d0
[   31.576978]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.577685]  kthread+0x24c/0x2d0
[   31.578162]  ret_from_fork+0x10/0x20
[   31.578644] 
[   31.578979] The buggy address belongs to the object at fff00000c63af680
[   31.578979]  which belongs to the cache kmalloc-32 of size 32
[   31.580613] The buggy address is located 0 bytes inside of
[   31.580613]  freed 32-byte region [fff00000c63af680, fff00000c63af6a0)
[   31.582218] 
[   31.582564] The buggy address belongs to the physical page:
[   31.583169] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063af
[   31.584101] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.584861] page_type: f5(slab)
[   31.585812] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   31.586628] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   31.587437] page dumped because: kasan: bad access detected
[   31.587986] 
[   31.588343] Memory state around the buggy address:
[   31.589380]  fff00000c63af580: 00 00 00 fc fc fc fc fc 00 00 03 fc fc fc fc fc
[   31.590203]  fff00000c63af600: 00 00 07 fc fc fc fc fc 00 00 00 07 fc fc fc fc
[   31.590953] >fff00000c63af680: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   31.591784]                    ^
[   31.592244]  fff00000c63af700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.593603]  fff00000c63af780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.594266] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[   31.457446] ==================================================================
[   31.458657] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   31.459490] Read of size 4 at addr fff00000c405e4c0 by task swapper/1/0
[   31.460146] 
[   31.460580] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G    B            N 6.12.0-next-20241128 #1
[   31.462288] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.462829] Hardware name: linux,dummy-virt (DT)
[   31.463431] Call trace:
[   31.463827]  show_stack+0x20/0x38 (C)
[   31.464439]  dump_stack_lvl+0x8c/0xd0
[   31.465012]  print_report+0x118/0x5e0
[   31.465619]  kasan_report+0xc8/0x118
[   31.466580]  __asan_report_load4_noabort+0x20/0x30
[   31.467327]  rcu_uaf_reclaim+0x64/0x70
[   31.467956]  rcu_core+0x9f4/0x1e20
[   31.468474]  rcu_core_si+0x18/0x30
[   31.469062]  handle_softirqs+0x374/0xb20
[   31.470289]  __do_softirq+0x1c/0x28
[   31.470891]  ____do_softirq+0x18/0x30
[   31.471439]  call_on_irq_stack+0x24/0x58
[   31.472094]  do_softirq_own_stack+0x24/0x38
[   31.472669]  __irq_exit_rcu+0x1fc/0x318
[   31.473321]  irq_exit_rcu+0x1c/0x80
[   31.473873]  el1_interrupt+0x38/0x58
[   31.474912]  el1h_64_irq_handler+0x18/0x28
[   31.475532]  el1h_64_irq+0x6c/0x70
[   31.476370]  arch_local_irq_enable+0x4/0x8 (P)
[   31.477070]  default_idle_call+0x6c/0x78 (L)
[   31.477649]  do_idle+0x384/0x4e8
[   31.478270]  cpu_startup_entry+0x64/0x80
[   31.479399]  secondary_start_kernel+0x288/0x340
[   31.480139]  __secondary_switched+0xc0/0xc8
[   31.480804] 
[   31.481589] Allocated by task 186:
[   31.482091]  kasan_save_stack+0x3c/0x68
[   31.482744]  kasan_save_track+0x20/0x40
[   31.483252]  kasan_save_alloc_info+0x40/0x58
[   31.483823]  __kasan_kmalloc+0xd4/0xd8
[   31.484392]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.485053]  rcu_uaf+0xb0/0x2d0
[   31.485527]  kunit_try_run_case+0x14c/0x3d0
[   31.486085]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.487329]  kthread+0x24c/0x2d0
[   31.487891]  ret_from_fork+0x10/0x20
[   31.488504] 
[   31.488861] Freed by task 0:
[   31.489816]  kasan_save_stack+0x3c/0x68
[   31.490444]  kasan_save_track+0x20/0x40
[   31.490960]  kasan_save_free_info+0x4c/0x78
[   31.491699]  __kasan_slab_free+0x6c/0x98
[   31.492238]  kfree+0x114/0x3c8
[   31.492762]  rcu_uaf_reclaim+0x28/0x70
[   31.493767]  rcu_core+0x9f4/0x1e20
[   31.494248]  rcu_core_si+0x18/0x30
[   31.494835]  handle_softirqs+0x374/0xb20
[   31.495490]  __do_softirq+0x1c/0x28
[   31.496077] 
[   31.496486] Last potentially related work creation:
[   31.497240]  kasan_save_stack+0x3c/0x68
[   31.498057]  __kasan_record_aux_stack+0xbc/0xe8
[   31.498996]  kasan_record_aux_stack_noalloc+0x14/0x20
[   31.499767]  __call_rcu_common.constprop.0+0x74/0xa10
[   31.500465]  call_rcu+0x18/0x30
[   31.501720]  rcu_uaf+0x14c/0x2d0
[   31.502227]  kunit_try_run_case+0x14c/0x3d0
[   31.502854]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.503494]  kthread+0x24c/0x2d0
[   31.504078]  ret_from_fork+0x10/0x20
[   31.504719] 
[   31.505394] The buggy address belongs to the object at fff00000c405e4c0
[   31.505394]  which belongs to the cache kmalloc-32 of size 32
[   31.506752] The buggy address is located 0 bytes inside of
[   31.506752]  freed 32-byte region [fff00000c405e4c0, fff00000c405e4e0)
[   31.507878] 
[   31.508236] The buggy address belongs to the physical page:
[   31.509152] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10405e
[   31.510722] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.511569] page_type: f5(slab)
[   31.512198] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   31.513222] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   31.514229] page dumped because: kasan: bad access detected
[   31.515161] 
[   31.515485] Memory state around the buggy address:
[   31.516173]  fff00000c405e380: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   31.516955]  fff00000c405e400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   31.517748] >fff00000c405e480: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   31.518468]                                            ^
[   31.519263]  fff00000c405e500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.520237]  fff00000c405e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.520917] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[   31.293651] ==================================================================
[   31.294744] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x600
[   31.295427] Read of size 1 at addr fff00000c403f400 by task kunit_try_catch/184
[   31.296682] 
[   31.297760] CPU: 0 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   31.298737] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.299281] Hardware name: linux,dummy-virt (DT)
[   31.300102] Call trace:
[   31.300695]  show_stack+0x20/0x38 (C)
[   31.301606]  dump_stack_lvl+0x8c/0xd0
[   31.302232]  print_report+0x118/0x5e0
[   31.303010]  kasan_report+0xc8/0x118
[   31.303728]  __kasan_check_byte+0x54/0x70
[   31.304457]  ksize+0x30/0x88
[   31.304956]  ksize_uaf+0x168/0x600
[   31.305819]  kunit_try_run_case+0x14c/0x3d0
[   31.306589]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.307462]  kthread+0x24c/0x2d0
[   31.308180]  ret_from_fork+0x10/0x20
[   31.308906] 
[   31.309551] Allocated by task 184:
[   31.310221]  kasan_save_stack+0x3c/0x68
[   31.310954]  kasan_save_track+0x20/0x40
[   31.311650]  kasan_save_alloc_info+0x40/0x58
[   31.312381]  __kasan_kmalloc+0xd4/0xd8
[   31.312881]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.313468]  ksize_uaf+0xb8/0x600
[   31.313921]  kunit_try_run_case+0x14c/0x3d0
[   31.315042]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.315700]  kthread+0x24c/0x2d0
[   31.316147]  ret_from_fork+0x10/0x20
[   31.316708] 
[   31.316989] Freed by task 184:
[   31.317937]  kasan_save_stack+0x3c/0x68
[   31.318479]  kasan_save_track+0x20/0x40
[   31.319050]  kasan_save_free_info+0x4c/0x78
[   31.319593]  __kasan_slab_free+0x6c/0x98
[   31.320195]  kfree+0x114/0x3c8
[   31.320713]  ksize_uaf+0x11c/0x600
[   31.321467]  kunit_try_run_case+0x14c/0x3d0
[   31.322061]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.322733]  kthread+0x24c/0x2d0
[   31.323284]  ret_from_fork+0x10/0x20
[   31.323811] 
[   31.324172] The buggy address belongs to the object at fff00000c403f400
[   31.324172]  which belongs to the cache kmalloc-128 of size 128
[   31.325533] The buggy address is located 0 bytes inside of
[   31.325533]  freed 128-byte region [fff00000c403f400, fff00000c403f480)
[   31.326693] 
[   31.327034] The buggy address belongs to the physical page:
[   31.327608] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10403f
[   31.328397] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.329459] page_type: f5(slab)
[   31.329989] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.330745] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   31.331626] page dumped because: kasan: bad access detected
[   31.332229] 
[   31.332575] Memory state around the buggy address:
[   31.333441]  fff00000c403f300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.334241]  fff00000c403f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.335032] >fff00000c403f400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.335746]                    ^
[   31.336269]  fff00000c403f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.337262]  fff00000c403f500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.338069] ==================================================================
[   31.341407] ==================================================================
[   31.342270] BUG: KASAN: slab-use-after-free in ksize_uaf+0x59c/0x600
[   31.343011] Read of size 1 at addr fff00000c403f400 by task kunit_try_catch/184
[   31.344025] 
[   31.344373] CPU: 0 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   31.345836] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.346412] Hardware name: linux,dummy-virt (DT)
[   31.346975] Call trace:
[   31.347332]  show_stack+0x20/0x38 (C)
[   31.347929]  dump_stack_lvl+0x8c/0xd0
[   31.348445]  print_report+0x118/0x5e0
[   31.349420]  kasan_report+0xc8/0x118
[   31.350076]  __asan_report_load1_noabort+0x20/0x30
[   31.350776]  ksize_uaf+0x59c/0x600
[   31.351353]  kunit_try_run_case+0x14c/0x3d0
[   31.351968]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.352729]  kthread+0x24c/0x2d0
[   31.353586]  ret_from_fork+0x10/0x20
[   31.354162] 
[   31.354403] Allocated by task 184:
[   31.354950]  kasan_save_stack+0x3c/0x68
[   31.355538]  kasan_save_track+0x20/0x40
[   31.356033]  kasan_save_alloc_info+0x40/0x58
[   31.356575]  __kasan_kmalloc+0xd4/0xd8
[   31.357392]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.358030]  ksize_uaf+0xb8/0x600
[   31.358562]  kunit_try_run_case+0x14c/0x3d0
[   31.359184]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.359838]  kthread+0x24c/0x2d0
[   31.360397]  ret_from_fork+0x10/0x20
[   31.360938] 
[   31.361766] Freed by task 184:
[   31.362290]  kasan_save_stack+0x3c/0x68
[   31.362777]  kasan_save_track+0x20/0x40
[   31.363365]  kasan_save_free_info+0x4c/0x78
[   31.363905]  __kasan_slab_free+0x6c/0x98
[   31.364455]  kfree+0x114/0x3c8
[   31.364903]  ksize_uaf+0x11c/0x600
[   31.365666]  kunit_try_run_case+0x14c/0x3d0
[   31.366293]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.366920]  kthread+0x24c/0x2d0
[   31.368049]  ret_from_fork+0x10/0x20
[   31.368578] 
[   31.368911] The buggy address belongs to the object at fff00000c403f400
[   31.368911]  which belongs to the cache kmalloc-128 of size 128
[   31.370233] The buggy address is located 0 bytes inside of
[   31.370233]  freed 128-byte region [fff00000c403f400, fff00000c403f480)
[   31.371361] 
[   31.371699] The buggy address belongs to the physical page:
[   31.372398] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10403f
[   31.373518] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.374324] page_type: f5(slab)
[   31.374842] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.375650] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   31.376439] page dumped because: kasan: bad access detected
[   31.377335] 
[   31.377789] Memory state around the buggy address:
[   31.378362]  fff00000c403f300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.379222]  fff00000c403f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.380139] >fff00000c403f400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.381023]                    ^
[   31.381592]  fff00000c403f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.382652]  fff00000c403f500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.383405] ==================================================================
[   31.386460] ==================================================================
[   31.387161] BUG: KASAN: slab-use-after-free in ksize_uaf+0x548/0x600
[   31.388057] Read of size 1 at addr fff00000c403f478 by task kunit_try_catch/184
[   31.388647] 
[   31.389556] CPU: 0 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   31.390632] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.391180] Hardware name: linux,dummy-virt (DT)
[   31.391730] Call trace:
[   31.392078]  show_stack+0x20/0x38 (C)
[   31.392598]  dump_stack_lvl+0x8c/0xd0
[   31.393403]  print_report+0x118/0x5e0
[   31.393964]  kasan_report+0xc8/0x118
[   31.394642]  __asan_report_load1_noabort+0x20/0x30
[   31.395395]  ksize_uaf+0x548/0x600
[   31.395927]  kunit_try_run_case+0x14c/0x3d0
[   31.396617]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.397611]  kthread+0x24c/0x2d0
[   31.398171]  ret_from_fork+0x10/0x20
[   31.398736] 
[   31.399134] Allocated by task 184:
[   31.399670]  kasan_save_stack+0x3c/0x68
[   31.400233]  kasan_save_track+0x20/0x40
[   31.400847]  kasan_save_alloc_info+0x40/0x58
[   31.401746]  __kasan_kmalloc+0xd4/0xd8
[   31.402307]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.402927]  ksize_uaf+0xb8/0x600
[   31.403451]  kunit_try_run_case+0x14c/0x3d0
[   31.403999]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.404765]  kthread+0x24c/0x2d0
[   31.405561]  ret_from_fork+0x10/0x20
[   31.406103] 
[   31.406497] Freed by task 184:
[   31.407014]  kasan_save_stack+0x3c/0x68
[   31.407548]  kasan_save_track+0x20/0x40
[   31.408177]  kasan_save_free_info+0x4c/0x78
[   31.408769]  __kasan_slab_free+0x6c/0x98
[   31.410437]  kfree+0x114/0x3c8
[   31.411223]  ksize_uaf+0x11c/0x600
[   31.411761]  kunit_try_run_case+0x14c/0x3d0
[   31.412433]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.413074]  kthread+0x24c/0x2d0
[   31.413823]  ret_from_fork+0x10/0x20
[   31.414508] 
[   31.414849] The buggy address belongs to the object at fff00000c403f400
[   31.414849]  which belongs to the cache kmalloc-128 of size 128
[   31.416134] The buggy address is located 120 bytes inside of
[   31.416134]  freed 128-byte region [fff00000c403f400, fff00000c403f480)
[   31.417721] 
[   31.418071] The buggy address belongs to the physical page:
[   31.418808] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10403f
[   31.419714] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.420567] page_type: f5(slab)
[   31.421063] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.422294] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   31.423071] page dumped because: kasan: bad access detected
[   31.423793] 
[   31.424190] Memory state around the buggy address:
[   31.424831]  fff00000c403f300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.425838]  fff00000c403f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.426722] >fff00000c403f400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.427482]                                                                 ^
[   31.428393]  fff00000c403f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.429721]  fff00000c403f500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.430463] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   31.201411] ==================================================================
[   31.202007] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x750
[   31.202876] Read of size 1 at addr fff00000c403f378 by task kunit_try_catch/182
[   31.203742] 
[   31.204143] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   31.205222] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.205826] Hardware name: linux,dummy-virt (DT)
[   31.206529] Call trace:
[   31.207038]  show_stack+0x20/0x38 (C)
[   31.207674]  dump_stack_lvl+0x8c/0xd0
[   31.208341]  print_report+0x118/0x5e0
[   31.208970]  kasan_report+0xc8/0x118
[   31.209619]  __asan_report_load1_noabort+0x20/0x30
[   31.210316]  ksize_unpoisons_memory+0x628/0x750
[   31.211023]  kunit_try_run_case+0x14c/0x3d0
[   31.211668]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.212466]  kthread+0x24c/0x2d0
[   31.213316]  ret_from_fork+0x10/0x20
[   31.213801] 
[   31.214194] Allocated by task 182:
[   31.214709]  kasan_save_stack+0x3c/0x68
[   31.215289]  kasan_save_track+0x20/0x40
[   31.215868]  kasan_save_alloc_info+0x40/0x58
[   31.216510]  __kasan_kmalloc+0xd4/0xd8
[   31.217389]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.218175]  ksize_unpoisons_memory+0xc0/0x750
[   31.218737]  kunit_try_run_case+0x14c/0x3d0
[   31.219303]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.219949]  kthread+0x24c/0x2d0
[   31.220503]  ret_from_fork+0x10/0x20
[   31.221081] 
[   31.221844] The buggy address belongs to the object at fff00000c403f300
[   31.221844]  which belongs to the cache kmalloc-128 of size 128
[   31.222750] The buggy address is located 5 bytes to the right of
[   31.222750]  allocated 115-byte region [fff00000c403f300, fff00000c403f373)
[   31.224103] 
[   31.224477] The buggy address belongs to the physical page:
[   31.225108] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10403f
[   31.226194] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.226970] page_type: f5(slab)
[   31.227456] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.228366] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   31.229371] page dumped because: kasan: bad access detected
[   31.230074] 
[   31.230445] Memory state around the buggy address:
[   31.231144]  fff00000c403f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   31.232033]  fff00000c403f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.232818] >fff00000c403f300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.233935]                                                                 ^
[   31.234722]  fff00000c403f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.235757]  fff00000c403f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.236744] ==================================================================
[   31.238597] ==================================================================
[   31.239686] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x6a0/0x750
[   31.240470] Read of size 1 at addr fff00000c403f37f by task kunit_try_catch/182
[   31.241822] 
[   31.242158] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   31.244719] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.245994] Hardware name: linux,dummy-virt (DT)
[   31.246916] Call trace:
[   31.247311]  show_stack+0x20/0x38 (C)
[   31.247834]  dump_stack_lvl+0x8c/0xd0
[   31.248704]  print_report+0x118/0x5e0
[   31.249950]  kasan_report+0xc8/0x118
[   31.252135]  __asan_report_load1_noabort+0x20/0x30
[   31.253504]  ksize_unpoisons_memory+0x6a0/0x750
[   31.254018]  kunit_try_run_case+0x14c/0x3d0
[   31.255653]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.256735]  kthread+0x24c/0x2d0
[   31.258178]  ret_from_fork+0x10/0x20
[   31.258583] 
[   31.258814] Allocated by task 182:
[   31.259166]  kasan_save_stack+0x3c/0x68
[   31.259605]  kasan_save_track+0x20/0x40
[   31.261068]  kasan_save_alloc_info+0x40/0x58
[   31.261789]  __kasan_kmalloc+0xd4/0xd8
[   31.263130]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.264184]  ksize_unpoisons_memory+0xc0/0x750
[   31.264743]  kunit_try_run_case+0x14c/0x3d0
[   31.265537]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.266190]  kthread+0x24c/0x2d0
[   31.266724]  ret_from_fork+0x10/0x20
[   31.267367] 
[   31.267736] The buggy address belongs to the object at fff00000c403f300
[   31.267736]  which belongs to the cache kmalloc-128 of size 128
[   31.268895] The buggy address is located 12 bytes to the right of
[   31.268895]  allocated 115-byte region [fff00000c403f300, fff00000c403f373)
[   31.270424] 
[   31.270715] The buggy address belongs to the physical page:
[   31.271405] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10403f
[   31.272295] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.273259] page_type: f5(slab)
[   31.273791] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.274595] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   31.275507] page dumped because: kasan: bad access detected
[   31.276099] 
[   31.276465] Memory state around the buggy address:
[   31.277358]  fff00000c403f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   31.278132]  fff00000c403f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.278984] >fff00000c403f300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.279667]                                                                 ^
[   31.280501]  fff00000c403f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.281327]  fff00000c403f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.282042] ==================================================================
[   31.160436] ==================================================================
[   31.161793] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x638/0x750
[   31.162607] Read of size 1 at addr fff00000c403f373 by task kunit_try_catch/182
[   31.163372] 
[   31.163795] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   31.165285] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.165872] Hardware name: linux,dummy-virt (DT)
[   31.166426] Call trace:
[   31.166887]  show_stack+0x20/0x38 (C)
[   31.167514]  dump_stack_lvl+0x8c/0xd0
[   31.168167]  print_report+0x118/0x5e0
[   31.168747]  kasan_report+0xc8/0x118
[   31.169560]  __asan_report_load1_noabort+0x20/0x30
[   31.170259]  ksize_unpoisons_memory+0x638/0x750
[   31.170906]  kunit_try_run_case+0x14c/0x3d0
[   31.171555]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.172332]  kthread+0x24c/0x2d0
[   31.172874]  ret_from_fork+0x10/0x20
[   31.173685] 
[   31.174067] Allocated by task 182:
[   31.174563]  kasan_save_stack+0x3c/0x68
[   31.174973]  kasan_save_track+0x20/0x40
[   31.175696]  kasan_save_alloc_info+0x40/0x58
[   31.176378]  __kasan_kmalloc+0xd4/0xd8
[   31.176904]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.177792]  ksize_unpoisons_memory+0xc0/0x750
[   31.178412]  kunit_try_run_case+0x14c/0x3d0
[   31.179005]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.179753]  kthread+0x24c/0x2d0
[   31.180287]  ret_from_fork+0x10/0x20
[   31.180803] 
[   31.182277] The buggy address belongs to the object at fff00000c403f300
[   31.182277]  which belongs to the cache kmalloc-128 of size 128
[   31.183483] The buggy address is located 0 bytes to the right of
[   31.183483]  allocated 115-byte region [fff00000c403f300, fff00000c403f373)
[   31.184751] 
[   31.185175] The buggy address belongs to the physical page:
[   31.185735] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10403f
[   31.186898] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.187765] page_type: f5(slab)
[   31.188545] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.189598] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   31.190498] page dumped because: kasan: bad access detected
[   31.191165] 
[   31.191535] Memory state around the buggy address:
[   31.192144]  fff00000c403f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   31.192933]  fff00000c403f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.194097] >fff00000c403f300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.195039]                                                              ^
[   31.195804]  fff00000c403f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.196833]  fff00000c403f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.197919] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
[   31.104338] ==================================================================
[   31.105217] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   31.105948] Free of addr fff00000c5d76c80 by task kunit_try_catch/180
[   31.106561] 
[   31.106931] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   31.108256] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.108818] Hardware name: linux,dummy-virt (DT)
[   31.109610] Call trace:
[   31.110030]  show_stack+0x20/0x38 (C)
[   31.110561]  dump_stack_lvl+0x8c/0xd0
[   31.111193]  print_report+0x118/0x5e0
[   31.111684]  kasan_report_invalid_free+0xb0/0xd8
[   31.112382]  check_slab_allocation+0xd4/0x108
[   31.113200]  __kasan_slab_pre_free+0x2c/0x48
[   31.113842]  kfree+0xe8/0x3c8
[   31.114387]  kfree_sensitive+0x3c/0xb0
[   31.114982]  kmalloc_double_kzfree+0x168/0x308
[   31.115645]  kunit_try_run_case+0x14c/0x3d0
[   31.116271]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.117274]  kthread+0x24c/0x2d0
[   31.117772]  ret_from_fork+0x10/0x20
[   31.118330] 
[   31.118641] Allocated by task 180:
[   31.119164]  kasan_save_stack+0x3c/0x68
[   31.119670]  kasan_save_track+0x20/0x40
[   31.120251]  kasan_save_alloc_info+0x40/0x58
[   31.120748]  __kasan_kmalloc+0xd4/0xd8
[   31.122194]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.123218]  kmalloc_double_kzfree+0xb8/0x308
[   31.123962]  kunit_try_run_case+0x14c/0x3d0
[   31.124538]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.125658]  kthread+0x24c/0x2d0
[   31.125909]  ret_from_fork+0x10/0x20
[   31.126181] 
[   31.126461] Freed by task 180:
[   31.126955]  kasan_save_stack+0x3c/0x68
[   31.127589]  kasan_save_track+0x20/0x40
[   31.128050]  kasan_save_free_info+0x4c/0x78
[   31.128728]  __kasan_slab_free+0x6c/0x98
[   31.129570]  kfree+0x114/0x3c8
[   31.130085]  kfree_sensitive+0x80/0xb0
[   31.130597]  kmalloc_double_kzfree+0x11c/0x308
[   31.131380]  kunit_try_run_case+0x14c/0x3d0
[   31.132027]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.132682]  kthread+0x24c/0x2d0
[   31.133467]  ret_from_fork+0x10/0x20
[   31.134042] 
[   31.134435] The buggy address belongs to the object at fff00000c5d76c80
[   31.134435]  which belongs to the cache kmalloc-16 of size 16
[   31.135661] The buggy address is located 0 bytes inside of
[   31.135661]  16-byte region [fff00000c5d76c80, fff00000c5d76c90)
[   31.136790] 
[   31.137223] The buggy address belongs to the physical page:
[   31.138212] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d76
[   31.139145] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.139925] page_type: f5(slab)
[   31.140461] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   31.141597] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   31.142334] page dumped because: kasan: bad access detected
[   31.142893] 
[   31.143289] Memory state around the buggy address:
[   31.143907]  fff00000c5d76b80: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   31.144803]  fff00000c5d76c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.145854] >fff00000c5d76c80: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.146723]                    ^
[   31.147424]  fff00000c5d76d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.148382]  fff00000c5d76d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.149547] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[   31.058715] ==================================================================
[   31.060028] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   31.060755] Read of size 1 at addr fff00000c5d76c80 by task kunit_try_catch/180
[   31.061927] 
[   31.062306] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   31.063285] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.063980] Hardware name: linux,dummy-virt (DT)
[   31.064460] Call trace:
[   31.064806]  show_stack+0x20/0x38 (C)
[   31.065574]  dump_stack_lvl+0x8c/0xd0
[   31.066276]  print_report+0x118/0x5e0
[   31.066937]  kasan_report+0xc8/0x118
[   31.067497]  __kasan_check_byte+0x54/0x70
[   31.068210]  kfree_sensitive+0x30/0xb0
[   31.068863]  kmalloc_double_kzfree+0x168/0x308
[   31.069654]  kunit_try_run_case+0x14c/0x3d0
[   31.070336]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.071106]  kthread+0x24c/0x2d0
[   31.071753]  ret_from_fork+0x10/0x20
[   31.072268] 
[   31.072615] Allocated by task 180:
[   31.073127]  kasan_save_stack+0x3c/0x68
[   31.073635]  kasan_save_track+0x20/0x40
[   31.074145]  kasan_save_alloc_info+0x40/0x58
[   31.074764]  __kasan_kmalloc+0xd4/0xd8
[   31.075326]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.075890]  kmalloc_double_kzfree+0xb8/0x308
[   31.076607]  kunit_try_run_case+0x14c/0x3d0
[   31.077474]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.078132]  kthread+0x24c/0x2d0
[   31.078664]  ret_from_fork+0x10/0x20
[   31.079214] 
[   31.079530] Freed by task 180:
[   31.079914]  kasan_save_stack+0x3c/0x68
[   31.080506]  kasan_save_track+0x20/0x40
[   31.081914]  kasan_save_free_info+0x4c/0x78
[   31.082431]  __kasan_slab_free+0x6c/0x98
[   31.083011]  kfree+0x114/0x3c8
[   31.083528]  kfree_sensitive+0x80/0xb0
[   31.084059]  kmalloc_double_kzfree+0x11c/0x308
[   31.084943]  kunit_try_run_case+0x14c/0x3d0
[   31.085505]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.086047]  kthread+0x24c/0x2d0
[   31.086851]  ret_from_fork+0x10/0x20
[   31.087315] 
[   31.087688] The buggy address belongs to the object at fff00000c5d76c80
[   31.087688]  which belongs to the cache kmalloc-16 of size 16
[   31.088855] The buggy address is located 0 bytes inside of
[   31.088855]  freed 16-byte region [fff00000c5d76c80, fff00000c5d76c90)
[   31.090254] 
[   31.090595] The buggy address belongs to the physical page:
[   31.091281] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d76
[   31.092073] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.092810] page_type: f5(slab)
[   31.093545] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   31.094390] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   31.095185] page dumped because: kasan: bad access detected
[   31.095801] 
[   31.096157] Memory state around the buggy address:
[   31.096682]  fff00000c5d76b80: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   31.097795]  fff00000c5d76c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.098557] >fff00000c5d76c80: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.099525]                    ^
[   31.100021]  fff00000c5d76d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.100871]  fff00000c5d76d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.102452] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob
[   30.440351] ==================================================================
[   30.441531] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   30.442301] Write of size 16 at addr fff00000c4005e20 by task kunit_try_catch/154
[   30.442673] 
[   30.442844] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   30.443468] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.443879] Hardware name: linux,dummy-virt (DT)
[   30.444367] Call trace:
[   30.444691]  show_stack+0x20/0x38 (C)
[   30.445173]  dump_stack_lvl+0x8c/0xd0
[   30.445793]  print_report+0x118/0x5e0
[   30.446428]  kasan_report+0xc8/0x118
[   30.447043]  __asan_report_store16_noabort+0x20/0x30
[   30.447798]  kmalloc_oob_16+0x3a0/0x3f8
[   30.448454]  kunit_try_run_case+0x14c/0x3d0
[   30.449143]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.449843]  kthread+0x24c/0x2d0
[   30.450337]  ret_from_fork+0x10/0x20
[   30.450868] 
[   30.451208] Allocated by task 154:
[   30.451606]  kasan_save_stack+0x3c/0x68
[   30.452202]  kasan_save_track+0x20/0x40
[   30.452728]  kasan_save_alloc_info+0x40/0x58
[   30.453276]  __kasan_kmalloc+0xd4/0xd8
[   30.453751]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.454247]  kmalloc_oob_16+0xb4/0x3f8
[   30.454683]  kunit_try_run_case+0x14c/0x3d0
[   30.455164]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.455688]  kthread+0x24c/0x2d0
[   30.456103]  ret_from_fork+0x10/0x20
[   30.456557] 
[   30.456841] The buggy address belongs to the object at fff00000c4005e20
[   30.456841]  which belongs to the cache kmalloc-16 of size 16
[   30.457747] The buggy address is located 0 bytes inside of
[   30.457747]  allocated 13-byte region [fff00000c4005e20, fff00000c4005e2d)
[   30.459144] 
[   30.459479] The buggy address belongs to the physical page:
[   30.460213] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005
[   30.461044] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.461828] page_type: f5(slab)
[   30.462331] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   30.463228] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   30.464045] page dumped because: kasan: bad access detected
[   30.464694] 
[   30.465050] Memory state around the buggy address:
[   30.465628]  fff00000c4005d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.466435]  fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   30.467270] >fff00000c4005e00: fa fb fc fc 00 05 fc fc 00 00 fc fc fc fc fc fc
[   30.468100]                                   ^
[   30.468670]  fff00000c4005e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.469494]  fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.470293] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[   30.939734] ==================================================================
[   30.940767] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   30.941566] Write of size 33 at addr fff00000c63ae900 by task kunit_try_catch/174
[   30.942422] 
[   30.942828] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   30.944429] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.945088] Hardware name: linux,dummy-virt (DT)
[   30.945710] Call trace:
[   30.946264]  show_stack+0x20/0x38 (C)
[   30.946936]  dump_stack_lvl+0x8c/0xd0
[   30.947610]  print_report+0x118/0x5e0
[   30.948218]  kasan_report+0xc8/0x118
[   30.948758]  kasan_check_range+0x100/0x1a8
[   30.949694]  __asan_memset+0x34/0x78
[   30.950273]  kmalloc_uaf_memset+0x170/0x310
[   30.950920]  kunit_try_run_case+0x14c/0x3d0
[   30.951486]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.952161]  kthread+0x24c/0x2d0
[   30.952754]  ret_from_fork+0x10/0x20
[   30.953810] 
[   30.954270] Allocated by task 174:
[   30.954837]  kasan_save_stack+0x3c/0x68
[   30.955476]  kasan_save_track+0x20/0x40
[   30.956085]  kasan_save_alloc_info+0x40/0x58
[   30.956757]  __kasan_kmalloc+0xd4/0xd8
[   30.957376]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.958372]  kmalloc_uaf_memset+0xb8/0x310
[   30.959129]  kunit_try_run_case+0x14c/0x3d0
[   30.959676]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.960355]  kthread+0x24c/0x2d0
[   30.960896]  ret_from_fork+0x10/0x20
[   30.961956] 
[   30.962485] Freed by task 174:
[   30.963089]  kasan_save_stack+0x3c/0x68
[   30.963614]  kasan_save_track+0x20/0x40
[   30.964536]  kasan_save_free_info+0x4c/0x78
[   30.965052]  __kasan_slab_free+0x6c/0x98
[   30.965826]  kfree+0x114/0x3c8
[   30.966536]  kmalloc_uaf_memset+0x11c/0x310
[   30.967063]  kunit_try_run_case+0x14c/0x3d0
[   30.967881]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.968723]  kthread+0x24c/0x2d0
[   30.969715]  ret_from_fork+0x10/0x20
[   30.970423] 
[   30.970767] The buggy address belongs to the object at fff00000c63ae900
[   30.970767]  which belongs to the cache kmalloc-64 of size 64
[   30.972237] The buggy address is located 0 bytes inside of
[   30.972237]  freed 64-byte region [fff00000c63ae900, fff00000c63ae940)
[   30.973946] 
[   30.974311] The buggy address belongs to the physical page:
[   30.974903] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ae
[   30.975759] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.976816] page_type: f5(slab)
[   30.977647] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.978493] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.979234] page dumped because: kasan: bad access detected
[   30.979905] 
[   30.980251] Memory state around the buggy address:
[   30.980886]  fff00000c63ae800: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   30.981705]  fff00000c63ae880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.982654] >fff00000c63ae900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.983643]                    ^
[   30.983879]  fff00000c63ae980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.984677]  fff00000c63aea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.985811] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   30.830888] ==================================================================
[   30.832014] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e8
[   30.832869] Read of size 64 at addr fff00000c6352a04 by task kunit_try_catch/170
[   30.834496] 
[   30.834972] CPU: 0 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   30.835875] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.836152] Hardware name: linux,dummy-virt (DT)
[   30.836668] Call trace:
[   30.837183]  show_stack+0x20/0x38 (C)
[   30.838300]  dump_stack_lvl+0x8c/0xd0
[   30.838921]  print_report+0x118/0x5e0
[   30.839496]  kasan_report+0xc8/0x118
[   30.840174]  kasan_check_range+0x100/0x1a8
[   30.840764]  __asan_memmove+0x3c/0x98
[   30.841863]  kmalloc_memmove_invalid_size+0x154/0x2e8
[   30.842670]  kunit_try_run_case+0x14c/0x3d0
[   30.843387]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.844173]  kthread+0x24c/0x2d0
[   30.844826]  ret_from_fork+0x10/0x20
[   30.845647] 
[   30.846506] Allocated by task 170:
[   30.846916]  kasan_save_stack+0x3c/0x68
[   30.847464]  kasan_save_track+0x20/0x40
[   30.847974]  kasan_save_alloc_info+0x40/0x58
[   30.848625]  __kasan_kmalloc+0xd4/0xd8
[   30.849313]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.849813]  kmalloc_memmove_invalid_size+0xb0/0x2e8
[   30.850555]  kunit_try_run_case+0x14c/0x3d0
[   30.851236]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.851972]  kthread+0x24c/0x2d0
[   30.852449]  ret_from_fork+0x10/0x20
[   30.853004] 
[   30.853887] The buggy address belongs to the object at fff00000c6352a00
[   30.853887]  which belongs to the cache kmalloc-64 of size 64
[   30.855860] The buggy address is located 4 bytes inside of
[   30.855860]  allocated 64-byte region [fff00000c6352a00, fff00000c6352a40)
[   30.857757] 
[   30.858032] The buggy address belongs to the physical page:
[   30.858727] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106352
[   30.859582] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.860448] page_type: f5(slab)
[   30.861062] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.862018] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.862707] page dumped because: kasan: bad access detected
[   30.863447] 
[   30.863884] Memory state around the buggy address:
[   30.864561]  fff00000c6352900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.865471]  fff00000c6352980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.866836] >fff00000c6352a00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   30.867388]                                            ^
[   30.867698]  fff00000c6352a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.868043]  fff00000c6352b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.868989] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   30.778607] ==================================================================
[   30.779685] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   30.780451] Read of size 18446744073709551614 at addr fff00000c6352984 by task kunit_try_catch/168
[   30.781901] 
[   30.782261] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   30.783151] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.783671] Hardware name: linux,dummy-virt (DT)
[   30.784252] Call trace:
[   30.784707]  show_stack+0x20/0x38 (C)
[   30.785557]  dump_stack_lvl+0x8c/0xd0
[   30.786185]  print_report+0x118/0x5e0
[   30.787041]  kasan_report+0xc8/0x118
[   30.787906]  kasan_check_range+0x100/0x1a8
[   30.788585]  __asan_memmove+0x3c/0x98
[   30.789169]  kmalloc_memmove_negative_size+0x154/0x2e0
[   30.790208]  kunit_try_run_case+0x14c/0x3d0
[   30.790898]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.791671]  kthread+0x24c/0x2d0
[   30.792233]  ret_from_fork+0x10/0x20
[   30.792836] 
[   30.793221] Allocated by task 168:
[   30.793735]  kasan_save_stack+0x3c/0x68
[   30.794272]  kasan_save_track+0x20/0x40
[   30.795407]  kasan_save_alloc_info+0x40/0x58
[   30.795997]  __kasan_kmalloc+0xd4/0xd8
[   30.796680]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.797420]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   30.798445]  kunit_try_run_case+0x14c/0x3d0
[   30.799133]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.799967]  kthread+0x24c/0x2d0
[   30.800461]  ret_from_fork+0x10/0x20
[   30.800937] 
[   30.801260] The buggy address belongs to the object at fff00000c6352980
[   30.801260]  which belongs to the cache kmalloc-64 of size 64
[   30.802928] The buggy address is located 4 bytes inside of
[   30.802928]  64-byte region [fff00000c6352980, fff00000c63529c0)
[   30.804938] 
[   30.805295] The buggy address belongs to the physical page:
[   30.806492] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106352
[   30.807502] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.808442] page_type: f5(slab)
[   30.809304] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.810007] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   30.810814] page dumped because: kasan: bad access detected
[   30.812210] 
[   30.812578] Memory state around the buggy address:
[   30.813771]  fff00000c6352880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.814524]  fff00000c6352900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.815463] >fff00000c6352980: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   30.816187]                    ^
[   30.816665]  fff00000c6352a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.817700]  fff00000c6352a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.818652] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset
[   30.580329] ==================================================================
[   30.581923] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   30.582620] Write of size 2 at addr fff00000c5b58b77 by task kunit_try_catch/160
[   30.583402] 
[   30.583776] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   30.584803] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.585339] Hardware name: linux,dummy-virt (DT)
[   30.585945] Call trace:
[   30.586384]  show_stack+0x20/0x38 (C)
[   30.586887]  dump_stack_lvl+0x8c/0xd0
[   30.587570]  print_report+0x118/0x5e0
[   30.588176]  kasan_report+0xc8/0x118
[   30.588710]  kasan_check_range+0x100/0x1a8
[   30.589591]  __asan_memset+0x34/0x78
[   30.590167]  kmalloc_oob_memset_2+0x150/0x2f8
[   30.590704]  kunit_try_run_case+0x14c/0x3d0
[   30.591364]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.592095]  kthread+0x24c/0x2d0
[   30.592628]  ret_from_fork+0x10/0x20
[   30.593503] 
[   30.593837] Allocated by task 160:
[   30.594352]  kasan_save_stack+0x3c/0x68
[   30.594858]  kasan_save_track+0x20/0x40
[   30.595437]  kasan_save_alloc_info+0x40/0x58
[   30.595917]  __kasan_kmalloc+0xd4/0xd8
[   30.596504]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.597471]  kmalloc_oob_memset_2+0xb0/0x2f8
[   30.597908]  kunit_try_run_case+0x14c/0x3d0
[   30.598542]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.599164]  kthread+0x24c/0x2d0
[   30.599700]  ret_from_fork+0x10/0x20
[   30.600198] 
[   30.600550] The buggy address belongs to the object at fff00000c5b58b00
[   30.600550]  which belongs to the cache kmalloc-128 of size 128
[   30.602003] The buggy address is located 119 bytes inside of
[   30.602003]  allocated 120-byte region [fff00000c5b58b00, fff00000c5b58b78)
[   30.603193] 
[   30.603511] The buggy address belongs to the physical page:
[   30.604200] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b58
[   30.605237] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.606049] page_type: f5(slab)
[   30.606582] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.607300] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.608214] page dumped because: kasan: bad access detected
[   30.608848] 
[   30.609439] Memory state around the buggy address:
[   30.610004]  fff00000c5b58a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   30.610826]  fff00000c5b58a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.611598] >fff00000c5b58b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.612430]                                                                 ^
[   30.613348]  fff00000c5b58b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.614145]  fff00000c5b58c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.614837] ==================================================================
[   30.628646] ==================================================================
[   30.630318] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   30.631011] Write of size 4 at addr fff00000c638e775 by task kunit_try_catch/162
[   30.631809] 
[   30.632168] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   30.633073] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.634134] Hardware name: linux,dummy-virt (DT)
[   30.634711] Call trace:
[   30.635157]  show_stack+0x20/0x38 (C)
[   30.635738]  dump_stack_lvl+0x8c/0xd0
[   30.636280]  print_report+0x118/0x5e0
[   30.636870]  kasan_report+0xc8/0x118
[   30.637492]  kasan_check_range+0x100/0x1a8
[   30.638077]  __asan_memset+0x34/0x78
[   30.639233]  kmalloc_oob_memset_4+0x150/0x300
[   30.639795]  kunit_try_run_case+0x14c/0x3d0
[   30.640390]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.641296]  kthread+0x24c/0x2d0
[   30.642087]  ret_from_fork+0x10/0x20
[   30.642612] 
[   30.642954] Allocated by task 162:
[   30.643486]  kasan_save_stack+0x3c/0x68
[   30.644071]  kasan_save_track+0x20/0x40
[   30.644564]  kasan_save_alloc_info+0x40/0x58
[   30.645457]  __kasan_kmalloc+0xd4/0xd8
[   30.645955]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.646489]  kmalloc_oob_memset_4+0xb0/0x300
[   30.647108]  kunit_try_run_case+0x14c/0x3d0
[   30.648387]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.648990]  kthread+0x24c/0x2d0
[   30.649701]  ret_from_fork+0x10/0x20
[   30.650435] 
[   30.650778] The buggy address belongs to the object at fff00000c638e700
[   30.650778]  which belongs to the cache kmalloc-128 of size 128
[   30.651870] The buggy address is located 117 bytes inside of
[   30.651870]  allocated 120-byte region [fff00000c638e700, fff00000c638e778)
[   30.653018] 
[   30.653343] The buggy address belongs to the physical page:
[   30.654007] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10638e
[   30.654941] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.656411] page_type: f5(slab)
[   30.657133] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.658066] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.659100] page dumped because: kasan: bad access detected
[   30.659782] 
[   30.660411] Memory state around the buggy address:
[   30.661544]  fff00000c638e600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   30.662158]  fff00000c638e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.662854] >fff00000c638e700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.663841]                                                                 ^
[   30.664769]  fff00000c638e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.665736]  fff00000c638e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.666480] ==================================================================
[   30.677708] ==================================================================
[   30.678866] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   30.679724] Write of size 8 at addr fff00000c638e971 by task kunit_try_catch/164
[   30.680561] 
[   30.681013] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   30.682066] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.682538] Hardware name: linux,dummy-virt (DT)
[   30.683039] Call trace:
[   30.683982]  show_stack+0x20/0x38 (C)
[   30.684549]  dump_stack_lvl+0x8c/0xd0
[   30.685044]  print_report+0x118/0x5e0
[   30.685594]  kasan_report+0xc8/0x118
[   30.686086]  kasan_check_range+0x100/0x1a8
[   30.687249]  __asan_memset+0x34/0x78
[   30.687938]  kmalloc_oob_memset_8+0x150/0x2f8
[   30.688680]  kunit_try_run_case+0x14c/0x3d0
[   30.689653]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.690442]  kthread+0x24c/0x2d0
[   30.691091]  ret_from_fork+0x10/0x20
[   30.691743] 
[   30.692127] Allocated by task 164:
[   30.692700]  kasan_save_stack+0x3c/0x68
[   30.693528]  kasan_save_track+0x20/0x40
[   30.694412]  kasan_save_alloc_info+0x40/0x58
[   30.695086]  __kasan_kmalloc+0xd4/0xd8
[   30.695692]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.696409]  kmalloc_oob_memset_8+0xb0/0x2f8
[   30.697032]  kunit_try_run_case+0x14c/0x3d0
[   30.697600]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.698612]  kthread+0x24c/0x2d0
[   30.699263]  ret_from_fork+0x10/0x20
[   30.699877] 
[   30.700319] The buggy address belongs to the object at fff00000c638e900
[   30.700319]  which belongs to the cache kmalloc-128 of size 128
[   30.701995] The buggy address is located 113 bytes inside of
[   30.701995]  allocated 120-byte region [fff00000c638e900, fff00000c638e978)
[   30.703338] 
[   30.703753] The buggy address belongs to the physical page:
[   30.704538] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10638e
[   30.705556] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.706626] page_type: f5(slab)
[   30.707166] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.708082] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.708957] page dumped because: kasan: bad access detected
[   30.709946] 
[   30.710272] Memory state around the buggy address:
[   30.710824]  fff00000c638e800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   30.711628]  fff00000c638e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.712347] >fff00000c638e900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.713509]                                                                 ^
[   30.714386]  fff00000c638e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.715233]  fff00000c638ea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.716045] ==================================================================
[   30.728475] ==================================================================
[   30.729513] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   30.730646] Write of size 16 at addr fff00000c638ea69 by task kunit_try_catch/166
[   30.731531] 
[   30.732504] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   30.734110] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.734855] Hardware name: linux,dummy-virt (DT)
[   30.735619] Call trace:
[   30.736226]  show_stack+0x20/0x38 (C)
[   30.736956]  dump_stack_lvl+0x8c/0xd0
[   30.738063]  print_report+0x118/0x5e0
[   30.738610]  kasan_report+0xc8/0x118
[   30.739270]  kasan_check_range+0x100/0x1a8
[   30.739880]  __asan_memset+0x34/0x78
[   30.740489]  kmalloc_oob_memset_16+0x150/0x2f8
[   30.741156]  kunit_try_run_case+0x14c/0x3d0
[   30.741890]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.742675]  kthread+0x24c/0x2d0
[   30.743248]  ret_from_fork+0x10/0x20
[   30.743866] 
[   30.744216] Allocated by task 166:
[   30.744642]  kasan_save_stack+0x3c/0x68
[   30.745343]  kasan_save_track+0x20/0x40
[   30.746107]  kasan_save_alloc_info+0x40/0x58
[   30.746730]  __kasan_kmalloc+0xd4/0xd8
[   30.747309]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.747979]  kmalloc_oob_memset_16+0xb0/0x2f8
[   30.748915]  kunit_try_run_case+0x14c/0x3d0
[   30.749915]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.750692]  kthread+0x24c/0x2d0
[   30.751279]  ret_from_fork+0x10/0x20
[   30.751869] 
[   30.752222] The buggy address belongs to the object at fff00000c638ea00
[   30.752222]  which belongs to the cache kmalloc-128 of size 128
[   30.754196] The buggy address is located 105 bytes inside of
[   30.754196]  allocated 120-byte region [fff00000c638ea00, fff00000c638ea78)
[   30.755266] 
[   30.755616] The buggy address belongs to the physical page:
[   30.756224] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10638e
[   30.757184] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.757984] page_type: f5(slab)
[   30.758564] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.759416] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.760258] page dumped because: kasan: bad access detected
[   30.761551] 
[   30.762230] Memory state around the buggy address:
[   30.762741]  fff00000c638e900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.763431]  fff00000c638e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.764107] >fff00000c638ea00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.765374]                                                                 ^
[   30.766250]  fff00000c638ea80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.767066]  fff00000c638eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.767960] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   30.532156] ==================================================================
[   30.533147] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   30.533914] Write of size 128 at addr fff00000c638e400 by task kunit_try_catch/158
[   30.535417] 
[   30.535762] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   30.536575] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.537516] Hardware name: linux,dummy-virt (DT)
[   30.538153] Call trace:
[   30.538507]  show_stack+0x20/0x38 (C)
[   30.539090]  dump_stack_lvl+0x8c/0xd0
[   30.539652]  print_report+0x118/0x5e0
[   30.540185]  kasan_report+0xc8/0x118
[   30.540773]  kasan_check_range+0x100/0x1a8
[   30.541820]  __asan_memset+0x34/0x78
[   30.542360]  kmalloc_oob_in_memset+0x144/0x2d0
[   30.542913]  kunit_try_run_case+0x14c/0x3d0
[   30.543494]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.544187]  kthread+0x24c/0x2d0
[   30.544771]  ret_from_fork+0x10/0x20
[   30.545477] 
[   30.545822] Allocated by task 158:
[   30.546237]  kasan_save_stack+0x3c/0x68
[   30.546741]  kasan_save_track+0x20/0x40
[   30.547668]  kasan_save_alloc_info+0x40/0x58
[   30.548226]  __kasan_kmalloc+0xd4/0xd8
[   30.548897]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.549906]  kmalloc_oob_in_memset+0xb0/0x2d0
[   30.550566]  kunit_try_run_case+0x14c/0x3d0
[   30.551219]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.551938]  kthread+0x24c/0x2d0
[   30.552518]  ret_from_fork+0x10/0x20
[   30.553241] 
[   30.554016] The buggy address belongs to the object at fff00000c638e400
[   30.554016]  which belongs to the cache kmalloc-128 of size 128
[   30.555044] The buggy address is located 0 bytes inside of
[   30.555044]  allocated 120-byte region [fff00000c638e400, fff00000c638e478)
[   30.555867] 
[   30.556336] The buggy address belongs to the physical page:
[   30.556800] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10638e
[   30.557441] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.559191] page_type: f5(slab)
[   30.559628] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.560408] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.561716] page dumped because: kasan: bad access detected
[   30.562569] 
[   30.563072] Memory state around the buggy address:
[   30.563806]  fff00000c638e300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   30.564760]  fff00000c638e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.565942] >fff00000c638e400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.566635]                                                                 ^
[   30.567306]  fff00000c638e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.568153]  fff00000c638e500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.569357] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[   30.880714] ==================================================================
[   30.882148] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   30.883498] Read of size 1 at addr fff00000c5d76c68 by task kunit_try_catch/172
[   30.884706] 
[   30.885251] CPU: 0 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   30.886521] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.887066] Hardware name: linux,dummy-virt (DT)
[   30.887603] Call trace:
[   30.887973]  show_stack+0x20/0x38 (C)
[   30.888603]  dump_stack_lvl+0x8c/0xd0
[   30.889388]  print_report+0x118/0x5e0
[   30.889987]  kasan_report+0xc8/0x118
[   30.890541]  __asan_report_load1_noabort+0x20/0x30
[   30.891103]  kmalloc_uaf+0x300/0x338
[   30.892189]  kunit_try_run_case+0x14c/0x3d0
[   30.892813]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.893481]  kthread+0x24c/0x2d0
[   30.894035]  ret_from_fork+0x10/0x20
[   30.895144] 
[   30.895477] Allocated by task 172:
[   30.895979]  kasan_save_stack+0x3c/0x68
[   30.896489]  kasan_save_track+0x20/0x40
[   30.897828]  kasan_save_alloc_info+0x40/0x58
[   30.898303]  __kasan_kmalloc+0xd4/0xd8
[   30.898872]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.899490]  kmalloc_uaf+0xb8/0x338
[   30.899976]  kunit_try_run_case+0x14c/0x3d0
[   30.900531]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.901832]  kthread+0x24c/0x2d0
[   30.902389]  ret_from_fork+0x10/0x20
[   30.902869] 
[   30.903215] Freed by task 172:
[   30.903678]  kasan_save_stack+0x3c/0x68
[   30.904158]  kasan_save_track+0x20/0x40
[   30.904748]  kasan_save_free_info+0x4c/0x78
[   30.905745]  __kasan_slab_free+0x6c/0x98
[   30.906424]  kfree+0x114/0x3c8
[   30.907152]  kmalloc_uaf+0x11c/0x338
[   30.907759]  kunit_try_run_case+0x14c/0x3d0
[   30.908430]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.909492]  kthread+0x24c/0x2d0
[   30.909993]  ret_from_fork+0x10/0x20
[   30.910731] 
[   30.911128] The buggy address belongs to the object at fff00000c5d76c60
[   30.911128]  which belongs to the cache kmalloc-16 of size 16
[   30.912344] The buggy address is located 8 bytes inside of
[   30.912344]  freed 16-byte region [fff00000c5d76c60, fff00000c5d76c70)
[   30.913814] 
[   30.914705] The buggy address belongs to the physical page:
[   30.915403] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d76
[   30.916347] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.917092] page_type: f5(slab)
[   30.917683] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   30.918530] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   30.919451] page dumped because: kasan: bad access detected
[   30.920207] 
[   30.920692] Memory state around the buggy address:
[   30.921997]  fff00000c5d76b00: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 05 fc fc
[   30.922885]  fff00000c5d76b80: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   30.923901] >fff00000c5d76c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.924701]                                                           ^
[   30.926338]  fff00000c5d76c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.927063]  fff00000c5d76d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.927828] ==================================================================
[   30.996249] ==================================================================
[   30.997730] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   30.998692] Read of size 1 at addr fff00000c63aea28 by task kunit_try_catch/176
[   30.999548] 
[   31.000626] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   31.002299] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.002928] Hardware name: linux,dummy-virt (DT)
[   31.003291] Call trace:
[   31.004011]  show_stack+0x20/0x38 (C)
[   31.004470]  dump_stack_lvl+0x8c/0xd0
[   31.005450]  print_report+0x118/0x5e0
[   31.006048]  kasan_report+0xc8/0x118
[   31.006685]  __asan_report_load1_noabort+0x20/0x30
[   31.007311]  kmalloc_uaf2+0x3f4/0x468
[   31.007961]  kunit_try_run_case+0x14c/0x3d0
[   31.008572]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.009329]  kthread+0x24c/0x2d0
[   31.009850]  ret_from_fork+0x10/0x20
[   31.010443] 
[   31.010789] Allocated by task 176:
[   31.011352]  kasan_save_stack+0x3c/0x68
[   31.012140]  kasan_save_track+0x20/0x40
[   31.012765]  kasan_save_alloc_info+0x40/0x58
[   31.013657]  __kasan_kmalloc+0xd4/0xd8
[   31.014388]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.015027]  kmalloc_uaf2+0xc4/0x468
[   31.015585]  kunit_try_run_case+0x14c/0x3d0
[   31.016199]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.017338]  kthread+0x24c/0x2d0
[   31.017834]  ret_from_fork+0x10/0x20
[   31.018407] 
[   31.018786] Freed by task 176:
[   31.019282]  kasan_save_stack+0x3c/0x68
[   31.019812]  kasan_save_track+0x20/0x40
[   31.020438]  kasan_save_free_info+0x4c/0x78
[   31.021427]  __kasan_slab_free+0x6c/0x98
[   31.021923]  kfree+0x114/0x3c8
[   31.022460]  kmalloc_uaf2+0x134/0x468
[   31.023060]  kunit_try_run_case+0x14c/0x3d0
[   31.023700]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.024399]  kthread+0x24c/0x2d0
[   31.025240]  ret_from_fork+0x10/0x20
[   31.025801] 
[   31.026402] The buggy address belongs to the object at fff00000c63aea00
[   31.026402]  which belongs to the cache kmalloc-64 of size 64
[   31.027627] The buggy address is located 40 bytes inside of
[   31.027627]  freed 64-byte region [fff00000c63aea00, fff00000c63aea40)
[   31.028790] 
[   31.029652] The buggy address belongs to the physical page:
[   31.030324] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ae
[   31.031257] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.032037] page_type: f5(slab)
[   31.032528] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   31.033490] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   31.034660] page dumped because: kasan: bad access detected
[   31.035321] 
[   31.035690] Memory state around the buggy address:
[   31.036242]  fff00000c63ae900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.037517]  fff00000c63ae980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.038364] >fff00000c63aea00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   31.039125]                                   ^
[   31.039706]  fff00000c63aea80: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   31.040540]  fff00000c63aeb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.041534] ==================================================================
[   30.482610] ==================================================================
[   30.483934] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   30.484842] Read of size 16 at addr fff00000c4005e80 by task kunit_try_catch/156
[   30.485563] 
[   30.485910] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   30.488800] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.489425] Hardware name: linux,dummy-virt (DT)
[   30.489951] Call trace:
[   30.490396]  show_stack+0x20/0x38 (C)
[   30.490930]  dump_stack_lvl+0x8c/0xd0
[   30.491442]  print_report+0x118/0x5e0
[   30.492037]  kasan_report+0xc8/0x118
[   30.492641]  __asan_report_load16_noabort+0x20/0x30
[   30.493351]  kmalloc_uaf_16+0x3bc/0x438
[   30.493929]  kunit_try_run_case+0x14c/0x3d0
[   30.494569]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.495241]  kthread+0x24c/0x2d0
[   30.495746]  ret_from_fork+0x10/0x20
[   30.496346] 
[   30.496683] Allocated by task 156:
[   30.497207]  kasan_save_stack+0x3c/0x68
[   30.497819]  kasan_save_track+0x20/0x40
[   30.498319]  kasan_save_alloc_info+0x40/0x58
[   30.498932]  __kasan_kmalloc+0xd4/0xd8
[   30.499461]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.499991]  kmalloc_uaf_16+0x140/0x438
[   30.500585]  kunit_try_run_case+0x14c/0x3d0
[   30.501104]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.501815]  kthread+0x24c/0x2d0
[   30.502344]  ret_from_fork+0x10/0x20
[   30.502844] 
[   30.503205] Freed by task 156:
[   30.503673]  kasan_save_stack+0x3c/0x68
[   30.504256]  kasan_save_track+0x20/0x40
[   30.504846]  kasan_save_free_info+0x4c/0x78
[   30.505462]  __kasan_slab_free+0x6c/0x98
[   30.505928]  kfree+0x114/0x3c8
[   30.506455]  kmalloc_uaf_16+0x190/0x438
[   30.507035]  kunit_try_run_case+0x14c/0x3d0
[   30.507667]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.508395]  kthread+0x24c/0x2d0
[   30.508868]  ret_from_fork+0x10/0x20
[   30.509437] 
[   30.509787] The buggy address belongs to the object at fff00000c4005e80
[   30.509787]  which belongs to the cache kmalloc-16 of size 16
[   30.510866] The buggy address is located 0 bytes inside of
[   30.510866]  freed 16-byte region [fff00000c4005e80, fff00000c4005e90)
[   30.512013] 
[   30.512380] The buggy address belongs to the physical page:
[   30.513056] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005
[   30.513852] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.514601] page_type: f5(slab)
[   30.515077] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   30.515838] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   30.516696] page dumped because: kasan: bad access detected
[   30.517417] 
[   30.517759] Memory state around the buggy address:
[   30.518396]  fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   30.518997]  fff00000c4005e00: fa fb fc fc fa fb fc fc fa fb fc fc 00 00 fc fc
[   30.519855] >fff00000c4005e80: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.520667]                    ^
[   30.521101]  fff00000c4005f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.521926]  fff00000c4005f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.522662] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[   30.338874] ==================================================================
[   30.340000] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   30.340716] Read of size 1 at addr fff00000c1de8000 by task kunit_try_catch/152
[   30.342252] 
[   30.342636] CPU: 1 UID: 0 PID: 152 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   30.343826] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.344436] Hardware name: linux,dummy-virt (DT)
[   30.345163] Call trace:
[   30.345593]  show_stack+0x20/0x38 (C)
[   30.346345]  dump_stack_lvl+0x8c/0xd0
[   30.346953]  print_report+0x118/0x5e0
[   30.347644]  kasan_report+0xc8/0x118
[   30.348330]  __kasan_check_byte+0x54/0x70
[   30.349104]  krealloc_noprof+0x44/0x360
[   30.349720]  krealloc_uaf+0x180/0x520
[   30.350359]  kunit_try_run_case+0x14c/0x3d0
[   30.350979]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.351839]  kthread+0x24c/0x2d0
[   30.352523]  ret_from_fork+0x10/0x20
[   30.353385] 
[   30.353789] Allocated by task 152:
[   30.354414]  kasan_save_stack+0x3c/0x68
[   30.355081]  kasan_save_track+0x20/0x40
[   30.355762]  kasan_save_alloc_info+0x40/0x58
[   30.356313]  __kasan_kmalloc+0xd4/0xd8
[   30.356790]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.357783]  krealloc_uaf+0xc8/0x520
[   30.358192]  kunit_try_run_case+0x14c/0x3d0
[   30.358629]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.359182]  kthread+0x24c/0x2d0
[   30.359724]  ret_from_fork+0x10/0x20
[   30.360989] 
[   30.361343] Freed by task 152:
[   30.362195]  kasan_save_stack+0x3c/0x68
[   30.362878]  kasan_save_track+0x20/0x40
[   30.363533]  kasan_save_free_info+0x4c/0x78
[   30.364173]  __kasan_slab_free+0x6c/0x98
[   30.364711]  kfree+0x114/0x3c8
[   30.364949]  krealloc_uaf+0x12c/0x520
[   30.365294]  kunit_try_run_case+0x14c/0x3d0
[   30.366405]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.367130]  kthread+0x24c/0x2d0
[   30.367536]  ret_from_fork+0x10/0x20
[   30.367993] 
[   30.368524] The buggy address belongs to the object at fff00000c1de8000
[   30.368524]  which belongs to the cache kmalloc-256 of size 256
[   30.369825] The buggy address is located 0 bytes inside of
[   30.369825]  freed 256-byte region [fff00000c1de8000, fff00000c1de8100)
[   30.370872] 
[   30.371187] The buggy address belongs to the physical page:
[   30.371789] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101de8
[   30.372968] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.373938] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.374638] page_type: f5(slab)
[   30.375023] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.375609] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.376285] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.377210] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.378156] head: 0bfffe0000000001 ffffc1ffc3077a01 ffffffffffffffff 0000000000000000
[   30.378941] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   30.379819] page dumped because: kasan: bad access detected
[   30.380536] 
[   30.380700] Memory state around the buggy address:
[   30.380960]  fff00000c1de7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.381480]  fff00000c1de7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.382078] >fff00000c1de8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.382665]                    ^
[   30.383049]  fff00000c1de8080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.383655]  fff00000c1de8100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.384257] ==================================================================
[   30.387094] ==================================================================
[   30.387802] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   30.388657] Read of size 1 at addr fff00000c1de8000 by task kunit_try_catch/152
[   30.389336] 
[   30.389654] CPU: 1 UID: 0 PID: 152 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   30.390473] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.390887] Hardware name: linux,dummy-virt (DT)
[   30.391353] Call trace:
[   30.391683]  show_stack+0x20/0x38 (C)
[   30.392164]  dump_stack_lvl+0x8c/0xd0
[   30.392804]  print_report+0x118/0x5e0
[   30.393457]  kasan_report+0xc8/0x118
[   30.394160]  __asan_report_load1_noabort+0x20/0x30
[   30.394965]  krealloc_uaf+0x4c8/0x520
[   30.395530]  kunit_try_run_case+0x14c/0x3d0
[   30.396078]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.396435]  kthread+0x24c/0x2d0
[   30.396678]  ret_from_fork+0x10/0x20
[   30.396926] 
[   30.397072] Allocated by task 152:
[   30.397421]  kasan_save_stack+0x3c/0x68
[   30.397959]  kasan_save_track+0x20/0x40
[   30.398638]  kasan_save_alloc_info+0x40/0x58
[   30.399328]  __kasan_kmalloc+0xd4/0xd8
[   30.400090]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.400845]  krealloc_uaf+0xc8/0x520
[   30.401455]  kunit_try_run_case+0x14c/0x3d0
[   30.402240]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.402972]  kthread+0x24c/0x2d0
[   30.403545]  ret_from_fork+0x10/0x20
[   30.404183] 
[   30.404594] Freed by task 152:
[   30.405135]  kasan_save_stack+0x3c/0x68
[   30.405765]  kasan_save_track+0x20/0x40
[   30.406373]  kasan_save_free_info+0x4c/0x78
[   30.407003]  __kasan_slab_free+0x6c/0x98
[   30.407692]  kfree+0x114/0x3c8
[   30.408222]  krealloc_uaf+0x12c/0x520
[   30.408826]  kunit_try_run_case+0x14c/0x3d0
[   30.409505]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.410241]  kthread+0x24c/0x2d0
[   30.410776]  ret_from_fork+0x10/0x20
[   30.411405] 
[   30.411864] The buggy address belongs to the object at fff00000c1de8000
[   30.411864]  which belongs to the cache kmalloc-256 of size 256
[   30.413299] The buggy address is located 0 bytes inside of
[   30.413299]  freed 256-byte region [fff00000c1de8000, fff00000c1de8100)
[   30.414224] 
[   30.414505] The buggy address belongs to the physical page:
[   30.414986] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101de8
[   30.415736] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.416668] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.417615] page_type: f5(slab)
[   30.418267] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.418647] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.419009] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.419564] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.420222] head: 0bfffe0000000001 ffffc1ffc3077a01 ffffffffffffffff 0000000000000000
[   30.420866] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   30.421504] page dumped because: kasan: bad access detected
[   30.422268] 
[   30.422614] Memory state around the buggy address:
[   30.423215]  fff00000c1de7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.423817]  fff00000c1de7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.424595] >fff00000c1de8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.425354]                    ^
[   30.425764]  fff00000c1de8080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.426579]  fff00000c1de8100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.427295] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   30.267985] ==================================================================
[   30.268828] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   30.269652] Write of size 1 at addr fff00000c64e60ea by task kunit_try_catch/150
[   30.270398] 
[   30.270751] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   30.272266] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.272817] Hardware name: linux,dummy-virt (DT)
[   30.273409] Call trace:
[   30.273818]  show_stack+0x20/0x38 (C)
[   30.274646]  dump_stack_lvl+0x8c/0xd0
[   30.275262]  print_report+0x118/0x5e0
[   30.275792]  kasan_report+0xc8/0x118
[   30.276390]  __asan_report_store1_noabort+0x20/0x30
[   30.277335]  krealloc_less_oob_helper+0xae4/0xc50
[   30.278033]  krealloc_large_less_oob+0x20/0x38
[   30.278616]  kunit_try_run_case+0x14c/0x3d0
[   30.279259]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.279948]  kthread+0x24c/0x2d0
[   30.280522]  ret_from_fork+0x10/0x20
[   30.281294] 
[   30.281533] The buggy address belongs to the physical page:
[   30.282217] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064e4
[   30.282938] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.283825] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.284586] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.285706] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.286519] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.287340] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.288194] head: 0bfffe0000000002 ffffc1ffc3193901 ffffffffffffffff 0000000000000000
[   30.289819] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.290550] page dumped because: kasan: bad access detected
[   30.291130] 
[   30.291464] Memory state around the buggy address:
[   30.292032]  fff00000c64e5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.292817]  fff00000c64e6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.293856] >fff00000c64e6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.294589]                                                           ^
[   30.295279]  fff00000c64e6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.296068]  fff00000c64e6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.296872] ==================================================================
[   30.238560] ==================================================================
[   30.239209] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   30.240024] Write of size 1 at addr fff00000c64e60da by task kunit_try_catch/150
[   30.240880] 
[   30.241522] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   30.242786] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.243406] Hardware name: linux,dummy-virt (DT)
[   30.243941] Call trace:
[   30.244383]  show_stack+0x20/0x38 (C)
[   30.244977]  dump_stack_lvl+0x8c/0xd0
[   30.245835]  print_report+0x118/0x5e0
[   30.246431]  kasan_report+0xc8/0x118
[   30.246927]  __asan_report_store1_noabort+0x20/0x30
[   30.247661]  krealloc_less_oob_helper+0xa80/0xc50
[   30.248238]  krealloc_large_less_oob+0x20/0x38
[   30.248886]  kunit_try_run_case+0x14c/0x3d0
[   30.249792]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.250492]  kthread+0x24c/0x2d0
[   30.251027]  ret_from_fork+0x10/0x20
[   30.251567] 
[   30.251878] The buggy address belongs to the physical page:
[   30.252445] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064e4
[   30.253631] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.254381] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.255241] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.256047] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.256895] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.258544] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.258931] head: 0bfffe0000000002 ffffc1ffc3193901 ffffffffffffffff 0000000000000000
[   30.259314] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.259663] page dumped because: kasan: bad access detected
[   30.259937] 
[   30.260081] Memory state around the buggy address:
[   30.261226]  fff00000c64e5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.262267]  fff00000c64e6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.263005] >fff00000c64e6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.263834]                                                     ^
[   30.264515]  fff00000c64e6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.265615]  fff00000c64e6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.266376] ==================================================================
[   29.915466] ==================================================================
[   29.916089] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   29.918603] Write of size 1 at addr fff00000c1de7ed0 by task kunit_try_catch/146
[   29.919324] 
[   29.919651] CPU: 1 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   29.920680] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.922418] Hardware name: linux,dummy-virt (DT)
[   29.923029] Call trace:
[   29.923381]  show_stack+0x20/0x38 (C)
[   29.923956]  dump_stack_lvl+0x8c/0xd0
[   29.924502]  print_report+0x118/0x5e0
[   29.925272]  kasan_report+0xc8/0x118
[   29.925761]  __asan_report_store1_noabort+0x20/0x30
[   29.926460]  krealloc_less_oob_helper+0xb9c/0xc50
[   29.927068]  krealloc_less_oob+0x20/0x38
[   29.927744]  kunit_try_run_case+0x14c/0x3d0
[   29.928257]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.929280]  kthread+0x24c/0x2d0
[   29.929837]  ret_from_fork+0x10/0x20
[   29.930390] 
[   29.930714] Allocated by task 146:
[   29.931237]  kasan_save_stack+0x3c/0x68
[   29.931729]  kasan_save_track+0x20/0x40
[   29.932337]  kasan_save_alloc_info+0x40/0x58
[   29.932874]  __kasan_krealloc+0x118/0x178
[   29.934374]  krealloc_noprof+0x128/0x360
[   29.934903]  krealloc_less_oob_helper+0x168/0xc50
[   29.935521]  krealloc_less_oob+0x20/0x38
[   29.936034]  kunit_try_run_case+0x14c/0x3d0
[   29.937206]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.937869]  kthread+0x24c/0x2d0
[   29.938340]  ret_from_fork+0x10/0x20
[   29.938882] 
[   29.939243] The buggy address belongs to the object at fff00000c1de7e00
[   29.939243]  which belongs to the cache kmalloc-256 of size 256
[   29.940375] The buggy address is located 7 bytes to the right of
[   29.940375]  allocated 201-byte region [fff00000c1de7e00, fff00000c1de7ec9)
[   29.941819] 
[   29.942171] The buggy address belongs to the physical page:
[   29.942801] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101de6
[   29.943646] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.944463] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.945558] page_type: f5(slab)
[   29.946002] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.946799] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   29.947587] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.948431] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   29.949472] head: 0bfffe0000000001 ffffc1ffc3077981 ffffffffffffffff 0000000000000000
[   29.950277] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   29.951068] page dumped because: kasan: bad access detected
[   29.951763] 
[   29.952096] Memory state around the buggy address:
[   29.952683]  fff00000c1de7d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.953867]  fff00000c1de7e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.954834] >fff00000c1de7e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   29.955567]                                                  ^
[   29.956188]  fff00000c1de7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.956797]  fff00000c1de7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.957965] ==================================================================
[   30.002764] ==================================================================
[   30.003546] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   30.004138] Write of size 1 at addr fff00000c1de7eea by task kunit_try_catch/146
[   30.004848] 
[   30.005513] CPU: 1 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   30.006576] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.007170] Hardware name: linux,dummy-virt (DT)
[   30.007768] Call trace:
[   30.008196]  show_stack+0x20/0x38 (C)
[   30.008785]  dump_stack_lvl+0x8c/0xd0
[   30.009549]  print_report+0x118/0x5e0
[   30.010148]  kasan_report+0xc8/0x118
[   30.010714]  __asan_report_store1_noabort+0x20/0x30
[   30.011384]  krealloc_less_oob_helper+0xae4/0xc50
[   30.012031]  krealloc_less_oob+0x20/0x38
[   30.012636]  kunit_try_run_case+0x14c/0x3d0
[   30.013544]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.014273]  kthread+0x24c/0x2d0
[   30.014723]  ret_from_fork+0x10/0x20
[   30.015312] 
[   30.015657] Allocated by task 146:
[   30.016152]  kasan_save_stack+0x3c/0x68
[   30.016739]  kasan_save_track+0x20/0x40
[   30.017525]  kasan_save_alloc_info+0x40/0x58
[   30.018139]  __kasan_krealloc+0x118/0x178
[   30.018626]  krealloc_noprof+0x128/0x360
[   30.019214]  krealloc_less_oob_helper+0x168/0xc50
[   30.019759]  krealloc_less_oob+0x20/0x38
[   30.020358]  kunit_try_run_case+0x14c/0x3d0
[   30.021587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.022234]  kthread+0x24c/0x2d0
[   30.022759]  ret_from_fork+0x10/0x20
[   30.023281] 
[   30.023629] The buggy address belongs to the object at fff00000c1de7e00
[   30.023629]  which belongs to the cache kmalloc-256 of size 256
[   30.024730] The buggy address is located 33 bytes to the right of
[   30.024730]  allocated 201-byte region [fff00000c1de7e00, fff00000c1de7ec9)
[   30.026183] 
[   30.026523] The buggy address belongs to the physical page:
[   30.027209] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101de6
[   30.028025] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.028847] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.029890] page_type: f5(slab)
[   30.030401] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.031130] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.032012] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.032791] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.033979] head: 0bfffe0000000001 ffffc1ffc3077981 ffffffffffffffff 0000000000000000
[   30.034803] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   30.035579] page dumped because: kasan: bad access detected
[   30.036200] 
[   30.036547] Memory state around the buggy address:
[   30.037342]  fff00000c1de7d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.038147]  fff00000c1de7e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.038920] >fff00000c1de7e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.039687]                                                           ^
[   30.040370]  fff00000c1de7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.042057]  fff00000c1de7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.042710] ==================================================================
[   30.044310] ==================================================================
[   30.045048] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   30.045938] Write of size 1 at addr fff00000c1de7eeb by task kunit_try_catch/146
[   30.046792] 
[   30.047474] CPU: 1 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   30.048606] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.049343] Hardware name: linux,dummy-virt (DT)
[   30.049946] Call trace:
[   30.050346]  show_stack+0x20/0x38 (C)
[   30.050866]  dump_stack_lvl+0x8c/0xd0
[   30.051416]  print_report+0x118/0x5e0
[   30.052006]  kasan_report+0xc8/0x118
[   30.052562]  __asan_report_store1_noabort+0x20/0x30
[   30.053546]  krealloc_less_oob_helper+0xa58/0xc50
[   30.054218]  krealloc_less_oob+0x20/0x38
[   30.054821]  kunit_try_run_case+0x14c/0x3d0
[   30.055391]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.056069]  kthread+0x24c/0x2d0
[   30.056641]  ret_from_fork+0x10/0x20
[   30.057531] 
[   30.057869] Allocated by task 146:
[   30.058286]  kasan_save_stack+0x3c/0x68
[   30.058869]  kasan_save_track+0x20/0x40
[   30.059419]  kasan_save_alloc_info+0x40/0x58
[   30.060049]  __kasan_krealloc+0x118/0x178
[   30.060661]  krealloc_noprof+0x128/0x360
[   30.061881]  krealloc_less_oob_helper+0x168/0xc50
[   30.062965]  krealloc_less_oob+0x20/0x38
[   30.063429]  kunit_try_run_case+0x14c/0x3d0
[   30.064036]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.064758]  kthread+0x24c/0x2d0
[   30.065545]  ret_from_fork+0x10/0x20
[   30.066082] 
[   30.066488] The buggy address belongs to the object at fff00000c1de7e00
[   30.066488]  which belongs to the cache kmalloc-256 of size 256
[   30.068054] The buggy address is located 34 bytes to the right of
[   30.068054]  allocated 201-byte region [fff00000c1de7e00, fff00000c1de7ec9)
[   30.069991] 
[   30.070485] The buggy address belongs to the physical page:
[   30.070997] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101de6
[   30.071766] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.072545] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.073606] page_type: f5(slab)
[   30.074363] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.074742] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.075103] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.075931] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   30.076706] head: 0bfffe0000000001 ffffc1ffc3077981 ffffffffffffffff 0000000000000000
[   30.077904] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   30.078744] page dumped because: kasan: bad access detected
[   30.079381] 
[   30.079754] Memory state around the buggy address:
[   30.080335]  fff00000c1de7d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.081970]  fff00000c1de7e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.082730] >fff00000c1de7e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   30.083572]                                                           ^
[   30.084331]  fff00000c1de7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.085295]  fff00000c1de7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.086190] ==================================================================
[   30.298289] ==================================================================
[   30.298805] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   30.299643] Write of size 1 at addr fff00000c64e60eb by task kunit_try_catch/150
[   30.300337] 
[   30.300655] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   30.303198] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.303838] Hardware name: linux,dummy-virt (DT)
[   30.304391] Call trace:
[   30.304740]  show_stack+0x20/0x38 (C)
[   30.305448]  dump_stack_lvl+0x8c/0xd0
[   30.306076]  print_report+0x118/0x5e0
[   30.306715]  kasan_report+0xc8/0x118
[   30.307274]  __asan_report_store1_noabort+0x20/0x30
[   30.307913]  krealloc_less_oob_helper+0xa58/0xc50
[   30.308635]  krealloc_large_less_oob+0x20/0x38
[   30.309729]  kunit_try_run_case+0x14c/0x3d0
[   30.310296]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.310943]  kthread+0x24c/0x2d0
[   30.311487]  ret_from_fork+0x10/0x20
[   30.312103] 
[   30.312497] The buggy address belongs to the physical page:
[   30.313040] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064e4
[   30.314211] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.314954] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.315890] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.316761] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.317868] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.318778] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.319553] head: 0bfffe0000000002 ffffc1ffc3193901 ffffffffffffffff 0000000000000000
[   30.320391] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.321263] page dumped because: kasan: bad access detected
[   30.322397] 
[   30.322877] Memory state around the buggy address:
[   30.323584]  fff00000c64e5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.324405]  fff00000c64e6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.325378] >fff00000c64e6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.326170]                                                           ^
[   30.326808]  fff00000c64e6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.328091]  fff00000c64e6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.328960] ==================================================================
[   30.173671] ==================================================================
[   30.174719] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   30.175762] Write of size 1 at addr fff00000c64e60c9 by task kunit_try_catch/150
[   30.176851] 
[   30.177641] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   30.178833] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.179321] Hardware name: linux,dummy-virt (DT)
[   30.179975] Call trace:
[   30.180416]  show_stack+0x20/0x38 (C)
[   30.181010]  dump_stack_lvl+0x8c/0xd0
[   30.181651]  print_report+0x118/0x5e0
[   30.182240]  kasan_report+0xc8/0x118
[   30.182748]  __asan_report_store1_noabort+0x20/0x30
[   30.183628]  krealloc_less_oob_helper+0xa48/0xc50
[   30.184273]  krealloc_large_less_oob+0x20/0x38
[   30.185161]  kunit_try_run_case+0x14c/0x3d0
[   30.185797]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.186555]  kthread+0x24c/0x2d0
[   30.187169]  ret_from_fork+0x10/0x20
[   30.187743] 
[   30.187912] The buggy address belongs to the physical page:
[   30.188308] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064e4
[   30.189726] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.190456] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.191211] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.192075] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.192899] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.193763] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.194660] head: 0bfffe0000000002 ffffc1ffc3193901 ffffffffffffffff 0000000000000000
[   30.195453] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.196291] page dumped because: kasan: bad access detected
[   30.196893] 
[   30.197252] Memory state around the buggy address:
[   30.197874]  fff00000c64e5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.198517]  fff00000c64e6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.199369] >fff00000c64e6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.200050]                                               ^
[   30.200781]  fff00000c64e6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.201516]  fff00000c64e6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.202859] ==================================================================
[   29.959568] ==================================================================
[   29.960249] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   29.960847] Write of size 1 at addr fff00000c1de7eda by task kunit_try_catch/146
[   29.961863] 
[   29.962247] CPU: 1 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   29.963432] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.964510] Hardware name: linux,dummy-virt (DT)
[   29.965328] Call trace:
[   29.965692]  show_stack+0x20/0x38 (C)
[   29.966177]  dump_stack_lvl+0x8c/0xd0
[   29.966778]  print_report+0x118/0x5e0
[   29.967489]  kasan_report+0xc8/0x118
[   29.968042]  __asan_report_store1_noabort+0x20/0x30
[   29.968681]  krealloc_less_oob_helper+0xa80/0xc50
[   29.969300]  krealloc_less_oob+0x20/0x38
[   29.969896]  kunit_try_run_case+0x14c/0x3d0
[   29.970479]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.971456]  kthread+0x24c/0x2d0
[   29.971960]  ret_from_fork+0x10/0x20
[   29.972567] 
[   29.972862] Allocated by task 146:
[   29.973621]  kasan_save_stack+0x3c/0x68
[   29.974169]  kasan_save_track+0x20/0x40
[   29.974695]  kasan_save_alloc_info+0x40/0x58
[   29.975344]  __kasan_krealloc+0x118/0x178
[   29.975924]  krealloc_noprof+0x128/0x360
[   29.976455]  krealloc_less_oob_helper+0x168/0xc50
[   29.977372]  krealloc_less_oob+0x20/0x38
[   29.977931]  kunit_try_run_case+0x14c/0x3d0
[   29.978504]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.979079]  kthread+0x24c/0x2d0
[   29.979631]  ret_from_fork+0x10/0x20
[   29.980180] 
[   29.980488] The buggy address belongs to the object at fff00000c1de7e00
[   29.980488]  which belongs to the cache kmalloc-256 of size 256
[   29.982752] The buggy address is located 17 bytes to the right of
[   29.982752]  allocated 201-byte region [fff00000c1de7e00, fff00000c1de7ec9)
[   29.983986] 
[   29.984345] The buggy address belongs to the physical page:
[   29.984874] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101de6
[   29.985860] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.986942] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.987702] page_type: f5(slab)
[   29.988226] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.989265] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   29.990171] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.990989] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   29.991809] head: 0bfffe0000000001 ffffc1ffc3077981 ffffffffffffffff 0000000000000000
[   29.992632] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   29.993636] page dumped because: kasan: bad access detected
[   29.994238] 
[   29.994565] Memory state around the buggy address:
[   29.995056]  fff00000c1de7d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.995914]  fff00000c1de7e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.996636] >fff00000c1de7e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   29.997796]                                                     ^
[   29.998504]  fff00000c1de7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.999255]  fff00000c1de7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.000061] ==================================================================
[   30.204946] ==================================================================
[   30.206349] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   30.207309] Write of size 1 at addr fff00000c64e60d0 by task kunit_try_catch/150
[   30.208082] 
[   30.208443] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   30.209878] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.210730] Hardware name: linux,dummy-virt (DT)
[   30.211383] Call trace:
[   30.211697]  show_stack+0x20/0x38 (C)
[   30.212171]  dump_stack_lvl+0x8c/0xd0
[   30.212710]  print_report+0x118/0x5e0
[   30.213856]  kasan_report+0xc8/0x118
[   30.214476]  __asan_report_store1_noabort+0x20/0x30
[   30.215195]  krealloc_less_oob_helper+0xb9c/0xc50
[   30.215758]  krealloc_large_less_oob+0x20/0x38
[   30.216373]  kunit_try_run_case+0x14c/0x3d0
[   30.217015]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.217689]  kthread+0x24c/0x2d0
[   30.218515]  ret_from_fork+0x10/0x20
[   30.219072] 
[   30.219383] The buggy address belongs to the physical page:
[   30.219989] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064e4
[   30.220855] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.222303] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.223052] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.223864] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.225007] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.225876] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.226981] head: 0bfffe0000000002 ffffc1ffc3193901 ffffffffffffffff 0000000000000000
[   30.227846] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.228591] page dumped because: kasan: bad access detected
[   30.229545] 
[   30.229854] Memory state around the buggy address:
[   30.230412]  fff00000c64e5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.231109]  fff00000c64e6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.231959] >fff00000c64e6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.232677]                                                  ^
[   30.233685]  fff00000c64e6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.234374]  fff00000c64e6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.235134] ==================================================================
[   29.871834] ==================================================================
[   29.872911] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   29.874089] Write of size 1 at addr fff00000c1de7ec9 by task kunit_try_catch/146
[   29.874902] 
[   29.875329] CPU: 1 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   29.876380] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.876950] Hardware name: linux,dummy-virt (DT)
[   29.877643] Call trace:
[   29.878058]  show_stack+0x20/0x38 (C)
[   29.878633]  dump_stack_lvl+0x8c/0xd0
[   29.879277]  print_report+0x118/0x5e0
[   29.879883]  kasan_report+0xc8/0x118
[   29.880403]  __asan_report_store1_noabort+0x20/0x30
[   29.881451]  krealloc_less_oob_helper+0xa48/0xc50
[   29.882080]  krealloc_less_oob+0x20/0x38
[   29.882654]  kunit_try_run_case+0x14c/0x3d0
[   29.883285]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.883956]  kthread+0x24c/0x2d0
[   29.884543]  ret_from_fork+0x10/0x20
[   29.885304] 
[   29.885742] Allocated by task 146:
[   29.886281]  kasan_save_stack+0x3c/0x68
[   29.886827]  kasan_save_track+0x20/0x40
[   29.887325]  kasan_save_alloc_info+0x40/0x58
[   29.887981]  __kasan_krealloc+0x118/0x178
[   29.888489]  krealloc_noprof+0x128/0x360
[   29.889073]  krealloc_less_oob_helper+0x168/0xc50
[   29.889688]  krealloc_less_oob+0x20/0x38
[   29.890463]  kunit_try_run_case+0x14c/0x3d0
[   29.891047]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.891670]  kthread+0x24c/0x2d0
[   29.892095]  ret_from_fork+0x10/0x20
[   29.893149] 
[   29.893789] The buggy address belongs to the object at fff00000c1de7e00
[   29.893789]  which belongs to the cache kmalloc-256 of size 256
[   29.895130] The buggy address is located 0 bytes to the right of
[   29.895130]  allocated 201-byte region [fff00000c1de7e00, fff00000c1de7ec9)
[   29.896656] 
[   29.896917] The buggy address belongs to the physical page:
[   29.897906] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101de6
[   29.898697] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.899821] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.900767] page_type: f5(slab)
[   29.901191] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.902301] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   29.903110] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.903891] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   29.904723] head: 0bfffe0000000001 ffffc1ffc3077981 ffffffffffffffff 0000000000000000
[   29.905935] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   29.906674] page dumped because: kasan: bad access detected
[   29.907671] 
[   29.907949] Memory state around the buggy address:
[   29.908594]  fff00000c1de7d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.909293]  fff00000c1de7e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.910177] >fff00000c1de7e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   29.911077]                                               ^
[   29.911688]  fff00000c1de7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.912579]  fff00000c1de7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.913761] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   29.814799] ==================================================================
[   29.816550] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680
[   29.817426] Write of size 1 at addr fff00000c61a20f0 by task kunit_try_catch/144
[   29.818256] 
[   29.818683] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   29.819942] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.820613] Hardware name: linux,dummy-virt (DT)
[   29.821157] Call trace:
[   29.821545]  show_stack+0x20/0x38 (C)
[   29.822031]  dump_stack_lvl+0x8c/0xd0
[   29.822650]  print_report+0x118/0x5e0
[   29.823176]  kasan_report+0xc8/0x118
[   29.823771]  __asan_report_store1_noabort+0x20/0x30
[   29.824746]  krealloc_more_oob_helper+0x5c8/0x680
[   29.826052]  krealloc_more_oob+0x20/0x38
[   29.826649]  kunit_try_run_case+0x14c/0x3d0
[   29.827292]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.827967]  kthread+0x24c/0x2d0
[   29.828583]  ret_from_fork+0x10/0x20
[   29.829511] 
[   29.829856] Allocated by task 144:
[   29.830344]  kasan_save_stack+0x3c/0x68
[   29.830968]  kasan_save_track+0x20/0x40
[   29.831559]  kasan_save_alloc_info+0x40/0x58
[   29.832181]  __kasan_krealloc+0x118/0x178
[   29.832703]  krealloc_noprof+0x128/0x360
[   29.833369]  krealloc_more_oob_helper+0x168/0x680
[   29.834764]  krealloc_more_oob+0x20/0x38
[   29.835494]  kunit_try_run_case+0x14c/0x3d0
[   29.836231]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.837107]  kthread+0x24c/0x2d0
[   29.837835]  ret_from_fork+0x10/0x20
[   29.838302] 
[   29.838607] The buggy address belongs to the object at fff00000c61a2000
[   29.838607]  which belongs to the cache kmalloc-256 of size 256
[   29.840312] The buggy address is located 5 bytes to the right of
[   29.840312]  allocated 235-byte region [fff00000c61a2000, fff00000c61a20eb)
[   29.841994] 
[   29.842402] The buggy address belongs to the physical page:
[   29.843657] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061a2
[   29.844719] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.845731] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.846739] page_type: f5(slab)
[   29.847217] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.848103] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   29.849795] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.850569] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   29.851448] head: 0bfffe0000000001 ffffc1ffc3186881 ffffffffffffffff 0000000000000000
[   29.852327] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   29.853192] page dumped because: kasan: bad access detected
[   29.854204] 
[   29.854564] Memory state around the buggy address:
[   29.855191]  fff00000c61a1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.855917]  fff00000c61a2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.856819] >fff00000c61a2080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   29.858299]                                                              ^
[   29.859054]  fff00000c61a2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.859862]  fff00000c61a2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.860665] ==================================================================
[   29.768598] ==================================================================
[   29.770253] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680
[   29.771161] Write of size 1 at addr fff00000c61a20eb by task kunit_try_catch/144
[   29.771901] 
[   29.772362] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   29.773692] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.774720] Hardware name: linux,dummy-virt (DT)
[   29.775367] Call trace:
[   29.775685]  show_stack+0x20/0x38 (C)
[   29.776140]  dump_stack_lvl+0x8c/0xd0
[   29.776665]  print_report+0x118/0x5e0
[   29.777458]  kasan_report+0xc8/0x118
[   29.778720]  __asan_report_store1_noabort+0x20/0x30
[   29.779468]  krealloc_more_oob_helper+0x614/0x680
[   29.780091]  krealloc_more_oob+0x20/0x38
[   29.780629]  kunit_try_run_case+0x14c/0x3d0
[   29.781558]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.782263]  kthread+0x24c/0x2d0
[   29.782824]  ret_from_fork+0x10/0x20
[   29.783369] 
[   29.783746] Allocated by task 144:
[   29.784316]  kasan_save_stack+0x3c/0x68
[   29.784888]  kasan_save_track+0x20/0x40
[   29.786212]  kasan_save_alloc_info+0x40/0x58
[   29.786833]  __kasan_krealloc+0x118/0x178
[   29.787465]  krealloc_noprof+0x128/0x360
[   29.788026]  krealloc_more_oob_helper+0x168/0x680
[   29.788731]  krealloc_more_oob+0x20/0x38
[   29.789281]  kunit_try_run_case+0x14c/0x3d0
[   29.790310]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.790938]  kthread+0x24c/0x2d0
[   29.791524]  ret_from_fork+0x10/0x20
[   29.792086] 
[   29.792491] The buggy address belongs to the object at fff00000c61a2000
[   29.792491]  which belongs to the cache kmalloc-256 of size 256
[   29.794473] The buggy address is located 0 bytes to the right of
[   29.794473]  allocated 235-byte region [fff00000c61a2000, fff00000c61a20eb)
[   29.795787] 
[   29.796175] The buggy address belongs to the physical page:
[   29.796763] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061a2
[   29.797670] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.798928] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.799759] page_type: f5(slab)
[   29.800332] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.801387] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   29.802157] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.802928] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   29.804190] head: 0bfffe0000000001 ffffc1ffc3186881 ffffffffffffffff 0000000000000000
[   29.804877] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   29.806056] page dumped because: kasan: bad access detected
[   29.806698] 
[   29.807034] Memory state around the buggy address:
[   29.807526]  fff00000c61a1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.808394]  fff00000c61a2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.809102] >fff00000c61a2080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   29.810066]                                                           ^
[   29.810778]  fff00000c61a2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.811943]  fff00000c61a2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.812828] ==================================================================
[   30.096251] ==================================================================
[   30.097650] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680
[   30.098555] Write of size 1 at addr fff00000c65260eb by task kunit_try_catch/148
[   30.099180] 
[   30.099562] CPU: 0 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   30.100606] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.102009] Hardware name: linux,dummy-virt (DT)
[   30.102658] Call trace:
[   30.103188]  show_stack+0x20/0x38 (C)
[   30.103867]  dump_stack_lvl+0x8c/0xd0
[   30.104596]  print_report+0x118/0x5e0
[   30.105315]  kasan_report+0xc8/0x118
[   30.106096]  __asan_report_store1_noabort+0x20/0x30
[   30.106759]  krealloc_more_oob_helper+0x614/0x680
[   30.107374]  krealloc_large_more_oob+0x20/0x38
[   30.107938]  kunit_try_run_case+0x14c/0x3d0
[   30.108454]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.109276]  kthread+0x24c/0x2d0
[   30.110524]  ret_from_fork+0x10/0x20
[   30.111232] 
[   30.111618] The buggy address belongs to the physical page:
[   30.112324] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106524
[   30.113153] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.114354] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.115219] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.116053] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.117263] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.117947] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.118753] head: 0bfffe0000000002 ffffc1ffc3194901 ffffffffffffffff 0000000000000000
[   30.119511] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.120813] page dumped because: kasan: bad access detected
[   30.121905] 
[   30.122279] Memory state around the buggy address:
[   30.122993]  fff00000c6525f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.123646]  fff00000c6526000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.124000] >fff00000c6526080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   30.124608]                                                           ^
[   30.125509]  fff00000c6526100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.126197]  fff00000c6526180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.127689] ==================================================================
[   30.130476] ==================================================================
[   30.131051] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680
[   30.131922] Write of size 1 at addr fff00000c65260f0 by task kunit_try_catch/148
[   30.132830] 
[   30.133902] CPU: 0 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   30.136032] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.136597] Hardware name: linux,dummy-virt (DT)
[   30.137574] Call trace:
[   30.138017]  show_stack+0x20/0x38 (C)
[   30.138615]  dump_stack_lvl+0x8c/0xd0
[   30.139475]  print_report+0x118/0x5e0
[   30.140352]  kasan_report+0xc8/0x118
[   30.140846]  __asan_report_store1_noabort+0x20/0x30
[   30.141551]  krealloc_more_oob_helper+0x5c8/0x680
[   30.142551]  krealloc_large_more_oob+0x20/0x38
[   30.143199]  kunit_try_run_case+0x14c/0x3d0
[   30.143814]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.144550]  kthread+0x24c/0x2d0
[   30.145157]  ret_from_fork+0x10/0x20
[   30.146453] 
[   30.146842] The buggy address belongs to the physical page:
[   30.147453] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106524
[   30.148424] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.149625] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.150546] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.151284] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.152006] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.153625] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.154863] head: 0bfffe0000000002 ffffc1ffc3194901 ffffffffffffffff 0000000000000000
[   30.155832] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.156738] page dumped because: kasan: bad access detected
[   30.157819] 
[   30.158152] Memory state around the buggy address:
[   30.158792]  fff00000c6525f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.159410]  fff00000c6526000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.160244] >fff00000c6526080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   30.161193]                                                              ^
[   30.162224]  fff00000c6526100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.163354]  fff00000c6526180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.164224] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[   29.682770] ==================================================================
[   29.684004] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   29.684665] Free of addr fff00000c64e0001 by task kunit_try_catch/138
[   29.685950] 
[   29.686222] CPU: 1 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   29.687275] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.687871] Hardware name: linux,dummy-virt (DT)
[   29.688392] Call trace:
[   29.688851]  show_stack+0x20/0x38 (C)
[   29.689779]  dump_stack_lvl+0x8c/0xd0
[   29.690422]  print_report+0x118/0x5e0
[   29.691019]  kasan_report_invalid_free+0xb0/0xd8
[   29.691687]  __kasan_kfree_large+0x5c/0xa8
[   29.692375]  free_large_kmalloc+0x58/0x140
[   29.693041]  kfree+0x270/0x3c8
[   29.693563]  kmalloc_large_invalid_free+0x108/0x270
[   29.694214]  kunit_try_run_case+0x14c/0x3d0
[   29.694805]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.695709]  kthread+0x24c/0x2d0
[   29.696272]  ret_from_fork+0x10/0x20
[   29.696968] 
[   29.697511] The buggy address belongs to the physical page:
[   29.698090] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064e0
[   29.699038] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.699885] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.700758] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.701850] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.702744] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.703545] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.704687] head: 0bfffe0000000002 ffffc1ffc3193801 ffffffffffffffff 0000000000000000
[   29.705773] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   29.706404] page dumped because: kasan: bad access detected
[   29.707021] 
[   29.707869] Memory state around the buggy address:
[   29.708551]  fff00000c64dff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.709733]  fff00000c64dff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.710547] >fff00000c64e0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.711339]                    ^
[   29.711823]  fff00000c64e0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.712632]  fff00000c64e0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.713710] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[   29.646739] ==================================================================
[   29.647944] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   29.648530] Read of size 1 at addr fff00000c6520000 by task kunit_try_catch/136
[   29.648881] 
[   29.649703] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   29.651564] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.652258] Hardware name: linux,dummy-virt (DT)
[   29.652787] Call trace:
[   29.653954]  show_stack+0x20/0x38 (C)
[   29.654563]  dump_stack_lvl+0x8c/0xd0
[   29.655156]  print_report+0x118/0x5e0
[   29.655754]  kasan_report+0xc8/0x118
[   29.656351]  __asan_report_load1_noabort+0x20/0x30
[   29.657040]  kmalloc_large_uaf+0x2cc/0x2f8
[   29.657555]  kunit_try_run_case+0x14c/0x3d0
[   29.658094]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.658854]  kthread+0x24c/0x2d0
[   29.660199]  ret_from_fork+0x10/0x20
[   29.660814] 
[   29.661524] The buggy address belongs to the physical page:
[   29.662189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106520
[   29.663093] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.663910] raw: 0bfffe0000000000 ffffc1ffc3194908 fff00000da4e3f80 0000000000000000
[   29.664820] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   29.666001] page dumped because: kasan: bad access detected
[   29.666747] 
[   29.667408] Memory state around the buggy address:
[   29.668247]  fff00000c651ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.669140]  fff00000c651ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.670104] >fff00000c6520000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.671144]                    ^
[   29.671683]  fff00000c6520080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.672475]  fff00000c6520100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.673512] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   29.606831] ==================================================================
[   29.607954] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   29.608803] Write of size 1 at addr fff00000c64e200a by task kunit_try_catch/134
[   29.609526] 
[   29.609877] CPU: 1 UID: 0 PID: 134 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   29.610872] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.611439] Hardware name: linux,dummy-virt (DT)
[   29.611936] Call trace:
[   29.612855]  show_stack+0x20/0x38 (C)
[   29.613730]  dump_stack_lvl+0x8c/0xd0
[   29.614276]  print_report+0x118/0x5e0
[   29.614867]  kasan_report+0xc8/0x118
[   29.615435]  __asan_report_store1_noabort+0x20/0x30
[   29.616052]  kmalloc_large_oob_right+0x278/0x2b8
[   29.616703]  kunit_try_run_case+0x14c/0x3d0
[   29.617561]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.618242]  kthread+0x24c/0x2d0
[   29.618709]  ret_from_fork+0x10/0x20
[   29.619300] 
[   29.619682] The buggy address belongs to the physical page:
[   29.620318] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064e0
[   29.621476] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.622391] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.623103] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.624024] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.624888] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.625740] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.626644] head: 0bfffe0000000002 ffffc1ffc3193801 ffffffffffffffff 0000000000000000
[   29.627732] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   29.628583] page dumped because: kasan: bad access detected
[   29.630250] 
[   29.630580] Memory state around the buggy address:
[   29.631265]  fff00000c64e1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.632061]  fff00000c64e1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.632914] >fff00000c64e2000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.633959]                       ^
[   29.634408]  fff00000c64e2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.635291]  fff00000c64e2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.636037] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[   29.552343] ==================================================================
[   29.553786] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   29.555310] Write of size 1 at addr fff00000c6519f00 by task kunit_try_catch/132
[   29.556701] 
[   29.557222] CPU: 0 UID: 0 PID: 132 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   29.558716] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.559199] Hardware name: linux,dummy-virt (DT)
[   29.559874] Call trace:
[   29.560331]  show_stack+0x20/0x38 (C)
[   29.560956]  dump_stack_lvl+0x8c/0xd0
[   29.562426]  print_report+0x118/0x5e0
[   29.562945]  kasan_report+0xc8/0x118
[   29.563448]  __asan_report_store1_noabort+0x20/0x30
[   29.564069]  kmalloc_big_oob_right+0x2a4/0x2f0
[   29.564667]  kunit_try_run_case+0x14c/0x3d0
[   29.565696]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.566425]  kthread+0x24c/0x2d0
[   29.566889]  ret_from_fork+0x10/0x20
[   29.567398] 
[   29.567717] Allocated by task 132:
[   29.568207]  kasan_save_stack+0x3c/0x68
[   29.568735]  kasan_save_track+0x20/0x40
[   29.569232]  kasan_save_alloc_info+0x40/0x58
[   29.570491]  __kasan_kmalloc+0xd4/0xd8
[   29.571561]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.572350]  kmalloc_big_oob_right+0xb8/0x2f0
[   29.573160]  kunit_try_run_case+0x14c/0x3d0
[   29.574144]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.574733]  kthread+0x24c/0x2d0
[   29.575276]  ret_from_fork+0x10/0x20
[   29.575757] 
[   29.576097] The buggy address belongs to the object at fff00000c6518000
[   29.576097]  which belongs to the cache kmalloc-8k of size 8192
[   29.577403] The buggy address is located 0 bytes to the right of
[   29.577403]  allocated 7936-byte region [fff00000c6518000, fff00000c6519f00)
[   29.579002] 
[   29.579435] The buggy address belongs to the physical page:
[   29.580243] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106518
[   29.581066] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.581874] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.583389] page_type: f5(slab)
[   29.584017] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   29.585036] raw: 0000000000000000 0000000080020002 00000001f5000000 0000000000000000
[   29.585832] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   29.586632] head: 0000000000000000 0000000080020002 00000001f5000000 0000000000000000
[   29.588200] head: 0bfffe0000000003 ffffc1ffc3194601 ffffffffffffffff 0000000000000000
[   29.589363] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000
[   29.590153] page dumped because: kasan: bad access detected
[   29.590750] 
[   29.591082] Memory state around the buggy address:
[   29.591581]  fff00000c6519e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.592431]  fff00000c6519e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.593321] >fff00000c6519f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.593991]                    ^
[   29.594433]  fff00000c6519f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.596038]  fff00000c651a000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.596645] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[   29.466061] ==================================================================
[   29.467220] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x414/0x490
[   29.468079] Write of size 1 at addr fff00000c402fb78 by task kunit_try_catch/130
[   29.468818] 
[   29.469661] CPU: 1 UID: 0 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   29.470689] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.471209] Hardware name: linux,dummy-virt (DT)
[   29.471821] Call trace:
[   29.472235]  show_stack+0x20/0x38 (C)
[   29.472741]  dump_stack_lvl+0x8c/0xd0
[   29.473583]  print_report+0x118/0x5e0
[   29.474332]  kasan_report+0xc8/0x118
[   29.475015]  __asan_report_store1_noabort+0x20/0x30
[   29.475597]  kmalloc_track_caller_oob_right+0x414/0x490
[   29.476224]  kunit_try_run_case+0x14c/0x3d0
[   29.476853]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.477732]  kthread+0x24c/0x2d0
[   29.478296]  ret_from_fork+0x10/0x20
[   29.478878] 
[   29.479214] Allocated by task 130:
[   29.479727]  kasan_save_stack+0x3c/0x68
[   29.480201]  kasan_save_track+0x20/0x40
[   29.480785]  kasan_save_alloc_info+0x40/0x58
[   29.481370]  __kasan_kmalloc+0xd4/0xd8
[   29.482228]  __kmalloc_node_track_caller_noprof+0x184/0x4b8
[   29.482957]  kmalloc_track_caller_oob_right+0xa8/0x490
[   29.483588]  kunit_try_run_case+0x14c/0x3d0
[   29.484212]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.484854]  kthread+0x24c/0x2d0
[   29.485437]  ret_from_fork+0x10/0x20
[   29.486169] 
[   29.486480] The buggy address belongs to the object at fff00000c402fb00
[   29.486480]  which belongs to the cache kmalloc-128 of size 128
[   29.487600] The buggy address is located 0 bytes to the right of
[   29.487600]  allocated 120-byte region [fff00000c402fb00, fff00000c402fb78)
[   29.488816] 
[   29.489128] The buggy address belongs to the physical page:
[   29.490041] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10402f
[   29.490968] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.492362] page_type: f5(slab)
[   29.492986] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.494009] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   29.494954] page dumped because: kasan: bad access detected
[   29.495685] 
[   29.496074] Memory state around the buggy address:
[   29.496784]  fff00000c402fa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   29.498041]  fff00000c402fa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.498930] >fff00000c402fb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.499730]                                                                 ^
[   29.500543]  fff00000c402fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.501612]  fff00000c402fc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.502334] ==================================================================
[   29.504789] ==================================================================
[   29.505650] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x420/0x490
[   29.506361] Write of size 1 at addr fff00000c402fc78 by task kunit_try_catch/130
[   29.507535] 
[   29.507943] CPU: 1 UID: 0 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   29.509411] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.509994] Hardware name: linux,dummy-virt (DT)
[   29.510664] Call trace:
[   29.511144]  show_stack+0x20/0x38 (C)
[   29.511619]  dump_stack_lvl+0x8c/0xd0
[   29.512224]  print_report+0x118/0x5e0
[   29.512816]  kasan_report+0xc8/0x118
[   29.513638]  __asan_report_store1_noabort+0x20/0x30
[   29.514275]  kmalloc_track_caller_oob_right+0x420/0x490
[   29.514982]  kunit_try_run_case+0x14c/0x3d0
[   29.515506]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.516255]  kthread+0x24c/0x2d0
[   29.516819]  ret_from_fork+0x10/0x20
[   29.517625] 
[   29.517902] Allocated by task 130:
[   29.518402]  kasan_save_stack+0x3c/0x68
[   29.518972]  kasan_save_track+0x20/0x40
[   29.519563]  kasan_save_alloc_info+0x40/0x58
[   29.520067]  __kasan_kmalloc+0xd4/0xd8
[   29.520664]  __kmalloc_node_track_caller_noprof+0x184/0x4b8
[   29.521605]  kmalloc_track_caller_oob_right+0x184/0x490
[   29.522244]  kunit_try_run_case+0x14c/0x3d0
[   29.522852]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.523518]  kthread+0x24c/0x2d0
[   29.524051]  ret_from_fork+0x10/0x20
[   29.524623] 
[   29.525655] The buggy address belongs to the object at fff00000c402fc00
[   29.525655]  which belongs to the cache kmalloc-128 of size 128
[   29.527243] The buggy address is located 0 bytes to the right of
[   29.527243]  allocated 120-byte region [fff00000c402fc00, fff00000c402fc78)
[   29.528966] 
[   29.529531] The buggy address belongs to the physical page:
[   29.530158] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10402f
[   29.530958] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.531671] page_type: f5(slab)
[   29.532215] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.533142] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   29.534159] page dumped because: kasan: bad access detected
[   29.534739] 
[   29.535077] Memory state around the buggy address:
[   29.535706]  fff00000c402fb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.536489]  fff00000c402fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.537465] >fff00000c402fc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.538274]                                                                 ^
[   29.539070]  fff00000c402fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.540209]  fff00000c402fd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.541133] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[   29.412841] ==================================================================
[   29.414296] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   29.415130] Read of size 1 at addr fff00000c6453000 by task kunit_try_catch/128
[   29.415956] 
[   29.416369] CPU: 0 UID: 0 PID: 128 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   29.417912] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.418435] Hardware name: linux,dummy-virt (DT)
[   29.419178] Call trace:
[   29.419600]  show_stack+0x20/0x38 (C)
[   29.420161]  dump_stack_lvl+0x8c/0xd0
[   29.420812]  print_report+0x118/0x5e0
[   29.421474]  kasan_report+0xc8/0x118
[   29.422407]  __asan_report_load1_noabort+0x20/0x30
[   29.423052]  kmalloc_node_oob_right+0x2f4/0x330
[   29.423704]  kunit_try_run_case+0x14c/0x3d0
[   29.424384]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.425083]  kthread+0x24c/0x2d0
[   29.425973]  ret_from_fork+0x10/0x20
[   29.426545] 
[   29.426919] Allocated by task 128:
[   29.427472]  kasan_save_stack+0x3c/0x68
[   29.427973]  kasan_save_track+0x20/0x40
[   29.428612]  kasan_save_alloc_info+0x40/0x58
[   29.429696]  __kasan_kmalloc+0xd4/0xd8
[   29.430189]  __kmalloc_cache_node_noprof+0x168/0x3d0
[   29.430718]  kmalloc_node_oob_right+0xbc/0x330
[   29.431207]  kunit_try_run_case+0x14c/0x3d0
[   29.431670]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.432254]  kthread+0x24c/0x2d0
[   29.433647]  ret_from_fork+0x10/0x20
[   29.434156] 
[   29.434461] The buggy address belongs to the object at fff00000c6452000
[   29.434461]  which belongs to the cache kmalloc-4k of size 4096
[   29.435742] The buggy address is located 0 bytes to the right of
[   29.435742]  allocated 4096-byte region [fff00000c6452000, fff00000c6453000)
[   29.437081] 
[   29.437814] The buggy address belongs to the physical page:
[   29.438450] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106450
[   29.439495] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.440414] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.441169] page_type: f5(slab)
[   29.442037] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   29.442940] raw: 0000000000000000 0000000080040004 00000001f5000000 0000000000000000
[   29.443953] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   29.444756] head: 0000000000000000 0000000080040004 00000001f5000000 0000000000000000
[   29.446043] head: 0bfffe0000000003 ffffc1ffc3191401 ffffffffffffffff 0000000000000000
[   29.447057] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000
[   29.448050] page dumped because: kasan: bad access detected
[   29.448843] 
[   29.449182] Memory state around the buggy address:
[   29.450198]  fff00000c6452f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.450890]  fff00000c6452f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.451578] >fff00000c6453000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.452686]                    ^
[   29.453097]  fff00000c6453080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.454363]  fff00000c6453100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.455305] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   29.358462] ==================================================================
[   29.359563] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   29.360328] Read of size 1 at addr fff00000c4005dff by task kunit_try_catch/126
[   29.360961] 
[   29.361380] CPU: 1 UID: 0 PID: 126 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   29.362801] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.363505] Hardware name: linux,dummy-virt (DT)
[   29.364261] Call trace:
[   29.364839]  show_stack+0x20/0x38 (C)
[   29.365586]  dump_stack_lvl+0x8c/0xd0
[   29.366362]  print_report+0x118/0x5e0
[   29.367065]  kasan_report+0xc8/0x118
[   29.367790]  __asan_report_load1_noabort+0x20/0x30
[   29.368596]  kmalloc_oob_left+0x2ec/0x320
[   29.369503]  kunit_try_run_case+0x14c/0x3d0
[   29.370267]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.371105]  kthread+0x24c/0x2d0
[   29.371580]  ret_from_fork+0x10/0x20
[   29.372072] 
[   29.372395] Allocated by task 28:
[   29.372842]  kasan_save_stack+0x3c/0x68
[   29.373944]  kasan_save_track+0x20/0x40
[   29.374662]  kasan_save_alloc_info+0x40/0x58
[   29.375409]  __kasan_kmalloc+0xd4/0xd8
[   29.376073]  __kmalloc_node_track_caller_noprof+0x184/0x4b8
[   29.376945]  kstrdup+0x54/0xc8
[   29.377638]  devtmpfs_work_loop+0x384/0x590
[   29.378191]  devtmpfsd+0x50/0x58
[   29.378633]  kthread+0x24c/0x2d0
[   29.379065]  ret_from_fork+0x10/0x20
[   29.380094] 
[   29.380683] Freed by task 28:
[   29.381807]  kasan_save_stack+0x3c/0x68
[   29.382272]  kasan_save_track+0x20/0x40
[   29.382849]  kasan_save_free_info+0x4c/0x78
[   29.383425]  __kasan_slab_free+0x6c/0x98
[   29.384022]  kfree+0x114/0x3c8
[   29.384693]  devtmpfs_work_loop+0x498/0x590
[   29.385421]  devtmpfsd+0x50/0x58
[   29.385922]  kthread+0x24c/0x2d0
[   29.386490]  ret_from_fork+0x10/0x20
[   29.387136] 
[   29.387485] The buggy address belongs to the object at fff00000c4005de0
[   29.387485]  which belongs to the cache kmalloc-16 of size 16
[   29.388750] The buggy address is located 15 bytes to the right of
[   29.388750]  allocated 16-byte region [fff00000c4005de0, fff00000c4005df0)
[   29.389987] 
[   29.390382] The buggy address belongs to the physical page:
[   29.391041] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104005
[   29.391962] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.392718] page_type: f5(slab)
[   29.393287] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   29.394139] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   29.395142] page dumped because: kasan: bad access detected
[   29.395880] 
[   29.396292] Memory state around the buggy address:
[   29.396979]  fff00000c4005c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.397716]  fff00000c4005d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.398467] >fff00000c4005d80: 00 05 fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   29.399208]                                                                 ^
[   29.400070]  fff00000c4005e00: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.400833]  fff00000c4005e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.401669] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   29.224178] ==================================================================
[   29.225632] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   29.227641] Write of size 1 at addr fff00000c402f973 by task kunit_try_catch/124
[   29.228612] 
[   29.230546] CPU: 1 UID: 0 PID: 124 Comm: kunit_try_catch Tainted: G                 N 6.12.0-next-20241128 #1
[   29.231806] Tainted: [N]=TEST
[   29.232226] Hardware name: linux,dummy-virt (DT)
[   29.233586] Call trace:
[   29.234431]  show_stack+0x20/0x38 (C)
[   29.235306]  dump_stack_lvl+0x8c/0xd0
[   29.235822]  print_report+0x118/0x5e0
[   29.236523]  kasan_report+0xc8/0x118
[   29.237409]  __asan_report_store1_noabort+0x20/0x30
[   29.238217]  kmalloc_oob_right+0x5a4/0x660
[   29.238931]  kunit_try_run_case+0x14c/0x3d0
[   29.239686]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.240365]  kthread+0x24c/0x2d0
[   29.240841]  ret_from_fork+0x10/0x20
[   29.242257] 
[   29.242686] Allocated by task 124:
[   29.243373]  kasan_save_stack+0x3c/0x68
[   29.243939]  kasan_save_track+0x20/0x40
[   29.244802]  kasan_save_alloc_info+0x40/0x58
[   29.245600]  __kasan_kmalloc+0xd4/0xd8
[   29.246307]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.247041]  kmalloc_oob_right+0xb0/0x660
[   29.247776]  kunit_try_run_case+0x14c/0x3d0
[   29.248510]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.249372]  kthread+0x24c/0x2d0
[   29.249818]  ret_from_fork+0x10/0x20
[   29.250366] 
[   29.250757] The buggy address belongs to the object at fff00000c402f900
[   29.250757]  which belongs to the cache kmalloc-128 of size 128
[   29.252652] The buggy address is located 0 bytes to the right of
[   29.252652]  allocated 115-byte region [fff00000c402f900, fff00000c402f973)
[   29.253993] 
[   29.254556] The buggy address belongs to the physical page:
[   29.255587] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10402f
[   29.256675] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.258126] page_type: f5(slab)
[   29.259245] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.260028] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   29.261069] page dumped because: kasan: bad access detected
[   29.261927] 
[   29.262282] Memory state around the buggy address:
[   29.263354]  fff00000c402f800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   29.264158]  fff00000c402f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.265012] >fff00000c402f900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.265767]                                                              ^
[   29.266777]  fff00000c402f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.267628]  fff00000c402fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.268498] ==================================================================
[   29.309859] ==================================================================
[   29.311523] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   29.312479] Read of size 1 at addr fff00000c402f980 by task kunit_try_catch/124
[   29.313925] 
[   29.314204] CPU: 1 UID: 0 PID: 124 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   29.315162] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.315769] Hardware name: linux,dummy-virt (DT)
[   29.316350] Call trace:
[   29.316631]  show_stack+0x20/0x38 (C)
[   29.317748]  dump_stack_lvl+0x8c/0xd0
[   29.318420]  print_report+0x118/0x5e0
[   29.319136]  kasan_report+0xc8/0x118
[   29.319734]  __asan_report_load1_noabort+0x20/0x30
[   29.320316]  kmalloc_oob_right+0x5d0/0x660
[   29.320927]  kunit_try_run_case+0x14c/0x3d0
[   29.321845]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.322457]  kthread+0x24c/0x2d0
[   29.323004]  ret_from_fork+0x10/0x20
[   29.323556] 
[   29.323875] Allocated by task 124:
[   29.324342]  kasan_save_stack+0x3c/0x68
[   29.324914]  kasan_save_track+0x20/0x40
[   29.325467]  kasan_save_alloc_info+0x40/0x58
[   29.326381]  __kasan_kmalloc+0xd4/0xd8
[   29.326995]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.327571]  kmalloc_oob_right+0xb0/0x660
[   29.328063]  kunit_try_run_case+0x14c/0x3d0
[   29.328697]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.330381]  kthread+0x24c/0x2d0
[   29.330869]  ret_from_fork+0x10/0x20
[   29.331609] 
[   29.332133] The buggy address belongs to the object at fff00000c402f900
[   29.332133]  which belongs to the cache kmalloc-128 of size 128
[   29.334035] The buggy address is located 13 bytes to the right of
[   29.334035]  allocated 115-byte region [fff00000c402f900, fff00000c402f973)
[   29.335366] 
[   29.335845] The buggy address belongs to the physical page:
[   29.336509] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10402f
[   29.337607] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.337982] page_type: f5(slab)
[   29.338307] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.339565] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   29.340535] page dumped because: kasan: bad access detected
[   29.341467] 
[   29.341948] Memory state around the buggy address:
[   29.342709]  fff00000c402f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.343671]  fff00000c402f900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.344637] >fff00000c402f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.345737]                    ^
[   29.346203]  fff00000c402fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.346933]  fff00000c402fa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.348074] ==================================================================
[   29.273570] ==================================================================
[   29.274192] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   29.274854] Write of size 1 at addr fff00000c402f978 by task kunit_try_catch/124
[   29.275547] 
[   29.275790] CPU: 1 UID: 0 PID: 124 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[   29.277755] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.278298] Hardware name: linux,dummy-virt (DT)
[   29.278885] Call trace:
[   29.279391]  show_stack+0x20/0x38 (C)
[   29.280049]  dump_stack_lvl+0x8c/0xd0
[   29.280762]  print_report+0x118/0x5e0
[   29.281391]  kasan_report+0xc8/0x118
[   29.282020]  __asan_report_store1_noabort+0x20/0x30
[   29.282688]  kmalloc_oob_right+0x538/0x660
[   29.283278]  kunit_try_run_case+0x14c/0x3d0
[   29.283876]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.284608]  kthread+0x24c/0x2d0
[   29.285396]  ret_from_fork+0x10/0x20
[   29.285926] 
[   29.286317] Allocated by task 124:
[   29.286856]  kasan_save_stack+0x3c/0x68
[   29.287441]  kasan_save_track+0x20/0x40
[   29.288028]  kasan_save_alloc_info+0x40/0x58
[   29.288637]  __kasan_kmalloc+0xd4/0xd8
[   29.289431]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.289989]  kmalloc_oob_right+0xb0/0x660
[   29.290563]  kunit_try_run_case+0x14c/0x3d0
[   29.291176]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.291715]  kthread+0x24c/0x2d0
[   29.292252]  ret_from_fork+0x10/0x20
[   29.292804] 
[   29.293398] The buggy address belongs to the object at fff00000c402f900
[   29.293398]  which belongs to the cache kmalloc-128 of size 128
[   29.294536] The buggy address is located 5 bytes to the right of
[   29.294536]  allocated 115-byte region [fff00000c402f900, fff00000c402f973)
[   29.295654] 
[   29.295983] The buggy address belongs to the physical page:
[   29.296676] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10402f
[   29.298196] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.298938] page_type: f5(slab)
[   29.299470] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.300374] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   29.301178] page dumped because: kasan: bad access detected
[   29.302097] 
[   29.302455] Memory state around the buggy address:
[   29.302968]  fff00000c402f800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   29.303738]  fff00000c402f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.304532] >fff00000c402f900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.305614]                                                                 ^
[   29.306412]  fff00000c402f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.307582]  fff00000c402fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.308264] ==================================================================
Failure - log-parser-boot - internal-error-oops-oops-preempt-smp KNOWN ISSUE - kunit_test_null_dereference internal oops on qemu-arm64 KUNIT KASAN
[  142.172491] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
[  142.173503] Modules linked in:
[  142.174378] CPU: 1 UID: 0 PID: 620 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241128 #1
[  142.175298] Tainted: [B]=BAD_PAGE, [N]=TEST
[  142.175800] Hardware name: linux,dummy-virt (DT)
[  142.176426] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  142.177127] pc : kunit_test_null_dereference+0x70/0x170
[  142.177690] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[  142.178244] sp : ffff8000834d7dc0
[  142.178678] x29: ffff8000834d7e20 x28: 0000000000000000 x27: 0000000000000000
[  142.179833] x26: 0000000000000000 x25: 0000000000000000 x24: fff00000c6327d00
[  142.180655] x23: ffffaee479fca390 x22: ffffaee479fd2f50 x21: fff00000c6327d08
[  142.181149] x20: 1ffff0001069afb8 x19: ffff8000800879f0 x18: 00000000c61e90ca
[  142.181934] x17: 0000000000000001 x16: fff00000da501ca0 x15: fff00000ff615b48
[  142.182860] x14: 000000002d0d0c63 x13: 1ffe00001815db04 x12: fffd8000198ca62a
[  142.183721] x11: 1ffe0000198ca629 x10: fffd8000198ca629 x9 : ffffaee479fca418
[  142.184387] x8 : ffff8000834d7cb8 x7 : 0000000000000001 x6 : 0000000041b58ab3
[  142.185192] x5 : ffff70001069afb8 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[  142.186026] x2 : dfff800000000000 x1 : fff00000cc652880 x0 : ffff8000800879f0
[  142.186893] Call trace:
[  142.187300]  kunit_test_null_dereference+0x70/0x170 (P)
[  142.187828]  kunit_generic_run_threadfn_adapter+0x88/0x100 (L)
[  142.188395]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  142.188932]  kthread+0x24c/0x2d0
[  142.189425]  ret_from_fork+0x10/0x20
[  142.190384] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[  142.191411] ---[ end trace 0000000000000000 ]---