Hay
Date
June 2, 2025, 2:10 p.m.
Failure - log-parser-boot - internal-error-oops-oops-preempt-smp
[  104.242170] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
[  104.243203] Modules linked in:
[  104.244055] CPU: 0 UID: 0 PID: 615 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[  104.244748] Tainted: [B]=BAD_PAGE, [N]=TEST
[  104.245051] Hardware name: linux,dummy-virt (DT)
[  104.246308] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  104.247031] pc : kunit_test_null_dereference+0x70/0x170
[  104.247861] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[  104.248289] sp : ffff800083407dc0
[  104.248762] x29: ffff800083407e20 x28: 0000000000000000 x27: 0000000000000000
[  104.249998] x26: 0000000000000000 x25: 0000000000000000 x24: fff00000c6dded00
[  104.250763] x23: ffff93d53abb2730 x22: ffff93d53abbb300 x21: fff00000c6dded08
[  104.251550] x20: 1ffff00010680fb8 x19: ffff8000800879f0 x18: 00000000333a7fe5
[  104.252509] x17: 0000000000000001 x16: fff00000da4faee0 x15: ffff93d53ab6f678
[  104.253223] x14: 1ffe00001b49f5c0 x13: 0000000000000000 x12: fffd80001b49f481
[  104.253967] x11: 1ffe00001b49f480 x10: fffd80001b49f480 x9 : ffff93d53abb27b8
[  104.254783] x8 : ffff800083407c88 x7 : 0000000000000000 x6 : 0000000041b58ab3
[  104.255503] x5 : ffff700010680fb8 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[  104.256379] x2 : dfff800000000000 x1 : fff00000cbce6400 x0 : ffff8000800879f0
[  104.257013] Call trace:
[  104.257256]  kunit_test_null_dereference+0x70/0x170
[  104.257671]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  104.258256]  kthread+0x24c/0x2d0
[  104.258695]  ret_from_fork+0x10/0x20
[  104.259754] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[  104.260862] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[   53.356874] ==================================================================
[   53.357340] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[   53.357340] 
[   53.357856] Use-after-free read at 0x0000000084d8593f (in kfence-#165):
[   53.358292]  test_krealloc+0x51c/0x830
[   53.358804]  kunit_try_run_case+0x170/0x3f0
[   53.359362]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.359626]  kthread+0x24c/0x2d0
[   53.360038]  ret_from_fork+0x10/0x20
[   53.360467] 
[   53.360703] kfence-#165: 0x0000000084d8593f-0x00000000934a97e3, size=32, cache=kmalloc-32
[   53.360703] 
[   53.361676] allocated by task 316 on cpu 0 at 53.356005s (0.005662s ago):
[   53.362187]  test_alloc+0x29c/0x628
[   53.362502]  test_krealloc+0xc0/0x830
[   53.362776]  kunit_try_run_case+0x170/0x3f0
[   53.363201]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.363680]  kthread+0x24c/0x2d0
[   53.363884]  ret_from_fork+0x10/0x20
[   53.364171] 
[   53.364327] freed by task 316 on cpu 0 at 53.356361s (0.007959s ago):
[   53.364707]  krealloc_noprof+0xa8/0x1a0
[   53.364930]  test_krealloc+0x1dc/0x830
[   53.365156]  kunit_try_run_case+0x170/0x3f0
[   53.365403]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.365918]  kthread+0x24c/0x2d0
[   53.366110]  ret_from_fork+0x10/0x20
[   53.366380] 
[   53.366522] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   53.367171] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.367684] Hardware name: linux,dummy-virt (DT)
[   53.368136] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[   20.628790] ==================================================================
[   20.629915] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   20.630296] Read of size 4 at addr fff00000c5c7fb00 by task ksoftirqd/1/26
[   20.630741] 
[   20.630924] CPU: 1 UID: 0 PID: 26 Comm: ksoftirqd/1 Tainted: G    B            N 6.12.32-rc1 #1
[   20.631036] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.631082] Hardware name: linux,dummy-virt (DT)
[   20.631126] Call trace:
[   20.631170]  dump_backtrace+0x9c/0x128
[   20.631227]  show_stack+0x20/0x38
[   20.631284]  dump_stack_lvl+0x8c/0xd0
[   20.631371]  print_report+0x118/0x5f0
[   20.631424]  kasan_report+0xdc/0x128
[   20.631483]  __asan_report_load4_noabort+0x20/0x30
[   20.631539]  rcu_uaf_reclaim+0x64/0x70
[   20.631588]  rcu_core+0xa54/0x1df8
[   20.631641]  rcu_core_si+0x18/0x30
[   20.631688]  handle_softirqs+0x36c/0xb18
[   20.631736]  run_ksoftirqd+0x80/0xb0
[   20.631777]  smpboot_thread_fn+0x42c/0x6b8
[   20.631828]  kthread+0x24c/0x2d0
[   20.631870]  ret_from_fork+0x10/0x20
[   20.631922] 
[   20.635987] Allocated by task 185:
[   20.636299]  kasan_save_stack+0x3c/0x68
[   20.636686]  kasan_save_track+0x20/0x40
[   20.636882]  kasan_save_alloc_info+0x40/0x58
[   20.637299]  __kasan_kmalloc+0xd4/0xd8
[   20.637664]  __kmalloc_cache_noprof+0x154/0x320
[   20.637986]  rcu_uaf+0xb8/0x2e0
[   20.638253]  kunit_try_run_case+0x170/0x3f0
[   20.638491]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.638997]  kthread+0x24c/0x2d0
[   20.639315]  ret_from_fork+0x10/0x20
[   20.639599] 
[   20.639817] Freed by task 26:
[   20.640063]  kasan_save_stack+0x3c/0x68
[   20.640326]  kasan_save_track+0x20/0x40
[   20.640645]  kasan_save_free_info+0x4c/0x78
[   20.640894]  __kasan_slab_free+0x6c/0x98
[   20.641249]  kfree+0x110/0x3b8
[   20.641503]  rcu_uaf_reclaim+0x28/0x70
[   20.641762]  rcu_core+0xa54/0x1df8
[   20.642094]  rcu_core_si+0x18/0x30
[   20.642351]  handle_softirqs+0x36c/0xb18
[   20.642587]  run_ksoftirqd+0x80/0xb0
[   20.642890]  smpboot_thread_fn+0x42c/0x6b8
[   20.643226]  kthread+0x24c/0x2d0
[   20.643463]  ret_from_fork+0x10/0x20
[   20.643643] 
[   20.643914] Last potentially related work creation:
[   20.644285]  kasan_save_stack+0x3c/0x68
[   20.644658]  __kasan_record_aux_stack+0xbc/0xe8
[   20.644922]  kasan_record_aux_stack_noalloc+0x14/0x20
[   20.645148]  __call_rcu_common.constprop.0+0x74/0xa18
[   20.645524]  call_rcu+0x18/0x30
[   20.645796]  rcu_uaf+0x150/0x2e0
[   20.646604]  kunit_try_run_case+0x170/0x3f0
[   20.647172]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.647428]  kthread+0x24c/0x2d0
[   20.647603]  ret_from_fork+0x10/0x20
[   20.647805] 
[   20.647941] The buggy address belongs to the object at fff00000c5c7fb00
[   20.647941]  which belongs to the cache kmalloc-32 of size 32
[   20.649672] The buggy address is located 0 bytes inside of
[   20.649672]  freed 32-byte region [fff00000c5c7fb00, fff00000c5c7fb20)
[   20.650880] 
[   20.651366] The buggy address belongs to the physical page:
[   20.652069] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105c7f
[   20.653019] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.653988] page_type: f5(slab)
[   20.654633] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   20.655307] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   20.655773] page dumped because: kasan: bad access detected
[   20.656040] 
[   20.656251] Memory state around the buggy address:
[   20.656552]  fff00000c5c7fa00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.656965]  fff00000c5c7fa80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.657348] >fff00000c5c7fb00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   20.657865]                    ^
[   20.658200]  fff00000c5c7fb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.658643]  fff00000c5c7fc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.659079] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[   20.529409] ==================================================================
[   20.529976] BUG: KASAN: slab-use-after-free in ksize_uaf+0x578/0x5d0
[   20.530529] Read of size 1 at addr fff00000c6492d00 by task kunit_try_catch/183
[   20.530961] 
[   20.531576] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   20.531804] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.531877] Hardware name: linux,dummy-virt (DT)
[   20.531957] Call trace:
[   20.532010]  dump_backtrace+0x9c/0x128
[   20.532894]  show_stack+0x20/0x38
[   20.532962]  dump_stack_lvl+0x8c/0xd0
[   20.533014]  print_report+0x118/0x5f0
[   20.533057]  kasan_report+0xdc/0x128
[   20.533099]  __asan_report_load1_noabort+0x20/0x30
[   20.533145]  ksize_uaf+0x578/0x5d0
[   20.533189]  kunit_try_run_case+0x170/0x3f0
[   20.533233]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.533319]  kthread+0x24c/0x2d0
[   20.533363]  ret_from_fork+0x10/0x20
[   20.533411] 
[   20.538819] Allocated by task 183:
[   20.539535]  kasan_save_stack+0x3c/0x68
[   20.540171]  kasan_save_track+0x20/0x40
[   20.540619]  kasan_save_alloc_info+0x40/0x58
[   20.541128]  __kasan_kmalloc+0xd4/0xd8
[   20.541523]  __kmalloc_cache_noprof+0x154/0x320
[   20.542072]  ksize_uaf+0xb8/0x5d0
[   20.542545]  kunit_try_run_case+0x170/0x3f0
[   20.542907]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.543752]  kthread+0x24c/0x2d0
[   20.544151]  ret_from_fork+0x10/0x20
[   20.544567] 
[   20.544885] Freed by task 183:
[   20.545221]  kasan_save_stack+0x3c/0x68
[   20.545732]  kasan_save_track+0x20/0x40
[   20.546191]  kasan_save_free_info+0x4c/0x78
[   20.546733]  __kasan_slab_free+0x6c/0x98
[   20.547553]  kfree+0x110/0x3b8
[   20.547958]  ksize_uaf+0x120/0x5d0
[   20.548205]  kunit_try_run_case+0x170/0x3f0
[   20.548477]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.548853]  kthread+0x24c/0x2d0
[   20.549326]  ret_from_fork+0x10/0x20
[   20.549809] 
[   20.550346] The buggy address belongs to the object at fff00000c6492d00
[   20.550346]  which belongs to the cache kmalloc-128 of size 128
[   20.551898] The buggy address is located 0 bytes inside of
[   20.551898]  freed 128-byte region [fff00000c6492d00, fff00000c6492d80)
[   20.552786] 
[   20.553060] The buggy address belongs to the physical page:
[   20.553674] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106492
[   20.554274] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.554848] page_type: f5(slab)
[   20.555598] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.556285] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   20.556816] page dumped because: kasan: bad access detected
[   20.557318] 
[   20.557603] Memory state around the buggy address:
[   20.557989]  fff00000c6492c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.558639]  fff00000c6492c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.559169] >fff00000c6492d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.560011]                    ^
[   20.560445]  fff00000c6492d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.561084]  fff00000c6492e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.561661] ==================================================================
[   20.493577] ==================================================================
[   20.494341] BUG: KASAN: slab-use-after-free in ksize_uaf+0x174/0x5d0
[   20.495138] Read of size 1 at addr fff00000c6492d00 by task kunit_try_catch/183
[   20.496223] 
[   20.496597] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   20.496834] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.496920] Hardware name: linux,dummy-virt (DT)
[   20.497004] Call trace:
[   20.497060]  dump_backtrace+0x9c/0x128
[   20.497143]  show_stack+0x20/0x38
[   20.497188]  dump_stack_lvl+0x8c/0xd0
[   20.497256]  print_report+0x118/0x5f0
[   20.497325]  kasan_report+0xdc/0x128
[   20.497368]  __kasan_check_byte+0x54/0x70
[   20.497411]  ksize+0x30/0x88
[   20.497451]  ksize_uaf+0x174/0x5d0
[   20.497508]  kunit_try_run_case+0x170/0x3f0
[   20.497559]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.497611]  kthread+0x24c/0x2d0
[   20.497653]  ret_from_fork+0x10/0x20
[   20.497701] 
[   20.503536] Allocated by task 183:
[   20.504041]  kasan_save_stack+0x3c/0x68
[   20.504505]  kasan_save_track+0x20/0x40
[   20.504998]  kasan_save_alloc_info+0x40/0x58
[   20.505540]  __kasan_kmalloc+0xd4/0xd8
[   20.506007]  __kmalloc_cache_noprof+0x154/0x320
[   20.506438]  ksize_uaf+0xb8/0x5d0
[   20.506925]  kunit_try_run_case+0x170/0x3f0
[   20.507724]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.508266]  kthread+0x24c/0x2d0
[   20.508694]  ret_from_fork+0x10/0x20
[   20.509114] 
[   20.509421] Freed by task 183:
[   20.509806]  kasan_save_stack+0x3c/0x68
[   20.510249]  kasan_save_track+0x20/0x40
[   20.510755]  kasan_save_free_info+0x4c/0x78
[   20.511568]  __kasan_slab_free+0x6c/0x98
[   20.511968]  kfree+0x110/0x3b8
[   20.512443]  ksize_uaf+0x120/0x5d0
[   20.512839]  kunit_try_run_case+0x170/0x3f0
[   20.513282]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.513882]  kthread+0x24c/0x2d0
[   20.514284]  ret_from_fork+0x10/0x20
[   20.514759] 
[   20.515035] The buggy address belongs to the object at fff00000c6492d00
[   20.515035]  which belongs to the cache kmalloc-128 of size 128
[   20.516102] The buggy address is located 0 bytes inside of
[   20.516102]  freed 128-byte region [fff00000c6492d00, fff00000c6492d80)
[   20.517014] 
[   20.517342] The buggy address belongs to the physical page:
[   20.517869] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106492
[   20.518659] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.519310] page_type: f5(slab)
[   20.520120] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.520800] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   20.521314] page dumped because: kasan: bad access detected
[   20.521885] 
[   20.522166] Memory state around the buggy address:
[   20.522627]  fff00000c6492c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.523278]  fff00000c6492c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.524088] >fff00000c6492d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.524640]                    ^
[   20.525072]  fff00000c6492d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.525639]  fff00000c6492e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.526161] ==================================================================
[   20.564889] ==================================================================
[   20.565334] BUG: KASAN: slab-use-after-free in ksize_uaf+0x53c/0x5d0
[   20.565896] Read of size 1 at addr fff00000c6492d78 by task kunit_try_catch/183
[   20.566461] 
[   20.566770] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   20.566969] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.567039] Hardware name: linux,dummy-virt (DT)
[   20.567542] Call trace:
[   20.567632]  dump_backtrace+0x9c/0x128
[   20.567753]  show_stack+0x20/0x38
[   20.567801]  dump_stack_lvl+0x8c/0xd0
[   20.567849]  print_report+0x118/0x5f0
[   20.567893]  kasan_report+0xdc/0x128
[   20.567935]  __asan_report_load1_noabort+0x20/0x30
[   20.567983]  ksize_uaf+0x53c/0x5d0
[   20.568025]  kunit_try_run_case+0x170/0x3f0
[   20.568074]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.568124]  kthread+0x24c/0x2d0
[   20.568165]  ret_from_fork+0x10/0x20
[   20.568213] 
[   20.573405] Allocated by task 183:
[   20.573897]  kasan_save_stack+0x3c/0x68
[   20.574453]  kasan_save_track+0x20/0x40
[   20.574957]  kasan_save_alloc_info+0x40/0x58
[   20.575869]  __kasan_kmalloc+0xd4/0xd8
[   20.576323]  __kmalloc_cache_noprof+0x154/0x320
[   20.576921]  ksize_uaf+0xb8/0x5d0
[   20.577385]  kunit_try_run_case+0x170/0x3f0
[   20.577848]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.578388]  kthread+0x24c/0x2d0
[   20.578843]  ret_from_fork+0x10/0x20
[   20.579527] 
[   20.579841] Freed by task 183:
[   20.580208]  kasan_save_stack+0x3c/0x68
[   20.580654]  kasan_save_track+0x20/0x40
[   20.581125]  kasan_save_free_info+0x4c/0x78
[   20.581541]  __kasan_slab_free+0x6c/0x98
[   20.582043]  kfree+0x110/0x3b8
[   20.582391]  ksize_uaf+0x120/0x5d0
[   20.582877]  kunit_try_run_case+0x170/0x3f0
[   20.583546]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.584202]  kthread+0x24c/0x2d0
[   20.584598]  ret_from_fork+0x10/0x20
[   20.585033] 
[   20.585321] The buggy address belongs to the object at fff00000c6492d00
[   20.585321]  which belongs to the cache kmalloc-128 of size 128
[   20.586286] The buggy address is located 120 bytes inside of
[   20.586286]  freed 128-byte region [fff00000c6492d00, fff00000c6492d80)
[   20.588261] 
[   20.588582] The buggy address belongs to the physical page:
[   20.588988] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106492
[   20.589761] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.590424] page_type: f5(slab)
[   20.590885] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.591629] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   20.592463] page dumped because: kasan: bad access detected
[   20.592965] 
[   20.593229] Memory state around the buggy address:
[   20.593786]  fff00000c6492c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.594321]  fff00000c6492c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.594987] >fff00000c6492d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.595536]                                                                 ^
[   20.596320]  fff00000c6492d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.596941]  fff00000c6492e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.597595] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   20.398381] ==================================================================
[   20.399093] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x630/0x720
[   20.400492] Read of size 1 at addr fff00000c6492c73 by task kunit_try_catch/181
[   20.401393] 
[   20.401785] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   20.402080] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.402165] Hardware name: linux,dummy-virt (DT)
[   20.402281] Call trace:
[   20.402339]  dump_backtrace+0x9c/0x128
[   20.402409]  show_stack+0x20/0x38
[   20.402454]  dump_stack_lvl+0x8c/0xd0
[   20.402503]  print_report+0x118/0x5f0
[   20.402546]  kasan_report+0xdc/0x128
[   20.402588]  __asan_report_load1_noabort+0x20/0x30
[   20.402636]  ksize_unpoisons_memory+0x630/0x720
[   20.402683]  kunit_try_run_case+0x170/0x3f0
[   20.402730]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.402780]  kthread+0x24c/0x2d0
[   20.402823]  ret_from_fork+0x10/0x20
[   20.402870] 
[   20.408893] Allocated by task 181:
[   20.409369]  kasan_save_stack+0x3c/0x68
[   20.409916]  kasan_save_track+0x20/0x40
[   20.410440]  kasan_save_alloc_info+0x40/0x58
[   20.410921]  __kasan_kmalloc+0xd4/0xd8
[   20.411652]  __kmalloc_cache_noprof+0x154/0x320
[   20.412114]  ksize_unpoisons_memory+0xc0/0x720
[   20.412654]  kunit_try_run_case+0x170/0x3f0
[   20.413194]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.413751]  kthread+0x24c/0x2d0
[   20.414160]  ret_from_fork+0x10/0x20
[   20.414585] 
[   20.414888] The buggy address belongs to the object at fff00000c6492c00
[   20.414888]  which belongs to the cache kmalloc-128 of size 128
[   20.416616] The buggy address is located 0 bytes to the right of
[   20.416616]  allocated 115-byte region [fff00000c6492c00, fff00000c6492c73)
[   20.417700] 
[   20.417984] The buggy address belongs to the physical page:
[   20.418591] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106492
[   20.419165] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.419957] page_type: f5(slab)
[   20.420334] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.420925] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   20.421782] page dumped because: kasan: bad access detected
[   20.422432] 
[   20.422760] Memory state around the buggy address:
[   20.423798]  fff00000c6492b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   20.424398]  fff00000c6492b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.425141] >fff00000c6492c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   20.425858]                                                              ^
[   20.426424]  fff00000c6492c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.427457]  fff00000c6492d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.427912] ==================================================================
[   20.456677] ==================================================================
[   20.457378] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x720
[   20.457988] Read of size 1 at addr fff00000c6492c7f by task kunit_try_catch/181
[   20.458720] 
[   20.459611] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   20.459860] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.459936] Hardware name: linux,dummy-virt (DT)
[   20.460022] Call trace:
[   20.460084]  dump_backtrace+0x9c/0x128
[   20.460211]  show_stack+0x20/0x38
[   20.460299]  dump_stack_lvl+0x8c/0xd0
[   20.460348]  print_report+0x118/0x5f0
[   20.460393]  kasan_report+0xdc/0x128
[   20.460433]  __asan_report_load1_noabort+0x20/0x30
[   20.460478]  ksize_unpoisons_memory+0x690/0x720
[   20.460527]  kunit_try_run_case+0x170/0x3f0
[   20.460574]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.460622]  kthread+0x24c/0x2d0
[   20.460665]  ret_from_fork+0x10/0x20
[   20.460713] 
[   20.465649] Allocated by task 181:
[   20.466200]  kasan_save_stack+0x3c/0x68
[   20.466720]  kasan_save_track+0x20/0x40
[   20.467326]  kasan_save_alloc_info+0x40/0x58
[   20.467760]  __kasan_kmalloc+0xd4/0xd8
[   20.468192]  __kmalloc_cache_noprof+0x154/0x320
[   20.468620]  ksize_unpoisons_memory+0xc0/0x720
[   20.469015]  kunit_try_run_case+0x170/0x3f0
[   20.469708]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.470253]  kthread+0x24c/0x2d0
[   20.470574]  ret_from_fork+0x10/0x20
[   20.471088] 
[   20.471719] The buggy address belongs to the object at fff00000c6492c00
[   20.471719]  which belongs to the cache kmalloc-128 of size 128
[   20.472902] The buggy address is located 12 bytes to the right of
[   20.472902]  allocated 115-byte region [fff00000c6492c00, fff00000c6492c73)
[   20.473962] 
[   20.474324] The buggy address belongs to the physical page:
[   20.474801] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106492
[   20.475793] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.476561] page_type: f5(slab)
[   20.477118] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.477933] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   20.478663] page dumped because: kasan: bad access detected
[   20.480222] 
[   20.480578] Memory state around the buggy address:
[   20.481082]  fff00000c6492b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.481717]  fff00000c6492b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.482276] >fff00000c6492c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   20.482805]                                                                 ^
[   20.483646]  fff00000c6492c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.484370]  fff00000c6492d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.485003] ==================================================================
[   20.429962] ==================================================================
[   20.430460] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x720
[   20.430968] Read of size 1 at addr fff00000c6492c78 by task kunit_try_catch/181
[   20.432057] 
[   20.432387] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   20.432603] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.432666] Hardware name: linux,dummy-virt (DT)
[   20.432751] Call trace:
[   20.432803]  dump_backtrace+0x9c/0x128
[   20.432922]  show_stack+0x20/0x38
[   20.433019]  dump_stack_lvl+0x8c/0xd0
[   20.433149]  print_report+0x118/0x5f0
[   20.433253]  kasan_report+0xdc/0x128
[   20.433352]  __asan_report_load1_noabort+0x20/0x30
[   20.433470]  ksize_unpoisons_memory+0x628/0x720
[   20.433595]  kunit_try_run_case+0x170/0x3f0
[   20.433704]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.433795]  kthread+0x24c/0x2d0
[   20.433845]  ret_from_fork+0x10/0x20
[   20.433896] 
[   20.438115] Allocated by task 181:
[   20.438390]  kasan_save_stack+0x3c/0x68
[   20.438758]  kasan_save_track+0x20/0x40
[   20.439097]  kasan_save_alloc_info+0x40/0x58
[   20.439644]  __kasan_kmalloc+0xd4/0xd8
[   20.440870]  __kmalloc_cache_noprof+0x154/0x320
[   20.441485]  ksize_unpoisons_memory+0xc0/0x720
[   20.441853]  kunit_try_run_case+0x170/0x3f0
[   20.442188]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.442658]  kthread+0x24c/0x2d0
[   20.443098]  ret_from_fork+0x10/0x20
[   20.443530] 
[   20.443800] The buggy address belongs to the object at fff00000c6492c00
[   20.443800]  which belongs to the cache kmalloc-128 of size 128
[   20.444569] The buggy address is located 5 bytes to the right of
[   20.444569]  allocated 115-byte region [fff00000c6492c00, fff00000c6492c73)
[   20.445942] 
[   20.446301] The buggy address belongs to the physical page:
[   20.446906] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106492
[   20.447767] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.448460] page_type: f5(slab)
[   20.448842] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.449679] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   20.450383] page dumped because: kasan: bad access detected
[   20.451021] 
[   20.451571] Memory state around the buggy address:
[   20.451893]  fff00000c6492b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.452268]  fff00000c6492b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.452631] >fff00000c6492c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   20.453691]                                                                 ^
[   20.454464]  fff00000c6492c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.455306]  fff00000c6492d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.455720] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[   53.260817] ==================================================================
[   53.261422] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[   53.261422] 
[   53.262154] Use-after-free read at 0x00000000bde6dc28 (in kfence-#164):
[   53.262895]  test_memcache_typesafe_by_rcu+0x280/0x560
[   53.263556]  kunit_try_run_case+0x170/0x3f0
[   53.264068]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.264590]  kthread+0x24c/0x2d0
[   53.264937]  ret_from_fork+0x10/0x20
[   53.265453] 
[   53.265785] kfence-#164: 0x00000000bde6dc28-0x000000000e9be907, size=32, cache=test
[   53.265785] 
[   53.266461] allocated by task 314 on cpu 0 at 53.253334s (0.013114s ago):
[   53.267284]  test_alloc+0x230/0x628
[   53.267774]  test_memcache_typesafe_by_rcu+0x15c/0x560
[   53.268340]  kunit_try_run_case+0x170/0x3f0
[   53.268820]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.269372]  kthread+0x24c/0x2d0
[   53.269832]  ret_from_fork+0x10/0x20
[   53.270269] 
[   53.270579] freed by task 314 on cpu 0 at 53.253551s (0.017016s ago):
[   53.271286]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[   53.271786]  kunit_try_run_case+0x170/0x3f0
[   53.272276]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.272802]  kthread+0x24c/0x2d0
[   53.273234]  ret_from_fork+0x10/0x20
[   53.273689] 
[   53.274043] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   53.274861] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.275305] Hardware name: linux,dummy-virt (DT)
[   53.275712] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[   31.954885] ==================================================================
[   31.956365] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   31.956365] 
[   31.957231] Invalid read at 0x00000000c76e8775:
[   31.957916]  test_invalid_access+0xdc/0x1f0
[   31.958569]  kunit_try_run_case+0x170/0x3f0
[   31.959489]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.960152]  kthread+0x24c/0x2d0
[   31.960563]  ret_from_fork+0x10/0x20
[   31.960949] 
[   31.961353] CPU: 1 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   31.962382] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.962804] Hardware name: linux,dummy-virt (DT)
[   31.963975] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[   31.716369] ==================================================================
[   31.716983] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   31.716983] 
[   31.718161] Corrupted memory at 0x000000005bf1344b [ ! . . . . . . . . . . . . . . . ] (in kfence-#160):
[   31.719864]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   31.720298]  kunit_try_run_case+0x170/0x3f0
[   31.720770]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.721274]  kthread+0x24c/0x2d0
[   31.721740]  ret_from_fork+0x10/0x20
[   31.722110] 
[   31.722364] kfence-#160: 0x000000004cb80fab-0x00000000e37b1e1e, size=73, cache=kmalloc-96
[   31.722364] 
[   31.723208] allocated by task 304 on cpu 1 at 31.715943s (0.007252s ago):
[   31.723805]  test_alloc+0x29c/0x628
[   31.724171]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   31.724650]  kunit_try_run_case+0x170/0x3f0
[   31.725039]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.725545]  kthread+0x24c/0x2d0
[   31.725889]  ret_from_fork+0x10/0x20
[   31.726280] 
[   31.726561] freed by task 304 on cpu 1 at 31.716177s (0.010372s ago):
[   31.727124]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   31.727689]  kunit_try_run_case+0x170/0x3f0
[   31.728084]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.728674]  kthread+0x24c/0x2d0
[   31.729057]  ret_from_fork+0x10/0x20
[   31.729406] 
[   31.729726] CPU: 1 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   31.730480] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.730944] Hardware name: linux,dummy-virt (DT)
[   31.731383] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[   31.404624] ==================================================================
[   31.405212] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   31.405212] 
[   31.406158] Out-of-bounds read at 0x0000000074f8621d (105B right of kfence-#157):
[   31.406971]  test_kmalloc_aligned_oob_read+0x238/0x468
[   31.407651]  kunit_try_run_case+0x170/0x3f0
[   31.408196]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.408732]  kthread+0x24c/0x2d0
[   31.409020]  ret_from_fork+0x10/0x20
[   31.409513] 
[   31.409839] kfence-#157: 0x0000000062d6c62f-0x000000001f74509e, size=73, cache=kmalloc-96
[   31.409839] 
[   31.411550] allocated by task 302 on cpu 1 at 31.404226s (0.007310s ago):
[   31.412172]  test_alloc+0x29c/0x628
[   31.414070]  test_kmalloc_aligned_oob_read+0x100/0x468
[   31.414485]  kunit_try_run_case+0x170/0x3f0
[   31.414812]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.415174]  kthread+0x24c/0x2d0
[   31.415566]  ret_from_fork+0x10/0x20
[   31.415888] 
[   31.416151] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   31.417297] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.417763] Hardware name: linux,dummy-virt (DT)
[   31.418967] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[   26.928507] ==================================================================
[   26.929147] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   26.929147] 
[   26.929875] Corrupted memory at 0x000000009a522b7a [ ! . . . . . . . . . . . . . . . ] (in kfence-#114):
[   26.932819]  test_corruption+0x278/0x378
[   26.933220]  kunit_try_run_case+0x170/0x3f0
[   26.933747]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.934190]  kthread+0x24c/0x2d0
[   26.934582]  ret_from_fork+0x10/0x20
[   26.934958] 
[   26.935224] kfence-#114: 0x00000000bb5bd880-0x000000003f047300, size=32, cache=kmalloc-32
[   26.935224] 
[   26.936132] allocated by task 290 on cpu 0 at 26.928007s (0.008112s ago):
[   26.936742]  test_alloc+0x29c/0x628
[   26.937223]  test_corruption+0xdc/0x378
[   26.937609]  kunit_try_run_case+0x170/0x3f0
[   26.937960]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.938544]  kthread+0x24c/0x2d0
[   26.938908]  ret_from_fork+0x10/0x20
[   26.939386] 
[   26.939650] freed by task 290 on cpu 0 at 26.928178s (0.011461s ago):
[   26.940122]  test_corruption+0x278/0x378
[   26.940619]  kunit_try_run_case+0x170/0x3f0
[   26.941069]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.941567]  kthread+0x24c/0x2d0
[   26.941942]  ret_from_fork+0x10/0x20
[   26.942344] 
[   26.942607] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   26.943340] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.943806] Hardware name: linux,dummy-virt (DT)
[   26.944256] ==================================================================
[   27.136393] ==================================================================
[   27.137035] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   27.137035] 
[   27.137676] Corrupted memory at 0x0000000002259677 [ ! ] (in kfence-#116):
[   27.138524]  test_corruption+0x284/0x378
[   27.139030]  kunit_try_run_case+0x170/0x3f0
[   27.139690]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.140400]  kthread+0x24c/0x2d0
[   27.140874]  ret_from_fork+0x10/0x20
[   27.141228] 
[   27.141555] kfence-#116: 0x0000000073aef4e3-0x000000003bad5c25, size=32, cache=kmalloc-32
[   27.141555] 
[   27.142341] allocated by task 290 on cpu 0 at 27.135898s (0.006432s ago):
[   27.143038]  test_alloc+0x29c/0x628
[   27.143547]  test_corruption+0x198/0x378
[   27.144050]  kunit_try_run_case+0x170/0x3f0
[   27.144451]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.144895]  kthread+0x24c/0x2d0
[   27.145212]  ret_from_fork+0x10/0x20
[   27.145587] 
[   27.145830] freed by task 290 on cpu 0 at 27.136073s (0.009747s ago):
[   27.146424]  test_corruption+0x284/0x378
[   27.146764]  kunit_try_run_case+0x170/0x3f0
[   27.147108]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.147722]  kthread+0x24c/0x2d0
[   27.148165]  ret_from_fork+0x10/0x20
[   27.148659] 
[   27.149012] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   27.149882] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.150300] Hardware name: linux,dummy-virt (DT)
[   27.150675] ==================================================================
[   27.448129] ==================================================================
[   27.448779] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   27.448779] 
[   27.449355] Corrupted memory at 0x00000000a5fe1565 [ ! ] (in kfence-#119):
[   27.450045]  test_corruption+0x1d8/0x378
[   27.450546]  kunit_try_run_case+0x170/0x3f0
[   27.451003]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.451636]  kthread+0x24c/0x2d0
[   27.452067]  ret_from_fork+0x10/0x20
[   27.452543] 
[   27.452833] kfence-#119: 0x00000000cd452ccd-0x000000000102bb01, size=32, cache=test
[   27.452833] 
[   27.453466] allocated by task 292 on cpu 0 at 27.447875s (0.005579s ago):
[   27.454065]  test_alloc+0x230/0x628
[   27.454534]  test_corruption+0x198/0x378
[   27.455013]  kunit_try_run_case+0x170/0x3f0
[   27.455523]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.456021]  kthread+0x24c/0x2d0
[   27.456456]  ret_from_fork+0x10/0x20
[   27.456845] 
[   27.457049] freed by task 292 on cpu 0 at 27.447973s (0.009066s ago):
[   27.457669]  test_corruption+0x1d8/0x378
[   27.458064]  kunit_try_run_case+0x170/0x3f0
[   27.458452]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.458861]  kthread+0x24c/0x2d0
[   27.459289]  ret_from_fork+0x10/0x20
[   27.459740] 
[   27.460035] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   27.460895] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.461286] Hardware name: linux,dummy-virt (DT)
[   27.461730] ==================================================================
[   27.344207] ==================================================================
[   27.344959] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   27.344959] 
[   27.345635] Corrupted memory at 0x000000007fd83cb5 [ ! . . . . . . . . . . . . . . . ] (in kfence-#118):
[   27.347455]  test_corruption+0x120/0x378
[   27.347896]  kunit_try_run_case+0x170/0x3f0
[   27.348412]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.348996]  kthread+0x24c/0x2d0
[   27.349407]  ret_from_fork+0x10/0x20
[   27.349884] 
[   27.350162] kfence-#118: 0x0000000003eac2cd-0x00000000f1bb26fe, size=32, cache=test
[   27.350162] 
[   27.350909] allocated by task 292 on cpu 0 at 27.343945s (0.006951s ago):
[   27.351689]  test_alloc+0x230/0x628
[   27.352083]  test_corruption+0xdc/0x378
[   27.352610]  kunit_try_run_case+0x170/0x3f0
[   27.353017]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.353624]  kthread+0x24c/0x2d0
[   27.354026]  ret_from_fork+0x10/0x20
[   27.354480] 
[   27.354759] freed by task 292 on cpu 0 at 27.344042s (0.010706s ago):
[   27.355485]  test_corruption+0x120/0x378
[   27.355910]  kunit_try_run_case+0x170/0x3f0
[   27.356345]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.356959]  kthread+0x24c/0x2d0
[   27.357399]  ret_from_fork+0x10/0x20
[   27.357804] 
[   27.358125] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   27.358964] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.359445] Hardware name: linux,dummy-virt (DT)
[   27.359897] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[   26.720198] ==================================================================
[   26.720785] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   26.720785] 
[   26.721376] Invalid free of 0x000000008e4b399f (in kfence-#112):
[   26.721797]  test_invalid_addr_free+0x1ac/0x238
[   26.722343]  kunit_try_run_case+0x170/0x3f0
[   26.722736]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.723373]  kthread+0x24c/0x2d0
[   26.723794]  ret_from_fork+0x10/0x20
[   26.724261] 
[   26.724540] kfence-#112: 0x000000008fbd6be0-0x00000000f0ae0dc6, size=32, cache=kmalloc-32
[   26.724540] 
[   26.725373] allocated by task 286 on cpu 1 at 26.719947s (0.005414s ago):
[   26.726092]  test_alloc+0x29c/0x628
[   26.726569]  test_invalid_addr_free+0xd4/0x238
[   26.726989]  kunit_try_run_case+0x170/0x3f0
[   26.727455]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.727951]  kthread+0x24c/0x2d0
[   26.728406]  ret_from_fork+0x10/0x20
[   26.728742] 
[   26.729068] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   26.729765] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.730269] Hardware name: linux,dummy-virt (DT)
[   26.730806] ==================================================================
[   26.824149] ==================================================================
[   26.824755] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   26.824755] 
[   26.825193] Invalid free of 0x00000000250b593f (in kfence-#113):
[   26.825816]  test_invalid_addr_free+0xec/0x238
[   26.826586]  kunit_try_run_case+0x170/0x3f0
[   26.827327]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.827831]  kthread+0x24c/0x2d0
[   26.828180]  ret_from_fork+0x10/0x20
[   26.828568] 
[   26.828806] kfence-#113: 0x000000006f5f824b-0x00000000e4c1203b, size=32, cache=test
[   26.828806] 
[   26.829968] allocated by task 288 on cpu 0 at 26.823918s (0.006037s ago):
[   26.830853]  test_alloc+0x230/0x628
[   26.831285]  test_invalid_addr_free+0xd4/0x238
[   26.831827]  kunit_try_run_case+0x170/0x3f0
[   26.832390]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.833028]  kthread+0x24c/0x2d0
[   26.833553]  ret_from_fork+0x10/0x20
[   26.834098] 
[   26.834501] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   26.835007] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.835320] Hardware name: linux,dummy-virt (DT)
[   26.835859] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[   26.512439] ==================================================================
[   26.513055] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   26.513055] 
[   26.513775] Invalid free of 0x00000000ac1ae79b (in kfence-#110):
[   26.514409]  test_double_free+0x1bc/0x238
[   26.514937]  kunit_try_run_case+0x170/0x3f0
[   26.515395]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.516037]  kthread+0x24c/0x2d0
[   26.516487]  ret_from_fork+0x10/0x20
[   26.516879] 
[   26.517102] kfence-#110: 0x00000000ac1ae79b-0x00000000db4a8637, size=32, cache=kmalloc-32
[   26.517102] 
[   26.518075] allocated by task 282 on cpu 1 at 26.511915s (0.006146s ago):
[   26.518722]  test_alloc+0x29c/0x628
[   26.519228]  test_double_free+0xd4/0x238
[   26.519707]  kunit_try_run_case+0x170/0x3f0
[   26.520233]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.520839]  kthread+0x24c/0x2d0
[   26.521377]  ret_from_fork+0x10/0x20
[   26.521758] 
[   26.522079] freed by task 282 on cpu 1 at 26.512034s (0.010032s ago):
[   26.522640]  test_double_free+0x1ac/0x238
[   26.523060]  kunit_try_run_case+0x170/0x3f0
[   26.523539]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.524081]  kthread+0x24c/0x2d0
[   26.524490]  ret_from_fork+0x10/0x20
[   26.524887] 
[   26.525264] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   26.526068] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.526475] Hardware name: linux,dummy-virt (DT)
[   26.526922] ==================================================================
[   26.616272] ==================================================================
[   26.616832] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   26.616832] 
[   26.617322] Invalid free of 0x00000000de5f4e31 (in kfence-#111):
[   26.617877]  test_double_free+0x100/0x238
[   26.618256]  kunit_try_run_case+0x170/0x3f0
[   26.618727]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.619146]  kthread+0x24c/0x2d0
[   26.619623]  ret_from_fork+0x10/0x20
[   26.620088] 
[   26.620385] kfence-#111: 0x00000000de5f4e31-0x00000000742eb288, size=32, cache=test
[   26.620385] 
[   26.621098] allocated by task 284 on cpu 1 at 26.615844s (0.005241s ago):
[   26.621810]  test_alloc+0x230/0x628
[   26.622287]  test_double_free+0xd4/0x238
[   26.622752]  kunit_try_run_case+0x170/0x3f0
[   26.623282]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.623753]  kthread+0x24c/0x2d0
[   26.624193]  ret_from_fork+0x10/0x20
[   26.624637] 
[   26.624909] freed by task 284 on cpu 1 at 26.615968s (0.008928s ago):
[   26.625416]  test_double_free+0xf0/0x238
[   26.625908]  kunit_try_run_case+0x170/0x3f0
[   26.626359]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.626844]  kthread+0x24c/0x2d0
[   26.627268]  ret_from_fork+0x10/0x20
[   26.627713] 
[   26.628023] CPU: 1 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   26.628736] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.629123] Hardware name: linux,dummy-virt (DT)
[   26.629591] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[   26.408253] ==================================================================
[   26.408904] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   26.408904] 
[   26.409674] Use-after-free read at 0x00000000adb4cf78 (in kfence-#109):
[   26.410128]  test_use_after_free_read+0x114/0x248
[   26.410786]  kunit_try_run_case+0x170/0x3f0
[   26.411348]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.412182]  kthread+0x24c/0x2d0
[   26.412752]  ret_from_fork+0x10/0x20
[   26.413302] 
[   26.413710] kfence-#109: 0x00000000adb4cf78-0x000000006474594f, size=32, cache=test
[   26.413710] 
[   26.414428] allocated by task 280 on cpu 0 at 26.407895s (0.006521s ago):
[   26.415195]  test_alloc+0x230/0x628
[   26.415565]  test_use_after_free_read+0xd0/0x248
[   26.416041]  kunit_try_run_case+0x170/0x3f0
[   26.416434]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.417013]  kthread+0x24c/0x2d0
[   26.417402]  ret_from_fork+0x10/0x20
[   26.417876] 
[   26.418136] freed by task 280 on cpu 0 at 26.407994s (0.010130s ago):
[   26.418931]  test_use_after_free_read+0xf0/0x248
[   26.419412]  kunit_try_run_case+0x170/0x3f0
[   26.419784]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.420315]  kthread+0x24c/0x2d0
[   26.420703]  ret_from_fork+0x10/0x20
[   26.421101] 
[   26.421410] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   26.422249] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.422709] Hardware name: linux,dummy-virt (DT)
[   26.423127] ==================================================================
[   26.304467] ==================================================================
[   26.305083] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   26.305083] 
[   26.305873] Use-after-free read at 0x00000000a0dc4f83 (in kfence-#108):
[   26.306601]  test_use_after_free_read+0x114/0x248
[   26.307129]  kunit_try_run_case+0x170/0x3f0
[   26.307700]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.308252]  kthread+0x24c/0x2d0
[   26.308700]  ret_from_fork+0x10/0x20
[   26.309031] 
[   26.309341] kfence-#108: 0x00000000a0dc4f83-0x000000006d46ef31, size=32, cache=kmalloc-32
[   26.309341] 
[   26.310218] allocated by task 278 on cpu 0 at 26.303994s (0.006211s ago):
[   26.310969]  test_alloc+0x29c/0x628
[   26.311399]  test_use_after_free_read+0xd0/0x248
[   26.311775]  kunit_try_run_case+0x170/0x3f0
[   26.312262]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.312856]  kthread+0x24c/0x2d0
[   26.313313]  ret_from_fork+0x10/0x20
[   26.313825] 
[   26.314371] freed by task 278 on cpu 0 at 26.304119s (0.010055s ago):
[   26.315168]  test_use_after_free_read+0x1c0/0x248
[   26.315710]  kunit_try_run_case+0x170/0x3f0
[   26.316068]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.316639]  kthread+0x24c/0x2d0
[   26.317099]  ret_from_fork+0x10/0x20
[   26.317619] 
[   26.317960] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   26.318788] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.319130] Hardware name: linux,dummy-virt (DT)
[   26.319532] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[   26.200116] ==================================================================
[   26.200823] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   26.200823] 
[   26.202317] Out-of-bounds write at 0x000000003b66057a (1B left of kfence-#107):
[   26.203135]  test_out_of_bounds_write+0x100/0x240
[   26.203576]  kunit_try_run_case+0x170/0x3f0
[   26.204016]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.204650]  kthread+0x24c/0x2d0
[   26.205078]  ret_from_fork+0x10/0x20
[   26.205454] 
[   26.205768] kfence-#107: 0x00000000d5386841-0x00000000aabdda0a, size=32, cache=test
[   26.205768] 
[   26.206439] allocated by task 276 on cpu 0 at 26.199961s (0.006466s ago):
[   26.207120]  test_alloc+0x230/0x628
[   26.207563]  test_out_of_bounds_write+0xc8/0x240
[   26.207977]  kunit_try_run_case+0x170/0x3f0
[   26.208421]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.209010]  kthread+0x24c/0x2d0
[   26.209410]  ret_from_fork+0x10/0x20
[   26.209895] 
[   26.210232] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   26.210901] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.211287] Hardware name: linux,dummy-virt (DT)
[   26.211687] ==================================================================
[   26.096195] ==================================================================
[   26.097011] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   26.097011] 
[   26.097437] Out-of-bounds write at 0x000000006e694128 (1B left of kfence-#106):
[   26.098379]  test_out_of_bounds_write+0x100/0x240
[   26.099000]  kunit_try_run_case+0x170/0x3f0
[   26.099467]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.100168]  kthread+0x24c/0x2d0
[   26.100653]  ret_from_fork+0x10/0x20
[   26.101089] 
[   26.101464] kfence-#106: 0x000000005ccfd0d2-0x00000000c267c60e, size=32, cache=kmalloc-32
[   26.101464] 
[   26.102342] allocated by task 274 on cpu 0 at 26.095919s (0.006378s ago):
[   26.103199]  test_alloc+0x29c/0x628
[   26.103590]  test_out_of_bounds_write+0xc8/0x240
[   26.104035]  kunit_try_run_case+0x170/0x3f0
[   26.104598]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.105246]  kthread+0x24c/0x2d0
[   26.105742]  ret_from_fork+0x10/0x20
[   26.106131] 
[   26.106539] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   26.107414] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.107707] Hardware name: linux,dummy-virt (DT)
[   26.108349] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[   24.953511] ==================================================================
[   24.954039] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   24.954039] 
[   24.954549] Out-of-bounds read at 0x0000000089429478 (1B left of kfence-#95):
[   24.955277]  test_out_of_bounds_read+0x114/0x3e0
[   24.955754]  kunit_try_run_case+0x170/0x3f0
[   24.956022]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.956387]  kthread+0x24c/0x2d0
[   24.956639]  ret_from_fork+0x10/0x20
[   24.956979] 
[   24.957351] kfence-#95: 0x0000000039100144-0x000000001e68da30, size=32, cache=kmalloc-32
[   24.957351] 
[   24.957975] allocated by task 270 on cpu 0 at 24.951889s (0.006013s ago):
[   24.958713]  test_alloc+0x29c/0x628
[   24.958954]  test_out_of_bounds_read+0xdc/0x3e0
[   24.959148]  kunit_try_run_case+0x170/0x3f0
[   24.959445]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.959799]  kthread+0x24c/0x2d0
[   24.960019]  ret_from_fork+0x10/0x20
[   24.960340] 
[   24.960607] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   24.961056] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.961362] Hardware name: linux,dummy-virt (DT)
[   24.961654] ==================================================================
[   25.160261] ==================================================================
[   25.160912] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   25.160912] 
[   25.162183] Out-of-bounds read at 0x00000000d8253473 (32B right of kfence-#97):
[   25.163247]  test_out_of_bounds_read+0x1c8/0x3e0
[   25.163763]  kunit_try_run_case+0x170/0x3f0
[   25.164452]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.165117]  kthread+0x24c/0x2d0
[   25.165648]  ret_from_fork+0x10/0x20
[   25.166023] 
[   25.166329] kfence-#97: 0x00000000ea4efba0-0x000000009e1c4a00, size=32, cache=kmalloc-32
[   25.166329] 
[   25.167096] allocated by task 270 on cpu 0 at 25.159927s (0.007157s ago):
[   25.167737]  test_alloc+0x29c/0x628
[   25.168196]  test_out_of_bounds_read+0x198/0x3e0
[   25.168732]  kunit_try_run_case+0x170/0x3f0
[   25.169188]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.169724]  kthread+0x24c/0x2d0
[   25.170142]  ret_from_fork+0x10/0x20
[   25.170540] 
[   25.170865] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   25.171697] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.172056] Hardware name: linux,dummy-virt (DT)
[   25.172535] ==================================================================
[   25.368218] ==================================================================
[   25.368875] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   25.368875] 
[   25.369627] Out-of-bounds read at 0x00000000e367fd8c (1B left of kfence-#99):
[   25.370235]  test_out_of_bounds_read+0x114/0x3e0
[   25.370745]  kunit_try_run_case+0x170/0x3f0
[   25.371178]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.371614]  kthread+0x24c/0x2d0
[   25.371953]  ret_from_fork+0x10/0x20
[   25.372362] 
[   25.372641] kfence-#99: 0x00000000b9ffe2b4-0x00000000ef23d120, size=32, cache=test
[   25.372641] 
[   25.373510] allocated by task 272 on cpu 1 at 25.367895s (0.005602s ago):
[   25.374217]  test_alloc+0x230/0x628
[   25.374728]  test_out_of_bounds_read+0xdc/0x3e0
[   25.375209]  kunit_try_run_case+0x170/0x3f0
[   25.375671]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.376159]  kthread+0x24c/0x2d0
[   25.376580]  ret_from_fork+0x10/0x20
[   25.376993] 
[   25.377292] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   25.378117] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.378468] Hardware name: linux,dummy-virt (DT)
[   25.378968] ==================================================================
[   25.992083] ==================================================================
[   25.992799] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   25.992799] 
[   25.993619] Out-of-bounds read at 0x0000000039cb244d (32B right of kfence-#105):
[   25.994081]  test_out_of_bounds_read+0x1c8/0x3e0
[   25.994616]  kunit_try_run_case+0x170/0x3f0
[   25.995133]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.995634]  kthread+0x24c/0x2d0
[   25.996047]  ret_from_fork+0x10/0x20
[   25.996526] 
[   25.996824] kfence-#105: 0x0000000022d9c02e-0x000000004caa7b00, size=32, cache=test
[   25.996824] 
[   25.997668] allocated by task 272 on cpu 1 at 25.991928s (0.005726s ago):
[   25.998427]  test_alloc+0x230/0x628
[   25.998884]  test_out_of_bounds_read+0x198/0x3e0
[   25.999347]  kunit_try_run_case+0x170/0x3f0
[   25.999724]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.000287]  kthread+0x24c/0x2d0
[   26.000712]  ret_from_fork+0x10/0x20
[   26.001142] 
[   26.001470] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   26.002229] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.002580] Hardware name: linux,dummy-virt (DT)
[   26.003058] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[   24.809091] ==================================================================
[   24.809664] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x50c/0x5b0
[   24.810918] Read of size 1 at addr ffff8000801097f8 by task kunit_try_catch/256
[   24.811504] 
[   24.811686] CPU: 1 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   24.811794] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.811831] Hardware name: linux,dummy-virt (DT)
[   24.811873] Call trace:
[   24.811902]  dump_backtrace+0x9c/0x128
[   24.811965]  show_stack+0x20/0x38
[   24.812010]  dump_stack_lvl+0x8c/0xd0
[   24.812058]  print_report+0x310/0x5f0
[   24.812106]  kasan_report+0xdc/0x128
[   24.812149]  __asan_report_load1_noabort+0x20/0x30
[   24.812199]  vmalloc_oob+0x50c/0x5b0
[   24.812267]  kunit_try_run_case+0x170/0x3f0
[   24.812359]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.812470]  kthread+0x24c/0x2d0
[   24.812552]  ret_from_fork+0x10/0x20
[   24.812655] 
[   24.817086] The buggy address belongs to the virtual mapping at
[   24.817086]  [ffff800080109000, ffff80008010b000) created by:
[   24.817086]  vmalloc_oob+0x98/0x5b0
[   24.818510] 
[   24.818803] The buggy address belongs to the physical page:
[   24.819200] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106d23
[   24.820001] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.820759] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   24.821568] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   24.822156] page dumped because: kasan: bad access detected
[   24.822697] 
[   24.822930] Memory state around the buggy address:
[   24.823461]  ffff800080109680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.824195]  ffff800080109700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.824720] >ffff800080109780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   24.825423]                                                                 ^
[   24.826059]  ffff800080109800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   24.826673]  ffff800080109880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   24.827218] ==================================================================
[   24.787738] ==================================================================
[   24.788771] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x560/0x5b0
[   24.789467] Read of size 1 at addr ffff8000801097f3 by task kunit_try_catch/256
[   24.789884] 
[   24.790201] CPU: 1 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   24.790544] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.790641] Hardware name: linux,dummy-virt (DT)
[   24.790726] Call trace:
[   24.790784]  dump_backtrace+0x9c/0x128
[   24.790915]  show_stack+0x20/0x38
[   24.791021]  dump_stack_lvl+0x8c/0xd0
[   24.791125]  print_report+0x310/0x5f0
[   24.791293]  kasan_report+0xdc/0x128
[   24.791440]  __asan_report_load1_noabort+0x20/0x30
[   24.791514]  vmalloc_oob+0x560/0x5b0
[   24.791563]  kunit_try_run_case+0x170/0x3f0
[   24.791616]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.791669]  kthread+0x24c/0x2d0
[   24.791715]  ret_from_fork+0x10/0x20
[   24.791766] 
[   24.797029] The buggy address belongs to the virtual mapping at
[   24.797029]  [ffff800080109000, ffff80008010b000) created by:
[   24.797029]  vmalloc_oob+0x98/0x5b0
[   24.798121] 
[   24.798490] The buggy address belongs to the physical page:
[   24.799137] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106d23
[   24.799813] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.800539] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   24.801232] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   24.801896] page dumped because: kasan: bad access detected
[   24.802421] 
[   24.802678] Memory state around the buggy address:
[   24.803192]  ffff800080109680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.803837]  ffff800080109700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.804472] >ffff800080109780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   24.805029]                                                              ^
[   24.805698]  ffff800080109800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   24.806437]  ffff800080109880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   24.807035] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   22.937218] ==================================================================
[   22.937719] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f8/0x49c8
[   22.938468] Read of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   22.939036] 
[   22.939793] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   22.939999] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.940073] Hardware name: linux,dummy-virt (DT)
[   22.940158] Call trace:
[   22.940205]  dump_backtrace+0x9c/0x128
[   22.940339]  show_stack+0x20/0x38
[   22.940425]  dump_stack_lvl+0x8c/0xd0
[   22.940533]  print_report+0x118/0x5f0
[   22.940647]  kasan_report+0xdc/0x128
[   22.940754]  kasan_check_range+0x100/0x1a8
[   22.940858]  __kasan_check_read+0x20/0x30
[   22.940921]  kasan_atomics_helper+0x1f8/0x49c8
[   22.940976]  kasan_atomics+0x1a0/0x2e8
[   22.941028]  kunit_try_run_case+0x170/0x3f0
[   22.941080]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.941135]  kthread+0x24c/0x2d0
[   22.941182]  ret_from_fork+0x10/0x20
[   22.941253] 
[   22.948528] Allocated by task 252:
[   22.948865]  kasan_save_stack+0x3c/0x68
[   22.949555]  kasan_save_track+0x20/0x40
[   22.950042]  kasan_save_alloc_info+0x40/0x58
[   22.950533]  __kasan_kmalloc+0xd4/0xd8
[   22.950976]  __kmalloc_cache_noprof+0x154/0x320
[   22.951804]  kasan_atomics+0xb8/0x2e8
[   22.952282]  kunit_try_run_case+0x170/0x3f0
[   22.952744]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.953218]  kthread+0x24c/0x2d0
[   22.953711]  ret_from_fork+0x10/0x20
[   22.954120] 
[   22.954445] The buggy address belongs to the object at fff00000c6cc9e00
[   22.954445]  which belongs to the cache kmalloc-64 of size 64
[   22.956246] The buggy address is located 0 bytes to the right of
[   22.956246]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   22.957162] 
[   22.957517] The buggy address belongs to the physical page:
[   22.958016] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   22.958744] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.959724] page_type: f5(slab)
[   22.960149] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.960724] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.961484] page dumped because: kasan: bad access detected
[   22.962021] 
[   22.962290] Memory state around the buggy address:
[   22.962745]  fff00000c6cc9d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.963572]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.965048] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.965675]                                      ^
[   22.966394]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.967143]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.967725] ==================================================================
[   23.829306] ==================================================================
[   23.829882] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f40/0x49c8
[   23.830838] Read of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.831925] 
[   23.832675] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.832947] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.832992] Hardware name: linux,dummy-virt (DT)
[   23.833039] Call trace:
[   23.833073]  dump_backtrace+0x9c/0x128
[   23.833142]  show_stack+0x20/0x38
[   23.833188]  dump_stack_lvl+0x8c/0xd0
[   23.833261]  print_report+0x118/0x5f0
[   23.833316]  kasan_report+0xdc/0x128
[   23.833364]  __asan_report_load4_noabort+0x20/0x30
[   23.833418]  kasan_atomics_helper+0x3f40/0x49c8
[   23.833472]  kasan_atomics+0x1a0/0x2e8
[   23.833544]  kunit_try_run_case+0x170/0x3f0
[   23.833594]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.833649]  kthread+0x24c/0x2d0
[   23.833695]  ret_from_fork+0x10/0x20
[   23.833747] 
[   23.838596] Allocated by task 252:
[   23.839077]  kasan_save_stack+0x3c/0x68
[   23.839693]  kasan_save_track+0x20/0x40
[   23.840214]  kasan_save_alloc_info+0x40/0x58
[   23.840630]  __kasan_kmalloc+0xd4/0xd8
[   23.841112]  __kmalloc_cache_noprof+0x154/0x320
[   23.841688]  kasan_atomics+0xb8/0x2e8
[   23.842181]  kunit_try_run_case+0x170/0x3f0
[   23.842601]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.843096]  kthread+0x24c/0x2d0
[   23.843573]  ret_from_fork+0x10/0x20
[   23.844037] 
[   23.844350] The buggy address belongs to the object at fff00000c6cc9e00
[   23.844350]  which belongs to the cache kmalloc-64 of size 64
[   23.845314] The buggy address is located 0 bytes to the right of
[   23.845314]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.846310] 
[   23.846654] The buggy address belongs to the physical page:
[   23.847129] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.847946] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.848499] page_type: f5(slab)
[   23.848965] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.849691] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.850331] page dumped because: kasan: bad access detected
[   23.850797] 
[   23.851086] Memory state around the buggy address:
[   23.851508]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.852082]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.852815] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.853363]                                      ^
[   23.853877]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.854548]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.855044] ==================================================================
[   23.794824] ==================================================================
[   23.795382] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd00/0x49c8
[   23.796172] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.796895] 
[   23.797255] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.797496] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.797577] Hardware name: linux,dummy-virt (DT)
[   23.797661] Call trace:
[   23.797729]  dump_backtrace+0x9c/0x128
[   23.797856]  show_stack+0x20/0x38
[   23.797949]  dump_stack_lvl+0x8c/0xd0
[   23.798052]  print_report+0x118/0x5f0
[   23.798153]  kasan_report+0xdc/0x128
[   23.798264]  kasan_check_range+0x100/0x1a8
[   23.798369]  __kasan_check_write+0x20/0x30
[   23.798481]  kasan_atomics_helper+0xd00/0x49c8
[   23.798574]  kasan_atomics+0x1a0/0x2e8
[   23.798626]  kunit_try_run_case+0x170/0x3f0
[   23.798679]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.798735]  kthread+0x24c/0x2d0
[   23.798783]  ret_from_fork+0x10/0x20
[   23.798836] 
[   23.804130] Allocated by task 252:
[   23.804633]  kasan_save_stack+0x3c/0x68
[   23.805169]  kasan_save_track+0x20/0x40
[   23.805646]  kasan_save_alloc_info+0x40/0x58
[   23.806197]  __kasan_kmalloc+0xd4/0xd8
[   23.807121]  __kmalloc_cache_noprof+0x154/0x320
[   23.807535]  kasan_atomics+0xb8/0x2e8
[   23.807901]  kunit_try_run_case+0x170/0x3f0
[   23.808279]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.810317]  kthread+0x24c/0x2d0
[   23.810935]  ret_from_fork+0x10/0x20
[   23.811998] 
[   23.812601] The buggy address belongs to the object at fff00000c6cc9e00
[   23.812601]  which belongs to the cache kmalloc-64 of size 64
[   23.814599] The buggy address is located 0 bytes to the right of
[   23.814599]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.816175] 
[   23.817586] The buggy address belongs to the physical page:
[   23.818693] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.819978] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.820616] page_type: f5(slab)
[   23.821012] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.821703] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.822306] page dumped because: kasan: bad access detected
[   23.822756] 
[   23.823037] Memory state around the buggy address:
[   23.823599]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.824187]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.824928] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.825604]                                      ^
[   23.826001]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.826656]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.827303] ==================================================================
[   23.469306] ==================================================================
[   23.469875] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8d8/0x49c8
[   23.470494] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.471201] 
[   23.471531] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.471761] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.471843] Hardware name: linux,dummy-virt (DT)
[   23.471935] Call trace:
[   23.472004]  dump_backtrace+0x9c/0x128
[   23.472135]  show_stack+0x20/0x38
[   23.472232]  dump_stack_lvl+0x8c/0xd0
[   23.472317]  print_report+0x118/0x5f0
[   23.472368]  kasan_report+0xdc/0x128
[   23.472414]  kasan_check_range+0x100/0x1a8
[   23.472463]  __kasan_check_write+0x20/0x30
[   23.472512]  kasan_atomics_helper+0x8d8/0x49c8
[   23.472565]  kasan_atomics+0x1a0/0x2e8
[   23.472614]  kunit_try_run_case+0x170/0x3f0
[   23.472665]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.472720]  kthread+0x24c/0x2d0
[   23.472767]  ret_from_fork+0x10/0x20
[   23.472819] 
[   23.477999] Allocated by task 252:
[   23.478494]  kasan_save_stack+0x3c/0x68
[   23.479048]  kasan_save_track+0x20/0x40
[   23.479559]  kasan_save_alloc_info+0x40/0x58
[   23.479969]  __kasan_kmalloc+0xd4/0xd8
[   23.480432]  __kmalloc_cache_noprof+0x154/0x320
[   23.480994]  kasan_atomics+0xb8/0x2e8
[   23.481471]  kunit_try_run_case+0x170/0x3f0
[   23.482011]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.482550]  kthread+0x24c/0x2d0
[   23.482944]  ret_from_fork+0x10/0x20
[   23.483434] 
[   23.483745] The buggy address belongs to the object at fff00000c6cc9e00
[   23.483745]  which belongs to the cache kmalloc-64 of size 64
[   23.484587] The buggy address is located 0 bytes to the right of
[   23.484587]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.485592] 
[   23.485911] The buggy address belongs to the physical page:
[   23.486454] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.487120] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.487644] page_type: f5(slab)
[   23.488107] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.488736] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.489402] page dumped because: kasan: bad access detected
[   23.489844] 
[   23.490127] Memory state around the buggy address:
[   23.490600]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.491172]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.491848] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.492417]                                      ^
[   23.492852]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.493533]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.494010] ==================================================================
[   23.768345] ==================================================================
[   23.769136] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f4c/0x49c8
[   23.769853] Read of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.770527] 
[   23.770891] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.771186] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.771287] Hardware name: linux,dummy-virt (DT)
[   23.771393] Call trace:
[   23.771459]  dump_backtrace+0x9c/0x128
[   23.771586]  show_stack+0x20/0x38
[   23.771687]  dump_stack_lvl+0x8c/0xd0
[   23.771791]  print_report+0x118/0x5f0
[   23.771893]  kasan_report+0xdc/0x128
[   23.771997]  __asan_report_load4_noabort+0x20/0x30
[   23.772087]  kasan_atomics_helper+0x3f4c/0x49c8
[   23.772145]  kasan_atomics+0x1a0/0x2e8
[   23.772195]  kunit_try_run_case+0x170/0x3f0
[   23.772278]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.772337]  kthread+0x24c/0x2d0
[   23.772387]  ret_from_fork+0x10/0x20
[   23.772444] 
[   23.777342] Allocated by task 252:
[   23.777828]  kasan_save_stack+0x3c/0x68
[   23.778265]  kasan_save_track+0x20/0x40
[   23.778632]  kasan_save_alloc_info+0x40/0x58
[   23.779163]  __kasan_kmalloc+0xd4/0xd8
[   23.779681]  __kmalloc_cache_noprof+0x154/0x320
[   23.780278]  kasan_atomics+0xb8/0x2e8
[   23.780758]  kunit_try_run_case+0x170/0x3f0
[   23.781253]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.781853]  kthread+0x24c/0x2d0
[   23.782252]  ret_from_fork+0x10/0x20
[   23.782670] 
[   23.783021] The buggy address belongs to the object at fff00000c6cc9e00
[   23.783021]  which belongs to the cache kmalloc-64 of size 64
[   23.783867] The buggy address is located 0 bytes to the right of
[   23.783867]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.784751] 
[   23.784932] The buggy address belongs to the physical page:
[   23.785273] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.786135] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.786752] page_type: f5(slab)
[   23.787110] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.787921] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.788563] page dumped because: kasan: bad access detected
[   23.789052] 
[   23.789306] Memory state around the buggy address:
[   23.789775]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.790438]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.791162] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.791788]                                      ^
[   23.792192]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.792745]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.793362] ==================================================================
[   23.911956] ==================================================================
[   23.912630] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe3c/0x49c8
[   23.913297] Read of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.913931] 
[   23.914266] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.914490] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.914575] Hardware name: linux,dummy-virt (DT)
[   23.914670] Call trace:
[   23.914738]  dump_backtrace+0x9c/0x128
[   23.914865]  show_stack+0x20/0x38
[   23.914964]  dump_stack_lvl+0x8c/0xd0
[   23.915048]  print_report+0x118/0x5f0
[   23.915142]  kasan_report+0xdc/0x128
[   23.915191]  kasan_check_range+0x100/0x1a8
[   23.915262]  __kasan_check_read+0x20/0x30
[   23.915318]  kasan_atomics_helper+0xe3c/0x49c8
[   23.915372]  kasan_atomics+0x1a0/0x2e8
[   23.915422]  kunit_try_run_case+0x170/0x3f0
[   23.915476]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.915529]  kthread+0x24c/0x2d0
[   23.915576]  ret_from_fork+0x10/0x20
[   23.915630] 
[   23.920822] Allocated by task 252:
[   23.922015]  kasan_save_stack+0x3c/0x68
[   23.922423]  kasan_save_track+0x20/0x40
[   23.923015]  kasan_save_alloc_info+0x40/0x58
[   23.923604]  __kasan_kmalloc+0xd4/0xd8
[   23.924218]  __kmalloc_cache_noprof+0x154/0x320
[   23.924868]  kasan_atomics+0xb8/0x2e8
[   23.925420]  kunit_try_run_case+0x170/0x3f0
[   23.926029]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.926652]  kthread+0x24c/0x2d0
[   23.927192]  ret_from_fork+0x10/0x20
[   23.927779] 
[   23.928147] The buggy address belongs to the object at fff00000c6cc9e00
[   23.928147]  which belongs to the cache kmalloc-64 of size 64
[   23.928991] The buggy address is located 0 bytes to the right of
[   23.928991]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.929781] 
[   23.930109] The buggy address belongs to the physical page:
[   23.930749] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.931381] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.932061] page_type: f5(slab)
[   23.932436] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.933151] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.933798] page dumped because: kasan: bad access detected
[   23.934259] 
[   23.934552] Memory state around the buggy address:
[   23.935015]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.935652]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.936355] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.936937]                                      ^
[   23.937331]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.937901]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.938555] ==================================================================
[   23.441964] ==================================================================
[   23.442665] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x810/0x49c8
[   23.443366] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.443984] 
[   23.444335] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.444572] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.444650] Hardware name: linux,dummy-virt (DT)
[   23.444739] Call trace:
[   23.444808]  dump_backtrace+0x9c/0x128
[   23.444943]  show_stack+0x20/0x38
[   23.445043]  dump_stack_lvl+0x8c/0xd0
[   23.445115]  print_report+0x118/0x5f0
[   23.445166]  kasan_report+0xdc/0x128
[   23.445212]  kasan_check_range+0x100/0x1a8
[   23.445293]  __kasan_check_write+0x20/0x30
[   23.445351]  kasan_atomics_helper+0x810/0x49c8
[   23.445405]  kasan_atomics+0x1a0/0x2e8
[   23.445455]  kunit_try_run_case+0x170/0x3f0
[   23.445525]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.445582]  kthread+0x24c/0x2d0
[   23.445631]  ret_from_fork+0x10/0x20
[   23.445684] 
[   23.450983] Allocated by task 252:
[   23.451390]  kasan_save_stack+0x3c/0x68
[   23.451878]  kasan_save_track+0x20/0x40
[   23.452402]  kasan_save_alloc_info+0x40/0x58
[   23.452948]  __kasan_kmalloc+0xd4/0xd8
[   23.453461]  __kmalloc_cache_noprof+0x154/0x320
[   23.454024]  kasan_atomics+0xb8/0x2e8
[   23.454473]  kunit_try_run_case+0x170/0x3f0
[   23.454982]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.455516]  kthread+0x24c/0x2d0
[   23.455856]  ret_from_fork+0x10/0x20
[   23.456341] 
[   23.456643] The buggy address belongs to the object at fff00000c6cc9e00
[   23.456643]  which belongs to the cache kmalloc-64 of size 64
[   23.457586] The buggy address is located 0 bytes to the right of
[   23.457586]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.458496] 
[   23.458828] The buggy address belongs to the physical page:
[   23.459344] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.460020] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.460715] page_type: f5(slab)
[   23.461092] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.461807] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.462447] page dumped because: kasan: bad access detected
[   23.462913] 
[   23.463197] Memory state around the buggy address:
[   23.463652]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.464306]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.464907] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.465525]                                      ^
[   23.465962]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.466663]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.467295] ==================================================================
[   24.053702] ==================================================================
[   24.054296] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf94/0x49c8
[   24.055226] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   24.055900] 
[   24.056228] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   24.056430] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.056491] Hardware name: linux,dummy-virt (DT)
[   24.056565] Call trace:
[   24.056618]  dump_backtrace+0x9c/0x128
[   24.056718]  show_stack+0x20/0x38
[   24.056790]  dump_stack_lvl+0x8c/0xd0
[   24.056874]  print_report+0x118/0x5f0
[   24.056960]  kasan_report+0xdc/0x128
[   24.057036]  kasan_check_range+0x100/0x1a8
[   24.057121]  __kasan_check_write+0x20/0x30
[   24.057267]  kasan_atomics_helper+0xf94/0x49c8
[   24.057384]  kasan_atomics+0x1a0/0x2e8
[   24.057493]  kunit_try_run_case+0x170/0x3f0
[   24.057617]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.057760]  kthread+0x24c/0x2d0
[   24.057835]  ret_from_fork+0x10/0x20
[   24.057891] 
[   24.063839] Allocated by task 252:
[   24.064398]  kasan_save_stack+0x3c/0x68
[   24.064965]  kasan_save_track+0x20/0x40
[   24.065505]  kasan_save_alloc_info+0x40/0x58
[   24.065960]  __kasan_kmalloc+0xd4/0xd8
[   24.066484]  __kmalloc_cache_noprof+0x154/0x320
[   24.067105]  kasan_atomics+0xb8/0x2e8
[   24.067488]  kunit_try_run_case+0x170/0x3f0
[   24.068019]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.068546]  kthread+0x24c/0x2d0
[   24.068960]  ret_from_fork+0x10/0x20
[   24.069448] 
[   24.070175] The buggy address belongs to the object at fff00000c6cc9e00
[   24.070175]  which belongs to the cache kmalloc-64 of size 64
[   24.071601] The buggy address is located 0 bytes to the right of
[   24.071601]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   24.072230] 
[   24.073973] The buggy address belongs to the physical page:
[   24.075090] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   24.076607] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.078021] page_type: f5(slab)
[   24.079067] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.080663] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.081907] page dumped because: kasan: bad access detected
[   24.082470] 
[   24.082785] Memory state around the buggy address:
[   24.083184]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.084008]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.084738] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.085352]                                      ^
[   24.085870]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.086566]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.087192] ==================================================================
[   22.906969] ==================================================================
[   22.907729] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40e4/0x49c8
[   22.908336] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   22.908979] 
[   22.910664] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   22.910804] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.910843] Hardware name: linux,dummy-virt (DT)
[   22.910889] Call trace:
[   22.910921]  dump_backtrace+0x9c/0x128
[   22.910990]  show_stack+0x20/0x38
[   22.911036]  dump_stack_lvl+0x8c/0xd0
[   22.911086]  print_report+0x118/0x5f0
[   22.911202]  kasan_report+0xdc/0x128
[   22.911313]  __asan_report_store4_noabort+0x20/0x30
[   22.911417]  kasan_atomics_helper+0x40e4/0x49c8
[   22.911520]  kasan_atomics+0x1a0/0x2e8
[   22.911616]  kunit_try_run_case+0x170/0x3f0
[   22.911710]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.911768]  kthread+0x24c/0x2d0
[   22.911815]  ret_from_fork+0x10/0x20
[   22.911869] 
[   22.916767] Allocated by task 252:
[   22.916945]  kasan_save_stack+0x3c/0x68
[   22.917141]  kasan_save_track+0x20/0x40
[   22.917846]  kasan_save_alloc_info+0x40/0x58
[   22.918506]  __kasan_kmalloc+0xd4/0xd8
[   22.919107]  __kmalloc_cache_noprof+0x154/0x320
[   22.919710]  kasan_atomics+0xb8/0x2e8
[   22.920611]  kunit_try_run_case+0x170/0x3f0
[   22.921077]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.921702]  kthread+0x24c/0x2d0
[   22.922096]  ret_from_fork+0x10/0x20
[   22.922523] 
[   22.922790] The buggy address belongs to the object at fff00000c6cc9e00
[   22.922790]  which belongs to the cache kmalloc-64 of size 64
[   22.923926] The buggy address is located 0 bytes to the right of
[   22.923926]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   22.924971] 
[   22.926084] The buggy address belongs to the physical page:
[   22.926535] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   22.927126] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.928035] page_type: f5(slab)
[   22.928454] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.929060] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.929651] page dumped because: kasan: bad access detected
[   22.930146] 
[   22.930452] Memory state around the buggy address:
[   22.930934]  fff00000c6cc9d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.932402]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.933020] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.933662]                                      ^
[   22.934085]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.934711]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.935306] ==================================================================
[   24.635768] ==================================================================
[   24.636513] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1780/0x49c8
[   24.637678] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   24.638498] 
[   24.638842] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   24.639120] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.639208] Hardware name: linux,dummy-virt (DT)
[   24.639317] Call trace:
[   24.639365]  dump_backtrace+0x9c/0x128
[   24.639438]  show_stack+0x20/0x38
[   24.639485]  dump_stack_lvl+0x8c/0xd0
[   24.639538]  print_report+0x118/0x5f0
[   24.639587]  kasan_report+0xdc/0x128
[   24.639633]  kasan_check_range+0x100/0x1a8
[   24.639682]  __kasan_check_write+0x20/0x30
[   24.639730]  kasan_atomics_helper+0x1780/0x49c8
[   24.639784]  kasan_atomics+0x1a0/0x2e8
[   24.639833]  kunit_try_run_case+0x170/0x3f0
[   24.639884]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.639939]  kthread+0x24c/0x2d0
[   24.639986]  ret_from_fork+0x10/0x20
[   24.640038] 
[   24.645316] Allocated by task 252:
[   24.645802]  kasan_save_stack+0x3c/0x68
[   24.646255]  kasan_save_track+0x20/0x40
[   24.646712]  kasan_save_alloc_info+0x40/0x58
[   24.647268]  __kasan_kmalloc+0xd4/0xd8
[   24.647670]  __kmalloc_cache_noprof+0x154/0x320
[   24.648215]  kasan_atomics+0xb8/0x2e8
[   24.648710]  kunit_try_run_case+0x170/0x3f0
[   24.649246]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.649677]  kthread+0x24c/0x2d0
[   24.650154]  ret_from_fork+0x10/0x20
[   24.650644] 
[   24.650895] The buggy address belongs to the object at fff00000c6cc9e00
[   24.650895]  which belongs to the cache kmalloc-64 of size 64
[   24.651779] The buggy address is located 0 bytes to the right of
[   24.651779]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   24.652821] 
[   24.653130] The buggy address belongs to the physical page:
[   24.653534] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   24.654249] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.654942] page_type: f5(slab)
[   24.655391] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.656032] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.656703] page dumped because: kasan: bad access detected
[   24.657139] 
[   24.657446] Memory state around the buggy address:
[   24.657912]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.658608]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.659234] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.659869]                                      ^
[   24.660375]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.660995]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.661633] ==================================================================
[   24.173875] ==================================================================
[   24.174414] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1144/0x49c8
[   24.175299] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   24.176080] 
[   24.176455] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   24.176649] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.176706] Hardware name: linux,dummy-virt (DT)
[   24.176775] Call trace:
[   24.176827]  dump_backtrace+0x9c/0x128
[   24.176936]  show_stack+0x20/0x38
[   24.177019]  dump_stack_lvl+0x8c/0xd0
[   24.177117]  print_report+0x118/0x5f0
[   24.177201]  kasan_report+0xdc/0x128
[   24.177300]  kasan_check_range+0x100/0x1a8
[   24.177382]  __kasan_check_write+0x20/0x30
[   24.177510]  kasan_atomics_helper+0x1144/0x49c8
[   24.177617]  kasan_atomics+0x1a0/0x2e8
[   24.177727]  kunit_try_run_case+0x170/0x3f0
[   24.177839]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.177951]  kthread+0x24c/0x2d0
[   24.178039]  ret_from_fork+0x10/0x20
[   24.178175] 
[   24.183910] Allocated by task 252:
[   24.184654]  kasan_save_stack+0x3c/0x68
[   24.185270]  kasan_save_track+0x20/0x40
[   24.185868]  kasan_save_alloc_info+0x40/0x58
[   24.186506]  __kasan_kmalloc+0xd4/0xd8
[   24.187183]  __kmalloc_cache_noprof+0x154/0x320
[   24.187757]  kasan_atomics+0xb8/0x2e8
[   24.188308]  kunit_try_run_case+0x170/0x3f0
[   24.188822]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.189323]  kthread+0x24c/0x2d0
[   24.189646]  ret_from_fork+0x10/0x20
[   24.189988] 
[   24.190721] The buggy address belongs to the object at fff00000c6cc9e00
[   24.190721]  which belongs to the cache kmalloc-64 of size 64
[   24.191731] The buggy address is located 0 bytes to the right of
[   24.191731]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   24.192623] 
[   24.192981] The buggy address belongs to the physical page:
[   24.193525] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   24.194307] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.194921] page_type: f5(slab)
[   24.195365] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.196066] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.196730] page dumped because: kasan: bad access detected
[   24.197233] 
[   24.197519] Memory state around the buggy address:
[   24.198006]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.198741]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.199414] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.200012]                                      ^
[   24.200509]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.201180]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.201833] ==================================================================
[   24.689694] ==================================================================
[   24.690283] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1810/0x49c8
[   24.691151] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   24.692175] 
[   24.692532] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   24.692789] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.692873] Hardware name: linux,dummy-virt (DT)
[   24.692931] Call trace:
[   24.692965]  dump_backtrace+0x9c/0x128
[   24.693033]  show_stack+0x20/0x38
[   24.693080]  dump_stack_lvl+0x8c/0xd0
[   24.693129]  print_report+0x118/0x5f0
[   24.693178]  kasan_report+0xdc/0x128
[   24.693224]  kasan_check_range+0x100/0x1a8
[   24.693300]  __kasan_check_write+0x20/0x30
[   24.693351]  kasan_atomics_helper+0x1810/0x49c8
[   24.693405]  kasan_atomics+0x1a0/0x2e8
[   24.693455]  kunit_try_run_case+0x170/0x3f0
[   24.693527]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.693584]  kthread+0x24c/0x2d0
[   24.693634]  ret_from_fork+0x10/0x20
[   24.693689] 
[   24.699090] Allocated by task 252:
[   24.699487]  kasan_save_stack+0x3c/0x68
[   24.700042]  kasan_save_track+0x20/0x40
[   24.700579]  kasan_save_alloc_info+0x40/0x58
[   24.700996]  __kasan_kmalloc+0xd4/0xd8
[   24.701399]  __kmalloc_cache_noprof+0x154/0x320
[   24.701874]  kasan_atomics+0xb8/0x2e8
[   24.702431]  kunit_try_run_case+0x170/0x3f0
[   24.702854]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.703502]  kthread+0x24c/0x2d0
[   24.703871]  ret_from_fork+0x10/0x20
[   24.704375] 
[   24.704668] The buggy address belongs to the object at fff00000c6cc9e00
[   24.704668]  which belongs to the cache kmalloc-64 of size 64
[   24.705594] The buggy address is located 0 bytes to the right of
[   24.705594]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   24.706782] 
[   24.707137] The buggy address belongs to the physical page:
[   24.707674] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   24.708432] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.709059] page_type: f5(slab)
[   24.709565] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.710257] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.710997] page dumped because: kasan: bad access detected
[   24.711536] 
[   24.711828] Memory state around the buggy address:
[   24.712300]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.713019]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.713701] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.714374]                                      ^
[   24.714846]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.715515]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.716123] ==================================================================
[   23.260494] ==================================================================
[   23.260899] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x578/0x49c8
[   23.261939] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.262783] 
[   23.263181] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.263430] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.263534] Hardware name: linux,dummy-virt (DT)
[   23.263620] Call trace:
[   23.263674]  dump_backtrace+0x9c/0x128
[   23.263805]  show_stack+0x20/0x38
[   23.263906]  dump_stack_lvl+0x8c/0xd0
[   23.264022]  print_report+0x118/0x5f0
[   23.264137]  kasan_report+0xdc/0x128
[   23.264233]  kasan_check_range+0x100/0x1a8
[   23.264333]  __kasan_check_write+0x20/0x30
[   23.264422]  kasan_atomics_helper+0x578/0x49c8
[   23.264524]  kasan_atomics+0x1a0/0x2e8
[   23.264652]  kunit_try_run_case+0x170/0x3f0
[   23.264771]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.264873]  kthread+0x24c/0x2d0
[   23.264975]  ret_from_fork+0x10/0x20
[   23.265090] 
[   23.271859] Allocated by task 252:
[   23.272348]  kasan_save_stack+0x3c/0x68
[   23.272865]  kasan_save_track+0x20/0x40
[   23.273596]  kasan_save_alloc_info+0x40/0x58
[   23.274126]  __kasan_kmalloc+0xd4/0xd8
[   23.274480]  __kmalloc_cache_noprof+0x154/0x320
[   23.274828]  kasan_atomics+0xb8/0x2e8
[   23.276141]  kunit_try_run_case+0x170/0x3f0
[   23.276547]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.276938]  kthread+0x24c/0x2d0
[   23.277256]  ret_from_fork+0x10/0x20
[   23.277584] 
[   23.277789] The buggy address belongs to the object at fff00000c6cc9e00
[   23.277789]  which belongs to the cache kmalloc-64 of size 64
[   23.280425] The buggy address is located 0 bytes to the right of
[   23.280425]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.282392] 
[   23.282709] The buggy address belongs to the physical page:
[   23.283287] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.284006] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.285808] page_type: f5(slab)
[   23.286438] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.288081] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.288832] page dumped because: kasan: bad access detected
[   23.289663] 
[   23.290137] Memory state around the buggy address:
[   23.290697]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.293563]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.294064] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.294773]                                      ^
[   23.295673]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.296326]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.296767] ==================================================================
[   23.329607] ==================================================================
[   23.330271] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x650/0x49c8
[   23.330859] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.332276] 
[   23.332857] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.333099] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.333150] Hardware name: linux,dummy-virt (DT)
[   23.333196] Call trace:
[   23.333230]  dump_backtrace+0x9c/0x128
[   23.333324]  show_stack+0x20/0x38
[   23.333372]  dump_stack_lvl+0x8c/0xd0
[   23.333424]  print_report+0x118/0x5f0
[   23.333473]  kasan_report+0xdc/0x128
[   23.333534]  kasan_check_range+0x100/0x1a8
[   23.333584]  __kasan_check_write+0x20/0x30
[   23.333634]  kasan_atomics_helper+0x650/0x49c8
[   23.333685]  kasan_atomics+0x1a0/0x2e8
[   23.333734]  kunit_try_run_case+0x170/0x3f0
[   23.333784]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.333837]  kthread+0x24c/0x2d0
[   23.333885]  ret_from_fork+0x10/0x20
[   23.333937] 
[   23.339769] Allocated by task 252:
[   23.340316]  kasan_save_stack+0x3c/0x68
[   23.340905]  kasan_save_track+0x20/0x40
[   23.341452]  kasan_save_alloc_info+0x40/0x58
[   23.341916]  __kasan_kmalloc+0xd4/0xd8
[   23.342516]  __kmalloc_cache_noprof+0x154/0x320
[   23.343137]  kasan_atomics+0xb8/0x2e8
[   23.343637]  kunit_try_run_case+0x170/0x3f0
[   23.344168]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.344799]  kthread+0x24c/0x2d0
[   23.345280]  ret_from_fork+0x10/0x20
[   23.345769] 
[   23.346102] The buggy address belongs to the object at fff00000c6cc9e00
[   23.346102]  which belongs to the cache kmalloc-64 of size 64
[   23.347067] The buggy address is located 0 bytes to the right of
[   23.347067]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.348147] 
[   23.348536] The buggy address belongs to the physical page:
[   23.349085] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.349823] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.350457] page_type: f5(slab)
[   23.350956] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.351774] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.352577] page dumped because: kasan: bad access detected
[   23.353221] 
[   23.353529] Memory state around the buggy address:
[   23.354034]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.354753]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.355452] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.356108]                                      ^
[   23.356709]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.357404]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.358046] ==================================================================
[   23.940313] ==================================================================
[   23.940887] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40c0/0x49c8
[   23.941510] Read of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.942080] 
[   23.942603] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.942806] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.942874] Hardware name: linux,dummy-virt (DT)
[   23.943097] Call trace:
[   23.943169]  dump_backtrace+0x9c/0x128
[   23.943318]  show_stack+0x20/0x38
[   23.943419]  dump_stack_lvl+0x8c/0xd0
[   23.943525]  print_report+0x118/0x5f0
[   23.943622]  kasan_report+0xdc/0x128
[   23.943724]  __asan_report_load8_noabort+0x20/0x30
[   23.943835]  kasan_atomics_helper+0x40c0/0x49c8
[   23.943949]  kasan_atomics+0x1a0/0x2e8
[   23.944060]  kunit_try_run_case+0x170/0x3f0
[   23.944164]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.944301]  kthread+0x24c/0x2d0
[   23.944423]  ret_from_fork+0x10/0x20
[   23.944541] 
[   23.949726] Allocated by task 252:
[   23.950130]  kasan_save_stack+0x3c/0x68
[   23.951265]  kasan_save_track+0x20/0x40
[   23.951690]  kasan_save_alloc_info+0x40/0x58
[   23.952112]  __kasan_kmalloc+0xd4/0xd8
[   23.952531]  __kmalloc_cache_noprof+0x154/0x320
[   23.953003]  kasan_atomics+0xb8/0x2e8
[   23.953405]  kunit_try_run_case+0x170/0x3f0
[   23.953950]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.954496]  kthread+0x24c/0x2d0
[   23.954977]  ret_from_fork+0x10/0x20
[   23.955354] 
[   23.955661] The buggy address belongs to the object at fff00000c6cc9e00
[   23.955661]  which belongs to the cache kmalloc-64 of size 64
[   23.956582] The buggy address is located 0 bytes to the right of
[   23.956582]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.957564] 
[   23.957903] The buggy address belongs to the physical page:
[   23.958344] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.959112] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.959767] page_type: f5(slab)
[   23.960142] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.960817] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.961417] page dumped because: kasan: bad access detected
[   23.961941] 
[   23.962247] Memory state around the buggy address:
[   23.962707]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.963272]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.963942] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.964524]                                      ^
[   23.964902]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.965604]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.966154] ==================================================================
[   24.117509] ==================================================================
[   24.118066] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x106c/0x49c8
[   24.118780] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   24.119412] 
[   24.119815] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   24.120068] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.120174] Hardware name: linux,dummy-virt (DT)
[   24.120282] Call trace:
[   24.120361]  dump_backtrace+0x9c/0x128
[   24.120509]  show_stack+0x20/0x38
[   24.120566]  dump_stack_lvl+0x8c/0xd0
[   24.120622]  print_report+0x118/0x5f0
[   24.120709]  kasan_report+0xdc/0x128
[   24.120759]  kasan_check_range+0x100/0x1a8
[   24.120810]  __kasan_check_write+0x20/0x30
[   24.120860]  kasan_atomics_helper+0x106c/0x49c8
[   24.120915]  kasan_atomics+0x1a0/0x2e8
[   24.120963]  kunit_try_run_case+0x170/0x3f0
[   24.121015]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.121069]  kthread+0x24c/0x2d0
[   24.121117]  ret_from_fork+0x10/0x20
[   24.121169] 
[   24.126809] Allocated by task 252:
[   24.127363]  kasan_save_stack+0x3c/0x68
[   24.127926]  kasan_save_track+0x20/0x40
[   24.128456]  kasan_save_alloc_info+0x40/0x58
[   24.129028]  __kasan_kmalloc+0xd4/0xd8
[   24.129571]  __kmalloc_cache_noprof+0x154/0x320
[   24.130095]  kasan_atomics+0xb8/0x2e8
[   24.130632]  kunit_try_run_case+0x170/0x3f0
[   24.131159]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.131726]  kthread+0x24c/0x2d0
[   24.132151]  ret_from_fork+0x10/0x20
[   24.132557] 
[   24.132889] The buggy address belongs to the object at fff00000c6cc9e00
[   24.132889]  which belongs to the cache kmalloc-64 of size 64
[   24.133705] The buggy address is located 0 bytes to the right of
[   24.133705]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   24.134763] 
[   24.135126] The buggy address belongs to the physical page:
[   24.135706] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   24.136428] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.137061] page_type: f5(slab)
[   24.137513] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.138234] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.138877] page dumped because: kasan: bad access detected
[   24.139425] 
[   24.139690] Memory state around the buggy address:
[   24.140107]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.140843]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.141447] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.142117]                                      ^
[   24.142569]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.143256]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.143863] ==================================================================
[   23.496626] ==================================================================
[   23.497270] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4440/0x49c8
[   23.497869] Read of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.498474] 
[   23.498809] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.499038] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.499142] Hardware name: linux,dummy-virt (DT)
[   23.499264] Call trace:
[   23.499338]  dump_backtrace+0x9c/0x128
[   23.499472]  show_stack+0x20/0x38
[   23.499580]  dump_stack_lvl+0x8c/0xd0
[   23.499709]  print_report+0x118/0x5f0
[   23.499803]  kasan_report+0xdc/0x128
[   23.499880]  __asan_report_load4_noabort+0x20/0x30
[   23.499973]  kasan_atomics_helper+0x4440/0x49c8
[   23.500053]  kasan_atomics+0x1a0/0x2e8
[   23.500130]  kunit_try_run_case+0x170/0x3f0
[   23.500216]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.500323]  kthread+0x24c/0x2d0
[   23.500411]  ret_from_fork+0x10/0x20
[   23.500498] 
[   23.506049] Allocated by task 252:
[   23.506551]  kasan_save_stack+0x3c/0x68
[   23.507023]  kasan_save_track+0x20/0x40
[   23.507478]  kasan_save_alloc_info+0x40/0x58
[   23.507946]  __kasan_kmalloc+0xd4/0xd8
[   23.508449]  __kmalloc_cache_noprof+0x154/0x320
[   23.509021]  kasan_atomics+0xb8/0x2e8
[   23.509469]  kunit_try_run_case+0x170/0x3f0
[   23.509925]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.510390]  kthread+0x24c/0x2d0
[   23.510866]  ret_from_fork+0x10/0x20
[   23.511303] 
[   23.511596] The buggy address belongs to the object at fff00000c6cc9e00
[   23.511596]  which belongs to the cache kmalloc-64 of size 64
[   23.512466] The buggy address is located 0 bytes to the right of
[   23.512466]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.513359] 
[   23.513707] The buggy address belongs to the physical page:
[   23.514255] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.515059] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.515636] page_type: f5(slab)
[   23.516105] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.516774] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.517446] page dumped because: kasan: bad access detected
[   23.517879] 
[   23.518183] Memory state around the buggy address:
[   23.518686]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.519315]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.519933] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.520618]                                      ^
[   23.521072]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.521734]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.522277] ==================================================================
[   23.415559] ==================================================================
[   23.416941] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7a0/0x49c8
[   23.417563] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.417944] 
[   23.418124] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.418233] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.418293] Hardware name: linux,dummy-virt (DT)
[   23.418338] Call trace:
[   23.418369]  dump_backtrace+0x9c/0x128
[   23.418432]  show_stack+0x20/0x38
[   23.418480]  dump_stack_lvl+0x8c/0xd0
[   23.418532]  print_report+0x118/0x5f0
[   23.418581]  kasan_report+0xdc/0x128
[   23.418627]  kasan_check_range+0x100/0x1a8
[   23.418676]  __kasan_check_write+0x20/0x30
[   23.418725]  kasan_atomics_helper+0x7a0/0x49c8
[   23.418777]  kasan_atomics+0x1a0/0x2e8
[   23.418825]  kunit_try_run_case+0x170/0x3f0
[   23.418875]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.418929]  kthread+0x24c/0x2d0
[   23.418976]  ret_from_fork+0x10/0x20
[   23.419031] 
[   23.423662] Allocated by task 252:
[   23.424164]  kasan_save_stack+0x3c/0x68
[   23.424704]  kasan_save_track+0x20/0x40
[   23.425192]  kasan_save_alloc_info+0x40/0x58
[   23.425755]  __kasan_kmalloc+0xd4/0xd8
[   23.426149]  __kmalloc_cache_noprof+0x154/0x320
[   23.426642]  kasan_atomics+0xb8/0x2e8
[   23.427059]  kunit_try_run_case+0x170/0x3f0
[   23.427587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.428232]  kthread+0x24c/0x2d0
[   23.428687]  ret_from_fork+0x10/0x20
[   23.429035] 
[   23.429373] The buggy address belongs to the object at fff00000c6cc9e00
[   23.429373]  which belongs to the cache kmalloc-64 of size 64
[   23.430401] The buggy address is located 0 bytes to the right of
[   23.430401]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.431566] 
[   23.431910] The buggy address belongs to the physical page:
[   23.432364] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.433190] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.433828] page_type: f5(slab)
[   23.434190] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.434930] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.435595] page dumped because: kasan: bad access detected
[   23.436115] 
[   23.436376] Memory state around the buggy address:
[   23.436923]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.437469]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.438165] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.438753]                                      ^
[   23.439178]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.439827]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.440407] ==================================================================
[   23.524381] ==================================================================
[   23.524942] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x978/0x49c8
[   23.525604] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.526171] 
[   23.526527] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.526748] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.526830] Hardware name: linux,dummy-virt (DT)
[   23.526922] Call trace:
[   23.526987]  dump_backtrace+0x9c/0x128
[   23.527123]  show_stack+0x20/0x38
[   23.527226]  dump_stack_lvl+0x8c/0xd0
[   23.527328]  print_report+0x118/0x5f0
[   23.527381]  kasan_report+0xdc/0x128
[   23.527429]  kasan_check_range+0x100/0x1a8
[   23.527476]  __kasan_check_write+0x20/0x30
[   23.527526]  kasan_atomics_helper+0x978/0x49c8
[   23.527579]  kasan_atomics+0x1a0/0x2e8
[   23.527627]  kunit_try_run_case+0x170/0x3f0
[   23.527679]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.527733]  kthread+0x24c/0x2d0
[   23.527783]  ret_from_fork+0x10/0x20
[   23.527839] 
[   23.533150] Allocated by task 252:
[   23.533672]  kasan_save_stack+0x3c/0x68
[   23.534220]  kasan_save_track+0x20/0x40
[   23.534723]  kasan_save_alloc_info+0x40/0x58
[   23.535177]  __kasan_kmalloc+0xd4/0xd8
[   23.535638]  __kmalloc_cache_noprof+0x154/0x320
[   23.536164]  kasan_atomics+0xb8/0x2e8
[   23.536681]  kunit_try_run_case+0x170/0x3f0
[   23.537166]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.537683]  kthread+0x24c/0x2d0
[   23.538027]  ret_from_fork+0x10/0x20
[   23.538502] 
[   23.538807] The buggy address belongs to the object at fff00000c6cc9e00
[   23.538807]  which belongs to the cache kmalloc-64 of size 64
[   23.539763] The buggy address is located 0 bytes to the right of
[   23.539763]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.540766] 
[   23.541088] The buggy address belongs to the physical page:
[   23.541576] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.542315] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.542915] page_type: f5(slab)
[   23.543804] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.544499] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.544952] page dumped because: kasan: bad access detected
[   23.545325] 
[   23.545536] Memory state around the buggy address:
[   23.545850]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.547619]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.548802] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.550069]                                      ^
[   23.550901]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.552502]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.554028] ==================================================================
[   23.583968] ==================================================================
[   23.584458] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa50/0x49c8
[   23.585125] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.585620] 
[   23.585979] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.586191] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.586282] Hardware name: linux,dummy-virt (DT)
[   23.586369] Call trace:
[   23.586430]  dump_backtrace+0x9c/0x128
[   23.586556]  show_stack+0x20/0x38
[   23.586652]  dump_stack_lvl+0x8c/0xd0
[   23.586736]  print_report+0x118/0x5f0
[   23.586789]  kasan_report+0xdc/0x128
[   23.586836]  kasan_check_range+0x100/0x1a8
[   23.586886]  __kasan_check_write+0x20/0x30
[   23.586933]  kasan_atomics_helper+0xa50/0x49c8
[   23.586987]  kasan_atomics+0x1a0/0x2e8
[   23.587036]  kunit_try_run_case+0x170/0x3f0
[   23.587126]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.587182]  kthread+0x24c/0x2d0
[   23.587231]  ret_from_fork+0x10/0x20
[   23.587312] 
[   23.593038] Allocated by task 252:
[   23.593414]  kasan_save_stack+0x3c/0x68
[   23.593724]  kasan_save_track+0x20/0x40
[   23.593966]  kasan_save_alloc_info+0x40/0x58
[   23.594213]  __kasan_kmalloc+0xd4/0xd8
[   23.594901]  __kmalloc_cache_noprof+0x154/0x320
[   23.595336]  kasan_atomics+0xb8/0x2e8
[   23.595580]  kunit_try_run_case+0x170/0x3f0
[   23.595835]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.596121]  kthread+0x24c/0x2d0
[   23.597070]  ret_from_fork+0x10/0x20
[   23.597631] 
[   23.597904] The buggy address belongs to the object at fff00000c6cc9e00
[   23.597904]  which belongs to the cache kmalloc-64 of size 64
[   23.598839] The buggy address is located 0 bytes to the right of
[   23.598839]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.599874] 
[   23.600223] The buggy address belongs to the physical page:
[   23.600796] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.601076] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.601535] page_type: f5(slab)
[   23.602089] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.602857] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.603544] page dumped because: kasan: bad access detected
[   23.603755] 
[   23.603870] Memory state around the buggy address:
[   23.604055]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.604312]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.604542] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.604762]                                      ^
[   23.604942]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.605169]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.605640] ==================================================================
[   23.556251] ==================================================================
[   23.556891] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x9e4/0x49c8
[   23.557501] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.558310] 
[   23.558659] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.558883] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.558962] Hardware name: linux,dummy-virt (DT)
[   23.559052] Call trace:
[   23.559252]  dump_backtrace+0x9c/0x128
[   23.559407]  show_stack+0x20/0x38
[   23.559502]  dump_stack_lvl+0x8c/0xd0
[   23.559561]  print_report+0x118/0x5f0
[   23.559611]  kasan_report+0xdc/0x128
[   23.559656]  kasan_check_range+0x100/0x1a8
[   23.559705]  __kasan_check_write+0x20/0x30
[   23.559753]  kasan_atomics_helper+0x9e4/0x49c8
[   23.559806]  kasan_atomics+0x1a0/0x2e8
[   23.559853]  kunit_try_run_case+0x170/0x3f0
[   23.559904]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.559958]  kthread+0x24c/0x2d0
[   23.560004]  ret_from_fork+0x10/0x20
[   23.560059] 
[   23.564872] Allocated by task 252:
[   23.565309]  kasan_save_stack+0x3c/0x68
[   23.565883]  kasan_save_track+0x20/0x40
[   23.566293]  kasan_save_alloc_info+0x40/0x58
[   23.566977]  __kasan_kmalloc+0xd4/0xd8
[   23.567376]  __kmalloc_cache_noprof+0x154/0x320
[   23.568099]  kasan_atomics+0xb8/0x2e8
[   23.568608]  kunit_try_run_case+0x170/0x3f0
[   23.569147]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.569742]  kthread+0x24c/0x2d0
[   23.570180]  ret_from_fork+0x10/0x20
[   23.570563] 
[   23.570893] The buggy address belongs to the object at fff00000c6cc9e00
[   23.570893]  which belongs to the cache kmalloc-64 of size 64
[   23.571862] The buggy address is located 0 bytes to the right of
[   23.571862]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.572792] 
[   23.573152] The buggy address belongs to the physical page:
[   23.573736] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.574471] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.575089] page_type: f5(slab)
[   23.575494] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.576120] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.576764] page dumped because: kasan: bad access detected
[   23.577345] 
[   23.577656] Memory state around the buggy address:
[   23.578131]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.578828]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.579465] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.580054]                                      ^
[   23.580510]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.581234]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.581756] ==================================================================
[   23.069953] ==================================================================
[   23.070710] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x344/0x49c8
[   23.071296] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.072042] 
[   23.072413] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.072652] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.072728] Hardware name: linux,dummy-virt (DT)
[   23.072814] Call trace:
[   23.072877]  dump_backtrace+0x9c/0x128
[   23.073002]  show_stack+0x20/0x38
[   23.073098]  dump_stack_lvl+0x8c/0xd0
[   23.073207]  print_report+0x118/0x5f0
[   23.073336]  kasan_report+0xdc/0x128
[   23.073432]  kasan_check_range+0x100/0x1a8
[   23.073537]  __kasan_check_write+0x20/0x30
[   23.073620]  kasan_atomics_helper+0x344/0x49c8
[   23.073746]  kasan_atomics+0x1a0/0x2e8
[   23.073832]  kunit_try_run_case+0x170/0x3f0
[   23.073911]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.074005]  kthread+0x24c/0x2d0
[   23.074093]  ret_from_fork+0x10/0x20
[   23.074177] 
[   23.081201] Allocated by task 252:
[   23.081618]  kasan_save_stack+0x3c/0x68
[   23.081995]  kasan_save_track+0x20/0x40
[   23.082843]  kasan_save_alloc_info+0x40/0x58
[   23.083306]  __kasan_kmalloc+0xd4/0xd8
[   23.083633]  __kmalloc_cache_noprof+0x154/0x320
[   23.084786]  kasan_atomics+0xb8/0x2e8
[   23.085112]  kunit_try_run_case+0x170/0x3f0
[   23.085623]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.086293]  kthread+0x24c/0x2d0
[   23.086706]  ret_from_fork+0x10/0x20
[   23.087190] 
[   23.087496] The buggy address belongs to the object at fff00000c6cc9e00
[   23.087496]  which belongs to the cache kmalloc-64 of size 64
[   23.088775] The buggy address is located 0 bytes to the right of
[   23.088775]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.089959] 
[   23.090421] The buggy address belongs to the physical page:
[   23.091013] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.091814] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.093114] page_type: f5(slab)
[   23.093673] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.094651] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.095470] page dumped because: kasan: bad access detected
[   23.096361] 
[   23.096650] Memory state around the buggy address:
[   23.097115]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.097700]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.098694] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.099424]                                      ^
[   23.099839]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.100200]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.101324] ==================================================================
[   23.883385] ==================================================================
[   23.883937] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f6c/0x49c8
[   23.884753] Read of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.885522] 
[   23.885811] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.886047] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.886133] Hardware name: linux,dummy-virt (DT)
[   23.886232] Call trace:
[   23.886300]  dump_backtrace+0x9c/0x128
[   23.886372]  show_stack+0x20/0x38
[   23.886462]  dump_stack_lvl+0x8c/0xd0
[   23.886570]  print_report+0x118/0x5f0
[   23.886666]  kasan_report+0xdc/0x128
[   23.886764]  __asan_report_load4_noabort+0x20/0x30
[   23.886876]  kasan_atomics_helper+0x3f6c/0x49c8
[   23.886988]  kasan_atomics+0x1a0/0x2e8
[   23.887144]  kunit_try_run_case+0x170/0x3f0
[   23.887211]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.887298]  kthread+0x24c/0x2d0
[   23.887350]  ret_from_fork+0x10/0x20
[   23.887406] 
[   23.894287] Allocated by task 252:
[   23.894650]  kasan_save_stack+0x3c/0x68
[   23.895018]  kasan_save_track+0x20/0x40
[   23.895641]  kasan_save_alloc_info+0x40/0x58
[   23.896088]  __kasan_kmalloc+0xd4/0xd8
[   23.896588]  __kmalloc_cache_noprof+0x154/0x320
[   23.896967]  kasan_atomics+0xb8/0x2e8
[   23.897498]  kunit_try_run_case+0x170/0x3f0
[   23.897955]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.898558]  kthread+0x24c/0x2d0
[   23.898887]  ret_from_fork+0x10/0x20
[   23.899364] 
[   23.899629] The buggy address belongs to the object at fff00000c6cc9e00
[   23.899629]  which belongs to the cache kmalloc-64 of size 64
[   23.900446] The buggy address is located 0 bytes to the right of
[   23.900446]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.901461] 
[   23.901792] The buggy address belongs to the physical page:
[   23.902293] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.902991] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.903589] page_type: f5(slab)
[   23.903998] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.904723] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.905405] page dumped because: kasan: bad access detected
[   23.905908] 
[   23.906173] Memory state around the buggy address:
[   23.906663]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.907285]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.907949] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.908588]                                      ^
[   23.909040]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.909673]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.910248] ==================================================================
[   23.994841] ==================================================================
[   23.995383] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3fc4/0x49c8
[   23.996005] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.996593] 
[   23.996949] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.997193] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.997293] Hardware name: linux,dummy-virt (DT)
[   23.997387] Call trace:
[   23.997462]  dump_backtrace+0x9c/0x128
[   23.997601]  show_stack+0x20/0x38
[   23.997673]  dump_stack_lvl+0x8c/0xd0
[   23.997729]  print_report+0x118/0x5f0
[   23.997779]  kasan_report+0xdc/0x128
[   23.997826]  __asan_report_store8_noabort+0x20/0x30
[   23.997880]  kasan_atomics_helper+0x3fc4/0x49c8
[   23.997933]  kasan_atomics+0x1a0/0x2e8
[   23.997982]  kunit_try_run_case+0x170/0x3f0
[   23.998033]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.998087]  kthread+0x24c/0x2d0
[   23.998135]  ret_from_fork+0x10/0x20
[   23.998189] 
[   24.003175] Allocated by task 252:
[   24.003633]  kasan_save_stack+0x3c/0x68
[   24.004115]  kasan_save_track+0x20/0x40
[   24.004608]  kasan_save_alloc_info+0x40/0x58
[   24.005165]  __kasan_kmalloc+0xd4/0xd8
[   24.005644]  __kmalloc_cache_noprof+0x154/0x320
[   24.006189]  kasan_atomics+0xb8/0x2e8
[   24.006714]  kunit_try_run_case+0x170/0x3f0
[   24.007212]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.007752]  kthread+0x24c/0x2d0
[   24.008122]  ret_from_fork+0x10/0x20
[   24.008625] 
[   24.008864] The buggy address belongs to the object at fff00000c6cc9e00
[   24.008864]  which belongs to the cache kmalloc-64 of size 64
[   24.009788] The buggy address is located 0 bytes to the right of
[   24.009788]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   24.010764] 
[   24.011084] The buggy address belongs to the physical page:
[   24.011608] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   24.012408] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.012981] page_type: f5(slab)
[   24.013428] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.014132] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.014750] page dumped because: kasan: bad access detected
[   24.015191] 
[   24.015491] Memory state around the buggy address:
[   24.015897]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.016560]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.017261] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.017877]                                      ^
[   24.018392]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.018965]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.019552] ==================================================================
[   23.635606] ==================================================================
[   23.636070] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb28/0x49c8
[   23.636493] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.637210] 
[   23.637607] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.637835] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.637919] Hardware name: linux,dummy-virt (DT)
[   23.638035] Call trace:
[   23.638098]  dump_backtrace+0x9c/0x128
[   23.638253]  show_stack+0x20/0x38
[   23.638356]  dump_stack_lvl+0x8c/0xd0
[   23.638460]  print_report+0x118/0x5f0
[   23.638579]  kasan_report+0xdc/0x128
[   23.638675]  kasan_check_range+0x100/0x1a8
[   23.638782]  __kasan_check_write+0x20/0x30
[   23.638897]  kasan_atomics_helper+0xb28/0x49c8
[   23.639007]  kasan_atomics+0x1a0/0x2e8
[   23.639138]  kunit_try_run_case+0x170/0x3f0
[   23.639214]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.639297]  kthread+0x24c/0x2d0
[   23.639351]  ret_from_fork+0x10/0x20
[   23.639404] 
[   23.646471] Allocated by task 252:
[   23.646934]  kasan_save_stack+0x3c/0x68
[   23.647386]  kasan_save_track+0x20/0x40
[   23.647874]  kasan_save_alloc_info+0x40/0x58
[   23.648367]  __kasan_kmalloc+0xd4/0xd8
[   23.648778]  __kmalloc_cache_noprof+0x154/0x320
[   23.649294]  kasan_atomics+0xb8/0x2e8
[   23.649756]  kunit_try_run_case+0x170/0x3f0
[   23.650228]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.650774]  kthread+0x24c/0x2d0
[   23.651181]  ret_from_fork+0x10/0x20
[   23.651671] 
[   23.651946] The buggy address belongs to the object at fff00000c6cc9e00
[   23.651946]  which belongs to the cache kmalloc-64 of size 64
[   23.652837] The buggy address is located 0 bytes to the right of
[   23.652837]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.653891] 
[   23.654223] The buggy address belongs to the physical page:
[   23.654787] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.655226] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.655964] page_type: f5(slab)
[   23.656463] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.657168] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.657828] page dumped because: kasan: bad access detected
[   23.658360] 
[   23.658603] Memory state around the buggy address:
[   23.659174]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.659831]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.660474] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.661086]                                      ^
[   23.661589]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.662206]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.662836] ==================================================================
[   23.716282] ==================================================================
[   23.716790] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f24/0x49c8
[   23.717328] Read of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.718608] 
[   23.719108] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.719335] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.719423] Hardware name: linux,dummy-virt (DT)
[   23.719504] Call trace:
[   23.719542]  dump_backtrace+0x9c/0x128
[   23.719614]  show_stack+0x20/0x38
[   23.719662]  dump_stack_lvl+0x8c/0xd0
[   23.719711]  print_report+0x118/0x5f0
[   23.719759]  kasan_report+0xdc/0x128
[   23.719804]  __asan_report_load4_noabort+0x20/0x30
[   23.719855]  kasan_atomics_helper+0x3f24/0x49c8
[   23.719905]  kasan_atomics+0x1a0/0x2e8
[   23.719953]  kunit_try_run_case+0x170/0x3f0
[   23.720001]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.720052]  kthread+0x24c/0x2d0
[   23.720102]  ret_from_fork+0x10/0x20
[   23.720152] 
[   23.724957] Allocated by task 252:
[   23.725450]  kasan_save_stack+0x3c/0x68
[   23.725984]  kasan_save_track+0x20/0x40
[   23.726422]  kasan_save_alloc_info+0x40/0x58
[   23.726936]  __kasan_kmalloc+0xd4/0xd8
[   23.727451]  __kmalloc_cache_noprof+0x154/0x320
[   23.727977]  kasan_atomics+0xb8/0x2e8
[   23.728410]  kunit_try_run_case+0x170/0x3f0
[   23.728950]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.729567]  kthread+0x24c/0x2d0
[   23.730041]  ret_from_fork+0x10/0x20
[   23.730527] 
[   23.730843] The buggy address belongs to the object at fff00000c6cc9e00
[   23.730843]  which belongs to the cache kmalloc-64 of size 64
[   23.731746] The buggy address is located 0 bytes to the right of
[   23.731746]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.732667] 
[   23.733006] The buggy address belongs to the physical page:
[   23.733463] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.734252] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.734856] page_type: f5(slab)
[   23.735293] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.735925] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.736587] page dumped because: kasan: bad access detected
[   23.737049] 
[   23.737351] Memory state around the buggy address:
[   23.737792]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.738410]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.739018] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.739454]                                      ^
[   23.739882]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.740458]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.741122] ==================================================================
[   24.549555] ==================================================================
[   24.550181] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f18/0x49c8
[   24.550960] Read of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   24.552340] 
[   24.552714] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   24.552943] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.553005] Hardware name: linux,dummy-virt (DT)
[   24.553088] Call trace:
[   24.553146]  dump_backtrace+0x9c/0x128
[   24.553269]  show_stack+0x20/0x38
[   24.553345]  dump_stack_lvl+0x8c/0xd0
[   24.553426]  print_report+0x118/0x5f0
[   24.553520]  kasan_report+0xdc/0x128
[   24.553601]  __asan_report_load8_noabort+0x20/0x30
[   24.553696]  kasan_atomics_helper+0x3f18/0x49c8
[   24.553792]  kasan_atomics+0x1a0/0x2e8
[   24.553885]  kunit_try_run_case+0x170/0x3f0
[   24.554004]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.554136]  kthread+0x24c/0x2d0
[   24.554213]  ret_from_fork+0x10/0x20
[   24.554299] 
[   24.559081] Allocated by task 252:
[   24.559555]  kasan_save_stack+0x3c/0x68
[   24.559974]  kasan_save_track+0x20/0x40
[   24.560511]  kasan_save_alloc_info+0x40/0x58
[   24.561055]  __kasan_kmalloc+0xd4/0xd8
[   24.561568]  __kmalloc_cache_noprof+0x154/0x320
[   24.561939]  kasan_atomics+0xb8/0x2e8
[   24.562377]  kunit_try_run_case+0x170/0x3f0
[   24.562882]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.563434]  kthread+0x24c/0x2d0
[   24.563792]  ret_from_fork+0x10/0x20
[   24.564199] 
[   24.564522] The buggy address belongs to the object at fff00000c6cc9e00
[   24.564522]  which belongs to the cache kmalloc-64 of size 64
[   24.565396] The buggy address is located 0 bytes to the right of
[   24.565396]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   24.566327] 
[   24.566645] The buggy address belongs to the physical page:
[   24.567246] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   24.567875] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.568507] page_type: f5(slab)
[   24.568901] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.569714] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.570472] page dumped because: kasan: bad access detected
[   24.571134] 
[   24.571583] Memory state around the buggy address:
[   24.572017]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.572616]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.573202] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.574110]                                      ^
[   24.574568]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.575118]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.575947] ==================================================================
[   23.102833] ==================================================================
[   23.103415] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x49c8
[   23.104661] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.105762] 
[   23.106097] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.106294] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.106364] Hardware name: linux,dummy-virt (DT)
[   23.106416] Call trace:
[   23.106452]  dump_backtrace+0x9c/0x128
[   23.106522]  show_stack+0x20/0x38
[   23.106570]  dump_stack_lvl+0x8c/0xd0
[   23.106622]  print_report+0x118/0x5f0
[   23.106671]  kasan_report+0xdc/0x128
[   23.106716]  __asan_report_store4_noabort+0x20/0x30
[   23.106769]  kasan_atomics_helper+0x40fc/0x49c8
[   23.106824]  kasan_atomics+0x1a0/0x2e8
[   23.106872]  kunit_try_run_case+0x170/0x3f0
[   23.106924]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.106978]  kthread+0x24c/0x2d0
[   23.107028]  ret_from_fork+0x10/0x20
[   23.107148] 
[   23.113614] Allocated by task 252:
[   23.114141]  kasan_save_stack+0x3c/0x68
[   23.114725]  kasan_save_track+0x20/0x40
[   23.115419]  kasan_save_alloc_info+0x40/0x58
[   23.115966]  __kasan_kmalloc+0xd4/0xd8
[   23.116651]  __kmalloc_cache_noprof+0x154/0x320
[   23.116988]  kasan_atomics+0xb8/0x2e8
[   23.117283]  kunit_try_run_case+0x170/0x3f0
[   23.117816]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.118473]  kthread+0x24c/0x2d0
[   23.118986]  ret_from_fork+0x10/0x20
[   23.119969] 
[   23.120324] The buggy address belongs to the object at fff00000c6cc9e00
[   23.120324]  which belongs to the cache kmalloc-64 of size 64
[   23.121431] The buggy address is located 0 bytes to the right of
[   23.121431]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.122476] 
[   23.122809] The buggy address belongs to the physical page:
[   23.123440] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.124072] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.125254] page_type: f5(slab)
[   23.125954] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.126656] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.127076] page dumped because: kasan: bad access detected
[   23.128025] 
[   23.128345] Memory state around the buggy address:
[   23.128852]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.129387]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.130103] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.130669]                                      ^
[   23.131467]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.132286]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.132888] ==================================================================
[   24.203756] ==================================================================
[   24.204389] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11b0/0x49c8
[   24.205037] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   24.205657] 
[   24.206030] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   24.206264] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.206361] Hardware name: linux,dummy-virt (DT)
[   24.206459] Call trace:
[   24.206530]  dump_backtrace+0x9c/0x128
[   24.206678]  show_stack+0x20/0x38
[   24.206778]  dump_stack_lvl+0x8c/0xd0
[   24.206865]  print_report+0x118/0x5f0
[   24.206918]  kasan_report+0xdc/0x128
[   24.206971]  kasan_check_range+0x100/0x1a8
[   24.207051]  __kasan_check_write+0x20/0x30
[   24.207154]  kasan_atomics_helper+0x11b0/0x49c8
[   24.207211]  kasan_atomics+0x1a0/0x2e8
[   24.207284]  kunit_try_run_case+0x170/0x3f0
[   24.207339]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.207396]  kthread+0x24c/0x2d0
[   24.207443]  ret_from_fork+0x10/0x20
[   24.207498] 
[   24.212555] Allocated by task 252:
[   24.212964]  kasan_save_stack+0x3c/0x68
[   24.213549]  kasan_save_track+0x20/0x40
[   24.214721]  kasan_save_alloc_info+0x40/0x58
[   24.215293]  __kasan_kmalloc+0xd4/0xd8
[   24.215985]  __kmalloc_cache_noprof+0x154/0x320
[   24.216521]  kasan_atomics+0xb8/0x2e8
[   24.217141]  kunit_try_run_case+0x170/0x3f0
[   24.217751]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.218330]  kthread+0x24c/0x2d0
[   24.218687]  ret_from_fork+0x10/0x20
[   24.219221] 
[   24.219483] The buggy address belongs to the object at fff00000c6cc9e00
[   24.219483]  which belongs to the cache kmalloc-64 of size 64
[   24.220564] The buggy address is located 0 bytes to the right of
[   24.220564]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   24.221915] 
[   24.222338] The buggy address belongs to the physical page:
[   24.222689] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   24.223480] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.224151] page_type: f5(slab)
[   24.224800] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.225515] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.226312] page dumped because: kasan: bad access detected
[   24.226775] 
[   24.227030] Memory state around the buggy address:
[   24.227454]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.228265]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.228996] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.229675]                                      ^
[   24.230284]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.230921]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.231555] ==================================================================
[   23.689845] ==================================================================
[   23.690934] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xbc8/0x49c8
[   23.691504] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.691873] 
[   23.692053] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.692167] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.692204] Hardware name: linux,dummy-virt (DT)
[   23.692267] Call trace:
[   23.692305]  dump_backtrace+0x9c/0x128
[   23.692368]  show_stack+0x20/0x38
[   23.692416]  dump_stack_lvl+0x8c/0xd0
[   23.692467]  print_report+0x118/0x5f0
[   23.692514]  kasan_report+0xdc/0x128
[   23.692561]  kasan_check_range+0x100/0x1a8
[   23.692608]  __kasan_check_write+0x20/0x30
[   23.692655]  kasan_atomics_helper+0xbc8/0x49c8
[   23.692707]  kasan_atomics+0x1a0/0x2e8
[   23.692754]  kunit_try_run_case+0x170/0x3f0
[   23.692803]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.692858]  kthread+0x24c/0x2d0
[   23.692905]  ret_from_fork+0x10/0x20
[   23.692956] 
[   23.698073] Allocated by task 252:
[   23.698487]  kasan_save_stack+0x3c/0x68
[   23.698949]  kasan_save_track+0x20/0x40
[   23.699363]  kasan_save_alloc_info+0x40/0x58
[   23.699841]  __kasan_kmalloc+0xd4/0xd8
[   23.700194]  __kmalloc_cache_noprof+0x154/0x320
[   23.700761]  kasan_atomics+0xb8/0x2e8
[   23.701278]  kunit_try_run_case+0x170/0x3f0
[   23.701810]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.702390]  kthread+0x24c/0x2d0
[   23.702824]  ret_from_fork+0x10/0x20
[   23.703307] 
[   23.703614] The buggy address belongs to the object at fff00000c6cc9e00
[   23.703614]  which belongs to the cache kmalloc-64 of size 64
[   23.704537] The buggy address is located 0 bytes to the right of
[   23.704537]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.705486] 
[   23.705803] The buggy address belongs to the physical page:
[   23.706282] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.706894] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.707514] page_type: f5(slab)
[   23.707851] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.708654] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.709396] page dumped because: kasan: bad access detected
[   23.709877] 
[   23.710183] Memory state around the buggy address:
[   23.710622]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.711258]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.711838] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.712520]                                      ^
[   23.712966]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.713548]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.714103] ==================================================================
[   23.000105] ==================================================================
[   23.000765] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2c4/0x49c8
[   23.001508] Read of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.002478] 
[   23.002848] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.003201] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.003855] Hardware name: linux,dummy-virt (DT)
[   23.003971] Call trace:
[   23.004025]  dump_backtrace+0x9c/0x128
[   23.004147]  show_stack+0x20/0x38
[   23.004254]  dump_stack_lvl+0x8c/0xd0
[   23.004354]  print_report+0x118/0x5f0
[   23.004444]  kasan_report+0xdc/0x128
[   23.004523]  kasan_check_range+0x100/0x1a8
[   23.004603]  __kasan_check_read+0x20/0x30
[   23.004692]  kasan_atomics_helper+0x2c4/0x49c8
[   23.004791]  kasan_atomics+0x1a0/0x2e8
[   23.004872]  kunit_try_run_case+0x170/0x3f0
[   23.004965]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.005063]  kthread+0x24c/0x2d0
[   23.005195]  ret_from_fork+0x10/0x20
[   23.005346] 
[   23.015644] Allocated by task 252:
[   23.016716]  kasan_save_stack+0x3c/0x68
[   23.017815]  kasan_save_track+0x20/0x40
[   23.018984]  kasan_save_alloc_info+0x40/0x58
[   23.020129]  __kasan_kmalloc+0xd4/0xd8
[   23.021259]  __kmalloc_cache_noprof+0x154/0x320
[   23.022173]  kasan_atomics+0xb8/0x2e8
[   23.022768]  kunit_try_run_case+0x170/0x3f0
[   23.023430]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.024333]  kthread+0x24c/0x2d0
[   23.024878]  ret_from_fork+0x10/0x20
[   23.025467] 
[   23.025912] The buggy address belongs to the object at fff00000c6cc9e00
[   23.025912]  which belongs to the cache kmalloc-64 of size 64
[   23.027319] The buggy address is located 0 bytes to the right of
[   23.027319]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.028145] 
[   23.028396] The buggy address belongs to the physical page:
[   23.028880] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.029926] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.030682] page_type: f5(slab)
[   23.031313] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.032362] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.033000] page dumped because: kasan: bad access detected
[   23.033440] 
[   23.033745] Memory state around the buggy address:
[   23.034153]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.034859]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.035744] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.036150]                                      ^
[   23.036552]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.037355]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.038153] ==================================================================
[   23.742769] ==================================================================
[   23.743397] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc64/0x49c8
[   23.744180] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.744684] 
[   23.745035] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.745272] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.745357] Hardware name: linux,dummy-virt (DT)
[   23.745454] Call trace:
[   23.745536]  dump_backtrace+0x9c/0x128
[   23.745656]  show_stack+0x20/0x38
[   23.745756]  dump_stack_lvl+0x8c/0xd0
[   23.745830]  print_report+0x118/0x5f0
[   23.745881]  kasan_report+0xdc/0x128
[   23.745927]  kasan_check_range+0x100/0x1a8
[   23.745977]  __kasan_check_write+0x20/0x30
[   23.746025]  kasan_atomics_helper+0xc64/0x49c8
[   23.746076]  kasan_atomics+0x1a0/0x2e8
[   23.746125]  kunit_try_run_case+0x170/0x3f0
[   23.746174]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.746228]  kthread+0x24c/0x2d0
[   23.746309]  ret_from_fork+0x10/0x20
[   23.746364] 
[   23.751398] Allocated by task 252:
[   23.751870]  kasan_save_stack+0x3c/0x68
[   23.752396]  kasan_save_track+0x20/0x40
[   23.752823]  kasan_save_alloc_info+0x40/0x58
[   23.753268]  __kasan_kmalloc+0xd4/0xd8
[   23.753648]  __kmalloc_cache_noprof+0x154/0x320
[   23.754196]  kasan_atomics+0xb8/0x2e8
[   23.754724]  kunit_try_run_case+0x170/0x3f0
[   23.755247]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.755749]  kthread+0x24c/0x2d0
[   23.756121]  ret_from_fork+0x10/0x20
[   23.756596] 
[   23.756910] The buggy address belongs to the object at fff00000c6cc9e00
[   23.756910]  which belongs to the cache kmalloc-64 of size 64
[   23.757773] The buggy address is located 0 bytes to the right of
[   23.757773]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.758723] 
[   23.759044] The buggy address belongs to the physical page:
[   23.759577] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.760349] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.760918] page_type: f5(slab)
[   23.761328] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.762010] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.762626] page dumped because: kasan: bad access detected
[   23.763104] 
[   23.763345] Memory state around the buggy address:
[   23.763679]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.764407]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.764889] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.765434]                                      ^
[   23.765792]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.766508]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.767104] ==================================================================
[   23.967667] ==================================================================
[   23.968350] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb0/0x49c8
[   23.968973] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.969664] 
[   23.970014] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.970249] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.970332] Hardware name: linux,dummy-virt (DT)
[   23.970426] Call trace:
[   23.970489]  dump_backtrace+0x9c/0x128
[   23.970615]  show_stack+0x20/0x38
[   23.970719]  dump_stack_lvl+0x8c/0xd0
[   23.970825]  print_report+0x118/0x5f0
[   23.970926]  kasan_report+0xdc/0x128
[   23.971024]  kasan_check_range+0x100/0x1a8
[   23.971118]  __kasan_check_write+0x20/0x30
[   23.971182]  kasan_atomics_helper+0xeb0/0x49c8
[   23.971252]  kasan_atomics+0x1a0/0x2e8
[   23.971317]  kunit_try_run_case+0x170/0x3f0
[   23.971374]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.971430]  kthread+0x24c/0x2d0
[   23.971480]  ret_from_fork+0x10/0x20
[   23.971532] 
[   23.976757] Allocated by task 252:
[   23.977227]  kasan_save_stack+0x3c/0x68
[   23.977784]  kasan_save_track+0x20/0x40
[   23.978265]  kasan_save_alloc_info+0x40/0x58
[   23.978727]  __kasan_kmalloc+0xd4/0xd8
[   23.979148]  __kmalloc_cache_noprof+0x154/0x320
[   23.979627]  kasan_atomics+0xb8/0x2e8
[   23.980128]  kunit_try_run_case+0x170/0x3f0
[   23.980622]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.981150]  kthread+0x24c/0x2d0
[   23.981542]  ret_from_fork+0x10/0x20
[   23.982024] 
[   23.982354] The buggy address belongs to the object at fff00000c6cc9e00
[   23.982354]  which belongs to the cache kmalloc-64 of size 64
[   23.983150] The buggy address is located 0 bytes to the right of
[   23.983150]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.984090] 
[   23.984429] The buggy address belongs to the physical page:
[   23.985032] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.985700] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.986383] page_type: f5(slab)
[   23.986787] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.987382] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.988086] page dumped because: kasan: bad access detected
[   23.988589] 
[   23.988870] Memory state around the buggy address:
[   23.989386]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.989985]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.990642] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.991247]                                      ^
[   23.991659]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.992313]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.992922] ==================================================================
[   24.434292] ==================================================================
[   24.434998] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1518/0x49c8
[   24.435945] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   24.436726] 
[   24.437080] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   24.437326] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.437402] Hardware name: linux,dummy-virt (DT)
[   24.437499] Call trace:
[   24.437569]  dump_backtrace+0x9c/0x128
[   24.437690]  show_stack+0x20/0x38
[   24.437786]  dump_stack_lvl+0x8c/0xd0
[   24.437865]  print_report+0x118/0x5f0
[   24.437933]  kasan_report+0xdc/0x128
[   24.437997]  kasan_check_range+0x100/0x1a8
[   24.438048]  __kasan_check_write+0x20/0x30
[   24.438097]  kasan_atomics_helper+0x1518/0x49c8
[   24.438151]  kasan_atomics+0x1a0/0x2e8
[   24.438200]  kunit_try_run_case+0x170/0x3f0
[   24.438277]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.438337]  kthread+0x24c/0x2d0
[   24.438386]  ret_from_fork+0x10/0x20
[   24.438441] 
[   24.445532] Allocated by task 252:
[   24.446059]  kasan_save_stack+0x3c/0x68
[   24.446595]  kasan_save_track+0x20/0x40
[   24.446990]  kasan_save_alloc_info+0x40/0x58
[   24.447588]  __kasan_kmalloc+0xd4/0xd8
[   24.448018]  __kmalloc_cache_noprof+0x154/0x320
[   24.448560]  kasan_atomics+0xb8/0x2e8
[   24.449021]  kunit_try_run_case+0x170/0x3f0
[   24.449413]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.450068]  kthread+0x24c/0x2d0
[   24.450509]  ret_from_fork+0x10/0x20
[   24.450978] 
[   24.451319] The buggy address belongs to the object at fff00000c6cc9e00
[   24.451319]  which belongs to the cache kmalloc-64 of size 64
[   24.452268] The buggy address is located 0 bytes to the right of
[   24.452268]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   24.453260] 
[   24.453602] The buggy address belongs to the physical page:
[   24.454166] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   24.454888] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.455518] page_type: f5(slab)
[   24.455911] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.456571] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.457193] page dumped because: kasan: bad access detected
[   24.457708] 
[   24.457974] Memory state around the buggy address:
[   24.458484]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.459173]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.460615] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.461173]                                      ^
[   24.461683]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.462305]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.462863] ==================================================================
[   23.608604] ==================================================================
[   23.609183] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xabc/0x49c8
[   23.610024] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.610555] 
[   23.610769] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.610944] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.611000] Hardware name: linux,dummy-virt (DT)
[   23.611072] Call trace:
[   23.611128]  dump_backtrace+0x9c/0x128
[   23.611281]  show_stack+0x20/0x38
[   23.611404]  dump_stack_lvl+0x8c/0xd0
[   23.612027]  print_report+0x118/0x5f0
[   23.612177]  kasan_report+0xdc/0x128
[   23.612284]  kasan_check_range+0x100/0x1a8
[   23.612396]  __kasan_check_write+0x20/0x30
[   23.612496]  kasan_atomics_helper+0xabc/0x49c8
[   23.612601]  kasan_atomics+0x1a0/0x2e8
[   23.612654]  kunit_try_run_case+0x170/0x3f0
[   23.612711]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.612768]  kthread+0x24c/0x2d0
[   23.612815]  ret_from_fork+0x10/0x20
[   23.612870] 
[   23.617935] Allocated by task 252:
[   23.618415]  kasan_save_stack+0x3c/0x68
[   23.618944]  kasan_save_track+0x20/0x40
[   23.619440]  kasan_save_alloc_info+0x40/0x58
[   23.619892]  __kasan_kmalloc+0xd4/0xd8
[   23.620264]  __kmalloc_cache_noprof+0x154/0x320
[   23.620829]  kasan_atomics+0xb8/0x2e8
[   23.621294]  kunit_try_run_case+0x170/0x3f0
[   23.621840]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.622386]  kthread+0x24c/0x2d0
[   23.622708]  ret_from_fork+0x10/0x20
[   23.623154] 
[   23.623818] The buggy address belongs to the object at fff00000c6cc9e00
[   23.623818]  which belongs to the cache kmalloc-64 of size 64
[   23.624639] The buggy address is located 0 bytes to the right of
[   23.624639]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.625567] 
[   23.625879] The buggy address belongs to the physical page:
[   23.626282] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.627054] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.627698] page_type: f5(slab)
[   23.628095] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.628776] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.629430] page dumped because: kasan: bad access detected
[   23.629874] 
[   23.630153] Memory state around the buggy address:
[   23.630565]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.631223]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.631732] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.632425]                                      ^
[   23.632844]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.633511]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.634086] ==================================================================
[   24.578078] ==================================================================
[   24.578621] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16f0/0x49c8
[   24.579426] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   24.580129] 
[   24.580495] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   24.580676] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.580717] Hardware name: linux,dummy-virt (DT)
[   24.580789] Call trace:
[   24.580842]  dump_backtrace+0x9c/0x128
[   24.580969]  show_stack+0x20/0x38
[   24.581077]  dump_stack_lvl+0x8c/0xd0
[   24.581177]  print_report+0x118/0x5f0
[   24.581300]  kasan_report+0xdc/0x128
[   24.581362]  kasan_check_range+0x100/0x1a8
[   24.581414]  __kasan_check_write+0x20/0x30
[   24.581464]  kasan_atomics_helper+0x16f0/0x49c8
[   24.581534]  kasan_atomics+0x1a0/0x2e8
[   24.581584]  kunit_try_run_case+0x170/0x3f0
[   24.581637]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.581692]  kthread+0x24c/0x2d0
[   24.581740]  ret_from_fork+0x10/0x20
[   24.581794] 
[   24.586956] Allocated by task 252:
[   24.587438]  kasan_save_stack+0x3c/0x68
[   24.587950]  kasan_save_track+0x20/0x40
[   24.588335]  kasan_save_alloc_info+0x40/0x58
[   24.588812]  __kasan_kmalloc+0xd4/0xd8
[   24.589308]  __kmalloc_cache_noprof+0x154/0x320
[   24.589822]  kasan_atomics+0xb8/0x2e8
[   24.590217]  kunit_try_run_case+0x170/0x3f0
[   24.590677]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.591193]  kthread+0x24c/0x2d0
[   24.591681]  ret_from_fork+0x10/0x20
[   24.592171] 
[   24.592482] The buggy address belongs to the object at fff00000c6cc9e00
[   24.592482]  which belongs to the cache kmalloc-64 of size 64
[   24.593344] The buggy address is located 0 bytes to the right of
[   24.593344]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   24.594206] 
[   24.594538] The buggy address belongs to the physical page:
[   24.595075] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   24.595795] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.596389] page_type: f5(slab)
[   24.596817] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.597371] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.599317] page dumped because: kasan: bad access detected
[   24.599912] 
[   24.600156] Memory state around the buggy address:
[   24.600624]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.601180]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.601746] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.602172]                                      ^
[   24.602531]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.602937]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.603336] ==================================================================
[   23.228878] ==================================================================
[   23.229686] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50c/0x49c8
[   23.230473] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.231275] 
[   23.231667] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.231905] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.231987] Hardware name: linux,dummy-virt (DT)
[   23.232077] Call trace:
[   23.232143]  dump_backtrace+0x9c/0x128
[   23.232283]  show_stack+0x20/0x38
[   23.232381]  dump_stack_lvl+0x8c/0xd0
[   23.232494]  print_report+0x118/0x5f0
[   23.232592]  kasan_report+0xdc/0x128
[   23.232703]  kasan_check_range+0x100/0x1a8
[   23.232816]  __kasan_check_write+0x20/0x30
[   23.232913]  kasan_atomics_helper+0x50c/0x49c8
[   23.233042]  kasan_atomics+0x1a0/0x2e8
[   23.233157]  kunit_try_run_case+0x170/0x3f0
[   23.233275]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.233380]  kthread+0x24c/0x2d0
[   23.233458]  ret_from_fork+0x10/0x20
[   23.233599] 
[   23.240379] Allocated by task 252:
[   23.240830]  kasan_save_stack+0x3c/0x68
[   23.241278]  kasan_save_track+0x20/0x40
[   23.241781]  kasan_save_alloc_info+0x40/0x58
[   23.242254]  __kasan_kmalloc+0xd4/0xd8
[   23.242659]  __kmalloc_cache_noprof+0x154/0x320
[   23.244040]  kasan_atomics+0xb8/0x2e8
[   23.244429]  kunit_try_run_case+0x170/0x3f0
[   23.244719]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.245343]  kthread+0x24c/0x2d0
[   23.245777]  ret_from_fork+0x10/0x20
[   23.246293] 
[   23.246604] The buggy address belongs to the object at fff00000c6cc9e00
[   23.246604]  which belongs to the cache kmalloc-64 of size 64
[   23.247762] The buggy address is located 0 bytes to the right of
[   23.247762]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.248669] 
[   23.248994] The buggy address belongs to the physical page:
[   23.249612] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.250434] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.251892] page_type: f5(slab)
[   23.252378] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.253123] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.253924] page dumped because: kasan: bad access detected
[   23.254428] 
[   23.254675] Memory state around the buggy address:
[   23.255110]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.255631]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.256171] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.257347]                                      ^
[   23.257832]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.258692]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.259477] ==================================================================
[   24.318009] ==================================================================
[   24.318450] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1370/0x49c8
[   24.319274] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   24.319895] 
[   24.320694] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   24.320949] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.321018] Hardware name: linux,dummy-virt (DT)
[   24.321068] Call trace:
[   24.321103]  dump_backtrace+0x9c/0x128
[   24.321173]  show_stack+0x20/0x38
[   24.321220]  dump_stack_lvl+0x8c/0xd0
[   24.321299]  print_report+0x118/0x5f0
[   24.321349]  kasan_report+0xdc/0x128
[   24.321395]  kasan_check_range+0x100/0x1a8
[   24.321444]  __kasan_check_write+0x20/0x30
[   24.321507]  kasan_atomics_helper+0x1370/0x49c8
[   24.321563]  kasan_atomics+0x1a0/0x2e8
[   24.321613]  kunit_try_run_case+0x170/0x3f0
[   24.321667]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.321723]  kthread+0x24c/0x2d0
[   24.321769]  ret_from_fork+0x10/0x20
[   24.321823] 
[   24.327339] Allocated by task 252:
[   24.327832]  kasan_save_stack+0x3c/0x68
[   24.328314]  kasan_save_track+0x20/0x40
[   24.328844]  kasan_save_alloc_info+0x40/0x58
[   24.329347]  __kasan_kmalloc+0xd4/0xd8
[   24.329896]  __kmalloc_cache_noprof+0x154/0x320
[   24.330366]  kasan_atomics+0xb8/0x2e8
[   24.330876]  kunit_try_run_case+0x170/0x3f0
[   24.331468]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.331995]  kthread+0x24c/0x2d0
[   24.332295]  ret_from_fork+0x10/0x20
[   24.334479] 
[   24.334724] The buggy address belongs to the object at fff00000c6cc9e00
[   24.334724]  which belongs to the cache kmalloc-64 of size 64
[   24.335388] The buggy address is located 0 bytes to the right of
[   24.335388]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   24.336324] 
[   24.336677] The buggy address belongs to the physical page:
[   24.337102] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   24.337670] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.338846] page_type: f5(slab)
[   24.340092] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.341271] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.341732] page dumped because: kasan: bad access detected
[   24.342071] 
[   24.343005] Memory state around the buggy address:
[   24.343917]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.345151]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.346368] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.346789]                                      ^
[   24.347197]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.347987]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.348773] ==================================================================
[   22.970627] ==================================================================
[   22.971400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x25c/0x49c8
[   22.972654] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   22.973170] 
[   22.973545] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   22.973753] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.973832] Hardware name: linux,dummy-virt (DT)
[   22.973929] Call trace:
[   22.973980]  dump_backtrace+0x9c/0x128
[   22.974054]  show_stack+0x20/0x38
[   22.974100]  dump_stack_lvl+0x8c/0xd0
[   22.974154]  print_report+0x118/0x5f0
[   22.974202]  kasan_report+0xdc/0x128
[   22.974273]  kasan_check_range+0x100/0x1a8
[   22.974329]  __kasan_check_write+0x20/0x30
[   22.974380]  kasan_atomics_helper+0x25c/0x49c8
[   22.974434]  kasan_atomics+0x1a0/0x2e8
[   22.974484]  kunit_try_run_case+0x170/0x3f0
[   22.974536]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.974590]  kthread+0x24c/0x2d0
[   22.974638]  ret_from_fork+0x10/0x20
[   22.974689] 
[   22.981270] Allocated by task 252:
[   22.981749]  kasan_save_stack+0x3c/0x68
[   22.982203]  kasan_save_track+0x20/0x40
[   22.982499]  kasan_save_alloc_info+0x40/0x58
[   22.982991]  __kasan_kmalloc+0xd4/0xd8
[   22.983818]  __kmalloc_cache_noprof+0x154/0x320
[   22.984551]  kasan_atomics+0xb8/0x2e8
[   22.984966]  kunit_try_run_case+0x170/0x3f0
[   22.985398]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.985912]  kthread+0x24c/0x2d0
[   22.986305]  ret_from_fork+0x10/0x20
[   22.986754] 
[   22.987022] The buggy address belongs to the object at fff00000c6cc9e00
[   22.987022]  which belongs to the cache kmalloc-64 of size 64
[   22.987846] The buggy address is located 0 bytes to the right of
[   22.987846]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   22.989209] 
[   22.989449] The buggy address belongs to the physical page:
[   22.989779] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   22.990342] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.990980] page_type: f5(slab)
[   22.991907] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.992570] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.993163] page dumped because: kasan: bad access detected
[   22.993739] 
[   22.994041] Memory state around the buggy address:
[   22.994545]  fff00000c6cc9d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.995123]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.996134] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.996647]                                      ^
[   22.997014]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.997954]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.998546] ==================================================================
[   24.290146] ==================================================================
[   24.290796] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1300/0x49c8
[   24.291733] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   24.292524] 
[   24.292793] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   24.292953] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.292993] Hardware name: linux,dummy-virt (DT)
[   24.293066] Call trace:
[   24.293135]  dump_backtrace+0x9c/0x128
[   24.293285]  show_stack+0x20/0x38
[   24.293388]  dump_stack_lvl+0x8c/0xd0
[   24.293450]  print_report+0x118/0x5f0
[   24.293522]  kasan_report+0xdc/0x128
[   24.293572]  kasan_check_range+0x100/0x1a8
[   24.293623]  __kasan_check_write+0x20/0x30
[   24.293674]  kasan_atomics_helper+0x1300/0x49c8
[   24.293728]  kasan_atomics+0x1a0/0x2e8
[   24.293777]  kunit_try_run_case+0x170/0x3f0
[   24.293832]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.293888]  kthread+0x24c/0x2d0
[   24.293935]  ret_from_fork+0x10/0x20
[   24.293988] 
[   24.299414] Allocated by task 252:
[   24.299928]  kasan_save_stack+0x3c/0x68
[   24.300488]  kasan_save_track+0x20/0x40
[   24.301044]  kasan_save_alloc_info+0x40/0x58
[   24.301587]  __kasan_kmalloc+0xd4/0xd8
[   24.302091]  __kmalloc_cache_noprof+0x154/0x320
[   24.302699]  kasan_atomics+0xb8/0x2e8
[   24.303211]  kunit_try_run_case+0x170/0x3f0
[   24.303780]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.304316]  kthread+0x24c/0x2d0
[   24.304702]  ret_from_fork+0x10/0x20
[   24.305197] 
[   24.305493] The buggy address belongs to the object at fff00000c6cc9e00
[   24.305493]  which belongs to the cache kmalloc-64 of size 64
[   24.306366] The buggy address is located 0 bytes to the right of
[   24.306366]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   24.307387] 
[   24.307736] The buggy address belongs to the physical page:
[   24.308266] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   24.308981] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.309630] page_type: f5(slab)
[   24.310049] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.310714] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.311353] page dumped because: kasan: bad access detected
[   24.311875] 
[   24.312163] Memory state around the buggy address:
[   24.312654]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.313267]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.313911] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.314603]                                      ^
[   24.315068]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.315712]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.316324] ==================================================================
[   23.039864] ==================================================================
[   23.040643] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4264/0x49c8
[   23.041468] Read of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.042162] 
[   23.042553] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.042836] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.042924] Hardware name: linux,dummy-virt (DT)
[   23.043028] Call trace:
[   23.043171]  dump_backtrace+0x9c/0x128
[   23.043305]  show_stack+0x20/0x38
[   23.043394]  dump_stack_lvl+0x8c/0xd0
[   23.043485]  print_report+0x118/0x5f0
[   23.043564]  kasan_report+0xdc/0x128
[   23.043657]  __asan_report_load4_noabort+0x20/0x30
[   23.043759]  kasan_atomics_helper+0x4264/0x49c8
[   23.043853]  kasan_atomics+0x1a0/0x2e8
[   23.043950]  kunit_try_run_case+0x170/0x3f0
[   23.044047]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.044141]  kthread+0x24c/0x2d0
[   23.044230]  ret_from_fork+0x10/0x20
[   23.044314] 
[   23.049967] Allocated by task 252:
[   23.050471]  kasan_save_stack+0x3c/0x68
[   23.051038]  kasan_save_track+0x20/0x40
[   23.051449]  kasan_save_alloc_info+0x40/0x58
[   23.051882]  __kasan_kmalloc+0xd4/0xd8
[   23.052252]  __kmalloc_cache_noprof+0x154/0x320
[   23.052650]  kasan_atomics+0xb8/0x2e8
[   23.052979]  kunit_try_run_case+0x170/0x3f0
[   23.054451]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.054847]  kthread+0x24c/0x2d0
[   23.055754]  ret_from_fork+0x10/0x20
[   23.056324] 
[   23.056661] The buggy address belongs to the object at fff00000c6cc9e00
[   23.056661]  which belongs to the cache kmalloc-64 of size 64
[   23.057744] The buggy address is located 0 bytes to the right of
[   23.057744]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.059004] 
[   23.059275] The buggy address belongs to the physical page:
[   23.059968] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.061163] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.061906] page_type: f5(slab)
[   23.062158] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.062646] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.063801] page dumped because: kasan: bad access detected
[   23.064251] 
[   23.064413] Memory state around the buggy address:
[   23.064678]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.065019]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.065821] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.066601]                                      ^
[   23.067016]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.068017]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.068657] ==================================================================
[   23.856518] ==================================================================
[   23.857171] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xda0/0x49c8
[   23.857792] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.858540] 
[   23.858845] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.859140] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.859223] Hardware name: linux,dummy-virt (DT)
[   23.859314] Call trace:
[   23.859376]  dump_backtrace+0x9c/0x128
[   23.859506]  show_stack+0x20/0x38
[   23.859617]  dump_stack_lvl+0x8c/0xd0
[   23.859722]  print_report+0x118/0x5f0
[   23.859787]  kasan_report+0xdc/0x128
[   23.859835]  kasan_check_range+0x100/0x1a8
[   23.859885]  __kasan_check_write+0x20/0x30
[   23.859935]  kasan_atomics_helper+0xda0/0x49c8
[   23.859990]  kasan_atomics+0x1a0/0x2e8
[   23.860041]  kunit_try_run_case+0x170/0x3f0
[   23.860091]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.860144]  kthread+0x24c/0x2d0
[   23.860191]  ret_from_fork+0x10/0x20
[   23.860266] 
[   23.865532] Allocated by task 252:
[   23.866017]  kasan_save_stack+0x3c/0x68
[   23.866583]  kasan_save_track+0x20/0x40
[   23.866974]  kasan_save_alloc_info+0x40/0x58
[   23.867412]  __kasan_kmalloc+0xd4/0xd8
[   23.867888]  __kmalloc_cache_noprof+0x154/0x320
[   23.868434]  kasan_atomics+0xb8/0x2e8
[   23.868935]  kunit_try_run_case+0x170/0x3f0
[   23.869364]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.870002]  kthread+0x24c/0x2d0
[   23.870394]  ret_from_fork+0x10/0x20
[   23.870775] 
[   23.871082] The buggy address belongs to the object at fff00000c6cc9e00
[   23.871082]  which belongs to the cache kmalloc-64 of size 64
[   23.872026] The buggy address is located 0 bytes to the right of
[   23.872026]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.872978] 
[   23.873261] The buggy address belongs to the physical page:
[   23.873802] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.874471] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.875143] page_type: f5(slab)
[   23.875622] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.876198] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.876901] page dumped because: kasan: bad access detected
[   23.877433] 
[   23.877733] Memory state around the buggy address:
[   23.878199]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.878776]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.879459] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.880018]                                      ^
[   23.880450]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.881095]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.881762] ==================================================================
[   24.464310] ==================================================================
[   24.464854] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1584/0x49c8
[   24.465551] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   24.466102] 
[   24.466453] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   24.466675] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.466754] Hardware name: linux,dummy-virt (DT)
[   24.466842] Call trace:
[   24.466901]  dump_backtrace+0x9c/0x128
[   24.467023]  show_stack+0x20/0x38
[   24.467118]  dump_stack_lvl+0x8c/0xd0
[   24.467220]  print_report+0x118/0x5f0
[   24.467384]  kasan_report+0xdc/0x128
[   24.467481]  kasan_check_range+0x100/0x1a8
[   24.467564]  __kasan_check_write+0x20/0x30
[   24.467617]  kasan_atomics_helper+0x1584/0x49c8
[   24.467672]  kasan_atomics+0x1a0/0x2e8
[   24.467722]  kunit_try_run_case+0x170/0x3f0
[   24.467779]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.467835]  kthread+0x24c/0x2d0
[   24.467883]  ret_from_fork+0x10/0x20
[   24.467937] 
[   24.473497] Allocated by task 252:
[   24.473971]  kasan_save_stack+0x3c/0x68
[   24.474432]  kasan_save_track+0x20/0x40
[   24.474950]  kasan_save_alloc_info+0x40/0x58
[   24.475867]  __kasan_kmalloc+0xd4/0xd8
[   24.476265]  __kmalloc_cache_noprof+0x154/0x320
[   24.476673]  kasan_atomics+0xb8/0x2e8
[   24.477017]  kunit_try_run_case+0x170/0x3f0
[   24.477995]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.478637]  kthread+0x24c/0x2d0
[   24.479006]  ret_from_fork+0x10/0x20
[   24.479376] 
[   24.479633] The buggy address belongs to the object at fff00000c6cc9e00
[   24.479633]  which belongs to the cache kmalloc-64 of size 64
[   24.480514] The buggy address is located 0 bytes to the right of
[   24.480514]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   24.481522] 
[   24.481886] The buggy address belongs to the physical page:
[   24.482464] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   24.483192] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.483777] page_type: f5(slab)
[   24.484305] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.484971] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.485688] page dumped because: kasan: bad access detected
[   24.486218] 
[   24.486504] Memory state around the buggy address:
[   24.486992]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.487670]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.488301] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.488926]                                      ^
[   24.489411]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.490081]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.490719] ==================================================================
[   24.405756] ==================================================================
[   24.406332] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14ac/0x49c8
[   24.408002] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   24.408848] 
[   24.409247] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   24.409509] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.409581] Hardware name: linux,dummy-virt (DT)
[   24.409631] Call trace:
[   24.409666]  dump_backtrace+0x9c/0x128
[   24.409734]  show_stack+0x20/0x38
[   24.409781]  dump_stack_lvl+0x8c/0xd0
[   24.409833]  print_report+0x118/0x5f0
[   24.409881]  kasan_report+0xdc/0x128
[   24.409927]  kasan_check_range+0x100/0x1a8
[   24.409977]  __kasan_check_write+0x20/0x30
[   24.410027]  kasan_atomics_helper+0x14ac/0x49c8
[   24.410079]  kasan_atomics+0x1a0/0x2e8
[   24.410129]  kunit_try_run_case+0x170/0x3f0
[   24.410180]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.410235]  kthread+0x24c/0x2d0
[   24.410314]  ret_from_fork+0x10/0x20
[   24.410370] 
[   24.415875] Allocated by task 252:
[   24.416430]  kasan_save_stack+0x3c/0x68
[   24.416960]  kasan_save_track+0x20/0x40
[   24.417515]  kasan_save_alloc_info+0x40/0x58
[   24.418024]  __kasan_kmalloc+0xd4/0xd8
[   24.418560]  __kmalloc_cache_noprof+0x154/0x320
[   24.419019]  kasan_atomics+0xb8/0x2e8
[   24.419560]  kunit_try_run_case+0x170/0x3f0
[   24.419966]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.420606]  kthread+0x24c/0x2d0
[   24.421031]  ret_from_fork+0x10/0x20
[   24.421501] 
[   24.421828] The buggy address belongs to the object at fff00000c6cc9e00
[   24.421828]  which belongs to the cache kmalloc-64 of size 64
[   24.422801] The buggy address is located 0 bytes to the right of
[   24.422801]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   24.423758] 
[   24.424072] The buggy address belongs to the physical page:
[   24.424676] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   24.425387] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.426005] page_type: f5(slab)
[   24.426431] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.427103] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.427727] page dumped because: kasan: bad access detected
[   24.428180] 
[   24.428510] Memory state around the buggy address:
[   24.428973]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.429634]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.430377] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.430966]                                      ^
[   24.431470]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.432132]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.432689] ==================================================================
[   24.521235] ==================================================================
[   24.521833] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x165c/0x49c8
[   24.522431] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   24.523109] 
[   24.523492] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   24.523716] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.523801] Hardware name: linux,dummy-virt (DT)
[   24.523891] Call trace:
[   24.523934]  dump_backtrace+0x9c/0x128
[   24.524007]  show_stack+0x20/0x38
[   24.524056]  dump_stack_lvl+0x8c/0xd0
[   24.524114]  print_report+0x118/0x5f0
[   24.524164]  kasan_report+0xdc/0x128
[   24.524210]  kasan_check_range+0x100/0x1a8
[   24.524304]  __kasan_check_write+0x20/0x30
[   24.524398]  kasan_atomics_helper+0x165c/0x49c8
[   24.524510]  kasan_atomics+0x1a0/0x2e8
[   24.524622]  kunit_try_run_case+0x170/0x3f0
[   24.524684]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.524741]  kthread+0x24c/0x2d0
[   24.524790]  ret_from_fork+0x10/0x20
[   24.524845] 
[   24.530058] Allocated by task 252:
[   24.530503]  kasan_save_stack+0x3c/0x68
[   24.530965]  kasan_save_track+0x20/0x40
[   24.531465]  kasan_save_alloc_info+0x40/0x58
[   24.531890]  __kasan_kmalloc+0xd4/0xd8
[   24.532324]  __kmalloc_cache_noprof+0x154/0x320
[   24.532853]  kasan_atomics+0xb8/0x2e8
[   24.533362]  kunit_try_run_case+0x170/0x3f0
[   24.533891]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.534343]  kthread+0x24c/0x2d0
[   24.534794]  ret_from_fork+0x10/0x20
[   24.535280] 
[   24.535581] The buggy address belongs to the object at fff00000c6cc9e00
[   24.535581]  which belongs to the cache kmalloc-64 of size 64
[   24.536472] The buggy address is located 0 bytes to the right of
[   24.536472]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   24.537963] 
[   24.538227] The buggy address belongs to the physical page:
[   24.538693] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   24.539601] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.540267] page_type: f5(slab)
[   24.540685] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.541352] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.541920] page dumped because: kasan: bad access detected
[   24.542441] 
[   24.542740] Memory state around the buggy address:
[   24.543396]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.544214]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.544895] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.545602]                                      ^
[   24.546018]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.546880]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.547554] ==================================================================
[   24.145418] ==================================================================
[   24.146179] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10d8/0x49c8
[   24.147036] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   24.148094] 
[   24.148448] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   24.148579] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.148634] Hardware name: linux,dummy-virt (DT)
[   24.148689] Call trace:
[   24.148726]  dump_backtrace+0x9c/0x128
[   24.148800]  show_stack+0x20/0x38
[   24.148847]  dump_stack_lvl+0x8c/0xd0
[   24.148896]  print_report+0x118/0x5f0
[   24.148945]  kasan_report+0xdc/0x128
[   24.148991]  kasan_check_range+0x100/0x1a8
[   24.149041]  __kasan_check_write+0x20/0x30
[   24.149091]  kasan_atomics_helper+0x10d8/0x49c8
[   24.149144]  kasan_atomics+0x1a0/0x2e8
[   24.149193]  kunit_try_run_case+0x170/0x3f0
[   24.149258]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.149319]  kthread+0x24c/0x2d0
[   24.149367]  ret_from_fork+0x10/0x20
[   24.149420] 
[   24.154964] Allocated by task 252:
[   24.155466]  kasan_save_stack+0x3c/0x68
[   24.155985]  kasan_save_track+0x20/0x40
[   24.156422]  kasan_save_alloc_info+0x40/0x58
[   24.157010]  __kasan_kmalloc+0xd4/0xd8
[   24.157559]  __kmalloc_cache_noprof+0x154/0x320
[   24.158137]  kasan_atomics+0xb8/0x2e8
[   24.158568]  kunit_try_run_case+0x170/0x3f0
[   24.158995]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.159645]  kthread+0x24c/0x2d0
[   24.160113]  ret_from_fork+0x10/0x20
[   24.160575] 
[   24.160882] The buggy address belongs to the object at fff00000c6cc9e00
[   24.160882]  which belongs to the cache kmalloc-64 of size 64
[   24.161824] The buggy address is located 0 bytes to the right of
[   24.161824]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   24.162935] 
[   24.163296] The buggy address belongs to the physical page:
[   24.163779] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   24.164592] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.165213] page_type: f5(slab)
[   24.165636] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.166334] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.166984] page dumped because: kasan: bad access detected
[   24.167495] 
[   24.167760] Memory state around the buggy address:
[   24.168202]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.168943]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.169622] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.170194]                                      ^
[   24.170562]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.171201]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.171849] ==================================================================
[   23.388540] ==================================================================
[   23.389328] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x728/0x49c8
[   23.390187] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.390941] 
[   23.391380] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.391622] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.391724] Hardware name: linux,dummy-virt (DT)
[   23.391781] Call trace:
[   23.391815]  dump_backtrace+0x9c/0x128
[   23.391903]  show_stack+0x20/0x38
[   23.391966]  dump_stack_lvl+0x8c/0xd0
[   23.392020]  print_report+0x118/0x5f0
[   23.392068]  kasan_report+0xdc/0x128
[   23.392114]  kasan_check_range+0x100/0x1a8
[   23.392164]  __kasan_check_write+0x20/0x30
[   23.392213]  kasan_atomics_helper+0x728/0x49c8
[   23.392290]  kasan_atomics+0x1a0/0x2e8
[   23.392342]  kunit_try_run_case+0x170/0x3f0
[   23.392396]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.392452]  kthread+0x24c/0x2d0
[   23.392500]  ret_from_fork+0x10/0x20
[   23.392552] 
[   23.397236] Allocated by task 252:
[   23.397776]  kasan_save_stack+0x3c/0x68
[   23.398352]  kasan_save_track+0x20/0x40
[   23.398882]  kasan_save_alloc_info+0x40/0x58
[   23.399490]  __kasan_kmalloc+0xd4/0xd8
[   23.399925]  __kmalloc_cache_noprof+0x154/0x320
[   23.400215]  kasan_atomics+0xb8/0x2e8
[   23.400809]  kunit_try_run_case+0x170/0x3f0
[   23.401435]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.402109]  kthread+0x24c/0x2d0
[   23.402613]  ret_from_fork+0x10/0x20
[   23.403125] 
[   23.403458] The buggy address belongs to the object at fff00000c6cc9e00
[   23.403458]  which belongs to the cache kmalloc-64 of size 64
[   23.404487] The buggy address is located 0 bytes to the right of
[   23.404487]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.405384] 
[   23.405723] The buggy address belongs to the physical page:
[   23.406293] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.406985] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.407545] page_type: f5(slab)
[   23.407990] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.408582] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.409318] page dumped because: kasan: bad access detected
[   23.409747] 
[   23.410039] Memory state around the buggy address:
[   23.410543]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.411159]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.411762] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.412364]                                      ^
[   23.412826]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.413473]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.414110] ==================================================================
[   24.377766] ==================================================================
[   24.378879] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x406c/0x49c8
[   24.379585] Read of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   24.380184] 
[   24.380582] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   24.380846] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.380935] Hardware name: linux,dummy-virt (DT)
[   24.381040] Call trace:
[   24.381102]  dump_backtrace+0x9c/0x128
[   24.381183]  show_stack+0x20/0x38
[   24.381233]  dump_stack_lvl+0x8c/0xd0
[   24.381317]  print_report+0x118/0x5f0
[   24.381369]  kasan_report+0xdc/0x128
[   24.381417]  __asan_report_load8_noabort+0x20/0x30
[   24.381473]  kasan_atomics_helper+0x406c/0x49c8
[   24.381542]  kasan_atomics+0x1a0/0x2e8
[   24.381593]  kunit_try_run_case+0x170/0x3f0
[   24.381645]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.381701]  kthread+0x24c/0x2d0
[   24.381749]  ret_from_fork+0x10/0x20
[   24.381803] 
[   24.387079] Allocated by task 252:
[   24.387625]  kasan_save_stack+0x3c/0x68
[   24.388087]  kasan_save_track+0x20/0x40
[   24.388604]  kasan_save_alloc_info+0x40/0x58
[   24.389150]  __kasan_kmalloc+0xd4/0xd8
[   24.389582]  __kmalloc_cache_noprof+0x154/0x320
[   24.390193]  kasan_atomics+0xb8/0x2e8
[   24.390607]  kunit_try_run_case+0x170/0x3f0
[   24.391194]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.391780]  kthread+0x24c/0x2d0
[   24.392274]  ret_from_fork+0x10/0x20
[   24.392699] 
[   24.393005] The buggy address belongs to the object at fff00000c6cc9e00
[   24.393005]  which belongs to the cache kmalloc-64 of size 64
[   24.393896] The buggy address is located 0 bytes to the right of
[   24.393896]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   24.394939] 
[   24.395254] The buggy address belongs to the physical page:
[   24.395865] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   24.396462] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.397058] page_type: f5(slab)
[   24.397488] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.398212] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.398857] page dumped because: kasan: bad access detected
[   24.399390] 
[   24.399707] Memory state around the buggy address:
[   24.400182]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.400917]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.401459] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.402108]                                      ^
[   24.402598]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.403192]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.403824] ==================================================================
[   23.166080] ==================================================================
[   23.166581] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x434/0x49c8
[   23.168266] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.168960] 
[   23.169290] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.169529] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.169611] Hardware name: linux,dummy-virt (DT)
[   23.169692] Call trace:
[   23.169759]  dump_backtrace+0x9c/0x128
[   23.169838]  show_stack+0x20/0x38
[   23.169886]  dump_stack_lvl+0x8c/0xd0
[   23.169942]  print_report+0x118/0x5f0
[   23.169992]  kasan_report+0xdc/0x128
[   23.170038]  kasan_check_range+0x100/0x1a8
[   23.170086]  __kasan_check_write+0x20/0x30
[   23.170136]  kasan_atomics_helper+0x434/0x49c8
[   23.170187]  kasan_atomics+0x1a0/0x2e8
[   23.170254]  kunit_try_run_case+0x170/0x3f0
[   23.170320]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.170375]  kthread+0x24c/0x2d0
[   23.170423]  ret_from_fork+0x10/0x20
[   23.170478] 
[   23.176609] Allocated by task 252:
[   23.177106]  kasan_save_stack+0x3c/0x68
[   23.178742]  kasan_save_track+0x20/0x40
[   23.179921]  kasan_save_alloc_info+0x40/0x58
[   23.180378]  __kasan_kmalloc+0xd4/0xd8
[   23.180713]  __kmalloc_cache_noprof+0x154/0x320
[   23.181298]  kasan_atomics+0xb8/0x2e8
[   23.181737]  kunit_try_run_case+0x170/0x3f0
[   23.182210]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.182728]  kthread+0x24c/0x2d0
[   23.183511]  ret_from_fork+0x10/0x20
[   23.184027] 
[   23.184287] The buggy address belongs to the object at fff00000c6cc9e00
[   23.184287]  which belongs to the cache kmalloc-64 of size 64
[   23.185183] The buggy address is located 0 bytes to the right of
[   23.185183]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.186191] 
[   23.186471] The buggy address belongs to the physical page:
[   23.187036] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.188087] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.188584] page_type: f5(slab)
[   23.189380] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.190225] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.190869] page dumped because: kasan: bad access detected
[   23.191654] 
[   23.191927] Memory state around the buggy address:
[   23.192674]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.193334]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.194168] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.194912]                                      ^
[   23.195712]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.196922]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.197558] ==================================================================
[   24.604934] ==================================================================
[   24.607420] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f5c/0x49c8
[   24.608461] Read of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   24.609938] 
[   24.610328] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   24.610567] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.610649] Hardware name: linux,dummy-virt (DT)
[   24.610745] Call trace:
[   24.610814]  dump_backtrace+0x9c/0x128
[   24.610941]  show_stack+0x20/0x38
[   24.611039]  dump_stack_lvl+0x8c/0xd0
[   24.611130]  print_report+0x118/0x5f0
[   24.611213]  kasan_report+0xdc/0x128
[   24.611315]  __asan_report_load8_noabort+0x20/0x30
[   24.611422]  kasan_atomics_helper+0x3f5c/0x49c8
[   24.611530]  kasan_atomics+0x1a0/0x2e8
[   24.611627]  kunit_try_run_case+0x170/0x3f0
[   24.611789]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.611906]  kthread+0x24c/0x2d0
[   24.611994]  ret_from_fork+0x10/0x20
[   24.612089] 
[   24.617290] Allocated by task 252:
[   24.617862]  kasan_save_stack+0x3c/0x68
[   24.618458]  kasan_save_track+0x20/0x40
[   24.619035]  kasan_save_alloc_info+0x40/0x58
[   24.619529]  __kasan_kmalloc+0xd4/0xd8
[   24.620007]  __kmalloc_cache_noprof+0x154/0x320
[   24.620534]  kasan_atomics+0xb8/0x2e8
[   24.620814]  kunit_try_run_case+0x170/0x3f0
[   24.621396]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.621946]  kthread+0x24c/0x2d0
[   24.622359]  ret_from_fork+0x10/0x20
[   24.622781] 
[   24.623089] The buggy address belongs to the object at fff00000c6cc9e00
[   24.623089]  which belongs to the cache kmalloc-64 of size 64
[   24.623894] The buggy address is located 0 bytes to the right of
[   24.623894]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   24.624832] 
[   24.625172] The buggy address belongs to the physical page:
[   24.625652] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   24.626344] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.627031] page_type: f5(slab)
[   24.627431] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.628135] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.628773] page dumped because: kasan: bad access detected
[   24.629282] 
[   24.629529] Memory state around the buggy address:
[   24.629969]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.630620]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.631000] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.631728]                                      ^
[   24.632213]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.632693]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.633425] ==================================================================
[   24.088761] ==================================================================
[   24.089429] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1000/0x49c8
[   24.090124] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   24.090773] 
[   24.091210] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   24.091473] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.091563] Hardware name: linux,dummy-virt (DT)
[   24.091649] Call trace:
[   24.091685]  dump_backtrace+0x9c/0x128
[   24.091760]  show_stack+0x20/0x38
[   24.091805]  dump_stack_lvl+0x8c/0xd0
[   24.091857]  print_report+0x118/0x5f0
[   24.091906]  kasan_report+0xdc/0x128
[   24.091952]  kasan_check_range+0x100/0x1a8
[   24.092003]  __kasan_check_write+0x20/0x30
[   24.092053]  kasan_atomics_helper+0x1000/0x49c8
[   24.092105]  kasan_atomics+0x1a0/0x2e8
[   24.092154]  kunit_try_run_case+0x170/0x3f0
[   24.092207]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.092293]  kthread+0x24c/0x2d0
[   24.092346]  ret_from_fork+0x10/0x20
[   24.092400] 
[   24.098116] Allocated by task 252:
[   24.098662]  kasan_save_stack+0x3c/0x68
[   24.099253]  kasan_save_track+0x20/0x40
[   24.099763]  kasan_save_alloc_info+0x40/0x58
[   24.100256]  __kasan_kmalloc+0xd4/0xd8
[   24.100765]  __kmalloc_cache_noprof+0x154/0x320
[   24.101404]  kasan_atomics+0xb8/0x2e8
[   24.101839]  kunit_try_run_case+0x170/0x3f0
[   24.102368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.102907]  kthread+0x24c/0x2d0
[   24.103252]  ret_from_fork+0x10/0x20
[   24.103727] 
[   24.103969] The buggy address belongs to the object at fff00000c6cc9e00
[   24.103969]  which belongs to the cache kmalloc-64 of size 64
[   24.104925] The buggy address is located 0 bytes to the right of
[   24.104925]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   24.106018] 
[   24.106366] The buggy address belongs to the physical page:
[   24.106924] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   24.107584] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.108195] page_type: f5(slab)
[   24.108642] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.109352] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.110010] page dumped because: kasan: bad access detected
[   24.110557] 
[   24.110857] Memory state around the buggy address:
[   24.111368]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.112009]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.112683] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.113306]                                      ^
[   24.113818]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.114457]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.115073] ==================================================================
[   24.022678] ==================================================================
[   24.023453] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf28/0x49c8
[   24.023848] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   24.024204] 
[   24.024422] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   24.024588] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.024661] Hardware name: linux,dummy-virt (DT)
[   24.024752] Call trace:
[   24.024819]  dump_backtrace+0x9c/0x128
[   24.024933]  show_stack+0x20/0x38
[   24.024987]  dump_stack_lvl+0x8c/0xd0
[   24.025042]  print_report+0x118/0x5f0
[   24.025121]  kasan_report+0xdc/0x128
[   24.025223]  kasan_check_range+0x100/0x1a8
[   24.025497]  __kasan_check_write+0x20/0x30
[   24.025621]  kasan_atomics_helper+0xf28/0x49c8
[   24.025752]  kasan_atomics+0x1a0/0x2e8
[   24.025874]  kunit_try_run_case+0x170/0x3f0
[   24.025994]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.026078]  kthread+0x24c/0x2d0
[   24.026134]  ret_from_fork+0x10/0x20
[   24.026190] 
[   24.033311] Allocated by task 252:
[   24.033951]  kasan_save_stack+0x3c/0x68
[   24.034395]  kasan_save_track+0x20/0x40
[   24.035019]  kasan_save_alloc_info+0x40/0x58
[   24.035645]  __kasan_kmalloc+0xd4/0xd8
[   24.036035]  __kmalloc_cache_noprof+0x154/0x320
[   24.036706]  kasan_atomics+0xb8/0x2e8
[   24.037088]  kunit_try_run_case+0x170/0x3f0
[   24.037734]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.038307]  kthread+0x24c/0x2d0
[   24.038674]  ret_from_fork+0x10/0x20
[   24.039217] 
[   24.039472] The buggy address belongs to the object at fff00000c6cc9e00
[   24.039472]  which belongs to the cache kmalloc-64 of size 64
[   24.040488] The buggy address is located 0 bytes to the right of
[   24.040488]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   24.041851] 
[   24.042360] The buggy address belongs to the physical page:
[   24.042835] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   24.043485] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.044025] page_type: f5(slab)
[   24.044459] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.045331] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.046127] page dumped because: kasan: bad access detected
[   24.046740] 
[   24.047051] Memory state around the buggy address:
[   24.047648]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.048352]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.049044] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.049740]                                      ^
[   24.050399]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.051082]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.051755] ==================================================================
[   24.350732] ==================================================================
[   24.351396] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x141c/0x49c8
[   24.351989] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   24.352700] 
[   24.353075] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   24.353344] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.353442] Hardware name: linux,dummy-virt (DT)
[   24.353543] Call trace:
[   24.353608]  dump_backtrace+0x9c/0x128
[   24.353763]  show_stack+0x20/0x38
[   24.353837]  dump_stack_lvl+0x8c/0xd0
[   24.353893]  print_report+0x118/0x5f0
[   24.353950]  kasan_report+0xdc/0x128
[   24.354021]  kasan_check_range+0x100/0x1a8
[   24.354073]  __kasan_check_write+0x20/0x30
[   24.354122]  kasan_atomics_helper+0x141c/0x49c8
[   24.354175]  kasan_atomics+0x1a0/0x2e8
[   24.354224]  kunit_try_run_case+0x170/0x3f0
[   24.354303]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.354359]  kthread+0x24c/0x2d0
[   24.354408]  ret_from_fork+0x10/0x20
[   24.354462] 
[   24.359922] Allocated by task 252:
[   24.360391]  kasan_save_stack+0x3c/0x68
[   24.360939]  kasan_save_track+0x20/0x40
[   24.361509]  kasan_save_alloc_info+0x40/0x58
[   24.361972]  __kasan_kmalloc+0xd4/0xd8
[   24.362508]  __kmalloc_cache_noprof+0x154/0x320
[   24.362997]  kasan_atomics+0xb8/0x2e8
[   24.363500]  kunit_try_run_case+0x170/0x3f0
[   24.363941]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.364543]  kthread+0x24c/0x2d0
[   24.364975]  ret_from_fork+0x10/0x20
[   24.365420] 
[   24.365755] The buggy address belongs to the object at fff00000c6cc9e00
[   24.365755]  which belongs to the cache kmalloc-64 of size 64
[   24.366683] The buggy address is located 0 bytes to the right of
[   24.366683]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   24.367642] 
[   24.367974] The buggy address belongs to the physical page:
[   24.368450] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   24.369184] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.369784] page_type: f5(slab)
[   24.370151] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.370910] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.371480] page dumped because: kasan: bad access detected
[   24.371988] 
[   24.372281] Memory state around the buggy address:
[   24.372759]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.373438]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.374082] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.374686]                                      ^
[   24.375170]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.375821]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.376439] ==================================================================
[   24.492714] ==================================================================
[   24.493304] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15f0/0x49c8
[   24.494188] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   24.495280] 
[   24.495616] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   24.495825] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.495868] Hardware name: linux,dummy-virt (DT)
[   24.495913] Call trace:
[   24.495961]  dump_backtrace+0x9c/0x128
[   24.496068]  show_stack+0x20/0x38
[   24.496167]  dump_stack_lvl+0x8c/0xd0
[   24.496273]  print_report+0x118/0x5f0
[   24.496333]  kasan_report+0xdc/0x128
[   24.496381]  kasan_check_range+0x100/0x1a8
[   24.496432]  __kasan_check_write+0x20/0x30
[   24.496482]  kasan_atomics_helper+0x15f0/0x49c8
[   24.496535]  kasan_atomics+0x1a0/0x2e8
[   24.496585]  kunit_try_run_case+0x170/0x3f0
[   24.496641]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.496701]  kthread+0x24c/0x2d0
[   24.496750]  ret_from_fork+0x10/0x20
[   24.496804] 
[   24.501918] Allocated by task 252:
[   24.502411]  kasan_save_stack+0x3c/0x68
[   24.502894]  kasan_save_track+0x20/0x40
[   24.503314]  kasan_save_alloc_info+0x40/0x58
[   24.503778]  __kasan_kmalloc+0xd4/0xd8
[   24.504267]  __kmalloc_cache_noprof+0x154/0x320
[   24.504817]  kasan_atomics+0xb8/0x2e8
[   24.505307]  kunit_try_run_case+0x170/0x3f0
[   24.505742]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.506286]  kthread+0x24c/0x2d0
[   24.506624]  ret_from_fork+0x10/0x20
[   24.506982] 
[   24.507228] The buggy address belongs to the object at fff00000c6cc9e00
[   24.507228]  which belongs to the cache kmalloc-64 of size 64
[   24.508566] The buggy address is located 0 bytes to the right of
[   24.508566]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   24.509595] 
[   24.510091] The buggy address belongs to the physical page:
[   24.510422] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   24.511178] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.511816] page_type: f5(slab)
[   24.512182] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.512937] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.513632] page dumped because: kasan: bad access detected
[   24.514103] 
[   24.514386] Memory state around the buggy address:
[   24.514853]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.515491]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.516127] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.516767]                                      ^
[   24.517086]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.517803]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.518306] ==================================================================
[   24.233155] ==================================================================
[   24.233774] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x121c/0x49c8
[   24.234482] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   24.235182] 
[   24.235481] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   24.235734] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.235823] Hardware name: linux,dummy-virt (DT)
[   24.235916] Call trace:
[   24.235986]  dump_backtrace+0x9c/0x128
[   24.236132]  show_stack+0x20/0x38
[   24.236231]  dump_stack_lvl+0x8c/0xd0
[   24.236353]  print_report+0x118/0x5f0
[   24.236488]  kasan_report+0xdc/0x128
[   24.236577]  kasan_check_range+0x100/0x1a8
[   24.236632]  __kasan_check_write+0x20/0x30
[   24.236686]  kasan_atomics_helper+0x121c/0x49c8
[   24.236776]  kasan_atomics+0x1a0/0x2e8
[   24.236828]  kunit_try_run_case+0x170/0x3f0
[   24.236884]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.236939]  kthread+0x24c/0x2d0
[   24.236988]  ret_from_fork+0x10/0x20
[   24.237043] 
[   24.242624] Allocated by task 252:
[   24.243105]  kasan_save_stack+0x3c/0x68
[   24.243679]  kasan_save_track+0x20/0x40
[   24.244172]  kasan_save_alloc_info+0x40/0x58
[   24.244721]  __kasan_kmalloc+0xd4/0xd8
[   24.245150]  __kmalloc_cache_noprof+0x154/0x320
[   24.245737]  kasan_atomics+0xb8/0x2e8
[   24.246274]  kunit_try_run_case+0x170/0x3f0
[   24.246832]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.247409]  kthread+0x24c/0x2d0
[   24.247815]  ret_from_fork+0x10/0x20
[   24.248167] 
[   24.248479] The buggy address belongs to the object at fff00000c6cc9e00
[   24.248479]  which belongs to the cache kmalloc-64 of size 64
[   24.249373] The buggy address is located 0 bytes to the right of
[   24.249373]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   24.250460] 
[   24.250819] The buggy address belongs to the physical page:
[   24.251327] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   24.252037] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.252742] page_type: f5(slab)
[   24.253116] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.253873] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.254609] page dumped because: kasan: bad access detected
[   24.255142] 
[   24.255434] Memory state around the buggy address:
[   24.255925]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.256639]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.257248] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.257827]                                      ^
[   24.258220]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.258758]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.259316] ==================================================================
[   23.664437] ==================================================================
[   23.665095] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f34/0x49c8
[   23.665758] Read of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.666269] 
[   23.666618] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.666852] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.666932] Hardware name: linux,dummy-virt (DT)
[   23.667027] Call trace:
[   23.667093]  dump_backtrace+0x9c/0x128
[   23.667269]  show_stack+0x20/0x38
[   23.667372]  dump_stack_lvl+0x8c/0xd0
[   23.667477]  print_report+0x118/0x5f0
[   23.667532]  kasan_report+0xdc/0x128
[   23.667581]  __asan_report_load4_noabort+0x20/0x30
[   23.667633]  kasan_atomics_helper+0x3f34/0x49c8
[   23.667688]  kasan_atomics+0x1a0/0x2e8
[   23.667736]  kunit_try_run_case+0x170/0x3f0
[   23.667788]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.667844]  kthread+0x24c/0x2d0
[   23.667890]  ret_from_fork+0x10/0x20
[   23.667945] 
[   23.672653] Allocated by task 252:
[   23.673156]  kasan_save_stack+0x3c/0x68
[   23.673701]  kasan_save_track+0x20/0x40
[   23.674165]  kasan_save_alloc_info+0x40/0x58
[   23.674611]  __kasan_kmalloc+0xd4/0xd8
[   23.675056]  __kmalloc_cache_noprof+0x154/0x320
[   23.675489]  kasan_atomics+0xb8/0x2e8
[   23.675959]  kunit_try_run_case+0x170/0x3f0
[   23.676432]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.676854]  kthread+0x24c/0x2d0
[   23.677325]  ret_from_fork+0x10/0x20
[   23.677810] 
[   23.678055] The buggy address belongs to the object at fff00000c6cc9e00
[   23.678055]  which belongs to the cache kmalloc-64 of size 64
[   23.678968] The buggy address is located 0 bytes to the right of
[   23.678968]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.679890] 
[   23.680208] The buggy address belongs to the physical page:
[   23.680823] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.681445] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.682092] page_type: f5(slab)
[   23.682491] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.683277] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.683854] page dumped because: kasan: bad access detected
[   23.684403] 
[   23.684651] Memory state around the buggy address:
[   23.685009]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.685740]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.686301] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.686908]                                      ^
[   23.687355]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.687973]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.688469] ==================================================================
[   23.360454] ==================================================================
[   23.361022] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6bc/0x49c8
[   23.361761] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.362515] 
[   23.362891] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.363075] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.363155] Hardware name: linux,dummy-virt (DT)
[   23.363213] Call trace:
[   23.363266]  dump_backtrace+0x9c/0x128
[   23.363400]  show_stack+0x20/0x38
[   23.363502]  dump_stack_lvl+0x8c/0xd0
[   23.363598]  print_report+0x118/0x5f0
[   23.363650]  kasan_report+0xdc/0x128
[   23.363702]  kasan_check_range+0x100/0x1a8
[   23.363752]  __kasan_check_write+0x20/0x30
[   23.363798]  kasan_atomics_helper+0x6bc/0x49c8
[   23.363849]  kasan_atomics+0x1a0/0x2e8
[   23.363895]  kunit_try_run_case+0x170/0x3f0
[   23.363944]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.364000]  kthread+0x24c/0x2d0
[   23.364047]  ret_from_fork+0x10/0x20
[   23.364098] 
[   23.369565] Allocated by task 252:
[   23.370099]  kasan_save_stack+0x3c/0x68
[   23.370676]  kasan_save_track+0x20/0x40
[   23.371163]  kasan_save_alloc_info+0x40/0x58
[   23.371594]  __kasan_kmalloc+0xd4/0xd8
[   23.372113]  __kmalloc_cache_noprof+0x154/0x320
[   23.372541]  kasan_atomics+0xb8/0x2e8
[   23.373056]  kunit_try_run_case+0x170/0x3f0
[   23.373594]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.374169]  kthread+0x24c/0x2d0
[   23.374662]  ret_from_fork+0x10/0x20
[   23.375182] 
[   23.375493] The buggy address belongs to the object at fff00000c6cc9e00
[   23.375493]  which belongs to the cache kmalloc-64 of size 64
[   23.376358] The buggy address is located 0 bytes to the right of
[   23.376358]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.377394] 
[   23.377746] The buggy address belongs to the physical page:
[   23.378221] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.378961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.379558] page_type: f5(slab)
[   23.379956] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.380617] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.381296] page dumped because: kasan: bad access detected
[   23.381745] 
[   23.381997] Memory state around the buggy address:
[   23.382720]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.383356]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.383889] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.384550]                                      ^
[   23.385071]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.385721]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.386334] ==================================================================
[   24.744935] ==================================================================
[   24.745761] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18a4/0x49c8
[   24.746295] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   24.746731] 
[   24.746945] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   24.747136] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.747200] Hardware name: linux,dummy-virt (DT)
[   24.747572] Call trace:
[   24.747655]  dump_backtrace+0x9c/0x128
[   24.747814]  show_stack+0x20/0x38
[   24.747934]  dump_stack_lvl+0x8c/0xd0
[   24.748049]  print_report+0x118/0x5f0
[   24.748162]  kasan_report+0xdc/0x128
[   24.748287]  kasan_check_range+0x100/0x1a8
[   24.748392]  __kasan_check_write+0x20/0x30
[   24.748499]  kasan_atomics_helper+0x18a4/0x49c8
[   24.748608]  kasan_atomics+0x1a0/0x2e8
[   24.748717]  kunit_try_run_case+0x170/0x3f0
[   24.748835]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.748953]  kthread+0x24c/0x2d0
[   24.749052]  ret_from_fork+0x10/0x20
[   24.749139] 
[   24.754291] Allocated by task 252:
[   24.754792]  kasan_save_stack+0x3c/0x68
[   24.755344]  kasan_save_track+0x20/0x40
[   24.755857]  kasan_save_alloc_info+0x40/0x58
[   24.756339]  __kasan_kmalloc+0xd4/0xd8
[   24.756820]  __kmalloc_cache_noprof+0x154/0x320
[   24.757402]  kasan_atomics+0xb8/0x2e8
[   24.757817]  kunit_try_run_case+0x170/0x3f0
[   24.758290]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.758752]  kthread+0x24c/0x2d0
[   24.759213]  ret_from_fork+0x10/0x20
[   24.759622] 
[   24.759918] The buggy address belongs to the object at fff00000c6cc9e00
[   24.759918]  which belongs to the cache kmalloc-64 of size 64
[   24.760808] The buggy address is located 0 bytes to the right of
[   24.760808]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   24.762271] 
[   24.762792] The buggy address belongs to the physical page:
[   24.763477] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   24.764133] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.764576] page_type: f5(slab)
[   24.765043] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.765685] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.766274] page dumped because: kasan: bad access detected
[   24.766852] 
[   24.767131] Memory state around the buggy address:
[   24.767566]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.768110]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.768840] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.769410]                                      ^
[   24.769873]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.770545]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.771107] ==================================================================
[   24.260745] ==================================================================
[   24.261838] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1288/0x49c8
[   24.262554] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   24.263403] 
[   24.263759] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   24.264015] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.264097] Hardware name: linux,dummy-virt (DT)
[   24.264216] Call trace:
[   24.264301]  dump_backtrace+0x9c/0x128
[   24.264407]  show_stack+0x20/0x38
[   24.264459]  dump_stack_lvl+0x8c/0xd0
[   24.264513]  print_report+0x118/0x5f0
[   24.264560]  kasan_report+0xdc/0x128
[   24.264606]  kasan_check_range+0x100/0x1a8
[   24.264655]  __kasan_check_write+0x20/0x30
[   24.264705]  kasan_atomics_helper+0x1288/0x49c8
[   24.264757]  kasan_atomics+0x1a0/0x2e8
[   24.264806]  kunit_try_run_case+0x170/0x3f0
[   24.264856]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.264911]  kthread+0x24c/0x2d0
[   24.264959]  ret_from_fork+0x10/0x20
[   24.265014] 
[   24.270440] Allocated by task 252:
[   24.270823]  kasan_save_stack+0x3c/0x68
[   24.271406]  kasan_save_track+0x20/0x40
[   24.271949]  kasan_save_alloc_info+0x40/0x58
[   24.272429]  __kasan_kmalloc+0xd4/0xd8
[   24.272959]  __kmalloc_cache_noprof+0x154/0x320
[   24.273497]  kasan_atomics+0xb8/0x2e8
[   24.273881]  kunit_try_run_case+0x170/0x3f0
[   24.274483]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.274999]  kthread+0x24c/0x2d0
[   24.275376]  ret_from_fork+0x10/0x20
[   24.275825] 
[   24.276102] The buggy address belongs to the object at fff00000c6cc9e00
[   24.276102]  which belongs to the cache kmalloc-64 of size 64
[   24.277006] The buggy address is located 0 bytes to the right of
[   24.277006]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   24.278061] 
[   24.278413] The buggy address belongs to the physical page:
[   24.278862] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   24.279654] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.280316] page_type: f5(slab)
[   24.280776] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.281514] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.282132] page dumped because: kasan: bad access detected
[   24.282686] 
[   24.282998] Memory state around the buggy address:
[   24.283450]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.284163]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.284835] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.285595]                                      ^
[   24.286227]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.286984]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.287703] ==================================================================
[   23.198766] ==================================================================
[   23.199515] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x49c8
[   23.200158] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.201093] 
[   23.201389] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.201621] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.201702] Hardware name: linux,dummy-virt (DT)
[   23.201799] Call trace:
[   23.201862]  dump_backtrace+0x9c/0x128
[   23.201989]  show_stack+0x20/0x38
[   23.202081]  dump_stack_lvl+0x8c/0xd0
[   23.202189]  print_report+0x118/0x5f0
[   23.202307]  kasan_report+0xdc/0x128
[   23.202404]  kasan_check_range+0x100/0x1a8
[   23.202513]  __kasan_check_write+0x20/0x30
[   23.202617]  kasan_atomics_helper+0x4a0/0x49c8
[   23.202732]  kasan_atomics+0x1a0/0x2e8
[   23.202785]  kunit_try_run_case+0x170/0x3f0
[   23.202843]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.202898]  kthread+0x24c/0x2d0
[   23.202946]  ret_from_fork+0x10/0x20
[   23.202999] 
[   23.209555] Allocated by task 252:
[   23.209797]  kasan_save_stack+0x3c/0x68
[   23.210058]  kasan_save_track+0x20/0x40
[   23.210301]  kasan_save_alloc_info+0x40/0x58
[   23.210782]  __kasan_kmalloc+0xd4/0xd8
[   23.211336]  __kmalloc_cache_noprof+0x154/0x320
[   23.212505]  kasan_atomics+0xb8/0x2e8
[   23.212848]  kunit_try_run_case+0x170/0x3f0
[   23.213284]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.214063]  kthread+0x24c/0x2d0
[   23.214607]  ret_from_fork+0x10/0x20
[   23.215317] 
[   23.215695] The buggy address belongs to the object at fff00000c6cc9e00
[   23.215695]  which belongs to the cache kmalloc-64 of size 64
[   23.216581] The buggy address is located 0 bytes to the right of
[   23.216581]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.217367] 
[   23.217729] The buggy address belongs to the physical page:
[   23.218287] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.219153] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.219829] page_type: f5(slab)
[   23.220218] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.220756] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.221809] page dumped because: kasan: bad access detected
[   23.222802] 
[   23.223019] Memory state around the buggy address:
[   23.223634]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.224539]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.225229] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.225827]                                      ^
[   23.226365]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.227116]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.227728] ==================================================================
[   23.298396] ==================================================================
[   23.299344] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5e4/0x49c8
[   23.300478] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.301151] 
[   23.301497] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.301974] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.302051] Hardware name: linux,dummy-virt (DT)
[   23.302141] Call trace:
[   23.302185]  dump_backtrace+0x9c/0x128
[   23.302281]  show_stack+0x20/0x38
[   23.302333]  dump_stack_lvl+0x8c/0xd0
[   23.302383]  print_report+0x118/0x5f0
[   23.302432]  kasan_report+0xdc/0x128
[   23.302476]  kasan_check_range+0x100/0x1a8
[   23.302526]  __kasan_check_write+0x20/0x30
[   23.302574]  kasan_atomics_helper+0x5e4/0x49c8
[   23.302628]  kasan_atomics+0x1a0/0x2e8
[   23.302678]  kunit_try_run_case+0x170/0x3f0
[   23.302730]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.302785]  kthread+0x24c/0x2d0
[   23.302831]  ret_from_fork+0x10/0x20
[   23.302884] 
[   23.309507] Allocated by task 252:
[   23.310084]  kasan_save_stack+0x3c/0x68
[   23.310787]  kasan_save_track+0x20/0x40
[   23.311257]  kasan_save_alloc_info+0x40/0x58
[   23.311904]  __kasan_kmalloc+0xd4/0xd8
[   23.312744]  __kmalloc_cache_noprof+0x154/0x320
[   23.313177]  kasan_atomics+0xb8/0x2e8
[   23.313525]  kunit_try_run_case+0x170/0x3f0
[   23.313894]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.314526]  kthread+0x24c/0x2d0
[   23.314893]  ret_from_fork+0x10/0x20
[   23.315638] 
[   23.316040] The buggy address belongs to the object at fff00000c6cc9e00
[   23.316040]  which belongs to the cache kmalloc-64 of size 64
[   23.317382] The buggy address is located 0 bytes to the right of
[   23.317382]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.318755] 
[   23.319020] The buggy address belongs to the physical page:
[   23.319616] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.320668] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.321279] page_type: f5(slab)
[   23.321488] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.321742] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.321973] page dumped because: kasan: bad access detected
[   23.322161] 
[   23.322346] Memory state around the buggy address:
[   23.323072]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.324328]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.325041] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.325842]                                      ^
[   23.326437]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.327067]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.327926] ==================================================================
[   22.874336] ==================================================================
[   22.876573] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4210/0x49c8
[   22.877284] Read of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   22.877831] 
[   22.878191] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   22.878436] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.878512] Hardware name: linux,dummy-virt (DT)
[   22.878617] Call trace:
[   22.878691]  dump_backtrace+0x9c/0x128
[   22.878822]  show_stack+0x20/0x38
[   22.878895]  dump_stack_lvl+0x8c/0xd0
[   22.878956]  print_report+0x118/0x5f0
[   22.879008]  kasan_report+0xdc/0x128
[   22.879078]  __asan_report_load4_noabort+0x20/0x30
[   22.879176]  kasan_atomics_helper+0x4210/0x49c8
[   22.879281]  kasan_atomics+0x1a0/0x2e8
[   22.879371]  kunit_try_run_case+0x170/0x3f0
[   22.879491]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.879598]  kthread+0x24c/0x2d0
[   22.879682]  ret_from_fork+0x10/0x20
[   22.879778] 
[   22.886033] Allocated by task 252:
[   22.886587]  kasan_save_stack+0x3c/0x68
[   22.887422]  kasan_save_track+0x20/0x40
[   22.887919]  kasan_save_alloc_info+0x40/0x58
[   22.888348]  __kasan_kmalloc+0xd4/0xd8
[   22.888853]  __kmalloc_cache_noprof+0x154/0x320
[   22.889434]  kasan_atomics+0xb8/0x2e8
[   22.889878]  kunit_try_run_case+0x170/0x3f0
[   22.890308]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.890914]  kthread+0x24c/0x2d0
[   22.891307]  ret_from_fork+0x10/0x20
[   22.891808] 
[   22.892054] The buggy address belongs to the object at fff00000c6cc9e00
[   22.892054]  which belongs to the cache kmalloc-64 of size 64
[   22.892908] The buggy address is located 0 bytes to the right of
[   22.892908]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   22.893892] 
[   22.894223] The buggy address belongs to the physical page:
[   22.894759] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   22.895499] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.896325] page_type: f5(slab)
[   22.896799] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.897435] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   22.898102] page dumped because: kasan: bad access detected
[   22.898830] 
[   22.899478] Memory state around the buggy address:
[   22.899997]  fff00000c6cc9d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   22.900619]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.901248] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.901871]                                      ^
[   22.902415]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.903065]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.903950] ==================================================================
[   23.134508] ==================================================================
[   23.135769] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3c8/0x49c8
[   23.136473] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   23.137282] 
[   23.137649] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   23.137885] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.137976] Hardware name: linux,dummy-virt (DT)
[   23.138070] Call trace:
[   23.138136]  dump_backtrace+0x9c/0x128
[   23.138276]  show_stack+0x20/0x38
[   23.138387]  dump_stack_lvl+0x8c/0xd0
[   23.138478]  print_report+0x118/0x5f0
[   23.138536]  kasan_report+0xdc/0x128
[   23.138585]  kasan_check_range+0x100/0x1a8
[   23.138633]  __kasan_check_write+0x20/0x30
[   23.138683]  kasan_atomics_helper+0x3c8/0x49c8
[   23.138734]  kasan_atomics+0x1a0/0x2e8
[   23.138783]  kunit_try_run_case+0x170/0x3f0
[   23.138832]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.138886]  kthread+0x24c/0x2d0
[   23.138934]  ret_from_fork+0x10/0x20
[   23.138986] 
[   23.145260] Allocated by task 252:
[   23.145770]  kasan_save_stack+0x3c/0x68
[   23.146899]  kasan_save_track+0x20/0x40
[   23.147510]  kasan_save_alloc_info+0x40/0x58
[   23.148298]  __kasan_kmalloc+0xd4/0xd8
[   23.148614]  __kmalloc_cache_noprof+0x154/0x320
[   23.149289]  kasan_atomics+0xb8/0x2e8
[   23.149656]  kunit_try_run_case+0x170/0x3f0
[   23.150338]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.150879]  kthread+0x24c/0x2d0
[   23.151744]  ret_from_fork+0x10/0x20
[   23.152125] 
[   23.152444] The buggy address belongs to the object at fff00000c6cc9e00
[   23.152444]  which belongs to the cache kmalloc-64 of size 64
[   23.153318] The buggy address is located 0 bytes to the right of
[   23.153318]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   23.154315] 
[   23.154585] The buggy address belongs to the physical page:
[   23.155573] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   23.156334] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.156752] page_type: f5(slab)
[   23.157582] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   23.158390] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   23.159310] page dumped because: kasan: bad access detected
[   23.160029] 
[   23.160311] Memory state around the buggy address:
[   23.160727]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.161342]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.161983] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.162589]                                      ^
[   23.163521]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.164219]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.164535] ==================================================================
[   24.717797] ==================================================================
[   24.718420] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f88/0x49c8
[   24.719161] Read of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   24.719628] 
[   24.720017] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   24.720272] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.720359] Hardware name: linux,dummy-virt (DT)
[   24.720460] Call trace:
[   24.720553]  dump_backtrace+0x9c/0x128
[   24.720684]  show_stack+0x20/0x38
[   24.720775]  dump_stack_lvl+0x8c/0xd0
[   24.720835]  print_report+0x118/0x5f0
[   24.720884]  kasan_report+0xdc/0x128
[   24.720931]  __asan_report_load8_noabort+0x20/0x30
[   24.720984]  kasan_atomics_helper+0x3f88/0x49c8
[   24.721038]  kasan_atomics+0x1a0/0x2e8
[   24.721091]  kunit_try_run_case+0x170/0x3f0
[   24.721143]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.721200]  kthread+0x24c/0x2d0
[   24.721273]  ret_from_fork+0x10/0x20
[   24.721331] 
[   24.726641] Allocated by task 252:
[   24.727065]  kasan_save_stack+0x3c/0x68
[   24.727619]  kasan_save_track+0x20/0x40
[   24.728073]  kasan_save_alloc_info+0x40/0x58
[   24.728515]  __kasan_kmalloc+0xd4/0xd8
[   24.729051]  __kmalloc_cache_noprof+0x154/0x320
[   24.729537]  kasan_atomics+0xb8/0x2e8
[   24.730068]  kunit_try_run_case+0x170/0x3f0
[   24.730563]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.731146]  kthread+0x24c/0x2d0
[   24.731542]  ret_from_fork+0x10/0x20
[   24.732026] 
[   24.732365] The buggy address belongs to the object at fff00000c6cc9e00
[   24.732365]  which belongs to the cache kmalloc-64 of size 64
[   24.733305] The buggy address is located 0 bytes to the right of
[   24.733305]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   24.734322] 
[   24.734661] The buggy address belongs to the physical page:
[   24.735154] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   24.735933] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.736550] page_type: f5(slab)
[   24.736970] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.737708] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.738355] page dumped because: kasan: bad access detected
[   24.738833] 
[   24.739160] Memory state around the buggy address:
[   24.739647]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.740266]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.740930] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.741590]                                      ^
[   24.742003]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.742557]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.743072] ==================================================================
[   24.662916] ==================================================================
[   24.663620] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f78/0x49c8
[   24.664311] Read of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252
[   24.664904] 
[   24.665261] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   24.665515] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.665605] Hardware name: linux,dummy-virt (DT)
[   24.665695] Call trace:
[   24.665767]  dump_backtrace+0x9c/0x128
[   24.665910]  show_stack+0x20/0x38
[   24.666012]  dump_stack_lvl+0x8c/0xd0
[   24.666096]  print_report+0x118/0x5f0
[   24.666148]  kasan_report+0xdc/0x128
[   24.666196]  __asan_report_load8_noabort+0x20/0x30
[   24.666277]  kasan_atomics_helper+0x3f78/0x49c8
[   24.666336]  kasan_atomics+0x1a0/0x2e8
[   24.666388]  kunit_try_run_case+0x170/0x3f0
[   24.666444]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.666501]  kthread+0x24c/0x2d0
[   24.666550]  ret_from_fork+0x10/0x20
[   24.666605] 
[   24.671523] Allocated by task 252:
[   24.672040]  kasan_save_stack+0x3c/0x68
[   24.672537]  kasan_save_track+0x20/0x40
[   24.672948]  kasan_save_alloc_info+0x40/0x58
[   24.673535]  __kasan_kmalloc+0xd4/0xd8
[   24.674040]  __kmalloc_cache_noprof+0x154/0x320
[   24.674548]  kasan_atomics+0xb8/0x2e8
[   24.675052]  kunit_try_run_case+0x170/0x3f0
[   24.675598]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.676117]  kthread+0x24c/0x2d0
[   24.676551]  ret_from_fork+0x10/0x20
[   24.676901] 
[   24.677203] The buggy address belongs to the object at fff00000c6cc9e00
[   24.677203]  which belongs to the cache kmalloc-64 of size 64
[   24.678105] The buggy address is located 0 bytes to the right of
[   24.678105]  allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30)
[   24.679085] 
[   24.679427] The buggy address belongs to the physical page:
[   24.679998] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9
[   24.680707] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.681315] page_type: f5(slab)
[   24.681699] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   24.682394] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   24.682966] page dumped because: kasan: bad access detected
[   24.683408] 
[   24.683709] Memory state around the buggy address:
[   24.684157]  fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.684819]  fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.685445] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.685992]                                      ^
[   24.686484]  fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.687202]  fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.687746] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   22.614037] ==================================================================
[   22.615018] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x104/0xc08
[   22.616114] Write of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248
[   22.616663] 
[   22.616885] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   22.617055] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.617111] Hardware name: linux,dummy-virt (DT)
[   22.617189] Call trace:
[   22.617258]  dump_backtrace+0x9c/0x128
[   22.617374]  show_stack+0x20/0x38
[   22.617503]  dump_stack_lvl+0x8c/0xd0
[   22.617639]  print_report+0x118/0x5f0
[   22.618053]  kasan_report+0xdc/0x128
[   22.618160]  kasan_check_range+0x100/0x1a8
[   22.618283]  __kasan_check_write+0x20/0x30
[   22.618341]  kasan_bitops_test_and_modify.constprop.0+0x104/0xc08
[   22.618405]  kasan_bitops_generic+0x120/0x1d0
[   22.618457]  kunit_try_run_case+0x170/0x3f0
[   22.618510]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.618564]  kthread+0x24c/0x2d0
[   22.618612]  ret_from_fork+0x10/0x20
[   22.618665] 
[   22.622189] Allocated by task 248:
[   22.622631]  kasan_save_stack+0x3c/0x68
[   22.623269]  kasan_save_track+0x20/0x40
[   22.623844]  kasan_save_alloc_info+0x40/0x58
[   22.625740]  __kasan_kmalloc+0xd4/0xd8
[   22.626337]  __kmalloc_cache_noprof+0x154/0x320
[   22.626932]  kasan_bitops_generic+0xa0/0x1d0
[   22.627431]  kunit_try_run_case+0x170/0x3f0
[   22.627968]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.628381]  kthread+0x24c/0x2d0
[   22.628753]  ret_from_fork+0x10/0x20
[   22.629175] 
[   22.629490] The buggy address belongs to the object at fff00000c5bb22a0
[   22.629490]  which belongs to the cache kmalloc-16 of size 16
[   22.630346] The buggy address is located 8 bytes inside of
[   22.630346]  allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9)
[   22.631232] 
[   22.631535] The buggy address belongs to the physical page:
[   22.631987] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2
[   22.632703] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.633226] page_type: f5(slab)
[   22.633684] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   22.634335] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   22.634985] page dumped because: kasan: bad access detected
[   22.635432] 
[   22.635699] Memory state around the buggy address:
[   22.636102]  fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.636785]  fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   22.637361] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.637887]                                   ^
[   22.638338]  fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.638972]  fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.639499] ==================================================================
[   22.667778] ==================================================================
[   22.668434] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1e4/0xc08
[   22.669129] Write of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248
[   22.670947] 
[   22.671224] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   22.671494] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.671562] Hardware name: linux,dummy-virt (DT)
[   22.671612] Call trace:
[   22.671644]  dump_backtrace+0x9c/0x128
[   22.671743]  show_stack+0x20/0x38
[   22.671793]  dump_stack_lvl+0x8c/0xd0
[   22.671842]  print_report+0x118/0x5f0
[   22.671890]  kasan_report+0xdc/0x128
[   22.671934]  kasan_check_range+0x100/0x1a8
[   22.671982]  __kasan_check_write+0x20/0x30
[   22.672030]  kasan_bitops_test_and_modify.constprop.0+0x1e4/0xc08
[   22.672087]  kasan_bitops_generic+0x120/0x1d0
[   22.672138]  kunit_try_run_case+0x170/0x3f0
[   22.672188]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.672267]  kthread+0x24c/0x2d0
[   22.672348]  ret_from_fork+0x10/0x20
[   22.672446] 
[   22.677583] Allocated by task 248:
[   22.677995]  kasan_save_stack+0x3c/0x68
[   22.678493]  kasan_save_track+0x20/0x40
[   22.678870]  kasan_save_alloc_info+0x40/0x58
[   22.679273]  __kasan_kmalloc+0xd4/0xd8
[   22.679719]  __kmalloc_cache_noprof+0x154/0x320
[   22.680176]  kasan_bitops_generic+0xa0/0x1d0
[   22.680700]  kunit_try_run_case+0x170/0x3f0
[   22.681126]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.681717]  kthread+0x24c/0x2d0
[   22.682163]  ret_from_fork+0x10/0x20
[   22.682644] 
[   22.682925] The buggy address belongs to the object at fff00000c5bb22a0
[   22.682925]  which belongs to the cache kmalloc-16 of size 16
[   22.683730] The buggy address is located 8 bytes inside of
[   22.683730]  allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9)
[   22.684702] 
[   22.685007] The buggy address belongs to the physical page:
[   22.685437] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2
[   22.686212] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.686906] page_type: f5(slab)
[   22.687340] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   22.687931] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   22.688486] page dumped because: kasan: bad access detected
[   22.688976] 
[   22.689212] Memory state around the buggy address:
[   22.689661]  fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.690317]  fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   22.690859] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.691457]                                   ^
[   22.691876]  fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.692521]  fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.693059] ==================================================================
[   22.721347] ==================================================================
[   22.722409] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x26c/0xc08
[   22.722992] Write of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248
[   22.724086] 
[   22.724421] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   22.724708] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.724756] Hardware name: linux,dummy-virt (DT)
[   22.724802] Call trace:
[   22.724835]  dump_backtrace+0x9c/0x128
[   22.724902]  show_stack+0x20/0x38
[   22.724947]  dump_stack_lvl+0x8c/0xd0
[   22.724997]  print_report+0x118/0x5f0
[   22.725045]  kasan_report+0xdc/0x128
[   22.725088]  kasan_check_range+0x100/0x1a8
[   22.725135]  __kasan_check_write+0x20/0x30
[   22.725183]  kasan_bitops_test_and_modify.constprop.0+0x26c/0xc08
[   22.725265]  kasan_bitops_generic+0x120/0x1d0
[   22.725322]  kunit_try_run_case+0x170/0x3f0
[   22.725373]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.725430]  kthread+0x24c/0x2d0
[   22.725483]  ret_from_fork+0x10/0x20
[   22.725547] 
[   22.731280] Allocated by task 248:
[   22.731776]  kasan_save_stack+0x3c/0x68
[   22.732193]  kasan_save_track+0x20/0x40
[   22.732735]  kasan_save_alloc_info+0x40/0x58
[   22.733102]  __kasan_kmalloc+0xd4/0xd8
[   22.733608]  __kmalloc_cache_noprof+0x154/0x320
[   22.734033]  kasan_bitops_generic+0xa0/0x1d0
[   22.734456]  kunit_try_run_case+0x170/0x3f0
[   22.735010]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.735563]  kthread+0x24c/0x2d0
[   22.736062]  ret_from_fork+0x10/0x20
[   22.736586] 
[   22.736908] The buggy address belongs to the object at fff00000c5bb22a0
[   22.736908]  which belongs to the cache kmalloc-16 of size 16
[   22.737881] The buggy address is located 8 bytes inside of
[   22.737881]  allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9)
[   22.738916] 
[   22.739284] The buggy address belongs to the physical page:
[   22.740175] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2
[   22.740869] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.741403] page_type: f5(slab)
[   22.741747] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   22.742508] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   22.743583] page dumped because: kasan: bad access detected
[   22.743958] 
[   22.744432] Memory state around the buggy address:
[   22.744822]  fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.745258]  fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   22.745665] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.746038]                                   ^
[   22.747197]  fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.747912]  fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.748415] ==================================================================
[   22.695495] ==================================================================
[   22.696263] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa90/0xc08
[   22.696581] Read of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248
[   22.696814] 
[   22.696944] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   22.697050] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.697086] Hardware name: linux,dummy-virt (DT)
[   22.697128] Call trace:
[   22.697157]  dump_backtrace+0x9c/0x128
[   22.697211]  show_stack+0x20/0x38
[   22.697284]  dump_stack_lvl+0x8c/0xd0
[   22.697375]  print_report+0x118/0x5f0
[   22.697457]  kasan_report+0xdc/0x128
[   22.697547]  __asan_report_load8_noabort+0x20/0x30
[   22.697643]  kasan_bitops_test_and_modify.constprop.0+0xa90/0xc08
[   22.697760]  kasan_bitops_generic+0x120/0x1d0
[   22.697866]  kunit_try_run_case+0x170/0x3f0
[   22.697976]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.698082]  kthread+0x24c/0x2d0
[   22.698180]  ret_from_fork+0x10/0x20
[   22.698304] 
[   22.703602] Allocated by task 248:
[   22.703941]  kasan_save_stack+0x3c/0x68
[   22.704471]  kasan_save_track+0x20/0x40
[   22.704823]  kasan_save_alloc_info+0x40/0x58
[   22.705310]  __kasan_kmalloc+0xd4/0xd8
[   22.705779]  __kmalloc_cache_noprof+0x154/0x320
[   22.706332]  kasan_bitops_generic+0xa0/0x1d0
[   22.706779]  kunit_try_run_case+0x170/0x3f0
[   22.707170]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.707720]  kthread+0x24c/0x2d0
[   22.708133]  ret_from_fork+0x10/0x20
[   22.708534] 
[   22.708815] The buggy address belongs to the object at fff00000c5bb22a0
[   22.708815]  which belongs to the cache kmalloc-16 of size 16
[   22.709817] The buggy address is located 8 bytes inside of
[   22.709817]  allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9)
[   22.710651] 
[   22.710934] The buggy address belongs to the physical page:
[   22.711501] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2
[   22.712213] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.712932] page_type: f5(slab)
[   22.713369] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   22.713994] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   22.714606] page dumped because: kasan: bad access detected
[   22.715007] 
[   22.715284] Memory state around the buggy address:
[   22.715750]  fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.716341]  fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   22.716933] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.717577]                                   ^
[   22.718073]  fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.718693]  fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.719235] ==================================================================
[   22.751895] ==================================================================
[   22.753088] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xb14/0xc08
[   22.755161] Read of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248
[   22.757290] 
[   22.757630] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   22.757877] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.757961] Hardware name: linux,dummy-virt (DT)
[   22.758019] Call trace:
[   22.758053]  dump_backtrace+0x9c/0x128
[   22.758145]  show_stack+0x20/0x38
[   22.758207]  dump_stack_lvl+0x8c/0xd0
[   22.758283]  print_report+0x118/0x5f0
[   22.758336]  kasan_report+0xdc/0x128
[   22.758380]  __asan_report_load8_noabort+0x20/0x30
[   22.758431]  kasan_bitops_test_and_modify.constprop.0+0xb14/0xc08
[   22.758489]  kasan_bitops_generic+0x120/0x1d0
[   22.758539]  kunit_try_run_case+0x170/0x3f0
[   22.758589]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.758643]  kthread+0x24c/0x2d0
[   22.758689]  ret_from_fork+0x10/0x20
[   22.758738] 
[   22.763700] Allocated by task 248:
[   22.764079]  kasan_save_stack+0x3c/0x68
[   22.764486]  kasan_save_track+0x20/0x40
[   22.764933]  kasan_save_alloc_info+0x40/0x58
[   22.765449]  __kasan_kmalloc+0xd4/0xd8
[   22.765947]  __kmalloc_cache_noprof+0x154/0x320
[   22.766442]  kasan_bitops_generic+0xa0/0x1d0
[   22.766928]  kunit_try_run_case+0x170/0x3f0
[   22.767469]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.768087]  kthread+0x24c/0x2d0
[   22.768555]  ret_from_fork+0x10/0x20
[   22.768961] 
[   22.769261] The buggy address belongs to the object at fff00000c5bb22a0
[   22.769261]  which belongs to the cache kmalloc-16 of size 16
[   22.770135] The buggy address is located 8 bytes inside of
[   22.770135]  allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9)
[   22.771018] 
[   22.771340] The buggy address belongs to the physical page:
[   22.771826] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2
[   22.772522] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.773048] page_type: f5(slab)
[   22.773516] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   22.774181] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   22.774813] page dumped because: kasan: bad access detected
[   22.775286] 
[   22.775557] Memory state around the buggy address:
[   22.776015]  fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.776615]  fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   22.777231] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.777827]                                   ^
[   22.778285]  fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.778902]  fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.779499] ==================================================================
[   22.832889] ==================================================================
[   22.833602] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xc08
[   22.834313] Read of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248
[   22.834926] 
[   22.836415] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   22.836548] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.836586] Hardware name: linux,dummy-virt (DT)
[   22.836631] Call trace:
[   22.836661]  dump_backtrace+0x9c/0x128
[   22.836731]  show_stack+0x20/0x38
[   22.836776]  dump_stack_lvl+0x8c/0xd0
[   22.836825]  print_report+0x118/0x5f0
[   22.836870]  kasan_report+0xdc/0x128
[   22.836915]  __asan_report_load8_noabort+0x20/0x30
[   22.836965]  kasan_bitops_test_and_modify.constprop.0+0xacc/0xc08
[   22.837023]  kasan_bitops_generic+0x120/0x1d0
[   22.837075]  kunit_try_run_case+0x170/0x3f0
[   22.837125]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.837178]  kthread+0x24c/0x2d0
[   22.837224]  ret_from_fork+0x10/0x20
[   22.837291] 
[   22.842085] Allocated by task 248:
[   22.842562]  kasan_save_stack+0x3c/0x68
[   22.843055]  kasan_save_track+0x20/0x40
[   22.843536]  kasan_save_alloc_info+0x40/0x58
[   22.843897]  __kasan_kmalloc+0xd4/0xd8
[   22.844396]  __kmalloc_cache_noprof+0x154/0x320
[   22.844937]  kasan_bitops_generic+0xa0/0x1d0
[   22.845348]  kunit_try_run_case+0x170/0x3f0
[   22.845777]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.846205]  kthread+0x24c/0x2d0
[   22.846674]  ret_from_fork+0x10/0x20
[   22.847052] 
[   22.847350] The buggy address belongs to the object at fff00000c5bb22a0
[   22.847350]  which belongs to the cache kmalloc-16 of size 16
[   22.848034] The buggy address is located 8 bytes inside of
[   22.848034]  allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9)
[   22.849060] 
[   22.849353] The buggy address belongs to the physical page:
[   22.849801] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2
[   22.850499] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.851077] page_type: f5(slab)
[   22.851538] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   22.852266] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   22.853000] page dumped because: kasan: bad access detected
[   22.853407] 
[   22.853697] Memory state around the buggy address:
[   22.854211]  fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.854798]  fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   22.855485] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.856043]                                   ^
[   22.856437]  fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.857068]  fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.857538] ==================================================================
[   22.641810] ==================================================================
[   22.642337] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xc08
[   22.643229] Read of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248
[   22.643962] 
[   22.644300] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   22.644512] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.644595] Hardware name: linux,dummy-virt (DT)
[   22.644672] Call trace:
[   22.644725]  dump_backtrace+0x9c/0x128
[   22.644854]  show_stack+0x20/0x38
[   22.644957]  dump_stack_lvl+0x8c/0xd0
[   22.645071]  print_report+0x118/0x5f0
[   22.645167]  kasan_report+0xdc/0x128
[   22.645230]  __asan_report_load8_noabort+0x20/0x30
[   22.645314]  kasan_bitops_test_and_modify.constprop.0+0xa48/0xc08
[   22.645375]  kasan_bitops_generic+0x120/0x1d0
[   22.645426]  kunit_try_run_case+0x170/0x3f0
[   22.645485]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.645546]  kthread+0x24c/0x2d0
[   22.645592]  ret_from_fork+0x10/0x20
[   22.645646] 
[   22.650361] Allocated by task 248:
[   22.650788]  kasan_save_stack+0x3c/0x68
[   22.651300]  kasan_save_track+0x20/0x40
[   22.651786]  kasan_save_alloc_info+0x40/0x58
[   22.652209]  __kasan_kmalloc+0xd4/0xd8
[   22.652671]  __kmalloc_cache_noprof+0x154/0x320
[   22.653197]  kasan_bitops_generic+0xa0/0x1d0
[   22.653729]  kunit_try_run_case+0x170/0x3f0
[   22.654086]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.654662]  kthread+0x24c/0x2d0
[   22.655024]  ret_from_fork+0x10/0x20
[   22.655485] 
[   22.655771] The buggy address belongs to the object at fff00000c5bb22a0
[   22.655771]  which belongs to the cache kmalloc-16 of size 16
[   22.656615] The buggy address is located 8 bytes inside of
[   22.656615]  allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9)
[   22.657500] 
[   22.657814] The buggy address belongs to the physical page:
[   22.658234] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2
[   22.659053] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.659744] page_type: f5(slab)
[   22.660120] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   22.660710] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   22.661330] page dumped because: kasan: bad access detected
[   22.661880] 
[   22.662167] Memory state around the buggy address:
[   22.662639]  fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.663202]  fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   22.663777] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.664253]                                   ^
[   22.664762]  fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.665347]  fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.665911] ==================================================================
[   22.807527] ==================================================================
[   22.808254] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xc08
[   22.808948] Read of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248
[   22.809491] 
[   22.809802] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   22.810006] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.810083] Hardware name: linux,dummy-virt (DT)
[   22.810173] Call trace:
[   22.810248]  dump_backtrace+0x9c/0x128
[   22.810372]  show_stack+0x20/0x38
[   22.810463]  dump_stack_lvl+0x8c/0xd0
[   22.810570]  print_report+0x118/0x5f0
[   22.810665]  kasan_report+0xdc/0x128
[   22.810730]  __asan_report_load8_noabort+0x20/0x30
[   22.810786]  kasan_bitops_test_and_modify.constprop.0+0xa84/0xc08
[   22.810844]  kasan_bitops_generic+0x120/0x1d0
[   22.810894]  kunit_try_run_case+0x170/0x3f0
[   22.810945]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.810999]  kthread+0x24c/0x2d0
[   22.811046]  ret_from_fork+0x10/0x20
[   22.811163] 
[   22.816082] Allocated by task 248:
[   22.816511]  kasan_save_stack+0x3c/0x68
[   22.816868]  kasan_save_track+0x20/0x40
[   22.817356]  kasan_save_alloc_info+0x40/0x58
[   22.817779]  __kasan_kmalloc+0xd4/0xd8
[   22.818196]  __kmalloc_cache_noprof+0x154/0x320
[   22.818590]  kasan_bitops_generic+0xa0/0x1d0
[   22.819100]  kunit_try_run_case+0x170/0x3f0
[   22.819480]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.819993]  kthread+0x24c/0x2d0
[   22.820366]  ret_from_fork+0x10/0x20
[   22.820713] 
[   22.821007] The buggy address belongs to the object at fff00000c5bb22a0
[   22.821007]  which belongs to the cache kmalloc-16 of size 16
[   22.821959] The buggy address is located 8 bytes inside of
[   22.821959]  allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9)
[   22.822840] 
[   22.823133] The buggy address belongs to the physical page:
[   22.823660] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2
[   22.824363] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.825006] page_type: f5(slab)
[   22.825434] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   22.826156] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   22.826793] page dumped because: kasan: bad access detected
[   22.827083] 
[   22.827226] Memory state around the buggy address:
[   22.827943]  fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.828544]  fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   22.828908] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.829594]                                   ^
[   22.829934]  fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.830665]  fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.831180] ==================================================================
[   22.781042] ==================================================================
[   22.781524] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x34c/0xc08
[   22.782098] Write of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248
[   22.782603] 
[   22.782958] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   22.783194] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.783520] Hardware name: linux,dummy-virt (DT)
[   22.783597] Call trace:
[   22.783634]  dump_backtrace+0x9c/0x128
[   22.783703]  show_stack+0x20/0x38
[   22.783749]  dump_stack_lvl+0x8c/0xd0
[   22.783799]  print_report+0x118/0x5f0
[   22.783847]  kasan_report+0xdc/0x128
[   22.783892]  kasan_check_range+0x100/0x1a8
[   22.783940]  __kasan_check_write+0x20/0x30
[   22.783987]  kasan_bitops_test_and_modify.constprop.0+0x34c/0xc08
[   22.784047]  kasan_bitops_generic+0x120/0x1d0
[   22.784097]  kunit_try_run_case+0x170/0x3f0
[   22.784148]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.784203]  kthread+0x24c/0x2d0
[   22.784278]  ret_from_fork+0x10/0x20
[   22.784336] 
[   22.790208] Allocated by task 248:
[   22.790632]  kasan_save_stack+0x3c/0x68
[   22.790995]  kasan_save_track+0x20/0x40
[   22.791480]  kasan_save_alloc_info+0x40/0x58
[   22.791836]  __kasan_kmalloc+0xd4/0xd8
[   22.792307]  __kmalloc_cache_noprof+0x154/0x320
[   22.792686]  kasan_bitops_generic+0xa0/0x1d0
[   22.793190]  kunit_try_run_case+0x170/0x3f0
[   22.793561]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.794161]  kthread+0x24c/0x2d0
[   22.794490]  ret_from_fork+0x10/0x20
[   22.794948] 
[   22.795214] The buggy address belongs to the object at fff00000c5bb22a0
[   22.795214]  which belongs to the cache kmalloc-16 of size 16
[   22.796432] The buggy address is located 8 bytes inside of
[   22.796432]  allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9)
[   22.797424] 
[   22.797727] The buggy address belongs to the physical page:
[   22.798278] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2
[   22.798973] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.799489] page_type: f5(slab)
[   22.799928] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   22.800605] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   22.801138] page dumped because: kasan: bad access detected
[   22.801688] 
[   22.801959] Memory state around the buggy address:
[   22.802456]  fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.802999]  fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   22.803657] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.804308]                                   ^
[   22.804844]  fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.805431]  fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.806042] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[   22.502949] ==================================================================
[   22.503674] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xb28/0xbf8
[   22.504120] Read of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248
[   22.504935] 
[   22.505286] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   22.505534] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.505615] Hardware name: linux,dummy-virt (DT)
[   22.505697] Call trace:
[   22.505761]  dump_backtrace+0x9c/0x128
[   22.505886]  show_stack+0x20/0x38
[   22.505994]  dump_stack_lvl+0x8c/0xd0
[   22.506107]  print_report+0x118/0x5f0
[   22.506218]  kasan_report+0xdc/0x128
[   22.506320]  __asan_report_load8_noabort+0x20/0x30
[   22.506377]  kasan_bitops_modify.constprop.0+0xb28/0xbf8
[   22.506434]  kasan_bitops_generic+0x114/0x1d0
[   22.506486]  kunit_try_run_case+0x170/0x3f0
[   22.506537]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.506591]  kthread+0x24c/0x2d0
[   22.506639]  ret_from_fork+0x10/0x20
[   22.506690] 
[   22.512098] Allocated by task 248:
[   22.513882]  kasan_save_stack+0x3c/0x68
[   22.514308]  kasan_save_track+0x20/0x40
[   22.514735]  kasan_save_alloc_info+0x40/0x58
[   22.515142]  __kasan_kmalloc+0xd4/0xd8
[   22.515570]  __kmalloc_cache_noprof+0x154/0x320
[   22.516105]  kasan_bitops_generic+0xa0/0x1d0
[   22.516669]  kunit_try_run_case+0x170/0x3f0
[   22.516963]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.517573]  kthread+0x24c/0x2d0
[   22.518026]  ret_from_fork+0x10/0x20
[   22.518447] 
[   22.518729] The buggy address belongs to the object at fff00000c5bb22a0
[   22.518729]  which belongs to the cache kmalloc-16 of size 16
[   22.519576] The buggy address is located 8 bytes inside of
[   22.519576]  allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9)
[   22.520632] 
[   22.520935] The buggy address belongs to the physical page:
[   22.521548] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2
[   22.522170] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.522779] page_type: f5(slab)
[   22.523143] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   22.523869] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   22.524416] page dumped because: kasan: bad access detected
[   22.524946] 
[   22.525230] Memory state around the buggy address:
[   22.525684]  fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.526224]  fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   22.526867] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.527443]                                   ^
[   22.527847]  fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.528462]  fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.529103] ==================================================================
[   22.530991] ==================================================================
[   22.531739] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x358/0xbf8
[   22.532930] Write of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248
[   22.533344] 
[   22.533612] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   22.533830] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.533911] Hardware name: linux,dummy-virt (DT)
[   22.533997] Call trace:
[   22.534059]  dump_backtrace+0x9c/0x128
[   22.534190]  show_stack+0x20/0x38
[   22.534299]  dump_stack_lvl+0x8c/0xd0
[   22.534368]  print_report+0x118/0x5f0
[   22.534417]  kasan_report+0xdc/0x128
[   22.534463]  kasan_check_range+0x100/0x1a8
[   22.534512]  __kasan_check_write+0x20/0x30
[   22.534560]  kasan_bitops_modify.constprop.0+0x358/0xbf8
[   22.534615]  kasan_bitops_generic+0x114/0x1d0
[   22.534665]  kunit_try_run_case+0x170/0x3f0
[   22.534714]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.534765]  kthread+0x24c/0x2d0
[   22.534811]  ret_from_fork+0x10/0x20
[   22.534862] 
[   22.539889] Allocated by task 248:
[   22.540375]  kasan_save_stack+0x3c/0x68
[   22.540894]  kasan_save_track+0x20/0x40
[   22.541336]  kasan_save_alloc_info+0x40/0x58
[   22.541859]  __kasan_kmalloc+0xd4/0xd8
[   22.542314]  __kmalloc_cache_noprof+0x154/0x320
[   22.542811]  kasan_bitops_generic+0xa0/0x1d0
[   22.543261]  kunit_try_run_case+0x170/0x3f0
[   22.543669]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.544258]  kthread+0x24c/0x2d0
[   22.544716]  ret_from_fork+0x10/0x20
[   22.545197] 
[   22.545441] The buggy address belongs to the object at fff00000c5bb22a0
[   22.545441]  which belongs to the cache kmalloc-16 of size 16
[   22.546343] The buggy address is located 8 bytes inside of
[   22.546343]  allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9)
[   22.547282] 
[   22.547583] The buggy address belongs to the physical page:
[   22.548106] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2
[   22.549092] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.549735] page_type: f5(slab)
[   22.550057] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   22.550836] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   22.551532] page dumped because: kasan: bad access detected
[   22.552034] 
[   22.552315] Memory state around the buggy address:
[   22.552847]  fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.553486]  fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   22.554134] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.554711]                                   ^
[   22.555175]  fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.555775]  fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.556355] ==================================================================
[   22.359259] ==================================================================
[   22.359927] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbf8
[   22.361176] Read of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248
[   22.361856] 
[   22.362197] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   22.362444] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.362549] Hardware name: linux,dummy-virt (DT)
[   22.362644] Call trace:
[   22.362722]  dump_backtrace+0x9c/0x128
[   22.362837]  show_stack+0x20/0x38
[   22.362937]  dump_stack_lvl+0x8c/0xd0
[   22.363030]  print_report+0x118/0x5f0
[   22.363084]  kasan_report+0xdc/0x128
[   22.363129]  __asan_report_load8_noabort+0x20/0x30
[   22.363182]  kasan_bitops_modify.constprop.0+0xa80/0xbf8
[   22.363254]  kasan_bitops_generic+0x114/0x1d0
[   22.363318]  kunit_try_run_case+0x170/0x3f0
[   22.363370]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.363422]  kthread+0x24c/0x2d0
[   22.363470]  ret_from_fork+0x10/0x20
[   22.363521] 
[   22.368586] Allocated by task 248:
[   22.368758]  kasan_save_stack+0x3c/0x68
[   22.368943]  kasan_save_track+0x20/0x40
[   22.369105]  kasan_save_alloc_info+0x40/0x58
[   22.369361]  __kasan_kmalloc+0xd4/0xd8
[   22.369932]  __kmalloc_cache_noprof+0x154/0x320
[   22.370528]  kasan_bitops_generic+0xa0/0x1d0
[   22.371115]  kunit_try_run_case+0x170/0x3f0
[   22.371669]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.372279]  kthread+0x24c/0x2d0
[   22.372732]  ret_from_fork+0x10/0x20
[   22.373162] 
[   22.373464] The buggy address belongs to the object at fff00000c5bb22a0
[   22.373464]  which belongs to the cache kmalloc-16 of size 16
[   22.374461] The buggy address is located 8 bytes inside of
[   22.374461]  allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9)
[   22.375427] 
[   22.375738] The buggy address belongs to the physical page:
[   22.376170] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2
[   22.376933] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.377570] page_type: f5(slab)
[   22.377949] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   22.378628] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   22.379282] page dumped because: kasan: bad access detected
[   22.379795] 
[   22.380065] Memory state around the buggy address:
[   22.380556]  fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.381181]  fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   22.381830] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.382409]                                   ^
[   22.382866]  fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.383589]  fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.384095] ==================================================================
[   22.387053] ==================================================================
[   22.387656] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1e4/0xbf8
[   22.388326] Write of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248
[   22.388899] 
[   22.389215] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   22.389463] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.389546] Hardware name: linux,dummy-virt (DT)
[   22.389632] Call trace:
[   22.389691]  dump_backtrace+0x9c/0x128
[   22.389836]  show_stack+0x20/0x38
[   22.389934]  dump_stack_lvl+0x8c/0xd0
[   22.390019]  print_report+0x118/0x5f0
[   22.390070]  kasan_report+0xdc/0x128
[   22.390113]  kasan_check_range+0x100/0x1a8
[   22.390283]  __kasan_check_write+0x20/0x30
[   22.390378]  kasan_bitops_modify.constprop.0+0x1e4/0xbf8
[   22.390476]  kasan_bitops_generic+0x114/0x1d0
[   22.390584]  kunit_try_run_case+0x170/0x3f0
[   22.390644]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.390699]  kthread+0x24c/0x2d0
[   22.390745]  ret_from_fork+0x10/0x20
[   22.390798] 
[   22.394550] Allocated by task 248:
[   22.395023]  kasan_save_stack+0x3c/0x68
[   22.395668]  kasan_save_track+0x20/0x40
[   22.396586]  kasan_save_alloc_info+0x40/0x58
[   22.397534]  __kasan_kmalloc+0xd4/0xd8
[   22.398062]  __kmalloc_cache_noprof+0x154/0x320
[   22.398655]  kasan_bitops_generic+0xa0/0x1d0
[   22.399066]  kunit_try_run_case+0x170/0x3f0
[   22.399485]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.400089]  kthread+0x24c/0x2d0
[   22.400542]  ret_from_fork+0x10/0x20
[   22.401003] 
[   22.401308] The buggy address belongs to the object at fff00000c5bb22a0
[   22.401308]  which belongs to the cache kmalloc-16 of size 16
[   22.402171] The buggy address is located 8 bytes inside of
[   22.402171]  allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9)
[   22.403120] 
[   22.403365] The buggy address belongs to the physical page:
[   22.403834] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2
[   22.404494] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.405059] page_type: f5(slab)
[   22.405536] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   22.406176] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   22.406860] page dumped because: kasan: bad access detected
[   22.407356] 
[   22.407618] Memory state around the buggy address:
[   22.408024]  fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.408643]  fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   22.409185] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.409852]                                   ^
[   22.410383]  fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.410935]  fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.411540] ==================================================================
[   22.560001] ==================================================================
[   22.560826] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3c8/0xbf8
[   22.561431] Write of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248
[   22.561975] 
[   22.562320] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   22.562538] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.562612] Hardware name: linux,dummy-virt (DT)
[   22.562688] Call trace:
[   22.562753]  dump_backtrace+0x9c/0x128
[   22.562873]  show_stack+0x20/0x38
[   22.562976]  dump_stack_lvl+0x8c/0xd0
[   22.563064]  print_report+0x118/0x5f0
[   22.563163]  kasan_report+0xdc/0x128
[   22.563271]  kasan_check_range+0x100/0x1a8
[   22.563325]  __kasan_check_write+0x20/0x30
[   22.563375]  kasan_bitops_modify.constprop.0+0x3c8/0xbf8
[   22.563431]  kasan_bitops_generic+0x114/0x1d0
[   22.563485]  kunit_try_run_case+0x170/0x3f0
[   22.563532]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.563586]  kthread+0x24c/0x2d0
[   22.563633]  ret_from_fork+0x10/0x20
[   22.563683] 
[   22.569132] Allocated by task 248:
[   22.569575]  kasan_save_stack+0x3c/0x68
[   22.570125]  kasan_save_track+0x20/0x40
[   22.570547]  kasan_save_alloc_info+0x40/0x58
[   22.571082]  __kasan_kmalloc+0xd4/0xd8
[   22.571552]  __kmalloc_cache_noprof+0x154/0x320
[   22.572062]  kasan_bitops_generic+0xa0/0x1d0
[   22.572611]  kunit_try_run_case+0x170/0x3f0
[   22.573129]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.573765]  kthread+0x24c/0x2d0
[   22.574246]  ret_from_fork+0x10/0x20
[   22.574635] 
[   22.574941] The buggy address belongs to the object at fff00000c5bb22a0
[   22.574941]  which belongs to the cache kmalloc-16 of size 16
[   22.575864] The buggy address is located 8 bytes inside of
[   22.575864]  allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9)
[   22.576856] 
[   22.577160] The buggy address belongs to the physical page:
[   22.577750] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2
[   22.578436] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.578953] page_type: f5(slab)
[   22.579401] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   22.580029] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   22.580671] page dumped because: kasan: bad access detected
[   22.581120] 
[   22.581396] Memory state around the buggy address:
[   22.581822]  fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.582551]  fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   22.583077] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.583687]                                   ^
[   22.584148]  fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.584768]  fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.585322] ==================================================================
[   22.470391] ==================================================================
[   22.470852] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x334/0xbf8
[   22.471739] Write of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248
[   22.472515] 
[   22.472880] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   22.473125] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.473206] Hardware name: linux,dummy-virt (DT)
[   22.473341] Call trace:
[   22.473410]  dump_backtrace+0x9c/0x128
[   22.473547]  show_stack+0x20/0x38
[   22.473654]  dump_stack_lvl+0x8c/0xd0
[   22.473747]  print_report+0x118/0x5f0
[   22.473802]  kasan_report+0xdc/0x128
[   22.473847]  kasan_check_range+0x100/0x1a8
[   22.473897]  __kasan_check_write+0x20/0x30
[   22.473946]  kasan_bitops_modify.constprop.0+0x334/0xbf8
[   22.474002]  kasan_bitops_generic+0x114/0x1d0
[   22.474052]  kunit_try_run_case+0x170/0x3f0
[   22.474102]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.474156]  kthread+0x24c/0x2d0
[   22.474202]  ret_from_fork+0x10/0x20
[   22.474277] 
[   22.480382] Allocated by task 248:
[   22.480688]  kasan_save_stack+0x3c/0x68
[   22.481065]  kasan_save_track+0x20/0x40
[   22.481596]  kasan_save_alloc_info+0x40/0x58
[   22.482151]  __kasan_kmalloc+0xd4/0xd8
[   22.484746]  __kmalloc_cache_noprof+0x154/0x320
[   22.485692]  kasan_bitops_generic+0xa0/0x1d0
[   22.486544]  kunit_try_run_case+0x170/0x3f0
[   22.487442]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.487849]  kthread+0x24c/0x2d0
[   22.488141]  ret_from_fork+0x10/0x20
[   22.488566] 
[   22.488804] The buggy address belongs to the object at fff00000c5bb22a0
[   22.488804]  which belongs to the cache kmalloc-16 of size 16
[   22.489526] The buggy address is located 8 bytes inside of
[   22.489526]  allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9)
[   22.490670] 
[   22.490962] The buggy address belongs to the physical page:
[   22.493033] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2
[   22.493649] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.494346] page_type: f5(slab)
[   22.494668] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   22.495466] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   22.496135] page dumped because: kasan: bad access detected
[   22.496594] 
[   22.496878] Memory state around the buggy address:
[   22.497449]  fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.498196]  fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   22.498830] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.499381]                                   ^
[   22.499809]  fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.500415]  fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.501001] ==================================================================
[   22.440669] ==================================================================
[   22.441167] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2c4/0xbf8
[   22.442184] Write of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248
[   22.442650] 
[   22.442887] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   22.443456] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.443566] Hardware name: linux,dummy-virt (DT)
[   22.443664] Call trace:
[   22.443719]  dump_backtrace+0x9c/0x128
[   22.443835]  show_stack+0x20/0x38
[   22.443958]  dump_stack_lvl+0x8c/0xd0
[   22.444084]  print_report+0x118/0x5f0
[   22.444179]  kasan_report+0xdc/0x128
[   22.444293]  kasan_check_range+0x100/0x1a8
[   22.444398]  __kasan_check_write+0x20/0x30
[   22.444456]  kasan_bitops_modify.constprop.0+0x2c4/0xbf8
[   22.444511]  kasan_bitops_generic+0x114/0x1d0
[   22.444562]  kunit_try_run_case+0x170/0x3f0
[   22.444611]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.444664]  kthread+0x24c/0x2d0
[   22.444711]  ret_from_fork+0x10/0x20
[   22.444763] 
[   22.450229] Allocated by task 248:
[   22.451466]  kasan_save_stack+0x3c/0x68
[   22.452558]  kasan_save_track+0x20/0x40
[   22.453285]  kasan_save_alloc_info+0x40/0x58
[   22.453733]  __kasan_kmalloc+0xd4/0xd8
[   22.454115]  __kmalloc_cache_noprof+0x154/0x320
[   22.454688]  kasan_bitops_generic+0xa0/0x1d0
[   22.455131]  kunit_try_run_case+0x170/0x3f0
[   22.455623]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.456183]  kthread+0x24c/0x2d0
[   22.456623]  ret_from_fork+0x10/0x20
[   22.457054] 
[   22.457338] The buggy address belongs to the object at fff00000c5bb22a0
[   22.457338]  which belongs to the cache kmalloc-16 of size 16
[   22.458224] The buggy address is located 8 bytes inside of
[   22.458224]  allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9)
[   22.459167] 
[   22.459501] The buggy address belongs to the physical page:
[   22.460042] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2
[   22.460733] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.461356] page_type: f5(slab)
[   22.461752] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   22.462459] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   22.463107] page dumped because: kasan: bad access detected
[   22.463623] 
[   22.463881] Memory state around the buggy address:
[   22.464381]  fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.465131]  fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   22.465775] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.466395]                                   ^
[   22.466877]  fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.467498]  fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.468114] ==================================================================
[   22.587180] ==================================================================
[   22.587859] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa5c/0xbf8
[   22.588554] Read of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248
[   22.589330] 
[   22.589670] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   22.589869] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.589910] Hardware name: linux,dummy-virt (DT)
[   22.589967] Call trace:
[   22.590024]  dump_backtrace+0x9c/0x128
[   22.590130]  show_stack+0x20/0x38
[   22.590218]  dump_stack_lvl+0x8c/0xd0
[   22.590343]  print_report+0x118/0x5f0
[   22.590450]  kasan_report+0xdc/0x128
[   22.590554]  __asan_report_load8_noabort+0x20/0x30
[   22.590669]  kasan_bitops_modify.constprop.0+0xa5c/0xbf8
[   22.590755]  kasan_bitops_generic+0x114/0x1d0
[   22.590810]  kunit_try_run_case+0x170/0x3f0
[   22.590863]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.590918]  kthread+0x24c/0x2d0
[   22.590966]  ret_from_fork+0x10/0x20
[   22.591018] 
[   22.595773] Allocated by task 248:
[   22.596226]  kasan_save_stack+0x3c/0x68
[   22.596612]  kasan_save_track+0x20/0x40
[   22.596946]  kasan_save_alloc_info+0x40/0x58
[   22.597473]  __kasan_kmalloc+0xd4/0xd8
[   22.597964]  __kmalloc_cache_noprof+0x154/0x320
[   22.598514]  kasan_bitops_generic+0xa0/0x1d0
[   22.598939]  kunit_try_run_case+0x170/0x3f0
[   22.599315]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.599913]  kthread+0x24c/0x2d0
[   22.600348]  ret_from_fork+0x10/0x20
[   22.600782] 
[   22.601069] The buggy address belongs to the object at fff00000c5bb22a0
[   22.601069]  which belongs to the cache kmalloc-16 of size 16
[   22.601830] The buggy address is located 8 bytes inside of
[   22.601830]  allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9)
[   22.602809] 
[   22.603110] The buggy address belongs to the physical page:
[   22.603582] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2
[   22.604190] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.604878] page_type: f5(slab)
[   22.605339] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   22.606024] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   22.606601] page dumped because: kasan: bad access detected
[   22.607148] 
[   22.607414] Memory state around the buggy address:
[   22.607921]  fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.608507]  fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   22.609087] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.610091]                                   ^
[   22.610684]  fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.611396]  fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.612077] ==================================================================
[   22.413277] ==================================================================
[   22.413993] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xabc/0xbf8
[   22.414519] Read of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248
[   22.415277] 
[   22.415650] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   22.415883] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.415965] Hardware name: linux,dummy-virt (DT)
[   22.416070] Call trace:
[   22.416154]  dump_backtrace+0x9c/0x128
[   22.416296]  show_stack+0x20/0x38
[   22.416407]  dump_stack_lvl+0x8c/0xd0
[   22.416505]  print_report+0x118/0x5f0
[   22.416600]  kasan_report+0xdc/0x128
[   22.416653]  __asan_report_load8_noabort+0x20/0x30
[   22.416705]  kasan_bitops_modify.constprop.0+0xabc/0xbf8
[   22.416760]  kasan_bitops_generic+0x114/0x1d0
[   22.416811]  kunit_try_run_case+0x170/0x3f0
[   22.416859]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.416914]  kthread+0x24c/0x2d0
[   22.416960]  ret_from_fork+0x10/0x20
[   22.417010] 
[   22.422203] Allocated by task 248:
[   22.422719]  kasan_save_stack+0x3c/0x68
[   22.423184]  kasan_save_track+0x20/0x40
[   22.423657]  kasan_save_alloc_info+0x40/0x58
[   22.424194]  __kasan_kmalloc+0xd4/0xd8
[   22.424601]  __kmalloc_cache_noprof+0x154/0x320
[   22.425161]  kasan_bitops_generic+0xa0/0x1d0
[   22.425624]  kunit_try_run_case+0x170/0x3f0
[   22.426161]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.426679]  kthread+0x24c/0x2d0
[   22.427074]  ret_from_fork+0x10/0x20
[   22.427500] 
[   22.427791] The buggy address belongs to the object at fff00000c5bb22a0
[   22.427791]  which belongs to the cache kmalloc-16 of size 16
[   22.428727] The buggy address is located 8 bytes inside of
[   22.428727]  allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9)
[   22.429699] 
[   22.430040] The buggy address belongs to the physical page:
[   22.430571] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2
[   22.431273] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.431873] page_type: f5(slab)
[   22.432290] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   22.432952] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   22.433594] page dumped because: kasan: bad access detected
[   22.434097] 
[   22.434373] Memory state around the buggy address:
[   22.434825]  fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.435430]  fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   22.435951] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.436692]                                   ^
[   22.437089]  fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.437760]  fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.438332] ==================================================================
[   22.330925] ==================================================================
[   22.332074] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x104/0xbf8
[   22.333202] Write of size 8 at addr fff00000c5bb22a8 by task kunit_try_catch/248
[   22.333790] 
[   22.334170] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   22.334434] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.334509] Hardware name: linux,dummy-virt (DT)
[   22.334592] Call trace:
[   22.334652]  dump_backtrace+0x9c/0x128
[   22.334781]  show_stack+0x20/0x38
[   22.334881]  dump_stack_lvl+0x8c/0xd0
[   22.334963]  print_report+0x118/0x5f0
[   22.335012]  kasan_report+0xdc/0x128
[   22.335056]  kasan_check_range+0x100/0x1a8
[   22.335104]  __kasan_check_write+0x20/0x30
[   22.335151]  kasan_bitops_modify.constprop.0+0x104/0xbf8
[   22.335207]  kasan_bitops_generic+0x114/0x1d0
[   22.335286]  kunit_try_run_case+0x170/0x3f0
[   22.335339]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.335394]  kthread+0x24c/0x2d0
[   22.335441]  ret_from_fork+0x10/0x20
[   22.335490] 
[   22.340752] Allocated by task 248:
[   22.341254]  kasan_save_stack+0x3c/0x68
[   22.341737]  kasan_save_track+0x20/0x40
[   22.342265]  kasan_save_alloc_info+0x40/0x58
[   22.342758]  __kasan_kmalloc+0xd4/0xd8
[   22.343261]  __kmalloc_cache_noprof+0x154/0x320
[   22.343835]  kasan_bitops_generic+0xa0/0x1d0
[   22.344267]  kunit_try_run_case+0x170/0x3f0
[   22.344807]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.345382]  kthread+0x24c/0x2d0
[   22.345800]  ret_from_fork+0x10/0x20
[   22.346232] 
[   22.346532] The buggy address belongs to the object at fff00000c5bb22a0
[   22.346532]  which belongs to the cache kmalloc-16 of size 16
[   22.347330] The buggy address is located 8 bytes inside of
[   22.347330]  allocated 9-byte region [fff00000c5bb22a0, fff00000c5bb22a9)
[   22.348219] 
[   22.348525] The buggy address belongs to the physical page:
[   22.348981] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2
[   22.349827] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.350436] page_type: f5(slab)
[   22.350915] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   22.351611] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   22.351986] page dumped because: kasan: bad access detected
[   22.352290] 
[   22.352507] Memory state around the buggy address:
[   22.352995]  fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.353584]  fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   22.354328] >fff00000c5bb2280: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   22.354920]                                   ^
[   22.355465]  fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.356053]  fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.356633] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen
[   22.284982] ==================================================================
[   22.286059] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88
[   22.286815] Read of size 1 at addr fff00000c6cfdcd0 by task kunit_try_catch/246
[   22.288233] 
[   22.288710] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   22.289020] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.289060] Hardware name: linux,dummy-virt (DT)
[   22.289107] Call trace:
[   22.289140]  dump_backtrace+0x9c/0x128
[   22.289206]  show_stack+0x20/0x38
[   22.289277]  dump_stack_lvl+0x8c/0xd0
[   22.289330]  print_report+0x118/0x5f0
[   22.289378]  kasan_report+0xdc/0x128
[   22.289422]  __asan_report_load1_noabort+0x20/0x30
[   22.289474]  strnlen+0x80/0x88
[   22.289550]  kasan_strings+0x398/0x938
[   22.289597]  kunit_try_run_case+0x170/0x3f0
[   22.289648]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.289700]  kthread+0x24c/0x2d0
[   22.289747]  ret_from_fork+0x10/0x20
[   22.289798] 
[   22.296306] Allocated by task 246:
[   22.297116]  kasan_save_stack+0x3c/0x68
[   22.297655]  kasan_save_track+0x20/0x40
[   22.298026]  kasan_save_alloc_info+0x40/0x58
[   22.298480]  __kasan_kmalloc+0xd4/0xd8
[   22.298906]  __kmalloc_cache_noprof+0x154/0x320
[   22.299496]  kasan_strings+0xb0/0x938
[   22.299971]  kunit_try_run_case+0x170/0x3f0
[   22.300483]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.300991]  kthread+0x24c/0x2d0
[   22.301725]  ret_from_fork+0x10/0x20
[   22.302644] 
[   22.302893] Freed by task 246:
[   22.303219]  kasan_save_stack+0x3c/0x68
[   22.304102]  kasan_save_track+0x20/0x40
[   22.304427]  kasan_save_free_info+0x4c/0x78
[   22.304934]  __kasan_slab_free+0x6c/0x98
[   22.305371]  kfree+0x110/0x3b8
[   22.305790]  kasan_strings+0x128/0x938
[   22.306267]  kunit_try_run_case+0x170/0x3f0
[   22.306659]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.307578]  kthread+0x24c/0x2d0
[   22.308455]  ret_from_fork+0x10/0x20
[   22.308920] 
[   22.309468] The buggy address belongs to the object at fff00000c6cfdcc0
[   22.309468]  which belongs to the cache kmalloc-32 of size 32
[   22.310469] The buggy address is located 16 bytes inside of
[   22.310469]  freed 32-byte region [fff00000c6cfdcc0, fff00000c6cfdce0)
[   22.311385] 
[   22.311619] The buggy address belongs to the physical page:
[   22.312075] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cfd
[   22.313362] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.313999] page_type: f5(slab)
[   22.314424] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   22.315033] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   22.315791] page dumped because: kasan: bad access detected
[   22.317017] 
[   22.317320] Memory state around the buggy address:
[   22.317698]  fff00000c6cfdb80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   22.318448]  fff00000c6cfdc00: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   22.319105] >fff00000c6cfdc80: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   22.319693]                                                  ^
[   22.320436]  fff00000c6cfdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.321295]  fff00000c6cfdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.321885] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen
[   22.248172] ==================================================================
[   22.248795] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   22.249495] Read of size 1 at addr fff00000c6cfdcd0 by task kunit_try_catch/246
[   22.250148] 
[   22.250562] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   22.250799] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.250895] Hardware name: linux,dummy-virt (DT)
[   22.250994] Call trace:
[   22.251061]  dump_backtrace+0x9c/0x128
[   22.251219]  show_stack+0x20/0x38
[   22.251321]  dump_stack_lvl+0x8c/0xd0
[   22.251403]  print_report+0x118/0x5f0
[   22.251473]  kasan_report+0xdc/0x128
[   22.251543]  __asan_report_load1_noabort+0x20/0x30
[   22.251641]  strlen+0xa8/0xb0
[   22.251728]  kasan_strings+0x334/0x938
[   22.251810]  kunit_try_run_case+0x170/0x3f0
[   22.251888]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.251991]  kthread+0x24c/0x2d0
[   22.252077]  ret_from_fork+0x10/0x20
[   22.252159] 
[   22.258084] Allocated by task 246:
[   22.258427]  kasan_save_stack+0x3c/0x68
[   22.258814]  kasan_save_track+0x20/0x40
[   22.259571]  kasan_save_alloc_info+0x40/0x58
[   22.260289]  __kasan_kmalloc+0xd4/0xd8
[   22.261185]  __kmalloc_cache_noprof+0x154/0x320
[   22.262087]  kasan_strings+0xb0/0x938
[   22.262614]  kunit_try_run_case+0x170/0x3f0
[   22.263513]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.264047]  kthread+0x24c/0x2d0
[   22.264533]  ret_from_fork+0x10/0x20
[   22.264918] 
[   22.265222] Freed by task 246:
[   22.265563]  kasan_save_stack+0x3c/0x68
[   22.266061]  kasan_save_track+0x20/0x40
[   22.266475]  kasan_save_free_info+0x4c/0x78
[   22.266991]  __kasan_slab_free+0x6c/0x98
[   22.267508]  kfree+0x110/0x3b8
[   22.267943]  kasan_strings+0x128/0x938
[   22.268301]  kunit_try_run_case+0x170/0x3f0
[   22.268711]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.269160]  kthread+0x24c/0x2d0
[   22.270069]  ret_from_fork+0x10/0x20
[   22.270540] 
[   22.271167] The buggy address belongs to the object at fff00000c6cfdcc0
[   22.271167]  which belongs to the cache kmalloc-32 of size 32
[   22.272697] The buggy address is located 16 bytes inside of
[   22.272697]  freed 32-byte region [fff00000c6cfdcc0, fff00000c6cfdce0)
[   22.273359] 
[   22.273575] The buggy address belongs to the physical page:
[   22.274167] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cfd
[   22.275136] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.275573] page_type: f5(slab)
[   22.275895] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   22.276721] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   22.277428] page dumped because: kasan: bad access detected
[   22.278689] 
[   22.278829] Memory state around the buggy address:
[   22.279009]  fff00000c6cfdb80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   22.280128]  fff00000c6cfdc00: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   22.280964] >fff00000c6cfdc80: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   22.281655]                                                  ^
[   22.282258]  fff00000c6cfdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.282820]  fff00000c6cfdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.283638] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[   22.204681] ==================================================================
[   22.205849] BUG: KASAN: slab-use-after-free in kasan_strings+0x894/0x938
[   22.206376] Read of size 1 at addr fff00000c6cfdcd0 by task kunit_try_catch/246
[   22.207033] 
[   22.207867] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   22.208089] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.208164] Hardware name: linux,dummy-virt (DT)
[   22.208267] Call trace:
[   22.208327]  dump_backtrace+0x9c/0x128
[   22.208442]  show_stack+0x20/0x38
[   22.208537]  dump_stack_lvl+0x8c/0xd0
[   22.208636]  print_report+0x118/0x5f0
[   22.208727]  kasan_report+0xdc/0x128
[   22.208822]  __asan_report_load1_noabort+0x20/0x30
[   22.208909]  kasan_strings+0x894/0x938
[   22.208962]  kunit_try_run_case+0x170/0x3f0
[   22.209016]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.209069]  kthread+0x24c/0x2d0
[   22.209115]  ret_from_fork+0x10/0x20
[   22.209167] 
[   22.216905] Allocated by task 246:
[   22.218796]  kasan_save_stack+0x3c/0x68
[   22.219875]  kasan_save_track+0x20/0x40
[   22.220223]  kasan_save_alloc_info+0x40/0x58
[   22.221724]  __kasan_kmalloc+0xd4/0xd8
[   22.222586]  __kmalloc_cache_noprof+0x154/0x320
[   22.223821]  kasan_strings+0xb0/0x938
[   22.224905]  kunit_try_run_case+0x170/0x3f0
[   22.226107]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.226581]  kthread+0x24c/0x2d0
[   22.227006]  ret_from_fork+0x10/0x20
[   22.228030] 
[   22.228440] Freed by task 246:
[   22.228722]  kasan_save_stack+0x3c/0x68
[   22.229349]  kasan_save_track+0x20/0x40
[   22.229970]  kasan_save_free_info+0x4c/0x78
[   22.230527]  __kasan_slab_free+0x6c/0x98
[   22.230869]  kfree+0x110/0x3b8
[   22.231545]  kasan_strings+0x128/0x938
[   22.232166]  kunit_try_run_case+0x170/0x3f0
[   22.232717]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.233228]  kthread+0x24c/0x2d0
[   22.233632]  ret_from_fork+0x10/0x20
[   22.234061] 
[   22.234309] The buggy address belongs to the object at fff00000c6cfdcc0
[   22.234309]  which belongs to the cache kmalloc-32 of size 32
[   22.235219] The buggy address is located 16 bytes inside of
[   22.235219]  freed 32-byte region [fff00000c6cfdcc0, fff00000c6cfdce0)
[   22.236636] 
[   22.236887] The buggy address belongs to the physical page:
[   22.237228] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cfd
[   22.237639] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.237968] page_type: f5(slab)
[   22.238196] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   22.239352] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   22.240351] page dumped because: kasan: bad access detected
[   22.240928] 
[   22.241227] Memory state around the buggy address:
[   22.241793]  fff00000c6cfdb80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   22.242502]  fff00000c6cfdc00: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   22.243334] >fff00000c6cfdc80: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   22.244024]                                                  ^
[   22.244394]  fff00000c6cfdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.245169]  fff00000c6cfdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.246020] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
[   22.169235] ==================================================================
[   22.169860] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   22.170535] Read of size 1 at addr fff00000c6cfdcd0 by task kunit_try_catch/246
[   22.171272] 
[   22.171827] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   22.172051] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.172122] Hardware name: linux,dummy-virt (DT)
[   22.172197] Call trace:
[   22.172273]  dump_backtrace+0x9c/0x128
[   22.172389]  show_stack+0x20/0x38
[   22.172470]  dump_stack_lvl+0x8c/0xd0
[   22.172571]  print_report+0x118/0x5f0
[   22.172672]  kasan_report+0xdc/0x128
[   22.172767]  __asan_report_load1_noabort+0x20/0x30
[   22.172872]  strcmp+0xc0/0xc8
[   22.172967]  kasan_strings+0x254/0x938
[   22.173063]  kunit_try_run_case+0x170/0x3f0
[   22.173162]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.173286]  kthread+0x24c/0x2d0
[   22.173354]  ret_from_fork+0x10/0x20
[   22.173410] 
[   22.178095] Allocated by task 246:
[   22.179583]  kasan_save_stack+0x3c/0x68
[   22.180045]  kasan_save_track+0x20/0x40
[   22.180336]  kasan_save_alloc_info+0x40/0x58
[   22.180706]  __kasan_kmalloc+0xd4/0xd8
[   22.181177]  __kmalloc_cache_noprof+0x154/0x320
[   22.181783]  kasan_strings+0xb0/0x938
[   22.182284]  kunit_try_run_case+0x170/0x3f0
[   22.182821]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.183328]  kthread+0x24c/0x2d0
[   22.183757]  ret_from_fork+0x10/0x20
[   22.184811] 
[   22.185308] Freed by task 246:
[   22.185709]  kasan_save_stack+0x3c/0x68
[   22.186655]  kasan_save_track+0x20/0x40
[   22.187230]  kasan_save_free_info+0x4c/0x78
[   22.187680]  __kasan_slab_free+0x6c/0x98
[   22.188573]  kfree+0x110/0x3b8
[   22.188941]  kasan_strings+0x128/0x938
[   22.189461]  kunit_try_run_case+0x170/0x3f0
[   22.189940]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.190489]  kthread+0x24c/0x2d0
[   22.190978]  ret_from_fork+0x10/0x20
[   22.191412] 
[   22.192010] The buggy address belongs to the object at fff00000c6cfdcc0
[   22.192010]  which belongs to the cache kmalloc-32 of size 32
[   22.193307] The buggy address is located 16 bytes inside of
[   22.193307]  freed 32-byte region [fff00000c6cfdcc0, fff00000c6cfdce0)
[   22.194333] 
[   22.194655] The buggy address belongs to the physical page:
[   22.195097] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cfd
[   22.195991] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.196371] page_type: f5(slab)
[   22.196595] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   22.196961] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   22.197958] page dumped because: kasan: bad access detected
[   22.198565] 
[   22.198692] Memory state around the buggy address:
[   22.198875]  fff00000c6cfdb80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   22.199504]  fff00000c6cfdc00: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   22.200696] >fff00000c6cfdc80: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   22.201414]                                                  ^
[   22.201833]  fff00000c6cfdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.202374]  fff00000c6cfdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.203019] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strrchr
[   22.129932] ==================================================================
[   22.130711] BUG: KASAN: slab-use-after-free in strrchr+0x6c/0x78
[   22.131343] Read of size 1 at addr fff00000c6cfdcd0 by task kunit_try_catch/246
[   22.131794] 
[   22.132131] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   22.132269] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.132333] Hardware name: linux,dummy-virt (DT)
[   22.132406] Call trace:
[   22.132455]  dump_backtrace+0x9c/0x128
[   22.132555]  show_stack+0x20/0x38
[   22.132623]  dump_stack_lvl+0x8c/0xd0
[   22.132700]  print_report+0x118/0x5f0
[   22.132784]  kasan_report+0xdc/0x128
[   22.132865]  __asan_report_load1_noabort+0x20/0x30
[   22.132949]  strrchr+0x6c/0x78
[   22.133025]  kasan_strings+0x1f0/0x938
[   22.133105]  kunit_try_run_case+0x170/0x3f0
[   22.133186]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.133327]  kthread+0x24c/0x2d0
[   22.133411]  ret_from_fork+0x10/0x20
[   22.133507] 
[   22.140339] Allocated by task 246:
[   22.140582]  kasan_save_stack+0x3c/0x68
[   22.140843]  kasan_save_track+0x20/0x40
[   22.141072]  kasan_save_alloc_info+0x40/0x58
[   22.142473]  __kasan_kmalloc+0xd4/0xd8
[   22.142947]  __kmalloc_cache_noprof+0x154/0x320
[   22.143564]  kasan_strings+0xb0/0x938
[   22.144057]  kunit_try_run_case+0x170/0x3f0
[   22.144404]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.144818]  kthread+0x24c/0x2d0
[   22.145256]  ret_from_fork+0x10/0x20
[   22.145738] 
[   22.146020] Freed by task 246:
[   22.146450]  kasan_save_stack+0x3c/0x68
[   22.146966]  kasan_save_track+0x20/0x40
[   22.147817]  kasan_save_free_info+0x4c/0x78
[   22.148364]  __kasan_slab_free+0x6c/0x98
[   22.148968]  kfree+0x110/0x3b8
[   22.149533]  kasan_strings+0x128/0x938
[   22.150105]  kunit_try_run_case+0x170/0x3f0
[   22.150651]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.151368]  kthread+0x24c/0x2d0
[   22.151650]  ret_from_fork+0x10/0x20
[   22.152643] 
[   22.152983] The buggy address belongs to the object at fff00000c6cfdcc0
[   22.152983]  which belongs to the cache kmalloc-32 of size 32
[   22.154384] The buggy address is located 16 bytes inside of
[   22.154384]  freed 32-byte region [fff00000c6cfdcc0, fff00000c6cfdce0)
[   22.155369] 
[   22.155692] The buggy address belongs to the physical page:
[   22.156605] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cfd
[   22.157147] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.157863] page_type: f5(slab)
[   22.158440] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   22.160021] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   22.160897] page dumped because: kasan: bad access detected
[   22.161358] 
[   22.161595] Memory state around the buggy address:
[   22.162029]  fff00000c6cfdb80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   22.162636]  fff00000c6cfdc00: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   22.163568] >fff00000c6cfdc80: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   22.164358]                                                  ^
[   22.165131]  fff00000c6cfdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.165716]  fff00000c6cfdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.166612] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strchr
[   22.091561] ==================================================================
[   22.092786] BUG: KASAN: slab-use-after-free in strchr+0xcc/0xd8
[   22.093532] Read of size 1 at addr fff00000c6cfdcd0 by task kunit_try_catch/246
[   22.094284] 
[   22.094629] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   22.094861] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.094934] Hardware name: linux,dummy-virt (DT)
[   22.095023] Call trace:
[   22.095087]  dump_backtrace+0x9c/0x128
[   22.095218]  show_stack+0x20/0x38
[   22.095333]  dump_stack_lvl+0x8c/0xd0
[   22.095491]  print_report+0x118/0x5f0
[   22.095586]  kasan_report+0xdc/0x128
[   22.095666]  __asan_report_load1_noabort+0x20/0x30
[   22.095765]  strchr+0xcc/0xd8
[   22.095841]  kasan_strings+0x18c/0x938
[   22.095931]  kunit_try_run_case+0x170/0x3f0
[   22.096022]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.096121]  kthread+0x24c/0x2d0
[   22.096212]  ret_from_fork+0x10/0x20
[   22.096326] 
[   22.102812] Allocated by task 246:
[   22.103615]  kasan_save_stack+0x3c/0x68
[   22.104411]  kasan_save_track+0x20/0x40
[   22.105326]  kasan_save_alloc_info+0x40/0x58
[   22.105790]  __kasan_kmalloc+0xd4/0xd8
[   22.106188]  __kmalloc_cache_noprof+0x154/0x320
[   22.106752]  kasan_strings+0xb0/0x938
[   22.107257]  kunit_try_run_case+0x170/0x3f0
[   22.107814]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.108457]  kthread+0x24c/0x2d0
[   22.108960]  ret_from_fork+0x10/0x20
[   22.109425] 
[   22.109715] Freed by task 246:
[   22.110133]  kasan_save_stack+0x3c/0x68
[   22.110559]  kasan_save_track+0x20/0x40
[   22.110992]  kasan_save_free_info+0x4c/0x78
[   22.111662]  __kasan_slab_free+0x6c/0x98
[   22.111963]  kfree+0x110/0x3b8
[   22.112218]  kasan_strings+0x128/0x938
[   22.112900]  kunit_try_run_case+0x170/0x3f0
[   22.113490]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.114131]  kthread+0x24c/0x2d0
[   22.114625]  ret_from_fork+0x10/0x20
[   22.115473] 
[   22.115947] The buggy address belongs to the object at fff00000c6cfdcc0
[   22.115947]  which belongs to the cache kmalloc-32 of size 32
[   22.116967] The buggy address is located 16 bytes inside of
[   22.116967]  freed 32-byte region [fff00000c6cfdcc0, fff00000c6cfdce0)
[   22.117767] 
[   22.118103] The buggy address belongs to the physical page:
[   22.118547] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cfd
[   22.119773] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.120418] page_type: f5(slab)
[   22.120696] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   22.121418] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   22.122021] page dumped because: kasan: bad access detected
[   22.122645] 
[   22.122936] Memory state around the buggy address:
[   22.123741]  fff00000c6cfdb80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   22.124317]  fff00000c6cfdc00: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   22.124854] >fff00000c6cfdc80: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   22.125671]                                                  ^
[   22.126176]  fff00000c6cfdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.126945]  fff00000c6cfdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.128356] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[   22.053935] ==================================================================
[   22.054717] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   22.055423] Read of size 1 at addr fff00000c6cfdb58 by task kunit_try_catch/244
[   22.056076] 
[   22.056434] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   22.056653] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.056720] Hardware name: linux,dummy-virt (DT)
[   22.056821] Call trace:
[   22.056883]  dump_backtrace+0x9c/0x128
[   22.057019]  show_stack+0x20/0x38
[   22.057122]  dump_stack_lvl+0x8c/0xd0
[   22.057249]  print_report+0x118/0x5f0
[   22.057359]  kasan_report+0xdc/0x128
[   22.057447]  __asan_report_load1_noabort+0x20/0x30
[   22.057549]  memcmp+0x198/0x1d8
[   22.057628]  kasan_memcmp+0x170/0x310
[   22.057718]  kunit_try_run_case+0x170/0x3f0
[   22.057806]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.057910]  kthread+0x24c/0x2d0
[   22.057993]  ret_from_fork+0x10/0x20
[   22.058132] 
[   22.064253] Allocated by task 244:
[   22.064752]  kasan_save_stack+0x3c/0x68
[   22.065187]  kasan_save_track+0x20/0x40
[   22.066068]  kasan_save_alloc_info+0x40/0x58
[   22.066714]  __kasan_kmalloc+0xd4/0xd8
[   22.067650]  __kmalloc_cache_noprof+0x154/0x320
[   22.068086]  kasan_memcmp+0xbc/0x310
[   22.068383]  kunit_try_run_case+0x170/0x3f0
[   22.068647]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.068936]  kthread+0x24c/0x2d0
[   22.069160]  ret_from_fork+0x10/0x20
[   22.069419] 
[   22.069764] The buggy address belongs to the object at fff00000c6cfdb40
[   22.069764]  which belongs to the cache kmalloc-32 of size 32
[   22.070995] The buggy address is located 0 bytes to the right of
[   22.070995]  allocated 24-byte region [fff00000c6cfdb40, fff00000c6cfdb58)
[   22.072528] 
[   22.072957] The buggy address belongs to the physical page:
[   22.073316] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cfd
[   22.074002] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.074741] page_type: f5(slab)
[   22.075175] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   22.075849] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   22.076935] page dumped because: kasan: bad access detected
[   22.077664] 
[   22.077961] Memory state around the buggy address:
[   22.078492]  fff00000c6cfda00: 00 00 07 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   22.079605]  fff00000c6cfda80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   22.080186] >fff00000c6cfdb00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   22.080866]                                                     ^
[   22.081465]  fff00000c6cfdb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.082085]  fff00000c6cfdc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.082723] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memchr
[   22.016480] ==================================================================
[   22.017421] BUG: KASAN: slab-out-of-bounds in memchr+0x78/0x88
[   22.018170] Read of size 1 at addr fff00000c6cf8fd8 by task kunit_try_catch/242
[   22.018568] 
[   22.019351] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   22.019605] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.019649] Hardware name: linux,dummy-virt (DT)
[   22.019694] Call trace:
[   22.019728]  dump_backtrace+0x9c/0x128
[   22.019793]  show_stack+0x20/0x38
[   22.019839]  dump_stack_lvl+0x8c/0xd0
[   22.019888]  print_report+0x118/0x5f0
[   22.019936]  kasan_report+0xdc/0x128
[   22.019979]  __asan_report_load1_noabort+0x20/0x30
[   22.020028]  memchr+0x78/0x88
[   22.020070]  kasan_memchr+0x150/0x2f0
[   22.020115]  kunit_try_run_case+0x170/0x3f0
[   22.020163]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.020217]  kthread+0x24c/0x2d0
[   22.020294]  ret_from_fork+0x10/0x20
[   22.020347] 
[   22.025144] Allocated by task 242:
[   22.025764]  kasan_save_stack+0x3c/0x68
[   22.026359]  kasan_save_track+0x20/0x40
[   22.026929]  kasan_save_alloc_info+0x40/0x58
[   22.027468]  __kasan_kmalloc+0xd4/0xd8
[   22.028033]  __kmalloc_cache_noprof+0x154/0x320
[   22.028566]  kasan_memchr+0xb0/0x2f0
[   22.029071]  kunit_try_run_case+0x170/0x3f0
[   22.029630]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.030315]  kthread+0x24c/0x2d0
[   22.030744]  ret_from_fork+0x10/0x20
[   22.031268] 
[   22.031603] The buggy address belongs to the object at fff00000c6cf8fc0
[   22.031603]  which belongs to the cache kmalloc-32 of size 32
[   22.032710] The buggy address is located 0 bytes to the right of
[   22.032710]  allocated 24-byte region [fff00000c6cf8fc0, fff00000c6cf8fd8)
[   22.033856] 
[   22.034191] The buggy address belongs to the physical page:
[   22.034707] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cf8
[   22.035549] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.036218] page_type: f5(slab)
[   22.036692] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   22.037433] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   22.038114] page dumped because: kasan: bad access detected
[   22.038556] 
[   22.038878] Memory state around the buggy address:
[   22.039426]  fff00000c6cf8e80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   22.040035]  fff00000c6cf8f00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   22.040663] >fff00000c6cf8f80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   22.041259]                                                     ^
[   22.041759]  fff00000c6cf9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.042362]  fff00000c6cf9080: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   22.042961] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[   21.984587] ==================================================================
[   21.985440] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2e4/0x348
[   21.986364] Read of size 1 at addr ffff800080be7bea by task kunit_try_catch/240
[   21.987022] 
[   21.987464] CPU: 1 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   21.987683] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.987761] Hardware name: linux,dummy-virt (DT)
[   21.987839] Call trace:
[   21.987899]  dump_backtrace+0x9c/0x128
[   21.988020]  show_stack+0x20/0x38
[   21.988114]  dump_stack_lvl+0x8c/0xd0
[   21.988644]  print_report+0x310/0x5f0
[   21.988694]  kasan_report+0xdc/0x128
[   21.988741]  __asan_report_load1_noabort+0x20/0x30
[   21.988793]  kasan_alloca_oob_right+0x2e4/0x348
[   21.988842]  kunit_try_run_case+0x170/0x3f0
[   21.988891]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.988945]  kthread+0x24c/0x2d0
[   21.988990]  ret_from_fork+0x10/0x20
[   21.989041] 
[   21.994826] The buggy address belongs to stack of task kunit_try_catch/240
[   21.996006] 
[   21.996455] The buggy address belongs to the virtual mapping at
[   21.996455]  [ffff800080be0000, ffff800080be9000) created by:
[   21.996455]  kernel_clone+0x150/0x7a8
[   21.997913] 
[   21.998302] The buggy address belongs to the physical page:
[   21.998688] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106dcb
[   21.999606] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.000344] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   22.001131] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   22.001730] page dumped because: kasan: bad access detected
[   22.002291] 
[   22.002582] Memory state around the buggy address:
[   22.003060]  ffff800080be7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.003684]  ffff800080be7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.004063] >ffff800080be7b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   22.004428]                                                           ^
[   22.004761]  ffff800080be7c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2
[   22.005113]  ffff800080be7c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00
[   22.006345] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[   21.943888] ==================================================================
[   21.944817] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2c0/0x318
[   21.945605] Read of size 1 at addr ffff800080bc7bdf by task kunit_try_catch/238
[   21.946067] 
[   21.946290] CPU: 1 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   21.946483] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.946544] Hardware name: linux,dummy-virt (DT)
[   21.946614] Call trace:
[   21.946666]  dump_backtrace+0x9c/0x128
[   21.946772]  show_stack+0x20/0x38
[   21.946851]  dump_stack_lvl+0x8c/0xd0
[   21.946941]  print_report+0x310/0x5f0
[   21.947025]  kasan_report+0xdc/0x128
[   21.948517]  __asan_report_load1_noabort+0x20/0x30
[   21.948631]  kasan_alloca_oob_left+0x2c0/0x318
[   21.948730]  kunit_try_run_case+0x170/0x3f0
[   21.948823]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.948926]  kthread+0x24c/0x2d0
[   21.949009]  ret_from_fork+0x10/0x20
[   21.949101] 
[   21.958422] The buggy address belongs to stack of task kunit_try_catch/238
[   21.959684] 
[   21.960260] The buggy address belongs to the virtual mapping at
[   21.960260]  [ffff800080bc0000, ffff800080bc9000) created by:
[   21.960260]  kernel_clone+0x150/0x7a8
[   21.961663] 
[   21.962073] The buggy address belongs to the physical page:
[   21.962678] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106d9f
[   21.963428] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.964095] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   21.964813] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   21.965472] page dumped because: kasan: bad access detected
[   21.965911] 
[   21.966207] Memory state around the buggy address:
[   21.966809]  ffff800080bc7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.967481]  ffff800080bc7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.968336] >ffff800080bc7b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   21.968948]                                                     ^
[   21.969590]  ffff800080bc7c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2
[   21.970252]  ffff800080bc7c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00
[   21.970862] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[   21.909180] ==================================================================
[   21.910404] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x240/0x278
[   21.911102] Read of size 1 at addr ffff800080ba7cba by task kunit_try_catch/236
[   21.912169] 
[   21.912561] CPU: 1 UID: 0 PID: 236 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   21.912783] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.912856] Hardware name: linux,dummy-virt (DT)
[   21.912937] Call trace:
[   21.913091]  dump_backtrace+0x9c/0x128
[   21.913235]  show_stack+0x20/0x38
[   21.913342]  dump_stack_lvl+0x8c/0xd0
[   21.913397]  print_report+0x310/0x5f0
[   21.913443]  kasan_report+0xdc/0x128
[   21.913533]  __asan_report_load1_noabort+0x20/0x30
[   21.913586]  kasan_stack_oob+0x240/0x278
[   21.913631]  kunit_try_run_case+0x170/0x3f0
[   21.913677]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.913726]  kthread+0x24c/0x2d0
[   21.913769]  ret_from_fork+0x10/0x20
[   21.913817] 
[   21.920040] The buggy address belongs to stack of task kunit_try_catch/236
[   21.920782]  and is located at offset 138 in frame:
[   21.921251]  kasan_stack_oob+0x0/0x278
[   21.921957] 
[   21.922233] This frame has 4 objects:
[   21.922686]  [48, 49) '__assertion'
[   21.922831]  [64, 72) 'array'
[   21.923499]  [96, 112) '__assertion'
[   21.923926]  [128, 138) 'stack_array'
[   21.924445] 
[   21.925090] The buggy address belongs to the virtual mapping at
[   21.925090]  [ffff800080ba0000, ffff800080ba9000) created by:
[   21.925090]  kernel_clone+0x150/0x7a8
[   21.926209] 
[   21.926502] The buggy address belongs to the physical page:
[   21.927044] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106d24
[   21.928071] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.929080] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   21.929507] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   21.929862] page dumped because: kasan: bad access detected
[   21.930161] 
[   21.930339] Memory state around the buggy address:
[   21.930626]  ffff800080ba7b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.931579]  ffff800080ba7c00: 00 00 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2
[   21.932619] >ffff800080ba7c80: f2 f2 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00
[   21.932874]                                         ^
[   21.933067]  ffff800080ba7d00: 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00
[   21.933395]  ffff800080ba7d80: f2 f2 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00
[   21.934267] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   21.875632] ==================================================================
[   21.876264] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x220/0x258
[   21.876967] Read of size 1 at addr ffff93d5410046cd by task kunit_try_catch/232
[   21.877492] 
[   21.877743] CPU: 1 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   21.877852] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.877916] Hardware name: linux,dummy-virt (DT)
[   21.878005] Call trace:
[   21.878036]  dump_backtrace+0x9c/0x128
[   21.878099]  show_stack+0x20/0x38
[   21.878141]  dump_stack_lvl+0x8c/0xd0
[   21.878188]  print_report+0x310/0x5f0
[   21.878234]  kasan_report+0xdc/0x128
[   21.878291]  __asan_report_load1_noabort+0x20/0x30
[   21.878340]  kasan_global_oob_right+0x220/0x258
[   21.878386]  kunit_try_run_case+0x170/0x3f0
[   21.878432]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.878483]  kthread+0x24c/0x2d0
[   21.878528]  ret_from_fork+0x10/0x20
[   21.878598] 
[   21.882071] The buggy address belongs to the variable:
[   21.882358]  global_array+0xd/0x40
[   21.882672] 
[   21.882961] The buggy address belongs to the virtual mapping at
[   21.882961]  [ffff93d53f380000, ffff93d5410c1000) created by:
[   21.882961]  paging_init+0x66c/0x7d0
[   21.884217] 
[   21.884648] The buggy address belongs to the physical page:
[   21.884965] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47804
[   21.885406] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   21.885837] raw: 03fffe0000002000 ffffc1ffc01e0108 ffffc1ffc01e0108 0000000000000000
[   21.886811] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   21.887614] page dumped because: kasan: bad access detected
[   21.887934] 
[   21.888115] Memory state around the buggy address:
[   21.888465]  ffff93d541004580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.888875]  ffff93d541004600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.889518] >ffff93d541004680: 00 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9
[   21.889970]                                               ^
[   21.890294]  ffff93d541004700: 02 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9
[   21.890819]  ffff93d541004780: 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9
[   21.891604] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[   21.851838] ==================================================================
[   21.852375] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x124/0x2b0
[   21.852912] Free of addr fff00000c6c7c001 by task kunit_try_catch/230
[   21.853192] 
[   21.853337] CPU: 1 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   21.853450] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.853504] Hardware name: linux,dummy-virt (DT)
[   21.853552] Call trace:
[   21.853580]  dump_backtrace+0x9c/0x128
[   21.853631]  show_stack+0x20/0x38
[   21.853673]  dump_stack_lvl+0x8c/0xd0
[   21.853721]  print_report+0x118/0x5f0
[   21.853765]  kasan_report_invalid_free+0xc0/0xe8
[   21.853811]  __kasan_mempool_poison_object+0xfc/0x150
[   21.853862]  mempool_free+0x28c/0x328
[   21.853910]  mempool_kmalloc_invalid_free_helper+0x124/0x2b0
[   21.853964]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   21.854016]  kunit_try_run_case+0x170/0x3f0
[   21.854063]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.854115]  kthread+0x24c/0x2d0
[   21.854157]  ret_from_fork+0x10/0x20
[   21.854206] 
[   21.859851] The buggy address belongs to the physical page:
[   21.860292] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106c7c
[   21.860802] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.861076] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.861576] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.862035] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   21.862559] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.862979] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   21.863479] head: 0bfffe0000000002 ffffc1ffc31b1f01 ffffffffffffffff 0000000000000000
[   21.864081] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   21.864418] page dumped because: kasan: bad access detected
[   21.864772] 
[   21.864973] Memory state around the buggy address:
[   21.865275]  fff00000c6c7bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.865797]  fff00000c6c7bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.866052] >fff00000c6c7c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.866492]                    ^
[   21.866759]  fff00000c6c7c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.867534]  fff00000c6c7c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.868019] ==================================================================
[   21.824093] ==================================================================
[   21.824616] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x124/0x2b0
[   21.825026] Free of addr fff00000c6cf0801 by task kunit_try_catch/228
[   21.825343] 
[   21.825558] CPU: 0 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   21.825674] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.825708] Hardware name: linux,dummy-virt (DT)
[   21.825760] Call trace:
[   21.825793]  dump_backtrace+0x9c/0x128
[   21.825860]  show_stack+0x20/0x38
[   21.825905]  dump_stack_lvl+0x8c/0xd0
[   21.825953]  print_report+0x118/0x5f0
[   21.825999]  kasan_report_invalid_free+0xc0/0xe8
[   21.826046]  check_slab_allocation+0xfc/0x108
[   21.826089]  __kasan_mempool_poison_object+0x78/0x150
[   21.826151]  mempool_free+0x28c/0x328
[   21.826203]  mempool_kmalloc_invalid_free_helper+0x124/0x2b0
[   21.826284]  mempool_kmalloc_invalid_free+0xc0/0x118
[   21.826350]  kunit_try_run_case+0x170/0x3f0
[   21.826413]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.826468]  kthread+0x24c/0x2d0
[   21.826510]  ret_from_fork+0x10/0x20
[   21.826560] 
[   21.832537] Allocated by task 228:
[   21.832844]  kasan_save_stack+0x3c/0x68
[   21.833145]  kasan_save_track+0x20/0x40
[   21.833359]  kasan_save_alloc_info+0x40/0x58
[   21.833650]  __kasan_mempool_unpoison_object+0x11c/0x180
[   21.833943]  remove_element+0x130/0x1f8
[   21.834217]  mempool_alloc_preallocated+0x58/0xc0
[   21.834540]  mempool_kmalloc_invalid_free_helper+0x94/0x2b0
[   21.834964]  mempool_kmalloc_invalid_free+0xc0/0x118
[   21.835547]  kunit_try_run_case+0x170/0x3f0
[   21.835756]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.836179]  kthread+0x24c/0x2d0
[   21.836444]  ret_from_fork+0x10/0x20
[   21.836739] 
[   21.837451] The buggy address belongs to the object at fff00000c6cf0800
[   21.837451]  which belongs to the cache kmalloc-128 of size 128
[   21.838564] The buggy address is located 1 bytes inside of
[   21.838564]  128-byte region [fff00000c6cf0800, fff00000c6cf0880)
[   21.839688] 
[   21.839923] The buggy address belongs to the physical page:
[   21.840292] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cf0
[   21.840756] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.841118] page_type: f5(slab)
[   21.841365] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.841786] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   21.842197] page dumped because: kasan: bad access detected
[   21.842492] 
[   21.842691] Memory state around the buggy address:
[   21.842993]  fff00000c6cf0700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.843417]  fff00000c6cf0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.843858] >fff00000c6cf0800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.844488]                    ^
[   21.844773]  fff00000c6cf0880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.845130]  fff00000c6cf0900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.845587] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[   21.742604] ==================================================================
[   21.743247] BUG: KASAN: double-free in mempool_double_free_helper+0x15c/0x2f8
[   21.743951] Free of addr fff00000c6cc8500 by task kunit_try_catch/222
[   21.744849] 
[   21.745113] CPU: 1 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   21.745315] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.745354] Hardware name: linux,dummy-virt (DT)
[   21.745394] Call trace:
[   21.745423]  dump_backtrace+0x9c/0x128
[   21.745523]  show_stack+0x20/0x38
[   21.745573]  dump_stack_lvl+0x8c/0xd0
[   21.745625]  print_report+0x118/0x5f0
[   21.745667]  kasan_report_invalid_free+0xc0/0xe8
[   21.745714]  check_slab_allocation+0xd4/0x108
[   21.745758]  __kasan_mempool_poison_object+0x78/0x150
[   21.745806]  mempool_free+0x28c/0x328
[   21.745853]  mempool_double_free_helper+0x15c/0x2f8
[   21.745905]  mempool_kmalloc_double_free+0xc0/0x118
[   21.745954]  kunit_try_run_case+0x170/0x3f0
[   21.746001]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.746052]  kthread+0x24c/0x2d0
[   21.746096]  ret_from_fork+0x10/0x20
[   21.746148] 
[   21.750806] Allocated by task 222:
[   21.751381]  kasan_save_stack+0x3c/0x68
[   21.751784]  kasan_save_track+0x20/0x40
[   21.752117]  kasan_save_alloc_info+0x40/0x58
[   21.752333]  __kasan_mempool_unpoison_object+0x11c/0x180
[   21.752812]  remove_element+0x130/0x1f8
[   21.753121]  mempool_alloc_preallocated+0x58/0xc0
[   21.753486]  mempool_double_free_helper+0x94/0x2f8
[   21.753768]  mempool_kmalloc_double_free+0xc0/0x118
[   21.754122]  kunit_try_run_case+0x170/0x3f0
[   21.754449]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.754829]  kthread+0x24c/0x2d0
[   21.755096]  ret_from_fork+0x10/0x20
[   21.755701] 
[   21.755884] Freed by task 222:
[   21.756180]  kasan_save_stack+0x3c/0x68
[   21.756475]  kasan_save_track+0x20/0x40
[   21.756774]  kasan_save_free_info+0x4c/0x78
[   21.757082]  __kasan_mempool_poison_object+0xc0/0x150
[   21.757447]  mempool_free+0x28c/0x328
[   21.757728]  mempool_double_free_helper+0x104/0x2f8
[   21.758048]  mempool_kmalloc_double_free+0xc0/0x118
[   21.758411]  kunit_try_run_case+0x170/0x3f0
[   21.758839]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.759256]  kthread+0x24c/0x2d0
[   21.759762]  ret_from_fork+0x10/0x20
[   21.760165] 
[   21.760460] The buggy address belongs to the object at fff00000c6cc8500
[   21.760460]  which belongs to the cache kmalloc-128 of size 128
[   21.761052] The buggy address is located 0 bytes inside of
[   21.761052]  128-byte region [fff00000c6cc8500, fff00000c6cc8580)
[   21.761854] 
[   21.762014] The buggy address belongs to the physical page:
[   21.762227] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc8
[   21.762904] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.763275] page_type: f5(slab)
[   21.763462] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.763794] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   21.764705] page dumped because: kasan: bad access detected
[   21.765841] 
[   21.765992] Memory state around the buggy address:
[   21.766440]  fff00000c6cc8400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.766826]  fff00000c6cc8480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.767276] >fff00000c6cc8500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.767677]                    ^
[   21.767918]  fff00000c6cc8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.768609]  fff00000c6cc8600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.768941] ==================================================================
[   21.777222] ==================================================================
[   21.777919] BUG: KASAN: double-free in mempool_double_free_helper+0x15c/0x2f8
[   21.778575] Free of addr fff00000c6d60000 by task kunit_try_catch/224
[   21.779022] 
[   21.779315] CPU: 0 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   21.779434] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.779470] Hardware name: linux,dummy-virt (DT)
[   21.779571] Call trace:
[   21.779606]  dump_backtrace+0x9c/0x128
[   21.779678]  show_stack+0x20/0x38
[   21.779723]  dump_stack_lvl+0x8c/0xd0
[   21.779773]  print_report+0x118/0x5f0
[   21.779816]  kasan_report_invalid_free+0xc0/0xe8
[   21.779862]  __kasan_mempool_poison_object+0x14c/0x150
[   21.779911]  mempool_free+0x28c/0x328
[   21.779958]  mempool_double_free_helper+0x15c/0x2f8
[   21.780007]  mempool_kmalloc_large_double_free+0xc0/0x118
[   21.780057]  kunit_try_run_case+0x170/0x3f0
[   21.780103]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.780154]  kthread+0x24c/0x2d0
[   21.780197]  ret_from_fork+0x10/0x20
[   21.780264] 
[   21.786048] The buggy address belongs to the physical page:
[   21.786485] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106d60
[   21.786937] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.787212] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.787810] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.788280] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   21.789070] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.789510] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   21.789825] head: 0bfffe0000000002 ffffc1ffc31b5801 ffffffffffffffff 0000000000000000
[   21.790395] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   21.790794] page dumped because: kasan: bad access detected
[   21.791540] 
[   21.791783] Memory state around the buggy address:
[   21.792125]  fff00000c6d5ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.792914]  fff00000c6d5ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.793289] >fff00000c6d60000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.793609]                    ^
[   21.793926]  fff00000c6d60080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.794312]  fff00000c6d60100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.794810] ==================================================================
[   21.802325] ==================================================================
[   21.802999] BUG: KASAN: double-free in mempool_double_free_helper+0x15c/0x2f8
[   21.803614] Free of addr fff00000c6c7c000 by task kunit_try_catch/226
[   21.804039] 
[   21.804252] CPU: 1 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   21.804366] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.804401] Hardware name: linux,dummy-virt (DT)
[   21.804440] Call trace:
[   21.804466]  dump_backtrace+0x9c/0x128
[   21.804519]  show_stack+0x20/0x38
[   21.804588]  dump_stack_lvl+0x8c/0xd0
[   21.804658]  print_report+0x118/0x5f0
[   21.804701]  kasan_report_invalid_free+0xc0/0xe8
[   21.804748]  __kasan_mempool_poison_pages+0xe0/0xe8
[   21.804795]  mempool_free+0x24c/0x328
[   21.804841]  mempool_double_free_helper+0x15c/0x2f8
[   21.804890]  mempool_page_alloc_double_free+0xbc/0x118
[   21.804940]  kunit_try_run_case+0x170/0x3f0
[   21.804986]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.805037]  kthread+0x24c/0x2d0
[   21.805079]  ret_from_fork+0x10/0x20
[   21.805125] 
[   21.809737] The buggy address belongs to the physical page:
[   21.810057] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106c7c
[   21.810379] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.810954] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   21.811980] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   21.812452] page dumped because: kasan: bad access detected
[   21.812903] 
[   21.813071] Memory state around the buggy address:
[   21.813324]  fff00000c6c7bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.813932]  fff00000c6c7bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.814358] >fff00000c6c7c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.814898]                    ^
[   21.815097]  fff00000c6c7c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.815568]  fff00000c6c7c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.816128] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[   19.196596] ==================================================================
[   19.197272] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2d8/0x300
[   19.198063] Read of size 1 at addr fff00000c6b40000 by task kunit_try_catch/135
[   19.198725] 
[   19.199550] CPU: 1 UID: 0 PID: 135 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   19.199934] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.199969] Hardware name: linux,dummy-virt (DT)
[   19.200009] Call trace:
[   19.200035]  dump_backtrace+0x9c/0x128
[   19.200100]  show_stack+0x20/0x38
[   19.200140]  dump_stack_lvl+0x8c/0xd0
[   19.200185]  print_report+0x118/0x5f0
[   19.200227]  kasan_report+0xdc/0x128
[   19.200298]  __asan_report_load1_noabort+0x20/0x30
[   19.200345]  kmalloc_large_uaf+0x2d8/0x300
[   19.200391]  kunit_try_run_case+0x170/0x3f0
[   19.200435]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.200483]  kthread+0x24c/0x2d0
[   19.200525]  ret_from_fork+0x10/0x20
[   19.200572] 
[   19.205377] The buggy address belongs to the physical page:
[   19.205856] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106b40
[   19.206691] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.207987] raw: 0bfffe0000000000 fff00000da521200 fff00000da521200 0000000000000000
[   19.208620] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   19.209235] page dumped because: kasan: bad access detected
[   19.209747] 
[   19.210422] Memory state around the buggy address:
[   19.210774]  fff00000c6b3ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.211662]  fff00000c6b3ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.212457] >fff00000c6b40000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.213006]                    ^
[   19.213508]  fff00000c6b40080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.214264]  fff00000c6b40100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.214977] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[   21.660696] ==================================================================
[   21.661299] BUG: KASAN: use-after-free in mempool_uaf_helper+0x320/0x348
[   21.661924] Read of size 1 at addr fff00000c6c78000 by task kunit_try_catch/216
[   21.662247] 
[   21.662448] CPU: 1 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   21.662554] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.662587] Hardware name: linux,dummy-virt (DT)
[   21.662626] Call trace:
[   21.662652]  dump_backtrace+0x9c/0x128
[   21.662708]  show_stack+0x20/0x38
[   21.662750]  dump_stack_lvl+0x8c/0xd0
[   21.662798]  print_report+0x118/0x5f0
[   21.662842]  kasan_report+0xdc/0x128
[   21.662885]  __asan_report_load1_noabort+0x20/0x30
[   21.662932]  mempool_uaf_helper+0x320/0x348
[   21.662977]  mempool_kmalloc_large_uaf+0xc4/0x120
[   21.663025]  kunit_try_run_case+0x170/0x3f0
[   21.663071]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.663313]  kthread+0x24c/0x2d0
[   21.663373]  ret_from_fork+0x10/0x20
[   21.663426] 
[   21.665909] The buggy address belongs to the physical page:
[   21.666379] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106c78
[   21.666882] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.667713] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.668038] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.668306] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   21.668803] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.669099] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   21.669578] head: 0bfffe0000000002 ffffc1ffc31b1e01 ffffffffffffffff 0000000000000000
[   21.669925] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   21.670356] page dumped because: kasan: bad access detected
[   21.670670] 
[   21.670791] Memory state around the buggy address:
[   21.671394]  fff00000c6c77f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.671712]  fff00000c6c77f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.672142] >fff00000c6c78000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.672458]                    ^
[   21.672776]  fff00000c6c78080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.673142]  fff00000c6c78100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.673518] ==================================================================
[   21.725271] ==================================================================
[   21.725800] BUG: KASAN: use-after-free in mempool_uaf_helper+0x320/0x348
[   21.726250] Read of size 1 at addr fff00000c6c78000 by task kunit_try_catch/220
[   21.726615] 
[   21.726832] CPU: 1 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   21.726937] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.726970] Hardware name: linux,dummy-virt (DT)
[   21.727010] Call trace:
[   21.727037]  dump_backtrace+0x9c/0x128
[   21.727103]  show_stack+0x20/0x38
[   21.727146]  dump_stack_lvl+0x8c/0xd0
[   21.727194]  print_report+0x118/0x5f0
[   21.727244]  kasan_report+0xdc/0x128
[   21.727294]  __asan_report_load1_noabort+0x20/0x30
[   21.727342]  mempool_uaf_helper+0x320/0x348
[   21.727388]  mempool_page_alloc_uaf+0xc0/0x118
[   21.727436]  kunit_try_run_case+0x170/0x3f0
[   21.727484]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.727535]  kthread+0x24c/0x2d0
[   21.727580]  ret_from_fork+0x10/0x20
[   21.727938] 
[   21.731225] The buggy address belongs to the physical page:
[   21.731911] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106c78
[   21.732189] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.732726] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   21.733116] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   21.733501] page dumped because: kasan: bad access detected
[   21.733780] 
[   21.733945] Memory state around the buggy address:
[   21.734138]  fff00000c6c77f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.734491]  fff00000c6c77f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.734883] >fff00000c6c78000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.735207]                    ^
[   21.735442]  fff00000c6c78080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.735884]  fff00000c6c78100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.736215] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[   21.632205] ==================================================================
[   21.632820] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x320/0x348
[   21.633264] Read of size 1 at addr fff00000c5d36e00 by task kunit_try_catch/214
[   21.633639] 
[   21.633843] CPU: 1 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   21.633955] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.633990] Hardware name: linux,dummy-virt (DT)
[   21.634030] Call trace:
[   21.634058]  dump_backtrace+0x9c/0x128
[   21.634116]  show_stack+0x20/0x38
[   21.634158]  dump_stack_lvl+0x8c/0xd0
[   21.634207]  print_report+0x118/0x5f0
[   21.634269]  kasan_report+0xdc/0x128
[   21.634316]  __asan_report_load1_noabort+0x20/0x30
[   21.634366]  mempool_uaf_helper+0x320/0x348
[   21.634412]  mempool_kmalloc_uaf+0xc4/0x120
[   21.634460]  kunit_try_run_case+0x170/0x3f0
[   21.634506]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.634556]  kthread+0x24c/0x2d0
[   21.634599]  ret_from_fork+0x10/0x20
[   21.634645] 
[   21.638012] Allocated by task 214:
[   21.638273]  kasan_save_stack+0x3c/0x68
[   21.638647]  kasan_save_track+0x20/0x40
[   21.638928]  kasan_save_alloc_info+0x40/0x58
[   21.639490]  __kasan_mempool_unpoison_object+0x11c/0x180
[   21.639796]  remove_element+0x130/0x1f8
[   21.640383]  mempool_alloc_preallocated+0x58/0xc0
[   21.640645]  mempool_uaf_helper+0xa4/0x348
[   21.640864]  mempool_kmalloc_uaf+0xc4/0x120
[   21.641039]  kunit_try_run_case+0x170/0x3f0
[   21.641424]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.641752]  kthread+0x24c/0x2d0
[   21.641989]  ret_from_fork+0x10/0x20
[   21.642147] 
[   21.642353] Freed by task 214:
[   21.642612]  kasan_save_stack+0x3c/0x68
[   21.642914]  kasan_save_track+0x20/0x40
[   21.643082]  kasan_save_free_info+0x4c/0x78
[   21.643587]  __kasan_mempool_poison_object+0xc0/0x150
[   21.644012]  mempool_free+0x28c/0x328
[   21.644296]  mempool_uaf_helper+0x108/0x348
[   21.644610]  mempool_kmalloc_uaf+0xc4/0x120
[   21.644825]  kunit_try_run_case+0x170/0x3f0
[   21.644998]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.645264]  kthread+0x24c/0x2d0
[   21.645586]  ret_from_fork+0x10/0x20
[   21.645909] 
[   21.646086] The buggy address belongs to the object at fff00000c5d36e00
[   21.646086]  which belongs to the cache kmalloc-128 of size 128
[   21.646625] The buggy address is located 0 bytes inside of
[   21.646625]  freed 128-byte region [fff00000c5d36e00, fff00000c5d36e80)
[   21.647559] 
[   21.647754] The buggy address belongs to the physical page:
[   21.647959] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105d36
[   21.648627] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.649013] page_type: f5(slab)
[   21.649362] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.649695] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   21.650215] page dumped because: kasan: bad access detected
[   21.650499] 
[   21.650697] Memory state around the buggy address:
[   21.650954]  fff00000c5d36d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.651376]  fff00000c5d36d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.652052] >fff00000c5d36e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.652559]                    ^
[   21.652816]  fff00000c5d36e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.653141]  fff00000c5d36f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.653391] ==================================================================
[   21.683917] ==================================================================
[   21.684610] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x320/0x348
[   21.685080] Read of size 1 at addr fff00000c6d00240 by task kunit_try_catch/218
[   21.685608] 
[   21.685740] CPU: 0 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   21.685847] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.685881] Hardware name: linux,dummy-virt (DT)
[   21.685920] Call trace:
[   21.685946]  dump_backtrace+0x9c/0x128
[   21.686001]  show_stack+0x20/0x38
[   21.686044]  dump_stack_lvl+0x8c/0xd0
[   21.686094]  print_report+0x118/0x5f0
[   21.686137]  kasan_report+0xdc/0x128
[   21.686177]  __asan_report_load1_noabort+0x20/0x30
[   21.686225]  mempool_uaf_helper+0x320/0x348
[   21.686288]  mempool_slab_uaf+0xc0/0x118
[   21.686333]  kunit_try_run_case+0x170/0x3f0
[   21.686381]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.686433]  kthread+0x24c/0x2d0
[   21.686477]  ret_from_fork+0x10/0x20
[   21.686525] 
[   21.690959] Allocated by task 218:
[   21.693149]  kasan_save_stack+0x3c/0x68
[   21.693987]  kasan_save_track+0x20/0x40
[   21.694694]  kasan_save_alloc_info+0x40/0x58
[   21.695647]  __kasan_mempool_unpoison_object+0xbc/0x180
[   21.695885]  remove_element+0x16c/0x1f8
[   21.696069]  mempool_alloc_preallocated+0x58/0xc0
[   21.696311]  mempool_uaf_helper+0xa4/0x348
[   21.696493]  mempool_slab_uaf+0xc0/0x118
[   21.696667]  kunit_try_run_case+0x170/0x3f0
[   21.696846]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.697053]  kthread+0x24c/0x2d0
[   21.697208]  ret_from_fork+0x10/0x20
[   21.698323] 
[   21.698503] Freed by task 218:
[   21.698790]  kasan_save_stack+0x3c/0x68
[   21.699284]  kasan_save_track+0x20/0x40
[   21.699535]  kasan_save_free_info+0x4c/0x78
[   21.700288]  __kasan_mempool_poison_object+0xc0/0x150
[   21.700584]  mempool_free+0x28c/0x328
[   21.700962]  mempool_uaf_helper+0x108/0x348
[   21.701226]  mempool_slab_uaf+0xc0/0x118
[   21.701549]  kunit_try_run_case+0x170/0x3f0
[   21.701760]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.702097]  kthread+0x24c/0x2d0
[   21.702440]  ret_from_fork+0x10/0x20
[   21.702719] 
[   21.702874] The buggy address belongs to the object at fff00000c6d00240
[   21.702874]  which belongs to the cache test_cache of size 123
[   21.704016] The buggy address is located 0 bytes inside of
[   21.704016]  freed 123-byte region [fff00000c6d00240, fff00000c6d002bb)
[   21.704865] 
[   21.705083] The buggy address belongs to the physical page:
[   21.705362] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106d00
[   21.705921] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.706363] page_type: f5(slab)
[   21.706669] raw: 0bfffe0000000000 fff00000c6cca000 dead000000000122 0000000000000000
[   21.707386] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000
[   21.707879] page dumped because: kasan: bad access detected
[   21.708226] 
[   21.708423] Memory state around the buggy address:
[   21.708683]  fff00000c6d00100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.709154]  fff00000c6d00180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.709894] >fff00000c6d00200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   21.710326]                                            ^
[   21.710614]  fff00000c6d00280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.711005]  fff00000c6d00300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.711615] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[   21.597971] ==================================================================
[   21.598631] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2b8/0x2f8
[   21.598923] Read of size 1 at addr fff00000c6cca2bb by task kunit_try_catch/212
[   21.599531] 
[   21.599725] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   21.599831] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.599864] Hardware name: linux,dummy-virt (DT)
[   21.599904] Call trace:
[   21.599930]  dump_backtrace+0x9c/0x128
[   21.599982]  show_stack+0x20/0x38
[   21.600021]  dump_stack_lvl+0x8c/0xd0
[   21.600070]  print_report+0x118/0x5f0
[   21.600112]  kasan_report+0xdc/0x128
[   21.600152]  __asan_report_load1_noabort+0x20/0x30
[   21.600200]  mempool_oob_right_helper+0x2b8/0x2f8
[   21.600260]  mempool_slab_oob_right+0xc0/0x118
[   21.600312]  kunit_try_run_case+0x170/0x3f0
[   21.600358]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.600438]  kthread+0x24c/0x2d0
[   21.600826]  ret_from_fork+0x10/0x20
[   21.600881] 
[   21.604592] Allocated by task 212:
[   21.604782]  kasan_save_stack+0x3c/0x68
[   21.605078]  kasan_save_track+0x20/0x40
[   21.605634]  kasan_save_alloc_info+0x40/0x58
[   21.605905]  __kasan_mempool_unpoison_object+0xbc/0x180
[   21.606170]  remove_element+0x16c/0x1f8
[   21.606425]  mempool_alloc_preallocated+0x58/0xc0
[   21.606609]  mempool_oob_right_helper+0x98/0x2f8
[   21.606995]  mempool_slab_oob_right+0xc0/0x118
[   21.607571]  kunit_try_run_case+0x170/0x3f0
[   21.607789]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.608082]  kthread+0x24c/0x2d0
[   21.608366]  ret_from_fork+0x10/0x20
[   21.608602] 
[   21.608778] The buggy address belongs to the object at fff00000c6cca240
[   21.608778]  which belongs to the cache test_cache of size 123
[   21.609246] The buggy address is located 0 bytes to the right of
[   21.609246]  allocated 123-byte region [fff00000c6cca240, fff00000c6cca2bb)
[   21.609801] 
[   21.609977] The buggy address belongs to the physical page:
[   21.610225] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cca
[   21.610651] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.611056] page_type: f5(slab)
[   21.611570] raw: 0bfffe0000000000 fff00000ffeaef00 dead000000000122 0000000000000000
[   21.611961] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000
[   21.612454] page dumped because: kasan: bad access detected
[   21.612771] 
[   21.612940] Memory state around the buggy address:
[   21.613141]  fff00000c6cca180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.613544]  fff00000c6cca200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   21.613941] >fff00000c6cca280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   21.614428]                                         ^
[   21.614687]  fff00000c6cca300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.615254]  fff00000c6cca380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.615596] ==================================================================
[   21.545148] ==================================================================
[   21.545823] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2b8/0x2f8
[   21.546401] Read of size 1 at addr fff00000c6cf2873 by task kunit_try_catch/208
[   21.546703] 
[   21.546839] CPU: 0 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   21.546949] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.546983] Hardware name: linux,dummy-virt (DT)
[   21.547023] Call trace:
[   21.547065]  dump_backtrace+0x9c/0x128
[   21.547123]  show_stack+0x20/0x38
[   21.547167]  dump_stack_lvl+0x8c/0xd0
[   21.547215]  print_report+0x118/0x5f0
[   21.547274]  kasan_report+0xdc/0x128
[   21.547316]  __asan_report_load1_noabort+0x20/0x30
[   21.547363]  mempool_oob_right_helper+0x2b8/0x2f8
[   21.547413]  mempool_kmalloc_oob_right+0xc4/0x120
[   21.547460]  kunit_try_run_case+0x170/0x3f0
[   21.547510]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.547560]  kthread+0x24c/0x2d0
[   21.547628]  ret_from_fork+0x10/0x20
[   21.547679] 
[   21.551169] Allocated by task 208:
[   21.552331]  kasan_save_stack+0x3c/0x68
[   21.552644]  kasan_save_track+0x20/0x40
[   21.552875]  kasan_save_alloc_info+0x40/0x58
[   21.553198]  __kasan_mempool_unpoison_object+0x11c/0x180
[   21.553567]  remove_element+0x130/0x1f8
[   21.553866]  mempool_alloc_preallocated+0x58/0xc0
[   21.554246]  mempool_oob_right_helper+0x98/0x2f8
[   21.554488]  mempool_kmalloc_oob_right+0xc4/0x120
[   21.554876]  kunit_try_run_case+0x170/0x3f0
[   21.555349]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.555778]  kthread+0x24c/0x2d0
[   21.556139]  ret_from_fork+0x10/0x20
[   21.556422] 
[   21.556692] The buggy address belongs to the object at fff00000c6cf2800
[   21.556692]  which belongs to the cache kmalloc-128 of size 128
[   21.557403] The buggy address is located 0 bytes to the right of
[   21.557403]  allocated 115-byte region [fff00000c6cf2800, fff00000c6cf2873)
[   21.558110] 
[   21.558349] The buggy address belongs to the physical page:
[   21.558724] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cf2
[   21.559176] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.559656] page_type: f5(slab)
[   21.559899] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.560504] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   21.560868] page dumped because: kasan: bad access detected
[   21.561332] 
[   21.561605] Memory state around the buggy address:
[   21.561874]  fff00000c6cf2700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.562381]  fff00000c6cf2780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.563806] >fff00000c6cf2800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   21.564256]                                                              ^
[   21.564574]  fff00000c6cf2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.565068]  fff00000c6cf2900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   21.565488] ==================================================================
[   21.573433] ==================================================================
[   21.574154] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2b8/0x2f8
[   21.574749] Read of size 1 at addr fff00000c6c7a001 by task kunit_try_catch/210
[   21.575092] 
[   21.575232] CPU: 1 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   21.575429] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.575465] Hardware name: linux,dummy-virt (DT)
[   21.575506] Call trace:
[   21.575535]  dump_backtrace+0x9c/0x128
[   21.575591]  show_stack+0x20/0x38
[   21.575632]  dump_stack_lvl+0x8c/0xd0
[   21.575682]  print_report+0x118/0x5f0
[   21.575724]  kasan_report+0xdc/0x128
[   21.575768]  __asan_report_load1_noabort+0x20/0x30
[   21.575832]  mempool_oob_right_helper+0x2b8/0x2f8
[   21.575902]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   21.576035]  kunit_try_run_case+0x170/0x3f0
[   21.576093]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.576147]  kthread+0x24c/0x2d0
[   21.576194]  ret_from_fork+0x10/0x20
[   21.576260] 
[   21.580830] The buggy address belongs to the physical page:
[   21.581226] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106c78
[   21.581762] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.582183] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.582665] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.583085] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   21.584034] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.584338] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   21.584880] head: 0bfffe0000000002 ffffc1ffc31b1e01 ffffffffffffffff 0000000000000000
[   21.585174] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   21.585680] page dumped because: kasan: bad access detected
[   21.586086] 
[   21.586208] Memory state around the buggy address:
[   21.586508]  fff00000c6c79f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.586900]  fff00000c6c79f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.587276] >fff00000c6c7a000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.587879]                    ^
[   21.588161]  fff00000c6c7a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.588581]  fff00000c6c7a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.589000] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[   20.962025] ==================================================================
[   20.962812] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x184/0x318
[   20.963694] Read of size 1 at addr fff00000c5a6fc80 by task kunit_try_catch/202
[   20.964531] 
[   20.964735] CPU: 0 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   20.964857] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.964892] Hardware name: linux,dummy-virt (DT)
[   20.964931] Call trace:
[   20.964962]  dump_backtrace+0x9c/0x128
[   20.965023]  show_stack+0x20/0x38
[   20.965080]  dump_stack_lvl+0x8c/0xd0
[   20.965150]  print_report+0x118/0x5f0
[   20.965197]  kasan_report+0xdc/0x128
[   20.965251]  __kasan_check_byte+0x54/0x70
[   20.965299]  kmem_cache_destroy+0x34/0x218
[   20.965345]  kmem_cache_double_destroy+0x184/0x318
[   20.965410]  kunit_try_run_case+0x170/0x3f0
[   20.965476]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.965563]  kthread+0x24c/0x2d0
[   20.965609]  ret_from_fork+0x10/0x20
[   20.965657] 
[   20.969375] Allocated by task 202:
[   20.969580]  kasan_save_stack+0x3c/0x68
[   20.969811]  kasan_save_track+0x20/0x40
[   20.970035]  kasan_save_alloc_info+0x40/0x58
[   20.970329]  __kasan_slab_alloc+0xa8/0xb0
[   20.970929]  kmem_cache_alloc_noprof+0xf8/0x300
[   20.972549]  __kmem_cache_create_args+0x19c/0x2c8
[   20.972994]  kmem_cache_double_destroy+0xd0/0x318
[   20.973421]  kunit_try_run_case+0x170/0x3f0
[   20.973660]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.974121]  kthread+0x24c/0x2d0
[   20.974334]  ret_from_fork+0x10/0x20
[   20.974690] 
[   20.974879] Freed by task 202:
[   20.975420]  kasan_save_stack+0x3c/0x68
[   20.975791]  kasan_save_track+0x20/0x40
[   20.976073]  kasan_save_free_info+0x4c/0x78
[   20.976475]  __kasan_slab_free+0x6c/0x98
[   20.976801]  kmem_cache_free+0x118/0x460
[   20.977184]  slab_kmem_cache_release+0x38/0x50
[   20.977526]  kmem_cache_release+0x1c/0x30
[   20.977720]  kobject_put+0x17c/0x420
[   20.978116]  sysfs_slab_release+0x1c/0x30
[   20.978347]  kmem_cache_destroy+0x118/0x218
[   20.978764]  kmem_cache_double_destroy+0x130/0x318
[   20.979039]  kunit_try_run_case+0x170/0x3f0
[   20.979753]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.980214]  kthread+0x24c/0x2d0
[   20.980424]  ret_from_fork+0x10/0x20
[   20.980776] 
[   20.981068] The buggy address belongs to the object at fff00000c5a6fc80
[   20.981068]  which belongs to the cache kmem_cache of size 208
[   20.981760] The buggy address is located 0 bytes inside of
[   20.981760]  freed 208-byte region [fff00000c5a6fc80, fff00000c5a6fd50)
[   20.982449] 
[   20.982617] The buggy address belongs to the physical page:
[   20.982818] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a6f
[   20.983653] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.983946] page_type: f5(slab)
[   20.984457] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000
[   20.984885] raw: 0000000000000000 00000000800c000c 00000001f5000000 0000000000000000
[   20.985363] page dumped because: kasan: bad access detected
[   20.985744] 
[   20.985848] Memory state around the buggy address:
[   20.986154]  fff00000c5a6fb80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.986607]  fff00000c5a6fc00: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.986949] >fff00000c5a6fc80: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.987722]                    ^
[   20.987923]  fff00000c5a6fd00: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   20.988795]  fff00000c5a6fd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.989047] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[   20.883906] ==================================================================
[   20.884712] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x3a4/0x488
[   20.885251] Read of size 1 at addr fff00000c6cf8000 by task kunit_try_catch/200
[   20.885673] 
[   20.885906] CPU: 0 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   20.886023] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.886059] Hardware name: linux,dummy-virt (DT)
[   20.886103] Call trace:
[   20.886133]  dump_backtrace+0x9c/0x128
[   20.886190]  show_stack+0x20/0x38
[   20.886234]  dump_stack_lvl+0x8c/0xd0
[   20.886301]  print_report+0x118/0x5f0
[   20.886343]  kasan_report+0xdc/0x128
[   20.886385]  __asan_report_load1_noabort+0x20/0x30
[   20.886434]  kmem_cache_rcu_uaf+0x3a4/0x488
[   20.886481]  kunit_try_run_case+0x170/0x3f0
[   20.886530]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.886580]  kthread+0x24c/0x2d0
[   20.886626]  ret_from_fork+0x10/0x20
[   20.886674] 
[   20.890197] Allocated by task 200:
[   20.890698]  kasan_save_stack+0x3c/0x68
[   20.891236]  kasan_save_track+0x20/0x40
[   20.892741]  kasan_save_alloc_info+0x40/0x58
[   20.893347]  __kasan_slab_alloc+0xa8/0xb0
[   20.893825]  kmem_cache_alloc_noprof+0xf8/0x300
[   20.894291]  kmem_cache_rcu_uaf+0x130/0x488
[   20.894678]  kunit_try_run_case+0x170/0x3f0
[   20.895297]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.896190]  kthread+0x24c/0x2d0
[   20.896557]  ret_from_fork+0x10/0x20
[   20.896840] 
[   20.897524] Freed by task 0:
[   20.898036]  kasan_save_stack+0x3c/0x68
[   20.898569]  kasan_save_track+0x20/0x40
[   20.899184]  kasan_save_free_info+0x4c/0x78
[   20.899829]  __kasan_slab_free+0x6c/0x98
[   20.900313]  slab_free_after_rcu_debug+0xd0/0x2d0
[   20.900777]  rcu_core+0xa54/0x1df8
[   20.901316]  rcu_core_si+0x18/0x30
[   20.901751]  handle_softirqs+0x36c/0xb18
[   20.902252]  __do_softirq+0x1c/0x28
[   20.902656] 
[   20.902917] Last potentially related work creation:
[   20.903535]  kasan_save_stack+0x3c/0x68
[   20.903997]  __kasan_record_aux_stack+0xbc/0xe8
[   20.904440]  kasan_record_aux_stack_noalloc+0x14/0x20
[   20.904960]  kmem_cache_free+0x28c/0x460
[   20.907315]  kmem_cache_rcu_uaf+0x170/0x488
[   20.908673]  kunit_try_run_case+0x170/0x3f0
[   20.909591]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.910571]  kthread+0x24c/0x2d0
[   20.910898]  ret_from_fork+0x10/0x20
[   20.911225] 
[   20.912692] The buggy address belongs to the object at fff00000c6cf8000
[   20.912692]  which belongs to the cache test_cache of size 200
[   20.914563] The buggy address is located 0 bytes inside of
[   20.914563]  freed 200-byte region [fff00000c6cf8000, fff00000c6cf80c8)
[   20.915320] 
[   20.915534] The buggy address belongs to the physical page:
[   20.915940] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cf8
[   20.918947] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.920213] page_type: f5(slab)
[   20.920728] raw: 0bfffe0000000000 fff00000c5a6fb40 dead000000000122 0000000000000000
[   20.921596] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000
[   20.922168] page dumped because: kasan: bad access detected
[   20.922789] 
[   20.923060] Memory state around the buggy address:
[   20.923786]  fff00000c6cf7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.924638]  fff00000c6cf7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.925707] >fff00000c6cf8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.926490]                    ^
[   20.926964]  fff00000c6cf8080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   20.928065]  fff00000c6cf8100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.928719] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   20.805756] ==================================================================
[   20.806549] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x190/0x3d8
[   20.806935] Free of addr fff00000c6cf6001 by task kunit_try_catch/198
[   20.807604] 
[   20.807826] CPU: 0 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   20.807947] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.807983] Hardware name: linux,dummy-virt (DT)
[   20.808025] Call trace:
[   20.808055]  dump_backtrace+0x9c/0x128
[   20.808122]  show_stack+0x20/0x38
[   20.808165]  dump_stack_lvl+0x8c/0xd0
[   20.808218]  print_report+0x118/0x5f0
[   20.808278]  kasan_report_invalid_free+0xc0/0xe8
[   20.808327]  check_slab_allocation+0xfc/0x108
[   20.808372]  __kasan_slab_pre_free+0x2c/0x48
[   20.808417]  kmem_cache_free+0xf0/0x460
[   20.808462]  kmem_cache_invalid_free+0x190/0x3d8
[   20.808512]  kunit_try_run_case+0x170/0x3f0
[   20.808560]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.808612]  kthread+0x24c/0x2d0
[   20.808657]  ret_from_fork+0x10/0x20
[   20.808707] 
[   20.813111] Allocated by task 198:
[   20.813691]  kasan_save_stack+0x3c/0x68
[   20.814113]  kasan_save_track+0x20/0x40
[   20.814322]  kasan_save_alloc_info+0x40/0x58
[   20.814700]  __kasan_slab_alloc+0xa8/0xb0
[   20.814926]  kmem_cache_alloc_noprof+0xf8/0x300
[   20.815233]  kmem_cache_invalid_free+0x130/0x3d8
[   20.815608]  kunit_try_run_case+0x170/0x3f0
[   20.815883]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.816290]  kthread+0x24c/0x2d0
[   20.816517]  ret_from_fork+0x10/0x20
[   20.816758] 
[   20.816959] The buggy address belongs to the object at fff00000c6cf6000
[   20.816959]  which belongs to the cache test_cache of size 200
[   20.817517] The buggy address is located 1 bytes inside of
[   20.817517]  200-byte region [fff00000c6cf6000, fff00000c6cf60c8)
[   20.818471] 
[   20.818707] The buggy address belongs to the physical page:
[   20.819086] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cf6
[   20.819741] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.820010] page_type: f5(slab)
[   20.820262] raw: 0bfffe0000000000 fff00000c5a6fa00 dead000000000122 0000000000000000
[   20.820769] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000
[   20.821214] page dumped because: kasan: bad access detected
[   20.821649] 
[   20.821778] Memory state around the buggy address:
[   20.822085]  fff00000c6cf5f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.822547]  fff00000c6cf5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.822978] >fff00000c6cf6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.823583]                    ^
[   20.823782]  fff00000c6cf6080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   20.824206]  fff00000c6cf6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.824524] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   20.768102] ==================================================================
[   20.768896] BUG: KASAN: double-free in kmem_cache_double_free+0x19c/0x3e0
[   20.769379] Free of addr fff00000c6cf4000 by task kunit_try_catch/196
[   20.769900] 
[   20.770099] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   20.770223] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.770272] Hardware name: linux,dummy-virt (DT)
[   20.770316] Call trace:
[   20.770343]  dump_backtrace+0x9c/0x128
[   20.770395]  show_stack+0x20/0x38
[   20.770438]  dump_stack_lvl+0x8c/0xd0
[   20.770485]  print_report+0x118/0x5f0
[   20.770530]  kasan_report_invalid_free+0xc0/0xe8
[   20.770575]  check_slab_allocation+0xd4/0x108
[   20.770619]  __kasan_slab_pre_free+0x2c/0x48
[   20.770663]  kmem_cache_free+0xf0/0x460
[   20.770706]  kmem_cache_double_free+0x19c/0x3e0
[   20.770754]  kunit_try_run_case+0x170/0x3f0
[   20.770798]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.770848]  kthread+0x24c/0x2d0
[   20.770891]  ret_from_fork+0x10/0x20
[   20.770938] 
[   20.775907] Allocated by task 196:
[   20.776270]  kasan_save_stack+0x3c/0x68
[   20.776651]  kasan_save_track+0x20/0x40
[   20.776868]  kasan_save_alloc_info+0x40/0x58
[   20.777056]  __kasan_slab_alloc+0xa8/0xb0
[   20.777218]  kmem_cache_alloc_noprof+0xf8/0x300
[   20.777707]  kmem_cache_double_free+0x130/0x3e0
[   20.777997]  kunit_try_run_case+0x170/0x3f0
[   20.778269]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.778718]  kthread+0x24c/0x2d0
[   20.778957]  ret_from_fork+0x10/0x20
[   20.779612] 
[   20.779889] Freed by task 196:
[   20.780125]  kasan_save_stack+0x3c/0x68
[   20.780429]  kasan_save_track+0x20/0x40
[   20.780619]  kasan_save_free_info+0x4c/0x78
[   20.780907]  __kasan_slab_free+0x6c/0x98
[   20.781162]  kmem_cache_free+0x118/0x460
[   20.781421]  kmem_cache_double_free+0x144/0x3e0
[   20.781691]  kunit_try_run_case+0x170/0x3f0
[   20.781948]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.782403]  kthread+0x24c/0x2d0
[   20.782661]  ret_from_fork+0x10/0x20
[   20.782937] 
[   20.783113] The buggy address belongs to the object at fff00000c6cf4000
[   20.783113]  which belongs to the cache test_cache of size 200
[   20.783940] The buggy address is located 0 bytes inside of
[   20.783940]  200-byte region [fff00000c6cf4000, fff00000c6cf40c8)
[   20.784561] 
[   20.784754] The buggy address belongs to the physical page:
[   20.784969] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cf4
[   20.785426] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.785749] page_type: f5(slab)
[   20.786014] raw: 0bfffe0000000000 fff00000c5a6f8c0 dead000000000122 0000000000000000
[   20.786426] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000
[   20.786785] page dumped because: kasan: bad access detected
[   20.787385] 
[   20.787501] Memory state around the buggy address:
[   20.787679]  fff00000c6cf3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.787922]  fff00000c6cf3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.788148] >fff00000c6cf4000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.788381]                    ^
[   20.788533]  fff00000c6cf4080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   20.788880]  fff00000c6cf4100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.789199] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   20.715893] ==================================================================
[   20.716474] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x350/0x440
[   20.716933] Read of size 1 at addr fff00000c6ccf0c8 by task kunit_try_catch/194
[   20.717448] 
[   20.717700] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   20.717814] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.717862] Hardware name: linux,dummy-virt (DT)
[   20.717916] Call trace:
[   20.717958]  dump_backtrace+0x9c/0x128
[   20.718027]  show_stack+0x20/0x38
[   20.718074]  dump_stack_lvl+0x8c/0xd0
[   20.718121]  print_report+0x118/0x5f0
[   20.718165]  kasan_report+0xdc/0x128
[   20.718205]  __asan_report_load1_noabort+0x20/0x30
[   20.718265]  kmem_cache_oob+0x350/0x440
[   20.718312]  kunit_try_run_case+0x170/0x3f0
[   20.718371]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.718445]  kthread+0x24c/0x2d0
[   20.718493]  ret_from_fork+0x10/0x20
[   20.718541] 
[   20.722095] Allocated by task 194:
[   20.722398]  kasan_save_stack+0x3c/0x68
[   20.722789]  kasan_save_track+0x20/0x40
[   20.723020]  kasan_save_alloc_info+0x40/0x58
[   20.723581]  __kasan_slab_alloc+0xa8/0xb0
[   20.724111]  kmem_cache_alloc_noprof+0xf8/0x300
[   20.724549]  kmem_cache_oob+0x130/0x440
[   20.725227]  kunit_try_run_case+0x170/0x3f0
[   20.725523]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.725900]  kthread+0x24c/0x2d0
[   20.726200]  ret_from_fork+0x10/0x20
[   20.726452] 
[   20.726682] The buggy address belongs to the object at fff00000c6ccf000
[   20.726682]  which belongs to the cache test_cache of size 200
[   20.727948] The buggy address is located 0 bytes to the right of
[   20.727948]  allocated 200-byte region [fff00000c6ccf000, fff00000c6ccf0c8)
[   20.728596] 
[   20.728826] The buggy address belongs to the physical page:
[   20.729148] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106ccf
[   20.729638] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.730081] page_type: f5(slab)
[   20.730380] raw: 0bfffe0000000000 fff00000c5a6f780 dead000000000122 0000000000000000
[   20.730852] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000
[   20.731426] page dumped because: kasan: bad access detected
[   20.731823] 
[   20.732029] Memory state around the buggy address:
[   20.732442]  fff00000c6ccef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.733086]  fff00000c6ccf000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.733537] >fff00000c6ccf080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   20.734146]                                               ^
[   20.734387]  fff00000c6ccf100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.734627]  fff00000c6ccf180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.734858] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[   20.670792] ==================================================================
[   20.671825] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x498/0x4c0
[   20.672119] Read of size 8 at addr fff00000c5c7fbc0 by task kunit_try_catch/187
[   20.672383] 
[   20.672515] CPU: 1 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   20.672619] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.672653] Hardware name: linux,dummy-virt (DT)
[   20.672694] Call trace:
[   20.672720]  dump_backtrace+0x9c/0x128
[   20.672769]  show_stack+0x20/0x38
[   20.672809]  dump_stack_lvl+0x8c/0xd0
[   20.672857]  print_report+0x118/0x5f0
[   20.672898]  kasan_report+0xdc/0x128
[   20.672937]  __asan_report_load8_noabort+0x20/0x30
[   20.672986]  workqueue_uaf+0x498/0x4c0
[   20.673029]  kunit_try_run_case+0x170/0x3f0
[   20.673076]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.673125]  kthread+0x24c/0x2d0
[   20.673168]  ret_from_fork+0x10/0x20
[   20.673214] 
[   20.676966] Allocated by task 187:
[   20.677320]  kasan_save_stack+0x3c/0x68
[   20.677598]  kasan_save_track+0x20/0x40
[   20.677842]  kasan_save_alloc_info+0x40/0x58
[   20.678168]  __kasan_kmalloc+0xd4/0xd8
[   20.678407]  __kmalloc_cache_noprof+0x154/0x320
[   20.678710]  workqueue_uaf+0x140/0x4c0
[   20.678883]  kunit_try_run_case+0x170/0x3f0
[   20.679056]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.679468]  kthread+0x24c/0x2d0
[   20.680359]  ret_from_fork+0x10/0x20
[   20.680774] 
[   20.680895] Freed by task 47:
[   20.681200]  kasan_save_stack+0x3c/0x68
[   20.681433]  kasan_save_track+0x20/0x40
[   20.681818]  kasan_save_free_info+0x4c/0x78
[   20.682020]  __kasan_slab_free+0x6c/0x98
[   20.682422]  kfree+0x110/0x3b8
[   20.682751]  workqueue_uaf_work+0x18/0x30
[   20.683004]  process_one_work+0x530/0xfa8
[   20.683304]  worker_thread+0x610/0xf18
[   20.683552]  kthread+0x24c/0x2d0
[   20.683795]  ret_from_fork+0x10/0x20
[   20.684052] 
[   20.684190] Last potentially related work creation:
[   20.684640]  kasan_save_stack+0x3c/0x68
[   20.685033]  __kasan_record_aux_stack+0xbc/0xe8
[   20.685395]  kasan_record_aux_stack_noalloc+0x14/0x20
[   20.685768]  __queue_work+0x654/0xfd8
[   20.685948]  queue_work_on+0xbc/0xf8
[   20.686395]  workqueue_uaf+0x218/0x4c0
[   20.686804]  kunit_try_run_case+0x170/0x3f0
[   20.687325]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.687676]  kthread+0x24c/0x2d0
[   20.688011]  ret_from_fork+0x10/0x20
[   20.688300] 
[   20.688546] The buggy address belongs to the object at fff00000c5c7fbc0
[   20.688546]  which belongs to the cache kmalloc-32 of size 32
[   20.689293] The buggy address is located 0 bytes inside of
[   20.689293]  freed 32-byte region [fff00000c5c7fbc0, fff00000c5c7fbe0)
[   20.689665] 
[   20.689785] The buggy address belongs to the physical page:
[   20.689982] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105c7f
[   20.690276] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.690573] page_type: f5(slab)
[   20.690879] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   20.692222] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   20.692816] page dumped because: kasan: bad access detected
[   20.693207] 
[   20.693437] Memory state around the buggy address:
[   20.693735]  fff00000c5c7fa80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.694287]  fff00000c5c7fb00: fa fb fb fb fc fc fc fc 00 00 07 fc fc fc fc fc
[   20.694744] >fff00000c5c7fb80: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   20.695289]                                            ^
[   20.695787]  fff00000c5c7fc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.696379]  fff00000c5c7fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.696648] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
[   20.345444] ==================================================================
[   20.346179] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   20.347351] Free of addr fff00000c5bb2280 by task kunit_try_catch/179
[   20.347740] 
[   20.347972] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   20.348153] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.348228] Hardware name: linux,dummy-virt (DT)
[   20.348323] Call trace:
[   20.348380]  dump_backtrace+0x9c/0x128
[   20.348480]  show_stack+0x20/0x38
[   20.348553]  dump_stack_lvl+0x8c/0xd0
[   20.348633]  print_report+0x118/0x5f0
[   20.348712]  kasan_report_invalid_free+0xc0/0xe8
[   20.348795]  check_slab_allocation+0xd4/0x108
[   20.348891]  __kasan_slab_pre_free+0x2c/0x48
[   20.348973]  kfree+0xe8/0x3b8
[   20.349052]  kfree_sensitive+0x3c/0xb0
[   20.349130]  kmalloc_double_kzfree+0x174/0x318
[   20.349216]  kunit_try_run_case+0x170/0x3f0
[   20.350580]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.350693]  kthread+0x24c/0x2d0
[   20.350743]  ret_from_fork+0x10/0x20
[   20.350795] 
[   20.356023] Allocated by task 179:
[   20.356491]  kasan_save_stack+0x3c/0x68
[   20.356998]  kasan_save_track+0x20/0x40
[   20.358788]  kasan_save_alloc_info+0x40/0x58
[   20.359705]  __kasan_kmalloc+0xd4/0xd8
[   20.360177]  __kmalloc_cache_noprof+0x154/0x320
[   20.360703]  kmalloc_double_kzfree+0xb8/0x318
[   20.361121]  kunit_try_run_case+0x170/0x3f0
[   20.361469]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.362010]  kthread+0x24c/0x2d0
[   20.362371]  ret_from_fork+0x10/0x20
[   20.362804] 
[   20.363077] Freed by task 179:
[   20.363919]  kasan_save_stack+0x3c/0x68
[   20.364301]  kasan_save_track+0x20/0x40
[   20.364568]  kasan_save_free_info+0x4c/0x78
[   20.364883]  __kasan_slab_free+0x6c/0x98
[   20.365190]  kfree+0x110/0x3b8
[   20.365605]  kfree_sensitive+0x80/0xb0
[   20.366092]  kmalloc_double_kzfree+0x120/0x318
[   20.366626]  kunit_try_run_case+0x170/0x3f0
[   20.367060]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.368127]  kthread+0x24c/0x2d0
[   20.368493]  ret_from_fork+0x10/0x20
[   20.368917] 
[   20.369183] The buggy address belongs to the object at fff00000c5bb2280
[   20.369183]  which belongs to the cache kmalloc-16 of size 16
[   20.370132] The buggy address is located 0 bytes inside of
[   20.370132]  16-byte region [fff00000c5bb2280, fff00000c5bb2290)
[   20.370970] 
[   20.371651] The buggy address belongs to the physical page:
[   20.372119] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2
[   20.372900] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.373577] page_type: f5(slab)
[   20.373832] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   20.374935] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   20.375742] page dumped because: kasan: bad access detected
[   20.376160] 
[   20.376816] Memory state around the buggy address:
[   20.377181]  fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.378105]  fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   20.378792] >fff00000c5bb2280: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.379458]                    ^
[   20.379934]  fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.380677]  fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.381533] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[   20.310111] ==================================================================
[   20.311227] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x174/0x318
[   20.311961] Read of size 1 at addr fff00000c5bb2280 by task kunit_try_catch/179
[   20.313319] 
[   20.313548] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   20.313749] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.313819] Hardware name: linux,dummy-virt (DT)
[   20.313892] Call trace:
[   20.313945]  dump_backtrace+0x9c/0x128
[   20.314068]  show_stack+0x20/0x38
[   20.314159]  dump_stack_lvl+0x8c/0xd0
[   20.314221]  print_report+0x118/0x5f0
[   20.314293]  kasan_report+0xdc/0x128
[   20.314334]  __kasan_check_byte+0x54/0x70
[   20.314379]  kfree_sensitive+0x30/0xb0
[   20.314421]  kmalloc_double_kzfree+0x174/0x318
[   20.314467]  kunit_try_run_case+0x170/0x3f0
[   20.314514]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.314564]  kthread+0x24c/0x2d0
[   20.314605]  ret_from_fork+0x10/0x20
[   20.314653] 
[   20.320907] Allocated by task 179:
[   20.321410]  kasan_save_stack+0x3c/0x68
[   20.321950]  kasan_save_track+0x20/0x40
[   20.322331]  kasan_save_alloc_info+0x40/0x58
[   20.322772]  __kasan_kmalloc+0xd4/0xd8
[   20.323113]  __kmalloc_cache_noprof+0x154/0x320
[   20.323645]  kmalloc_double_kzfree+0xb8/0x318
[   20.324146]  kunit_try_run_case+0x170/0x3f0
[   20.324557]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.325037]  kthread+0x24c/0x2d0
[   20.325712]  ret_from_fork+0x10/0x20
[   20.326181] 
[   20.326487] Freed by task 179:
[   20.326852]  kasan_save_stack+0x3c/0x68
[   20.327594]  kasan_save_track+0x20/0x40
[   20.327884]  kasan_save_free_info+0x4c/0x78
[   20.328152]  __kasan_slab_free+0x6c/0x98
[   20.328436]  kfree+0x110/0x3b8
[   20.329012]  kfree_sensitive+0x80/0xb0
[   20.329554]  kmalloc_double_kzfree+0x120/0x318
[   20.330103]  kunit_try_run_case+0x170/0x3f0
[   20.330527]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.331141]  kthread+0x24c/0x2d0
[   20.331508]  ret_from_fork+0x10/0x20
[   20.331937] 
[   20.332204] The buggy address belongs to the object at fff00000c5bb2280
[   20.332204]  which belongs to the cache kmalloc-16 of size 16
[   20.333178] The buggy address is located 0 bytes inside of
[   20.333178]  freed 16-byte region [fff00000c5bb2280, fff00000c5bb2290)
[   20.334273] 
[   20.334612] The buggy address belongs to the physical page:
[   20.334944] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2
[   20.336008] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.336532] page_type: f5(slab)
[   20.336881] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   20.337682] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   20.338334] page dumped because: kasan: bad access detected
[   20.338888] 
[   20.339335] Memory state around the buggy address:
[   20.340100]  fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.340676]  fff00000c5bb2200: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   20.341291] >fff00000c5bb2280: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.341905]                    ^
[   20.342273]  fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.342916]  fff00000c5bb2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.343524] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[   20.260418] ==================================================================
[   20.261168] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x408/0x478
[   20.261935] Read of size 1 at addr fff00000c5cc29a8 by task kunit_try_catch/175
[   20.262550] 
[   20.262873] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   20.263189] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.263278] Hardware name: linux,dummy-virt (DT)
[   20.263360] Call trace:
[   20.263418]  dump_backtrace+0x9c/0x128
[   20.263545]  show_stack+0x20/0x38
[   20.263635]  dump_stack_lvl+0x8c/0xd0
[   20.263697]  print_report+0x118/0x5f0
[   20.263743]  kasan_report+0xdc/0x128
[   20.263783]  __asan_report_load1_noabort+0x20/0x30
[   20.263832]  kmalloc_uaf2+0x408/0x478
[   20.263876]  kunit_try_run_case+0x170/0x3f0
[   20.263921]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.263972]  kthread+0x24c/0x2d0
[   20.264014]  ret_from_fork+0x10/0x20
[   20.264060] 
[   20.269929] Allocated by task 175:
[   20.270937]  kasan_save_stack+0x3c/0x68
[   20.271883]  kasan_save_track+0x20/0x40
[   20.272406]  kasan_save_alloc_info+0x40/0x58
[   20.272956]  __kasan_kmalloc+0xd4/0xd8
[   20.273448]  __kmalloc_cache_noprof+0x154/0x320
[   20.273953]  kmalloc_uaf2+0xc4/0x478
[   20.274361]  kunit_try_run_case+0x170/0x3f0
[   20.274834]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.275718]  kthread+0x24c/0x2d0
[   20.276099]  ret_from_fork+0x10/0x20
[   20.276583] 
[   20.276881] Freed by task 175:
[   20.277169]  kasan_save_stack+0x3c/0x68
[   20.277723]  kasan_save_track+0x20/0x40
[   20.278176]  kasan_save_free_info+0x4c/0x78
[   20.278704]  __kasan_slab_free+0x6c/0x98
[   20.279136]  kfree+0x110/0x3b8
[   20.279870]  kmalloc_uaf2+0x138/0x478
[   20.280273]  kunit_try_run_case+0x170/0x3f0
[   20.280630]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.281074]  kthread+0x24c/0x2d0
[   20.281471]  ret_from_fork+0x10/0x20
[   20.281828] 
[   20.282099] The buggy address belongs to the object at fff00000c5cc2980
[   20.282099]  which belongs to the cache kmalloc-64 of size 64
[   20.283677] The buggy address is located 40 bytes inside of
[   20.283677]  freed 64-byte region [fff00000c5cc2980, fff00000c5cc29c0)
[   20.284610] 
[   20.284898] The buggy address belongs to the physical page:
[   20.285401] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cc2
[   20.286044] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.286664] page_type: f5(slab)
[   20.287028] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.287858] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   20.288511] page dumped because: kasan: bad access detected
[   20.289030] 
[   20.289541] Memory state around the buggy address:
[   20.290079]  fff00000c5cc2880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.290738]  fff00000c5cc2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.291634] >fff00000c5cc2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.291990]                                   ^
[   20.292472]  fff00000c5cc2a00: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   20.292997]  fff00000c5cc2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.293712] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[   20.218453] ==================================================================
[   20.219181] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x17c/0x328
[   20.220584] Write of size 33 at addr fff00000c5cc2900 by task kunit_try_catch/173
[   20.221715] 
[   20.222311] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   20.222531] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.222602] Hardware name: linux,dummy-virt (DT)
[   20.222673] Call trace:
[   20.222718]  dump_backtrace+0x9c/0x128
[   20.222830]  show_stack+0x20/0x38
[   20.222874]  dump_stack_lvl+0x8c/0xd0
[   20.222924]  print_report+0x118/0x5f0
[   20.222968]  kasan_report+0xdc/0x128
[   20.223010]  kasan_check_range+0x100/0x1a8
[   20.223060]  __asan_memset+0x34/0x78
[   20.223139]  kmalloc_uaf_memset+0x17c/0x328
[   20.223222]  kunit_try_run_case+0x170/0x3f0
[   20.223452]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.223562]  kthread+0x24c/0x2d0
[   20.223640]  ret_from_fork+0x10/0x20
[   20.223733] 
[   20.229494] Allocated by task 173:
[   20.229733]  kasan_save_stack+0x3c/0x68
[   20.229993]  kasan_save_track+0x20/0x40
[   20.230216]  kasan_save_alloc_info+0x40/0x58
[   20.230506]  __kasan_kmalloc+0xd4/0xd8
[   20.230749]  __kmalloc_cache_noprof+0x154/0x320
[   20.231577]  kmalloc_uaf_memset+0xb8/0x328
[   20.232562]  kunit_try_run_case+0x170/0x3f0
[   20.233016]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.233691]  kthread+0x24c/0x2d0
[   20.234129]  ret_from_fork+0x10/0x20
[   20.234553] 
[   20.234801] Freed by task 173:
[   20.235194]  kasan_save_stack+0x3c/0x68
[   20.235598]  kasan_save_track+0x20/0x40
[   20.235982]  kasan_save_free_info+0x4c/0x78
[   20.236348]  __kasan_slab_free+0x6c/0x98
[   20.236684]  kfree+0x110/0x3b8
[   20.236974]  kmalloc_uaf_memset+0x120/0x328
[   20.237704]  kunit_try_run_case+0x170/0x3f0
[   20.238161]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.238677]  kthread+0x24c/0x2d0
[   20.239008]  ret_from_fork+0x10/0x20
[   20.239333] 
[   20.240051] The buggy address belongs to the object at fff00000c5cc2900
[   20.240051]  which belongs to the cache kmalloc-64 of size 64
[   20.240836] The buggy address is located 0 bytes inside of
[   20.240836]  freed 64-byte region [fff00000c5cc2900, fff00000c5cc2940)
[   20.241847] 
[   20.242187] The buggy address belongs to the physical page:
[   20.242742] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cc2
[   20.243773] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.244422] page_type: f5(slab)
[   20.244826] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.245485] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   20.246203] page dumped because: kasan: bad access detected
[   20.246727] 
[   20.246978] Memory state around the buggy address:
[   20.247558]  fff00000c5cc2800: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.248381]  fff00000c5cc2880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.248979] >fff00000c5cc2900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.249602]                    ^
[   20.249982]  fff00000c5cc2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.250585]  fff00000c5cc2a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.251213] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[   20.176647] ==================================================================
[   20.177490] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x30c/0x340
[   20.178249] Read of size 1 at addr fff00000c6451428 by task kunit_try_catch/171
[   20.178745] 
[   20.179074] CPU: 1 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   20.179295] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.179352] Hardware name: linux,dummy-virt (DT)
[   20.179418] Call trace:
[   20.179460]  dump_backtrace+0x9c/0x128
[   20.179570]  show_stack+0x20/0x38
[   20.179659]  dump_stack_lvl+0x8c/0xd0
[   20.179763]  print_report+0x118/0x5f0
[   20.179861]  kasan_report+0xdc/0x128
[   20.179954]  __asan_report_load1_noabort+0x20/0x30
[   20.180062]  kmalloc_uaf+0x30c/0x340
[   20.180182]  kunit_try_run_case+0x170/0x3f0
[   20.180420]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.180480]  kthread+0x24c/0x2d0
[   20.180526]  ret_from_fork+0x10/0x20
[   20.180576] 
[   20.185386] Allocated by task 171:
[   20.185874]  kasan_save_stack+0x3c/0x68
[   20.186142]  kasan_save_track+0x20/0x40
[   20.186644]  kasan_save_alloc_info+0x40/0x58
[   20.187506]  __kasan_kmalloc+0xd4/0xd8
[   20.188190]  __kmalloc_cache_noprof+0x154/0x320
[   20.188724]  kmalloc_uaf+0xb8/0x340
[   20.189703]  kunit_try_run_case+0x170/0x3f0
[   20.190144]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.190767]  kthread+0x24c/0x2d0
[   20.191260]  ret_from_fork+0x10/0x20
[   20.191882] 
[   20.192059] Freed by task 171:
[   20.192699]  kasan_save_stack+0x3c/0x68
[   20.193226]  kasan_save_track+0x20/0x40
[   20.193681]  kasan_save_free_info+0x4c/0x78
[   20.194201]  __kasan_slab_free+0x6c/0x98
[   20.194563]  kfree+0x110/0x3b8
[   20.194996]  kmalloc_uaf+0x120/0x340
[   20.195702]  kunit_try_run_case+0x170/0x3f0
[   20.196103]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.196727]  kthread+0x24c/0x2d0
[   20.197105]  ret_from_fork+0x10/0x20
[   20.197587] 
[   20.197858] The buggy address belongs to the object at fff00000c6451420
[   20.197858]  which belongs to the cache kmalloc-16 of size 16
[   20.198815] The buggy address is located 8 bytes inside of
[   20.198815]  freed 16-byte region [fff00000c6451420, fff00000c6451430)
[   20.200349] 
[   20.200874] The buggy address belongs to the physical page:
[   20.201636] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106451
[   20.202063] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.202781] page_type: f5(slab)
[   20.203100] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   20.204119] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   20.204847] page dumped because: kasan: bad access detected
[   20.205345] 
[   20.205507] Memory state around the buggy address:
[   20.205777]  fff00000c6451300: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[   20.206538]  fff00000c6451380: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   20.207556] >fff00000c6451400: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   20.207907]                                   ^
[   20.208462]  fff00000c6451480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.209183]  fff00000c6451500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.209780] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   20.137370] ==================================================================
[   20.138085] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x15c/0x2f8
[   20.138901] Read of size 64 at addr fff00000c6491804 by task kunit_try_catch/169
[   20.140489] 
[   20.140837] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   20.141040] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.141108] Hardware name: linux,dummy-virt (DT)
[   20.141188] Call trace:
[   20.141257]  dump_backtrace+0x9c/0x128
[   20.141388]  show_stack+0x20/0x38
[   20.141458]  dump_stack_lvl+0x8c/0xd0
[   20.141556]  print_report+0x118/0x5f0
[   20.141629]  kasan_report+0xdc/0x128
[   20.141691]  kasan_check_range+0x100/0x1a8
[   20.141749]  __asan_memmove+0x3c/0x98
[   20.141794]  kmalloc_memmove_invalid_size+0x15c/0x2f8
[   20.141843]  kunit_try_run_case+0x170/0x3f0
[   20.141888]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.141936]  kthread+0x24c/0x2d0
[   20.141978]  ret_from_fork+0x10/0x20
[   20.142026] 
[   20.146637] Allocated by task 169:
[   20.147051]  kasan_save_stack+0x3c/0x68
[   20.147521]  kasan_save_track+0x20/0x40
[   20.148286]  kasan_save_alloc_info+0x40/0x58
[   20.148849]  __kasan_kmalloc+0xd4/0xd8
[   20.149186]  __kmalloc_cache_noprof+0x154/0x320
[   20.149689]  kmalloc_memmove_invalid_size+0xb8/0x2f8
[   20.150246]  kunit_try_run_case+0x170/0x3f0
[   20.150734]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.151658]  kthread+0x24c/0x2d0
[   20.151985]  ret_from_fork+0x10/0x20
[   20.152220] 
[   20.152380] The buggy address belongs to the object at fff00000c6491800
[   20.152380]  which belongs to the cache kmalloc-64 of size 64
[   20.154090] The buggy address is located 4 bytes inside of
[   20.154090]  allocated 64-byte region [fff00000c6491800, fff00000c6491840)
[   20.154960] 
[   20.155563] The buggy address belongs to the physical page:
[   20.155968] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106491
[   20.156645] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.157255] page_type: f5(slab)
[   20.157602] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.158169] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   20.158797] page dumped because: kasan: bad access detected
[   20.159383] 
[   20.159560] Memory state around the buggy address:
[   20.160045]  fff00000c6491700: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[   20.160427]  fff00000c6491780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.161986] >fff00000c6491800: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.163034]                                            ^
[   20.163818]  fff00000c6491880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.164477]  fff00000c6491900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.165033] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   20.092637] ==================================================================
[   20.093393] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x15c/0x2f8
[   20.094222] Read of size 18446744073709551614 at addr fff00000c6491684 by task kunit_try_catch/167
[   20.094857] 
[   20.095130] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   20.095406] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.095999] Hardware name: linux,dummy-virt (DT)
[   20.096208] Call trace:
[   20.096289]  dump_backtrace+0x9c/0x128
[   20.096400]  show_stack+0x20/0x38
[   20.096471]  dump_stack_lvl+0x8c/0xd0
[   20.096554]  print_report+0x118/0x5f0
[   20.096626]  kasan_report+0xdc/0x128
[   20.096667]  kasan_check_range+0x100/0x1a8
[   20.096709]  __asan_memmove+0x3c/0x98
[   20.096750]  kmalloc_memmove_negative_size+0x15c/0x2f8
[   20.096798]  kunit_try_run_case+0x170/0x3f0
[   20.096842]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.096890]  kthread+0x24c/0x2d0
[   20.096931]  ret_from_fork+0x10/0x20
[   20.096979] 
[   20.102062] Allocated by task 167:
[   20.102310]  kasan_save_stack+0x3c/0x68
[   20.102666]  kasan_save_track+0x20/0x40
[   20.103000]  kasan_save_alloc_info+0x40/0x58
[   20.104181]  __kasan_kmalloc+0xd4/0xd8
[   20.105121]  __kmalloc_cache_noprof+0x154/0x320
[   20.105674]  kmalloc_memmove_negative_size+0xb8/0x2f8
[   20.106291]  kunit_try_run_case+0x170/0x3f0
[   20.106603]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.107488]  kthread+0x24c/0x2d0
[   20.108036]  ret_from_fork+0x10/0x20
[   20.108602] 
[   20.108872] The buggy address belongs to the object at fff00000c6491680
[   20.108872]  which belongs to the cache kmalloc-64 of size 64
[   20.109702] The buggy address is located 4 bytes inside of
[   20.109702]  64-byte region [fff00000c6491680, fff00000c64916c0)
[   20.110845] 
[   20.111251] The buggy address belongs to the physical page:
[   20.111812] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106491
[   20.112434] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.112940] page_type: f5(slab)
[   20.113765] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.114397] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   20.115672] page dumped because: kasan: bad access detected
[   20.115982] 
[   20.116157] Memory state around the buggy address:
[   20.116700]  fff00000c6491580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.117590]  fff00000c6491600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.118377] >fff00000c6491680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.118975]                    ^
[   20.119562]  fff00000c6491700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.119925]  fff00000c6491780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.120638] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[   20.056288] ==================================================================
[   20.056971] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x15c/0x310
[   20.057718] Write of size 16 at addr fff00000c6492769 by task kunit_try_catch/165
[   20.058370] 
[   20.058641] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   20.058839] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.058907] Hardware name: linux,dummy-virt (DT)
[   20.058977] Call trace:
[   20.059026]  dump_backtrace+0x9c/0x128
[   20.059190]  show_stack+0x20/0x38
[   20.059297]  dump_stack_lvl+0x8c/0xd0
[   20.059406]  print_report+0x118/0x5f0
[   20.059484]  kasan_report+0xdc/0x128
[   20.059550]  kasan_check_range+0x100/0x1a8
[   20.059628]  __asan_memset+0x34/0x78
[   20.059696]  kmalloc_oob_memset_16+0x15c/0x310
[   20.059786]  kunit_try_run_case+0x170/0x3f0
[   20.059866]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.059954]  kthread+0x24c/0x2d0
[   20.060038]  ret_from_fork+0x10/0x20
[   20.060148] 
[   20.065409] Allocated by task 165:
[   20.065787]  kasan_save_stack+0x3c/0x68
[   20.066136]  kasan_save_track+0x20/0x40
[   20.066687]  kasan_save_alloc_info+0x40/0x58
[   20.067339]  __kasan_kmalloc+0xd4/0xd8
[   20.067864]  __kmalloc_cache_noprof+0x154/0x320
[   20.068425]  kmalloc_oob_memset_16+0xb0/0x310
[   20.068852]  kunit_try_run_case+0x170/0x3f0
[   20.069388]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.069874]  kthread+0x24c/0x2d0
[   20.070346]  ret_from_fork+0x10/0x20
[   20.070751] 
[   20.071071] The buggy address belongs to the object at fff00000c6492700
[   20.071071]  which belongs to the cache kmalloc-128 of size 128
[   20.072124] The buggy address is located 105 bytes inside of
[   20.072124]  allocated 120-byte region [fff00000c6492700, fff00000c6492778)
[   20.073118] 
[   20.073469] The buggy address belongs to the physical page:
[   20.074030] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106492
[   20.074738] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.075831] page_type: f5(slab)
[   20.076232] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.076982] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   20.077629] page dumped because: kasan: bad access detected
[   20.078125] 
[   20.078301] Memory state around the buggy address:
[   20.078853]  fff00000c6492600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.079700]  fff00000c6492680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.080487] >fff00000c6492700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.081080]                                                                 ^
[   20.081710]  fff00000c6492780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.082444]  fff00000c6492800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.083049] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[   20.017114] ==================================================================
[   20.017789] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x15c/0x310
[   20.018857] Write of size 8 at addr fff00000c5cb7871 by task kunit_try_catch/163
[   20.019770] 
[   20.020008] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   20.020204] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.020278] Hardware name: linux,dummy-virt (DT)
[   20.020346] Call trace:
[   20.020392]  dump_backtrace+0x9c/0x128
[   20.020496]  show_stack+0x20/0x38
[   20.020582]  dump_stack_lvl+0x8c/0xd0
[   20.020663]  print_report+0x118/0x5f0
[   20.020741]  kasan_report+0xdc/0x128
[   20.020818]  kasan_check_range+0x100/0x1a8
[   20.020865]  __asan_memset+0x34/0x78
[   20.020907]  kmalloc_oob_memset_8+0x15c/0x310
[   20.020952]  kunit_try_run_case+0x170/0x3f0
[   20.020997]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.021045]  kthread+0x24c/0x2d0
[   20.021087]  ret_from_fork+0x10/0x20
[   20.021134] 
[   20.027923] Allocated by task 163:
[   20.028298]  kasan_save_stack+0x3c/0x68
[   20.028671]  kasan_save_track+0x20/0x40
[   20.028994]  kasan_save_alloc_info+0x40/0x58
[   20.029822]  __kasan_kmalloc+0xd4/0xd8
[   20.030366]  __kmalloc_cache_noprof+0x154/0x320
[   20.030816]  kmalloc_oob_memset_8+0xb0/0x310
[   20.031199]  kunit_try_run_case+0x170/0x3f0
[   20.031696]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.032972]  kthread+0x24c/0x2d0
[   20.033366]  ret_from_fork+0x10/0x20
[   20.033870] 
[   20.034165] The buggy address belongs to the object at fff00000c5cb7800
[   20.034165]  which belongs to the cache kmalloc-128 of size 128
[   20.035000] The buggy address is located 113 bytes inside of
[   20.035000]  allocated 120-byte region [fff00000c5cb7800, fff00000c5cb7878)
[   20.035898] 
[   20.036662] The buggy address belongs to the physical page:
[   20.036987] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cb7
[   20.037829] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.038476] page_type: f5(slab)
[   20.038830] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.039662] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   20.040222] page dumped because: kasan: bad access detected
[   20.040642] 
[   20.040870] Memory state around the buggy address:
[   20.042448]  fff00000c5cb7700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   20.043630]  fff00000c5cb7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.044378] >fff00000c5cb7800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.044896]                                                                 ^
[   20.045497]  fff00000c5cb7880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.046045]  fff00000c5cb7900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.046692] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[   19.980855] ==================================================================
[   19.981658] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x15c/0x318
[   19.982103] Write of size 4 at addr fff00000c5cb7575 by task kunit_try_catch/161
[   19.983293] 
[   19.983576] CPU: 0 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   19.983766] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.983822] Hardware name: linux,dummy-virt (DT)
[   19.983899] Call trace:
[   19.983945]  dump_backtrace+0x9c/0x128
[   19.984055]  show_stack+0x20/0x38
[   19.984135]  dump_stack_lvl+0x8c/0xd0
[   19.984212]  print_report+0x118/0x5f0
[   19.984307]  kasan_report+0xdc/0x128
[   19.984387]  kasan_check_range+0x100/0x1a8
[   19.984477]  __asan_memset+0x34/0x78
[   19.984579]  kmalloc_oob_memset_4+0x15c/0x318
[   19.984683]  kunit_try_run_case+0x170/0x3f0
[   19.984772]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.984878]  kthread+0x24c/0x2d0
[   19.984971]  ret_from_fork+0x10/0x20
[   19.985049] 
[   19.990618] Allocated by task 161:
[   19.991155]  kasan_save_stack+0x3c/0x68
[   19.991733]  kasan_save_track+0x20/0x40
[   19.992292]  kasan_save_alloc_info+0x40/0x58
[   19.992695]  __kasan_kmalloc+0xd4/0xd8
[   19.993302]  __kmalloc_cache_noprof+0x154/0x320
[   19.994123]  kmalloc_oob_memset_4+0xb0/0x318
[   19.994484]  kunit_try_run_case+0x170/0x3f0
[   19.994784]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.995523]  kthread+0x24c/0x2d0
[   19.996290]  ret_from_fork+0x10/0x20
[   19.996686] 
[   19.996891] The buggy address belongs to the object at fff00000c5cb7500
[   19.996891]  which belongs to the cache kmalloc-128 of size 128
[   19.997848] The buggy address is located 117 bytes inside of
[   19.997848]  allocated 120-byte region [fff00000c5cb7500, fff00000c5cb7578)
[   19.998827] 
[   19.999135] The buggy address belongs to the physical page:
[   20.000113] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cb7
[   20.001182] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.001858] page_type: f5(slab)
[   20.002181] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.003068] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   20.004085] page dumped because: kasan: bad access detected
[   20.004585] 
[   20.004853] Memory state around the buggy address:
[   20.005119]  fff00000c5cb7400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   20.005463]  fff00000c5cb7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.005794] >fff00000c5cb7500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.006116]                                                                 ^
[   20.007338]  fff00000c5cb7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.008077]  fff00000c5cb7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.008550] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[   19.945640] ==================================================================
[   19.946327] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x15c/0x310
[   19.947417] Write of size 2 at addr fff00000c5cb7277 by task kunit_try_catch/159
[   19.947855] 
[   19.948081] CPU: 0 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   19.948265] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.948323] Hardware name: linux,dummy-virt (DT)
[   19.948387] Call trace:
[   19.948428]  dump_backtrace+0x9c/0x128
[   19.948514]  show_stack+0x20/0x38
[   19.948589]  dump_stack_lvl+0x8c/0xd0
[   19.949183]  print_report+0x118/0x5f0
[   19.949331]  kasan_report+0xdc/0x128
[   19.949423]  kasan_check_range+0x100/0x1a8
[   19.949527]  __asan_memset+0x34/0x78
[   19.949595]  kmalloc_oob_memset_2+0x15c/0x310
[   19.949642]  kunit_try_run_case+0x170/0x3f0
[   19.949692]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.949740]  kthread+0x24c/0x2d0
[   19.949782]  ret_from_fork+0x10/0x20
[   19.949829] 
[   19.953466] Allocated by task 159:
[   19.953645]  kasan_save_stack+0x3c/0x68
[   19.953821]  kasan_save_track+0x20/0x40
[   19.953974]  kasan_save_alloc_info+0x40/0x58
[   19.954135]  __kasan_kmalloc+0xd4/0xd8
[   19.954410]  __kmalloc_cache_noprof+0x154/0x320
[   19.955362]  kmalloc_oob_memset_2+0xb0/0x310
[   19.955967]  kunit_try_run_case+0x170/0x3f0
[   19.956530]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.957177]  kthread+0x24c/0x2d0
[   19.958179]  ret_from_fork+0x10/0x20
[   19.958694] 
[   19.958967] The buggy address belongs to the object at fff00000c5cb7200
[   19.958967]  which belongs to the cache kmalloc-128 of size 128
[   19.960215] The buggy address is located 119 bytes inside of
[   19.960215]  allocated 120-byte region [fff00000c5cb7200, fff00000c5cb7278)
[   19.961460] 
[   19.961777] The buggy address belongs to the physical page:
[   19.962391] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105cb7
[   19.963451] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.964005] page_type: f5(slab)
[   19.964335] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.964948] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   19.965569] page dumped because: kasan: bad access detected
[   19.965991] 
[   19.966228] Memory state around the buggy address:
[   19.966702]  fff00000c5cb7100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   19.967211]  fff00000c5cb7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.967910] >fff00000c5cb7200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.968495]                                                                 ^
[   19.969147]  fff00000c5cb7280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.970036]  fff00000c5cb7300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.970542] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   19.906190] ==================================================================
[   19.906865] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x150/0x2e8
[   19.907898] Write of size 128 at addr fff00000c6492500 by task kunit_try_catch/157
[   19.908913] 
[   19.909183] CPU: 1 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   19.909493] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.909564] Hardware name: linux,dummy-virt (DT)
[   19.909608] Call trace:
[   19.909636]  dump_backtrace+0x9c/0x128
[   19.909700]  show_stack+0x20/0x38
[   19.909740]  dump_stack_lvl+0x8c/0xd0
[   19.909787]  print_report+0x118/0x5f0
[   19.909829]  kasan_report+0xdc/0x128
[   19.909868]  kasan_check_range+0x100/0x1a8
[   19.909911]  __asan_memset+0x34/0x78
[   19.909951]  kmalloc_oob_in_memset+0x150/0x2e8
[   19.909997]  kunit_try_run_case+0x170/0x3f0
[   19.910042]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.910090]  kthread+0x24c/0x2d0
[   19.910131]  ret_from_fork+0x10/0x20
[   19.910177] 
[   19.916789] Allocated by task 157:
[   19.917255]  kasan_save_stack+0x3c/0x68
[   19.917764]  kasan_save_track+0x20/0x40
[   19.918220]  kasan_save_alloc_info+0x40/0x58
[   19.918740]  __kasan_kmalloc+0xd4/0xd8
[   19.919233]  __kmalloc_cache_noprof+0x154/0x320
[   19.919780]  kmalloc_oob_in_memset+0xb0/0x2e8
[   19.920290]  kunit_try_run_case+0x170/0x3f0
[   19.920947]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.921454]  kthread+0x24c/0x2d0
[   19.921809]  ret_from_fork+0x10/0x20
[   19.922172] 
[   19.922411] The buggy address belongs to the object at fff00000c6492500
[   19.922411]  which belongs to the cache kmalloc-128 of size 128
[   19.924251] The buggy address is located 0 bytes inside of
[   19.924251]  allocated 120-byte region [fff00000c6492500, fff00000c6492578)
[   19.925890] 
[   19.926168] The buggy address belongs to the physical page:
[   19.926631] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106492
[   19.927663] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.928221] page_type: f5(slab)
[   19.928607] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.929182] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   19.929661] page dumped because: kasan: bad access detected
[   19.930252] 
[   19.930529] Memory state around the buggy address:
[   19.930926]  fff00000c6492400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.931532]  fff00000c6492480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.932200] >fff00000c6492500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.932699]                                                                 ^
[   19.933641]  fff00000c6492580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.934165]  fff00000c6492600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.934718] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[   19.859151] ==================================================================
[   19.860023] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   19.862370] Read of size 16 at addr fff00000c5bb2260 by task kunit_try_catch/155
[   19.863755] 
[   19.864548] CPU: 0 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   19.864763] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.864820] Hardware name: linux,dummy-virt (DT)
[   19.864889] Call trace:
[   19.864942]  dump_backtrace+0x9c/0x128
[   19.865055]  show_stack+0x20/0x38
[   19.865131]  dump_stack_lvl+0x8c/0xd0
[   19.865218]  print_report+0x118/0x5f0
[   19.865312]  kasan_report+0xdc/0x128
[   19.865379]  __asan_report_load16_noabort+0x20/0x30
[   19.865462]  kmalloc_uaf_16+0x3bc/0x438
[   19.865551]  kunit_try_run_case+0x170/0x3f0
[   19.865637]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.865720]  kthread+0x24c/0x2d0
[   19.865796]  ret_from_fork+0x10/0x20
[   19.865885] 
[   19.874636] Allocated by task 155:
[   19.875302]  kasan_save_stack+0x3c/0x68
[   19.876102]  kasan_save_track+0x20/0x40
[   19.876532]  kasan_save_alloc_info+0x40/0x58
[   19.877075]  __kasan_kmalloc+0xd4/0xd8
[   19.877557]  __kmalloc_cache_noprof+0x154/0x320
[   19.878145]  kmalloc_uaf_16+0x144/0x438
[   19.878571]  kunit_try_run_case+0x170/0x3f0
[   19.879001]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.879558]  kthread+0x24c/0x2d0
[   19.880117]  ret_from_fork+0x10/0x20
[   19.880506] 
[   19.880712] Freed by task 155:
[   19.881121]  kasan_save_stack+0x3c/0x68
[   19.881499]  kasan_save_track+0x20/0x40
[   19.881957]  kasan_save_free_info+0x4c/0x78
[   19.882441]  __kasan_slab_free+0x6c/0x98
[   19.882886]  kfree+0x110/0x3b8
[   19.883397]  kmalloc_uaf_16+0x198/0x438
[   19.883968]  kunit_try_run_case+0x170/0x3f0
[   19.884627]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.885180]  kthread+0x24c/0x2d0
[   19.885613]  ret_from_fork+0x10/0x20
[   19.886097] 
[   19.886414] The buggy address belongs to the object at fff00000c5bb2260
[   19.886414]  which belongs to the cache kmalloc-16 of size 16
[   19.887463] The buggy address is located 0 bytes inside of
[   19.887463]  freed 16-byte region [fff00000c5bb2260, fff00000c5bb2270)
[   19.888227] 
[   19.888440] The buggy address belongs to the physical page:
[   19.888772] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105bb2
[   19.889566] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.890077] page_type: f5(slab)
[   19.890591] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.891286] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   19.892166] page dumped because: kasan: bad access detected
[   19.892485] 
[   19.892986] Memory state around the buggy address:
[   19.893612]  fff00000c5bb2100: 00 02 fc fc 00 05 fc fc fa fb fc fc 00 02 fc fc
[   19.894189]  fff00000c5bb2180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   19.894635] >fff00000c5bb2200: fa fb fc fc 00 04 fc fc 00 00 fc fc fa fb fc fc
[   19.895763]                                                        ^
[   19.896292]  fff00000c5bb2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.896831]  fff00000c5bb2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.897340] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[   19.822510] ==================================================================
[   19.823279] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a8/0x400
[   19.824510] Write of size 16 at addr fff00000c64513e0 by task kunit_try_catch/153
[   19.825158] 
[   19.825516] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   19.825732] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.825803] Hardware name: linux,dummy-virt (DT)
[   19.825886] Call trace:
[   19.825944]  dump_backtrace+0x9c/0x128
[   19.826065]  show_stack+0x20/0x38
[   19.826155]  dump_stack_lvl+0x8c/0xd0
[   19.826231]  print_report+0x118/0x5f0
[   19.826351]  kasan_report+0xdc/0x128
[   19.826410]  __asan_report_store16_noabort+0x20/0x30
[   19.826460]  kmalloc_oob_16+0x3a8/0x400
[   19.826503]  kunit_try_run_case+0x170/0x3f0
[   19.826551]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.826599]  kthread+0x24c/0x2d0
[   19.826641]  ret_from_fork+0x10/0x20
[   19.826687] 
[   19.831944] Allocated by task 153:
[   19.832174]  kasan_save_stack+0x3c/0x68
[   19.832442]  kasan_save_track+0x20/0x40
[   19.832669]  kasan_save_alloc_info+0x40/0x58
[   19.832908]  __kasan_kmalloc+0xd4/0xd8
[   19.833127]  __kmalloc_cache_noprof+0x154/0x320
[   19.834324]  kmalloc_oob_16+0xb4/0x400
[   19.834762]  kunit_try_run_case+0x170/0x3f0
[   19.835891]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.836339]  kthread+0x24c/0x2d0
[   19.836789]  ret_from_fork+0x10/0x20
[   19.837154] 
[   19.837414] The buggy address belongs to the object at fff00000c64513e0
[   19.837414]  which belongs to the cache kmalloc-16 of size 16
[   19.838235] The buggy address is located 0 bytes inside of
[   19.838235]  allocated 13-byte region [fff00000c64513e0, fff00000c64513ed)
[   19.839056] 
[   19.839768] The buggy address belongs to the physical page:
[   19.840102] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106451
[   19.840505] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.841190] page_type: f5(slab)
[   19.841640] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.842249] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   19.842965] page dumped because: kasan: bad access detected
[   19.843745] 
[   19.843938] Memory state around the buggy address:
[   19.844142]  fff00000c6451280: 00 00 fc fc 00 06 fc fc 00 06 fc fc 00 00 fc fc
[   19.844782]  fff00000c6451300: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[   19.845531] >fff00000c6451380: fa fb fc fc 00 05 fc fc fa fb fc fc 00 05 fc fc
[   19.846129]                                                           ^
[   19.846689]  fff00000c6451400: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.847331]  fff00000c6451480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.847984] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[   19.777400] ==================================================================
[   19.777886] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c4/0x510
[   19.778341] Read of size 1 at addr fff00000c6042800 by task kunit_try_catch/151
[   19.778785] 
[   19.779062] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   19.779288] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.779361] Hardware name: linux,dummy-virt (DT)
[   19.779441] Call trace:
[   19.779495]  dump_backtrace+0x9c/0x128
[   19.779612]  show_stack+0x20/0x38
[   19.779696]  dump_stack_lvl+0x8c/0xd0
[   19.779787]  print_report+0x118/0x5f0
[   19.779882]  kasan_report+0xdc/0x128
[   19.779968]  __asan_report_load1_noabort+0x20/0x30
[   19.780064]  krealloc_uaf+0x4c4/0x510
[   19.780158]  kunit_try_run_case+0x170/0x3f0
[   19.780574]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.780654]  kthread+0x24c/0x2d0
[   19.780728]  ret_from_fork+0x10/0x20
[   19.780801] 
[   19.786881] Allocated by task 151:
[   19.787537]  kasan_save_stack+0x3c/0x68
[   19.788128]  kasan_save_track+0x20/0x40
[   19.788680]  kasan_save_alloc_info+0x40/0x58
[   19.789075]  __kasan_kmalloc+0xd4/0xd8
[   19.789390]  __kmalloc_cache_noprof+0x154/0x320
[   19.789783]  krealloc_uaf+0xc8/0x510
[   19.790105]  kunit_try_run_case+0x170/0x3f0
[   19.790480]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.790902]  kthread+0x24c/0x2d0
[   19.791511]  ret_from_fork+0x10/0x20
[   19.791948] 
[   19.792168] Freed by task 151:
[   19.792594]  kasan_save_stack+0x3c/0x68
[   19.792982]  kasan_save_track+0x20/0x40
[   19.793412]  kasan_save_free_info+0x4c/0x78
[   19.793866]  __kasan_slab_free+0x6c/0x98
[   19.794322]  kfree+0x110/0x3b8
[   19.794746]  krealloc_uaf+0x130/0x510
[   19.795454]  kunit_try_run_case+0x170/0x3f0
[   19.795919]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.796394]  kthread+0x24c/0x2d0
[   19.796695]  ret_from_fork+0x10/0x20
[   19.797009] 
[   19.797841] The buggy address belongs to the object at fff00000c6042800
[   19.797841]  which belongs to the cache kmalloc-256 of size 256
[   19.798796] The buggy address is located 0 bytes inside of
[   19.798796]  freed 256-byte region [fff00000c6042800, fff00000c6042900)
[   19.800068] 
[   19.800622] The buggy address belongs to the physical page:
[   19.801511] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106042
[   19.802115] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.803268] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.803864] page_type: f5(slab)
[   19.804103] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.804486] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   19.804844] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.805197] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   19.806424] head: 0bfffe0000000001 ffffc1ffc3181081 ffffffffffffffff 0000000000000000
[   19.807098] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   19.807953] page dumped because: kasan: bad access detected
[   19.808430] 
[   19.808698] Memory state around the buggy address:
[   19.809177]  fff00000c6042700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.809842]  fff00000c6042780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.810542] >fff00000c6042800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.811601]                    ^
[   19.811913]  fff00000c6042880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.812459]  fff00000c6042900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.813149] ==================================================================
[   19.738011] ==================================================================
[   19.738853] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x18c/0x510
[   19.739609] Read of size 1 at addr fff00000c6042800 by task kunit_try_catch/151
[   19.740747] 
[   19.741124] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   19.741372] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.741447] Hardware name: linux,dummy-virt (DT)
[   19.741549] Call trace:
[   19.741627]  dump_backtrace+0x9c/0x128
[   19.741740]  show_stack+0x20/0x38
[   19.741789]  dump_stack_lvl+0x8c/0xd0
[   19.741838]  print_report+0x118/0x5f0
[   19.741880]  kasan_report+0xdc/0x128
[   19.741921]  __kasan_check_byte+0x54/0x70
[   19.741962]  krealloc_noprof+0x48/0x1a0
[   19.742006]  krealloc_uaf+0x18c/0x510
[   19.742048]  kunit_try_run_case+0x170/0x3f0
[   19.742092]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.742140]  kthread+0x24c/0x2d0
[   19.742181]  ret_from_fork+0x10/0x20
[   19.742228] 
[   19.747938] Allocated by task 151:
[   19.748421]  kasan_save_stack+0x3c/0x68
[   19.748845]  kasan_save_track+0x20/0x40
[   19.749374]  kasan_save_alloc_info+0x40/0x58
[   19.749788]  __kasan_kmalloc+0xd4/0xd8
[   19.750287]  __kmalloc_cache_noprof+0x154/0x320
[   19.750863]  krealloc_uaf+0xc8/0x510
[   19.751601]  kunit_try_run_case+0x170/0x3f0
[   19.752003]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.752626]  kthread+0x24c/0x2d0
[   19.753048]  ret_from_fork+0x10/0x20
[   19.753466] 
[   19.753826] Freed by task 151:
[   19.754301]  kasan_save_stack+0x3c/0x68
[   19.754753]  kasan_save_track+0x20/0x40
[   19.755419]  kasan_save_free_info+0x4c/0x78
[   19.755716]  __kasan_slab_free+0x6c/0x98
[   19.756228]  kfree+0x110/0x3b8
[   19.756659]  krealloc_uaf+0x130/0x510
[   19.757176]  kunit_try_run_case+0x170/0x3f0
[   19.757672]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.758197]  kthread+0x24c/0x2d0
[   19.758608]  ret_from_fork+0x10/0x20
[   19.759073] 
[   19.759640] The buggy address belongs to the object at fff00000c6042800
[   19.759640]  which belongs to the cache kmalloc-256 of size 256
[   19.761403] The buggy address is located 0 bytes inside of
[   19.761403]  freed 256-byte region [fff00000c6042800, fff00000c6042900)
[   19.762273] 
[   19.762530] The buggy address belongs to the physical page:
[   19.762986] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106042
[   19.763978] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.764790] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.765447] page_type: f5(slab)
[   19.765836] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.766688] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   19.767634] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.768340] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   19.768926] head: 0bfffe0000000001 ffffc1ffc3181081 ffffffffffffffff 0000000000000000
[   19.769824] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   19.770529] page dumped because: kasan: bad access detected
[   19.771368] 
[   19.771826] Memory state around the buggy address:
[   19.772474]  fff00000c6042700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.772976]  fff00000c6042780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.773767] >fff00000c6042800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.774355]                    ^
[   19.774948]  fff00000c6042880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.775776]  fff00000c6042900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.776120] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   19.374197] ==================================================================
[   19.374957] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa2c/0xbc8
[   19.376658] Write of size 1 at addr fff00000c44796c9 by task kunit_try_catch/145
[   19.377226] 
[   19.377577] CPU: 0 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   19.377777] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.377836] Hardware name: linux,dummy-virt (DT)
[   19.377911] Call trace:
[   19.377963]  dump_backtrace+0x9c/0x128
[   19.378078]  show_stack+0x20/0x38
[   19.378158]  dump_stack_lvl+0x8c/0xd0
[   19.378269]  print_report+0x118/0x5f0
[   19.378344]  kasan_report+0xdc/0x128
[   19.378399]  __asan_report_store1_noabort+0x20/0x30
[   19.378448]  krealloc_less_oob_helper+0xa2c/0xbc8
[   19.378496]  krealloc_less_oob+0x20/0x38
[   19.378540]  kunit_try_run_case+0x170/0x3f0
[   19.378586]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.378635]  kthread+0x24c/0x2d0
[   19.378677]  ret_from_fork+0x10/0x20
[   19.378724] 
[   19.383813] Allocated by task 145:
[   19.384080]  kasan_save_stack+0x3c/0x68
[   19.384430]  kasan_save_track+0x20/0x40
[   19.385667]  kasan_save_alloc_info+0x40/0x58
[   19.386259]  __kasan_krealloc+0x118/0x178
[   19.386782]  krealloc_noprof+0x10c/0x1a0
[   19.387746]  krealloc_less_oob_helper+0x170/0xbc8
[   19.388119]  krealloc_less_oob+0x20/0x38
[   19.389203]  kunit_try_run_case+0x170/0x3f0
[   19.389739]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.390282]  kthread+0x24c/0x2d0
[   19.390620]  ret_from_fork+0x10/0x20
[   19.390991] 
[   19.391278] The buggy address belongs to the object at fff00000c4479600
[   19.391278]  which belongs to the cache kmalloc-256 of size 256
[   19.392081] The buggy address is located 0 bytes to the right of
[   19.392081]  allocated 201-byte region [fff00000c4479600, fff00000c44796c9)
[   19.393135] 
[   19.393969] The buggy address belongs to the physical page:
[   19.394611] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104478
[   19.395666] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.395942] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.396179] page_type: f5(slab)
[   19.396362] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.396599] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   19.396829] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.397059] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   19.397407] head: 0bfffe0000000001 ffffc1ffc3111e01 ffffffffffffffff 0000000000000000
[   19.398259] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   19.399067] page dumped because: kasan: bad access detected
[   19.400074] 
[   19.400367] Memory state around the buggy address:
[   19.400874]  fff00000c4479580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.402019]  fff00000c4479600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.402794] >fff00000c4479680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.403814]                                               ^
[   19.404451]  fff00000c4479700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.405012]  fff00000c4479780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.405650] ==================================================================
[   19.511096] ==================================================================
[   19.512656] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa3c/0xbc8
[   19.513291] Write of size 1 at addr fff00000c44796eb by task kunit_try_catch/145
[   19.513937] 
[   19.514194] CPU: 0 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   19.514421] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.514489] Hardware name: linux,dummy-virt (DT)
[   19.514575] Call trace:
[   19.514631]  dump_backtrace+0x9c/0x128
[   19.514743]  show_stack+0x20/0x38
[   19.514828]  dump_stack_lvl+0x8c/0xd0
[   19.514919]  print_report+0x118/0x5f0
[   19.515015]  kasan_report+0xdc/0x128
[   19.515311]  __asan_report_store1_noabort+0x20/0x30
[   19.515434]  krealloc_less_oob_helper+0xa3c/0xbc8
[   19.515495]  krealloc_less_oob+0x20/0x38
[   19.515541]  kunit_try_run_case+0x170/0x3f0
[   19.515589]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.515638]  kthread+0x24c/0x2d0
[   19.515680]  ret_from_fork+0x10/0x20
[   19.515727] 
[   19.522821] Allocated by task 145:
[   19.523287]  kasan_save_stack+0x3c/0x68
[   19.523854]  kasan_save_track+0x20/0x40
[   19.524440]  kasan_save_alloc_info+0x40/0x58
[   19.524874]  __kasan_krealloc+0x118/0x178
[   19.525406]  krealloc_noprof+0x10c/0x1a0
[   19.525676]  krealloc_less_oob_helper+0x170/0xbc8
[   19.526269]  krealloc_less_oob+0x20/0x38
[   19.526749]  kunit_try_run_case+0x170/0x3f0
[   19.527498]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.528130]  kthread+0x24c/0x2d0
[   19.528449]  ret_from_fork+0x10/0x20
[   19.528937] 
[   19.529202] The buggy address belongs to the object at fff00000c4479600
[   19.529202]  which belongs to the cache kmalloc-256 of size 256
[   19.530636] The buggy address is located 34 bytes to the right of
[   19.530636]  allocated 201-byte region [fff00000c4479600, fff00000c44796c9)
[   19.531738] 
[   19.531908] The buggy address belongs to the physical page:
[   19.532181] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104478
[   19.533164] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.533662] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.534206] page_type: f5(slab)
[   19.534646] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.535702] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   19.536123] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.536563] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   19.537392] head: 0bfffe0000000001 ffffc1ffc3111e01 ffffffffffffffff 0000000000000000
[   19.538013] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   19.538729] page dumped because: kasan: bad access detected
[   19.539410] 
[   19.539987] Memory state around the buggy address:
[   19.540463]  fff00000c4479580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.541091]  fff00000c4479600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.541736] >fff00000c4479680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.542337]                                                           ^
[   19.542904]  fff00000c4479700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.543596]  fff00000c4479780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.544190] ==================================================================
[   19.441302] ==================================================================
[   19.441734] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa54/0xbc8
[   19.442002] Write of size 1 at addr fff00000c44796da by task kunit_try_catch/145
[   19.442230] 
[   19.442572] CPU: 0 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   19.442860] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.442940] Hardware name: linux,dummy-virt (DT)
[   19.443049] Call trace:
[   19.443101]  dump_backtrace+0x9c/0x128
[   19.443262]  show_stack+0x20/0x38
[   19.443399]  dump_stack_lvl+0x8c/0xd0
[   19.443503]  print_report+0x118/0x5f0
[   19.443604]  kasan_report+0xdc/0x128
[   19.443701]  __asan_report_store1_noabort+0x20/0x30
[   19.443809]  krealloc_less_oob_helper+0xa54/0xbc8
[   19.443903]  krealloc_less_oob+0x20/0x38
[   19.443990]  kunit_try_run_case+0x170/0x3f0
[   19.444539]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.444683]  kthread+0x24c/0x2d0
[   19.444787]  ret_from_fork+0x10/0x20
[   19.444897] 
[   19.452212] Allocated by task 145:
[   19.452746]  kasan_save_stack+0x3c/0x68
[   19.453317]  kasan_save_track+0x20/0x40
[   19.453862]  kasan_save_alloc_info+0x40/0x58
[   19.454372]  __kasan_krealloc+0x118/0x178
[   19.454878]  krealloc_noprof+0x10c/0x1a0
[   19.455502]  krealloc_less_oob_helper+0x170/0xbc8
[   19.456396]  krealloc_less_oob+0x20/0x38
[   19.456715]  kunit_try_run_case+0x170/0x3f0
[   19.457049]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.457745]  kthread+0x24c/0x2d0
[   19.458100]  ret_from_fork+0x10/0x20
[   19.458521] 
[   19.458783] The buggy address belongs to the object at fff00000c4479600
[   19.458783]  which belongs to the cache kmalloc-256 of size 256
[   19.460147] The buggy address is located 17 bytes to the right of
[   19.460147]  allocated 201-byte region [fff00000c4479600, fff00000c44796c9)
[   19.461050] 
[   19.461358] The buggy address belongs to the physical page:
[   19.461895] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104478
[   19.462561] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.463172] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.463842] page_type: f5(slab)
[   19.464709] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.465416] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   19.465988] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.466664] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   19.467557] head: 0bfffe0000000001 ffffc1ffc3111e01 ffffffffffffffff 0000000000000000
[   19.468218] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   19.468773] page dumped because: kasan: bad access detected
[   19.470071] 
[   19.470271] Memory state around the buggy address:
[   19.470545]  fff00000c4479580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.471701]  fff00000c4479600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.472284] >fff00000c4479680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.472881]                                                     ^
[   19.473427]  fff00000c4479700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.474036]  fff00000c4479780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.474603] ==================================================================
[   19.408199] ==================================================================
[   19.408736] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb20/0xbc8
[   19.409356] Write of size 1 at addr fff00000c44796d0 by task kunit_try_catch/145
[   19.409815] 
[   19.410141] CPU: 0 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   19.410320] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.410381] Hardware name: linux,dummy-virt (DT)
[   19.410459] Call trace:
[   19.410518]  dump_backtrace+0x9c/0x128
[   19.410645]  show_stack+0x20/0x38
[   19.410734]  dump_stack_lvl+0x8c/0xd0
[   19.410826]  print_report+0x118/0x5f0
[   19.410921]  kasan_report+0xdc/0x128
[   19.410994]  __asan_report_store1_noabort+0x20/0x30
[   19.411045]  krealloc_less_oob_helper+0xb20/0xbc8
[   19.411139]  krealloc_less_oob+0x20/0x38
[   19.411215]  kunit_try_run_case+0x170/0x3f0
[   19.411322]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.411409]  kthread+0x24c/0x2d0
[   19.411484]  ret_from_fork+0x10/0x20
[   19.411555] 
[   19.416475] Allocated by task 145:
[   19.416933]  kasan_save_stack+0x3c/0x68
[   19.418546]  kasan_save_track+0x20/0x40
[   19.418833]  kasan_save_alloc_info+0x40/0x58
[   19.419117]  __kasan_krealloc+0x118/0x178
[   19.419411]  krealloc_noprof+0x10c/0x1a0
[   19.419696]  krealloc_less_oob_helper+0x170/0xbc8
[   19.420008]  krealloc_less_oob+0x20/0x38
[   19.420377]  kunit_try_run_case+0x170/0x3f0
[   19.420736]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.421257]  kthread+0x24c/0x2d0
[   19.421548]  ret_from_fork+0x10/0x20
[   19.421815] 
[   19.421987] The buggy address belongs to the object at fff00000c4479600
[   19.421987]  which belongs to the cache kmalloc-256 of size 256
[   19.424110] The buggy address is located 7 bytes to the right of
[   19.424110]  allocated 201-byte region [fff00000c4479600, fff00000c44796c9)
[   19.425735] 
[   19.426040] The buggy address belongs to the physical page:
[   19.426669] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104478
[   19.427290] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.427893] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.428879] page_type: f5(slab)
[   19.429146] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.429959] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   19.430639] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.431344] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   19.432816] head: 0bfffe0000000001 ffffc1ffc3111e01 ffffffffffffffff 0000000000000000
[   19.433446] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   19.434012] page dumped because: kasan: bad access detected
[   19.434825] 
[   19.435326] Memory state around the buggy address:
[   19.435626]  fff00000c4479580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.436612]  fff00000c4479600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.437329] >fff00000c4479680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.437978]                                                  ^
[   19.438339]  fff00000c4479700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.439135]  fff00000c4479780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.440219] ==================================================================
[   19.707961] ==================================================================
[   19.708503] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa3c/0xbc8
[   19.709965] Write of size 1 at addr fff00000c6c6e0eb by task kunit_try_catch/149
[   19.710735] 
[   19.711015] CPU: 1 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   19.711261] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.711752] Hardware name: linux,dummy-virt (DT)
[   19.711854] Call trace:
[   19.711914]  dump_backtrace+0x9c/0x128
[   19.711997]  show_stack+0x20/0x38
[   19.712040]  dump_stack_lvl+0x8c/0xd0
[   19.712087]  print_report+0x118/0x5f0
[   19.712164]  kasan_report+0xdc/0x128
[   19.712206]  __asan_report_store1_noabort+0x20/0x30
[   19.712278]  krealloc_less_oob_helper+0xa3c/0xbc8
[   19.712331]  krealloc_large_less_oob+0x20/0x38
[   19.712377]  kunit_try_run_case+0x170/0x3f0
[   19.712423]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.712471]  kthread+0x24c/0x2d0
[   19.712514]  ret_from_fork+0x10/0x20
[   19.712562] 
[   19.717295] The buggy address belongs to the physical page:
[   19.717590] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106c6c
[   19.717971] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.718348] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.719301] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.719687] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.720032] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.720419] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.720902] head: 0bfffe0000000002 ffffc1ffc31b1b01 ffffffffffffffff 0000000000000000
[   19.721583] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   19.722402] page dumped because: kasan: bad access detected
[   19.723038] 
[   19.723859] Memory state around the buggy address:
[   19.724457]  fff00000c6c6df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.724890]  fff00000c6c6e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.725230] >fff00000c6c6e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.726287]                                                           ^
[   19.726882]  fff00000c6c6e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.728399]  fff00000c6c6e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.728972] ==================================================================
[   19.615539] ==================================================================
[   19.616615] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa2c/0xbc8
[   19.617418] Write of size 1 at addr fff00000c6c6e0c9 by task kunit_try_catch/149
[   19.618042] 
[   19.618300] CPU: 1 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   19.618499] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.618562] Hardware name: linux,dummy-virt (DT)
[   19.618643] Call trace:
[   19.618701]  dump_backtrace+0x9c/0x128
[   19.618822]  show_stack+0x20/0x38
[   19.618914]  dump_stack_lvl+0x8c/0xd0
[   19.619017]  print_report+0x118/0x5f0
[   19.619287]  kasan_report+0xdc/0x128
[   19.619397]  __asan_report_store1_noabort+0x20/0x30
[   19.619502]  krealloc_less_oob_helper+0xa2c/0xbc8
[   19.619624]  krealloc_large_less_oob+0x20/0x38
[   19.619723]  kunit_try_run_case+0x170/0x3f0
[   19.619798]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.619850]  kthread+0x24c/0x2d0
[   19.619894]  ret_from_fork+0x10/0x20
[   19.619944] 
[   19.625596] The buggy address belongs to the physical page:
[   19.626103] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106c6c
[   19.626750] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.627679] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.628347] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.628948] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.629634] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.630273] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.630908] head: 0bfffe0000000002 ffffc1ffc31b1b01 ffffffffffffffff 0000000000000000
[   19.631657] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   19.632272] page dumped because: kasan: bad access detected
[   19.632734] 
[   19.632964] Memory state around the buggy address:
[   19.633912]  fff00000c6c6df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.634378]  fff00000c6c6e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.635076] >fff00000c6c6e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.636028]                                               ^
[   19.636399]  fff00000c6c6e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.637036]  fff00000c6c6e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.637546] ==================================================================
[   19.684356] ==================================================================
[   19.684889] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa98/0xbc8
[   19.685468] Write of size 1 at addr fff00000c6c6e0ea by task kunit_try_catch/149
[   19.686179] 
[   19.686514] CPU: 1 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   19.686731] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.686800] Hardware name: linux,dummy-virt (DT)
[   19.686878] Call trace:
[   19.686933]  dump_backtrace+0x9c/0x128
[   19.687048]  show_stack+0x20/0x38
[   19.687136]  dump_stack_lvl+0x8c/0xd0
[   19.687226]  print_report+0x118/0x5f0
[   19.688047]  kasan_report+0xdc/0x128
[   19.688171]  __asan_report_store1_noabort+0x20/0x30
[   19.688300]  krealloc_less_oob_helper+0xa98/0xbc8
[   19.688414]  krealloc_large_less_oob+0x20/0x38
[   19.688512]  kunit_try_run_case+0x170/0x3f0
[   19.688598]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.688650]  kthread+0x24c/0x2d0
[   19.688695]  ret_from_fork+0x10/0x20
[   19.688743] 
[   19.693089] The buggy address belongs to the physical page:
[   19.694313] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106c6c
[   19.695344] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.696132] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.696844] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.697482] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.698055] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.698645] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.699253] head: 0bfffe0000000002 ffffc1ffc31b1b01 ffffffffffffffff 0000000000000000
[   19.700264] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   19.700875] page dumped because: kasan: bad access detected
[   19.701405] 
[   19.701664] Memory state around the buggy address:
[   19.702096]  fff00000c6c6df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.702792]  fff00000c6c6e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.703674] >fff00000c6c6e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.704292]                                                           ^
[   19.704969]  fff00000c6c6e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.705571]  fff00000c6c6e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.706136] ==================================================================
[   19.661608] ==================================================================
[   19.662214] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa54/0xbc8
[   19.662839] Write of size 1 at addr fff00000c6c6e0da by task kunit_try_catch/149
[   19.663660] 
[   19.664003] CPU: 1 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   19.664225] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.664310] Hardware name: linux,dummy-virt (DT)
[   19.664388] Call trace:
[   19.664447]  dump_backtrace+0x9c/0x128
[   19.664559]  show_stack+0x20/0x38
[   19.664649]  dump_stack_lvl+0x8c/0xd0
[   19.664745]  print_report+0x118/0x5f0
[   19.664807]  kasan_report+0xdc/0x128
[   19.664848]  __asan_report_store1_noabort+0x20/0x30
[   19.664896]  krealloc_less_oob_helper+0xa54/0xbc8
[   19.664943]  krealloc_large_less_oob+0x20/0x38
[   19.664989]  kunit_try_run_case+0x170/0x3f0
[   19.665034]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.665083]  kthread+0x24c/0x2d0
[   19.665124]  ret_from_fork+0x10/0x20
[   19.665170] 
[   19.671764] The buggy address belongs to the physical page:
[   19.672284] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106c6c
[   19.672900] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.673577] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.674082] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.674427] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.675400] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.676063] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.676704] head: 0bfffe0000000002 ffffc1ffc31b1b01 ffffffffffffffff 0000000000000000
[   19.677343] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   19.677943] page dumped because: kasan: bad access detected
[   19.678425] 
[   19.678676] Memory state around the buggy address:
[   19.680111]  fff00000c6c6df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.680619]  fff00000c6c6e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.681105] >fff00000c6c6e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.681798]                                                     ^
[   19.682420]  fff00000c6c6e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.683004]  fff00000c6c6e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.683700] ==================================================================
[   19.639122] ==================================================================
[   19.640302] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb20/0xbc8
[   19.640736] Write of size 1 at addr fff00000c6c6e0d0 by task kunit_try_catch/149
[   19.640977] 
[   19.641100] CPU: 1 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   19.641207] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.641260] Hardware name: linux,dummy-virt (DT)
[   19.641308] Call trace:
[   19.641335]  dump_backtrace+0x9c/0x128
[   19.641390]  show_stack+0x20/0x38
[   19.641430]  dump_stack_lvl+0x8c/0xd0
[   19.641476]  print_report+0x118/0x5f0
[   19.641538]  kasan_report+0xdc/0x128
[   19.641579]  __asan_report_store1_noabort+0x20/0x30
[   19.641626]  krealloc_less_oob_helper+0xb20/0xbc8
[   19.641673]  krealloc_large_less_oob+0x20/0x38
[   19.641719]  kunit_try_run_case+0x170/0x3f0
[   19.641764]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.641813]  kthread+0x24c/0x2d0
[   19.641856]  ret_from_fork+0x10/0x20
[   19.641903] 
[   19.647130] The buggy address belongs to the physical page:
[   19.647750] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106c6c
[   19.648586] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.649756] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.650576] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.651533] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.652052] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.652802] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.653348] head: 0bfffe0000000002 ffffc1ffc31b1b01 ffffffffffffffff 0000000000000000
[   19.654039] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   19.654567] page dumped because: kasan: bad access detected
[   19.654988] 
[   19.656187] Memory state around the buggy address:
[   19.656515]  fff00000c6c6df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.657195]  fff00000c6c6e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.657826] >fff00000c6c6e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   19.658376]                                                  ^
[   19.658878]  fff00000c6c6e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.659504]  fff00000c6c6e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.660106] ==================================================================
[   19.476045] ==================================================================
[   19.477248] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa98/0xbc8
[   19.477848] Write of size 1 at addr fff00000c44796ea by task kunit_try_catch/145
[   19.478269] 
[   19.478544] CPU: 0 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   19.478769] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.478833] Hardware name: linux,dummy-virt (DT)
[   19.478912] Call trace:
[   19.478964]  dump_backtrace+0x9c/0x128
[   19.479074]  show_stack+0x20/0x38
[   19.479160]  dump_stack_lvl+0x8c/0xd0
[   19.479276]  print_report+0x118/0x5f0
[   19.479802]  kasan_report+0xdc/0x128
[   19.479891]  __asan_report_store1_noabort+0x20/0x30
[   19.479942]  krealloc_less_oob_helper+0xa98/0xbc8
[   19.479991]  krealloc_less_oob+0x20/0x38
[   19.480035]  kunit_try_run_case+0x170/0x3f0
[   19.480083]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.480131]  kthread+0x24c/0x2d0
[   19.480174]  ret_from_fork+0x10/0x20
[   19.480222] 
[   19.486253] Allocated by task 145:
[   19.486723]  kasan_save_stack+0x3c/0x68
[   19.487076]  kasan_save_track+0x20/0x40
[   19.488023]  kasan_save_alloc_info+0x40/0x58
[   19.488456]  __kasan_krealloc+0x118/0x178
[   19.488864]  krealloc_noprof+0x10c/0x1a0
[   19.489802]  krealloc_less_oob_helper+0x170/0xbc8
[   19.490215]  krealloc_less_oob+0x20/0x38
[   19.490798]  kunit_try_run_case+0x170/0x3f0
[   19.491533]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.492133]  kthread+0x24c/0x2d0
[   19.492867]  ret_from_fork+0x10/0x20
[   19.493318] 
[   19.493610] The buggy address belongs to the object at fff00000c4479600
[   19.493610]  which belongs to the cache kmalloc-256 of size 256
[   19.494745] The buggy address is located 33 bytes to the right of
[   19.494745]  allocated 201-byte region [fff00000c4479600, fff00000c44796c9)
[   19.496063] 
[   19.496434] The buggy address belongs to the physical page:
[   19.496865] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104478
[   19.497787] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.498384] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.499026] page_type: f5(slab)
[   19.499378] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.500034] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   19.500730] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.501858] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   19.502543] head: 0bfffe0000000001 ffffc1ffc3111e01 ffffffffffffffff 0000000000000000
[   19.504030] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   19.504543] page dumped because: kasan: bad access detected
[   19.505174] 
[   19.505464] Memory state around the buggy address:
[   19.505867]  fff00000c4479580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.506508]  fff00000c4479600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.507089] >fff00000c4479680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   19.507637]                                                           ^
[   19.508144]  fff00000c4479700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.509092]  fff00000c4479780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.509525] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   19.292311] ==================================================================
[   19.293096] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x628/0x690
[   19.294224] Write of size 1 at addr fff00000c44794eb by task kunit_try_catch/143
[   19.295365] 
[   19.295924] CPU: 0 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   19.296142] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.296201] Hardware name: linux,dummy-virt (DT)
[   19.296283] Call trace:
[   19.296330]  dump_backtrace+0x9c/0x128
[   19.296442]  show_stack+0x20/0x38
[   19.296489]  dump_stack_lvl+0x8c/0xd0
[   19.296537]  print_report+0x118/0x5f0
[   19.296580]  kasan_report+0xdc/0x128
[   19.296621]  __asan_report_store1_noabort+0x20/0x30
[   19.296668]  krealloc_more_oob_helper+0x628/0x690
[   19.296716]  krealloc_more_oob+0x20/0x38
[   19.296759]  kunit_try_run_case+0x170/0x3f0
[   19.296804]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.296852]  kthread+0x24c/0x2d0
[   19.296894]  ret_from_fork+0x10/0x20
[   19.296942] 
[   19.302559] Allocated by task 143:
[   19.302932]  kasan_save_stack+0x3c/0x68
[   19.303415]  kasan_save_track+0x20/0x40
[   19.303908]  kasan_save_alloc_info+0x40/0x58
[   19.304692]  __kasan_krealloc+0x118/0x178
[   19.305110]  krealloc_noprof+0x10c/0x1a0
[   19.305571]  krealloc_more_oob_helper+0x170/0x690
[   19.306024]  krealloc_more_oob+0x20/0x38
[   19.307530]  kunit_try_run_case+0x170/0x3f0
[   19.307951]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.308344]  kthread+0x24c/0x2d0
[   19.308783]  ret_from_fork+0x10/0x20
[   19.309166] 
[   19.309445] The buggy address belongs to the object at fff00000c4479400
[   19.309445]  which belongs to the cache kmalloc-256 of size 256
[   19.310205] The buggy address is located 0 bytes to the right of
[   19.310205]  allocated 235-byte region [fff00000c4479400, fff00000c44794eb)
[   19.311198] 
[   19.311676] The buggy address belongs to the physical page:
[   19.312658] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104478
[   19.313252] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.314323] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.315117] page_type: f5(slab)
[   19.315424] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.316071] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   19.317115] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.317528] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   19.318289] head: 0bfffe0000000001 ffffc1ffc3111e01 ffffffffffffffff 0000000000000000
[   19.318868] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   19.319566] page dumped because: kasan: bad access detected
[   19.320065] 
[   19.320552] Memory state around the buggy address:
[   19.320867]  fff00000c4479380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.321298]  fff00000c4479400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.322295] >fff00000c4479480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   19.323027]                                                           ^
[   19.323574]  fff00000c4479500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.324386]  fff00000c4479580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.324968] ==================================================================
[   19.577036] ==================================================================
[   19.577797] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5dc/0x690
[   19.578345] Write of size 1 at addr fff00000c6c520f0 by task kunit_try_catch/147
[   19.579001] 
[   19.579780] CPU: 0 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   19.580005] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.580070] Hardware name: linux,dummy-virt (DT)
[   19.580144] Call trace:
[   19.580201]  dump_backtrace+0x9c/0x128
[   19.580334]  show_stack+0x20/0x38
[   19.580416]  dump_stack_lvl+0x8c/0xd0
[   19.580507]  print_report+0x118/0x5f0
[   19.580596]  kasan_report+0xdc/0x128
[   19.580660]  __asan_report_store1_noabort+0x20/0x30
[   19.580710]  krealloc_more_oob_helper+0x5dc/0x690
[   19.580760]  krealloc_large_more_oob+0x20/0x38
[   19.580807]  kunit_try_run_case+0x170/0x3f0
[   19.580852]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.580900]  kthread+0x24c/0x2d0
[   19.580941]  ret_from_fork+0x10/0x20
[   19.580989] 
[   19.586748] The buggy address belongs to the physical page:
[   19.587373] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106c50
[   19.587922] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.589111] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.589814] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.590475] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.591972] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.592420] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.593036] head: 0bfffe0000000002 ffffc1ffc31b1401 ffffffffffffffff 0000000000000000
[   19.593784] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   19.594367] page dumped because: kasan: bad access detected
[   19.594850] 
[   19.596341] Memory state around the buggy address:
[   19.596764]  fff00000c6c51f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.597160]  fff00000c6c52000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.597573] >fff00000c6c52080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   19.597961]                                                              ^
[   19.600105]  fff00000c6c52100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.602555]  fff00000c6c52180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.603993] ==================================================================
[   19.553368] ==================================================================
[   19.554316] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x628/0x690
[   19.555038] Write of size 1 at addr fff00000c6c520eb by task kunit_try_catch/147
[   19.556109] 
[   19.556707] CPU: 0 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   19.556952] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.557025] Hardware name: linux,dummy-virt (DT)
[   19.557089] Call trace:
[   19.557119]  dump_backtrace+0x9c/0x128
[   19.557185]  show_stack+0x20/0x38
[   19.557226]  dump_stack_lvl+0x8c/0xd0
[   19.557301]  print_report+0x118/0x5f0
[   19.557344]  kasan_report+0xdc/0x128
[   19.557385]  __asan_report_store1_noabort+0x20/0x30
[   19.557431]  krealloc_more_oob_helper+0x628/0x690
[   19.557490]  krealloc_large_more_oob+0x20/0x38
[   19.557543]  kunit_try_run_case+0x170/0x3f0
[   19.557589]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.557638]  kthread+0x24c/0x2d0
[   19.557680]  ret_from_fork+0x10/0x20
[   19.557728] 
[   19.563704] The buggy address belongs to the physical page:
[   19.564179] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106c50
[   19.564718] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.565263] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.565917] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.566584] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.567582] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.568419] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.568988] head: 0bfffe0000000002 ffffc1ffc31b1401 ffffffffffffffff 0000000000000000
[   19.569563] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   19.570154] page dumped because: kasan: bad access detected
[   19.570955] 
[   19.571537] Memory state around the buggy address:
[   19.571788]  fff00000c6c51f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.572011]  fff00000c6c52000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.572224] >fff00000c6c52080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   19.573133]                                                           ^
[   19.573813]  fff00000c6c52100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.574358]  fff00000c6c52180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.574688] ==================================================================
[   19.327010] ==================================================================
[   19.327594] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5dc/0x690
[   19.328503] Write of size 1 at addr fff00000c44794f0 by task kunit_try_catch/143
[   19.328939] 
[   19.329645] CPU: 0 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   19.329863] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.329926] Hardware name: linux,dummy-virt (DT)
[   19.330002] Call trace:
[   19.330052]  dump_backtrace+0x9c/0x128
[   19.330156]  show_stack+0x20/0x38
[   19.330233]  dump_stack_lvl+0x8c/0xd0
[   19.330334]  print_report+0x118/0x5f0
[   19.330422]  kasan_report+0xdc/0x128
[   19.330893]  __asan_report_store1_noabort+0x20/0x30
[   19.331013]  krealloc_more_oob_helper+0x5dc/0x690
[   19.331126]  krealloc_more_oob+0x20/0x38
[   19.331206]  kunit_try_run_case+0x170/0x3f0
[   19.331305]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.331390]  kthread+0x24c/0x2d0
[   19.331470]  ret_from_fork+0x10/0x20
[   19.331563] 
[   19.340515] Allocated by task 143:
[   19.341333]  kasan_save_stack+0x3c/0x68
[   19.342776]  kasan_save_track+0x20/0x40
[   19.343589]  kasan_save_alloc_info+0x40/0x58
[   19.345101]  __kasan_krealloc+0x118/0x178
[   19.345683]  krealloc_noprof+0x10c/0x1a0
[   19.346044]  krealloc_more_oob_helper+0x170/0x690
[   19.346679]  krealloc_more_oob+0x20/0x38
[   19.347193]  kunit_try_run_case+0x170/0x3f0
[   19.347619]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.348660]  kthread+0x24c/0x2d0
[   19.348946]  ret_from_fork+0x10/0x20
[   19.349486] 
[   19.349750] The buggy address belongs to the object at fff00000c4479400
[   19.349750]  which belongs to the cache kmalloc-256 of size 256
[   19.350591] The buggy address is located 5 bytes to the right of
[   19.350591]  allocated 235-byte region [fff00000c4479400, fff00000c44794eb)
[   19.352589] 
[   19.352900] The buggy address belongs to the physical page:
[   19.353577] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104478
[   19.354279] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.354990] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.355973] page_type: f5(slab)
[   19.356459] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.357197] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   19.357935] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   19.358648] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   19.359934] head: 0bfffe0000000001 ffffc1ffc3111e01 ffffffffffffffff 0000000000000000
[   19.360336] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   19.360571] page dumped because: kasan: bad access detected
[   19.360750] 
[   19.360850] Memory state around the buggy address:
[   19.361019]  fff00000c4479380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.361236]  fff00000c4479400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.361600] >fff00000c4479480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   19.362356]                                                              ^
[   19.363017]  fff00000c4479500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.364136]  fff00000c4479580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.364756] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[   19.262090] ==================================================================
[   19.263998] BUG: KASAN: use-after-free in page_alloc_uaf+0x33c/0x368
[   19.264522] Read of size 1 at addr fff00000c6c40000 by task kunit_try_catch/141
[   19.265069] 
[   19.265399] CPU: 0 UID: 0 PID: 141 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   19.265613] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.265681] Hardware name: linux,dummy-virt (DT)
[   19.265764] Call trace:
[   19.265823]  dump_backtrace+0x9c/0x128
[   19.265941]  show_stack+0x20/0x38
[   19.266033]  dump_stack_lvl+0x8c/0xd0
[   19.266121]  print_report+0x118/0x5f0
[   19.266210]  kasan_report+0xdc/0x128
[   19.266309]  __asan_report_load1_noabort+0x20/0x30
[   19.266406]  page_alloc_uaf+0x33c/0x368
[   19.266496]  kunit_try_run_case+0x170/0x3f0
[   19.266545]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.266605]  kthread+0x24c/0x2d0
[   19.266659]  ret_from_fork+0x10/0x20
[   19.266707] 
[   19.270986] The buggy address belongs to the physical page:
[   19.272583] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106c40
[   19.273505] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.274097] page_type: f0(buddy)
[   19.274496] raw: 0bfffe0000000000 fff00000ff6163b0 fff00000ff6163b0 0000000000000000
[   19.275186] raw: 0000000000000000 0000000000000006 00000000f0000000 0000000000000000
[   19.276256] page dumped because: kasan: bad access detected
[   19.276692] 
[   19.276919] Memory state around the buggy address:
[   19.277362]  fff00000c6c3ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.277909]  fff00000c6c3ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.278707] >fff00000c6c40000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.279503]                    ^
[   19.279869]  fff00000c6c40080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.280516]  fff00000c6c40100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.281118] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[   19.224292] ==================================================================
[   19.225100] BUG: KASAN: invalid-free in kfree+0x260/0x3b8
[   19.226073] Free of addr fff00000c6b40001 by task kunit_try_catch/137
[   19.226614] 
[   19.226951] CPU: 1 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   19.227172] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.227249] Hardware name: linux,dummy-virt (DT)
[   19.227333] Call trace:
[   19.227383]  dump_backtrace+0x9c/0x128
[   19.227448]  show_stack+0x20/0x38
[   19.227489]  dump_stack_lvl+0x8c/0xd0
[   19.227565]  print_report+0x118/0x5f0
[   19.227612]  kasan_report_invalid_free+0xc0/0xe8
[   19.227656]  __kasan_kfree_large+0x5c/0xa8
[   19.227697]  free_large_kmalloc+0x58/0x140
[   19.227741]  kfree+0x260/0x3b8
[   19.227780]  kmalloc_large_invalid_free+0x114/0x290
[   19.227827]  kunit_try_run_case+0x170/0x3f0
[   19.227871]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.227918]  kthread+0x24c/0x2d0
[   19.227960]  ret_from_fork+0x10/0x20
[   19.228007] 
[   19.234101] The buggy address belongs to the physical page:
[   19.234608] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106b40
[   19.235187] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.236303] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.236897] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.237643] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.238264] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.238993] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.239743] head: 0bfffe0000000002 ffffc1ffc31ad001 ffffffffffffffff 0000000000000000
[   19.240645] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   19.241298] page dumped because: kasan: bad access detected
[   19.241763] 
[   19.242059] Memory state around the buggy address:
[   19.242476]  fff00000c6b3ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.244144]  fff00000c6b3ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.244650] >fff00000c6b40000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.245267]                    ^
[   19.245652]  fff00000c6b40080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.246389]  fff00000c6b40100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.247002] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   19.164955] ==================================================================
[   19.165856] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x28c/0x2d0
[   19.166370] Write of size 1 at addr fff00000c6b8a00a by task kunit_try_catch/133
[   19.166730] 
[   19.166897] CPU: 0 UID: 0 PID: 133 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   19.167001] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.167032] Hardware name: linux,dummy-virt (DT)
[   19.167124] Call trace:
[   19.167176]  dump_backtrace+0x9c/0x128
[   19.167287]  show_stack+0x20/0x38
[   19.167363]  dump_stack_lvl+0x8c/0xd0
[   19.167465]  print_report+0x118/0x5f0
[   19.167562]  kasan_report+0xdc/0x128
[   19.167656]  __asan_report_store1_noabort+0x20/0x30
[   19.167743]  kmalloc_large_oob_right+0x28c/0x2d0
[   19.167826]  kunit_try_run_case+0x170/0x3f0
[   19.167915]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.168012]  kthread+0x24c/0x2d0
[   19.168084]  ret_from_fork+0x10/0x20
[   19.168166] 
[   19.173987] The buggy address belongs to the physical page:
[   19.174371] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106b88
[   19.174972] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.176449] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.177720] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.178266] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.179034] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.179748] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.180133] head: 0bfffe0000000002 ffffc1ffc31ae201 ffffffffffffffff 0000000000000000
[   19.180484] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   19.180831] page dumped because: kasan: bad access detected
[   19.181101] 
[   19.181827] Memory state around the buggy address:
[   19.182550]  fff00000c6b89f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.183304]  fff00000c6b89f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.184231] >fff00000c6b8a000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.184789]                       ^
[   19.185212]  fff00000c6b8a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.185680]  fff00000c6b8a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.186173] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[   19.125825] ==================================================================
[   19.126479] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2b8/0x308
[   19.127849] Write of size 1 at addr fff00000c6c21f00 by task kunit_try_catch/131
[   19.128831] 
[   19.129205] CPU: 1 UID: 0 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   19.129452] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.129537] Hardware name: linux,dummy-virt (DT)
[   19.129609] Call trace:
[   19.129639]  dump_backtrace+0x9c/0x128
[   19.129708]  show_stack+0x20/0x38
[   19.129749]  dump_stack_lvl+0x8c/0xd0
[   19.129794]  print_report+0x118/0x5f0
[   19.129836]  kasan_report+0xdc/0x128
[   19.129875]  __asan_report_store1_noabort+0x20/0x30
[   19.129921]  kmalloc_big_oob_right+0x2b8/0x308
[   19.129967]  kunit_try_run_case+0x170/0x3f0
[   19.130011]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.130058]  kthread+0x24c/0x2d0
[   19.130099]  ret_from_fork+0x10/0x20
[   19.130145] 
[   19.135746] Allocated by task 131:
[   19.136152]  kasan_save_stack+0x3c/0x68
[   19.136782]  kasan_save_track+0x20/0x40
[   19.137368]  kasan_save_alloc_info+0x40/0x58
[   19.137878]  __kasan_kmalloc+0xd4/0xd8
[   19.138291]  __kmalloc_cache_noprof+0x154/0x320
[   19.138672]  kmalloc_big_oob_right+0xb8/0x308
[   19.139051]  kunit_try_run_case+0x170/0x3f0
[   19.139891]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.140523]  kthread+0x24c/0x2d0
[   19.140936]  ret_from_fork+0x10/0x20
[   19.141396] 
[   19.141701] The buggy address belongs to the object at fff00000c6c20000
[   19.141701]  which belongs to the cache kmalloc-8k of size 8192
[   19.142660] The buggy address is located 0 bytes to the right of
[   19.142660]  allocated 7936-byte region [fff00000c6c20000, fff00000c6c21f00)
[   19.143698] 
[   19.143871] The buggy address belongs to the physical page:
[   19.144137] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106c20
[   19.144515] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.144864] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.145205] page_type: f5(slab)
[   19.146524] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   19.147424] raw: 0000000000000000 0000000080020002 00000001f5000000 0000000000000000
[   19.147812] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   19.148165] head: 0000000000000000 0000000080020002 00000001f5000000 0000000000000000
[   19.148635] head: 0bfffe0000000003 ffffc1ffc31b0801 ffffffffffffffff 0000000000000000
[   19.149833] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000
[   19.150475] page dumped because: kasan: bad access detected
[   19.150968] 
[   19.151545] Memory state around the buggy address:
[   19.152061]  fff00000c6c21e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.152656]  fff00000c6c21e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.153400] >fff00000c6c21f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.154069]                    ^
[   19.154414]  fff00000c6c21f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.154964]  fff00000c6c22000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.155460] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[   19.084760] ==================================================================
[   19.085616] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x310/0x348
[   19.086463] Read of size 1 at addr fff00000c6b25000 by task kunit_try_catch/129
[   19.087545] 
[   19.087920] CPU: 1 UID: 0 PID: 129 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   19.088381] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.088456] Hardware name: linux,dummy-virt (DT)
[   19.088543] Call trace:
[   19.088622]  dump_backtrace+0x9c/0x128
[   19.088748]  show_stack+0x20/0x38
[   19.088833]  dump_stack_lvl+0x8c/0xd0
[   19.088904]  print_report+0x118/0x5f0
[   19.088948]  kasan_report+0xdc/0x128
[   19.088989]  __asan_report_load1_noabort+0x20/0x30
[   19.089035]  kmalloc_node_oob_right+0x310/0x348
[   19.089082]  kunit_try_run_case+0x170/0x3f0
[   19.089127]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.089174]  kthread+0x24c/0x2d0
[   19.089216]  ret_from_fork+0x10/0x20
[   19.089289] 
[   19.095313] Allocated by task 129:
[   19.095750]  kasan_save_stack+0x3c/0x68
[   19.096288]  kasan_save_track+0x20/0x40
[   19.096759]  kasan_save_alloc_info+0x40/0x58
[   19.097646]  __kasan_kmalloc+0xd4/0xd8
[   19.097993]  __kmalloc_cache_node_noprof+0x174/0x348
[   19.098410]  kmalloc_node_oob_right+0xbc/0x348
[   19.098954]  kunit_try_run_case+0x170/0x3f0
[   19.099569]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.099904]  kthread+0x24c/0x2d0
[   19.100375]  ret_from_fork+0x10/0x20
[   19.100799] 
[   19.101013] The buggy address belongs to the object at fff00000c6b24000
[   19.101013]  which belongs to the cache kmalloc-4k of size 4096
[   19.102032] The buggy address is located 0 bytes to the right of
[   19.102032]  allocated 4096-byte region [fff00000c6b24000, fff00000c6b25000)
[   19.102999] 
[   19.103346] The buggy address belongs to the physical page:
[   19.104385] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106b20
[   19.105436] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.106178] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.106780] page_type: f5(slab)
[   19.107138] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   19.107899] raw: 0000000000000000 0000000080040004 00000001f5000000 0000000000000000
[   19.108742] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   19.109337] head: 0000000000000000 0000000080040004 00000001f5000000 0000000000000000
[   19.110055] head: 0bfffe0000000003 ffffc1ffc31ac801 ffffffffffffffff 0000000000000000
[   19.110709] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000
[   19.111664] page dumped because: kasan: bad access detected
[   19.112339] 
[   19.112497] Memory state around the buggy address:
[   19.112749]  fff00000c6b24f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.113083]  fff00000c6b24f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.113416] >fff00000c6b25000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.113743]                    ^
[   19.113945]  fff00000c6b25080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.115209]  fff00000c6b25100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.116007] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   19.037414] ==================================================================
[   19.038054] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x308/0x340
[   19.038757] Read of size 1 at addr fff00000c64513bf by task kunit_try_catch/127
[   19.039311] 
[   19.039628] CPU: 1 UID: 0 PID: 127 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   19.039841] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.039910] Hardware name: linux,dummy-virt (DT)
[   19.039986] Call trace:
[   19.040045]  dump_backtrace+0x9c/0x128
[   19.040159]  show_stack+0x20/0x38
[   19.040264]  dump_stack_lvl+0x8c/0xd0
[   19.040357]  print_report+0x118/0x5f0
[   19.040445]  kasan_report+0xdc/0x128
[   19.040535]  __asan_report_load1_noabort+0x20/0x30
[   19.040644]  kmalloc_oob_left+0x308/0x340
[   19.040748]  kunit_try_run_case+0x170/0x3f0
[   19.040828]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.040881]  kthread+0x24c/0x2d0
[   19.040925]  ret_from_fork+0x10/0x20
[   19.040973] 
[   19.046341] Allocated by task 1:
[   19.046829]  kasan_save_stack+0x3c/0x68
[   19.047367]  kasan_save_track+0x20/0x40
[   19.047995]  kasan_save_alloc_info+0x40/0x58
[   19.048661]  __kasan_kmalloc+0xd4/0xd8
[   19.049113]  __kmalloc_node_track_caller_noprof+0x194/0x438
[   19.049648]  kvasprintf+0xe0/0x180
[   19.050090]  __kthread_create_on_node+0x16c/0x348
[   19.050573]  kthread_create_on_node+0xe4/0x130
[   19.050973]  create_worker+0x380/0x6b8
[   19.051807]  alloc_unbound_pwq+0x62c/0x778
[   19.052456]  apply_wqattrs_prepare+0x1a0/0x6e0
[   19.052912]  apply_workqueue_attrs_locked+0x58/0xb8
[   19.053591]  alloc_workqueue+0x9ac/0x1440
[   19.054160]  latency_fsnotify_init+0x28/0x60
[   19.054774]  do_one_initcall+0xd0/0x608
[   19.055623]  kernel_init_freeable+0x3e0/0x8a0
[   19.056010]  kernel_init+0x2c/0x1f8
[   19.056387]  ret_from_fork+0x10/0x20
[   19.057002] 
[   19.057289] The buggy address belongs to the object at fff00000c64513a0
[   19.057289]  which belongs to the cache kmalloc-16 of size 16
[   19.058216] The buggy address is located 18 bytes to the right of
[   19.058216]  allocated 13-byte region [fff00000c64513a0, fff00000c64513ad)
[   19.059138] 
[   19.059475] The buggy address belongs to the physical page:
[   19.060026] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106451
[   19.060600] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.061099] page_type: f5(slab)
[   19.062854] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   19.063387] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   19.064141] page dumped because: kasan: bad access detected
[   19.064596] 
[   19.064877] Memory state around the buggy address:
[   19.065404]  fff00000c6451280: 00 00 fc fc 00 06 fc fc 00 06 fc fc 00 00 fc fc
[   19.066504]  fff00000c6451300: 00 02 fc fc 00 02 fc fc 00 06 fc fc 00 06 fc fc
[   19.066911] >fff00000c6451380: fa fb fc fc 00 05 fc fc 00 07 fc fc fc fc fc fc
[   19.067304]                                         ^
[   19.067629]  fff00000c6451400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.067993]  fff00000c6451480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.069118] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   18.977257] ==================================================================
[   18.977796] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x528/0x5f0
[   18.978361] Write of size 1 at addr fff00000c64acc78 by task kunit_try_catch/125
[   18.978608] 
[   18.978732] CPU: 1 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   18.978842] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.978874] Hardware name: linux,dummy-virt (DT)
[   18.978914] Call trace:
[   18.978942]  dump_backtrace+0x9c/0x128
[   18.978996]  show_stack+0x20/0x38
[   18.979036]  dump_stack_lvl+0x8c/0xd0
[   18.979118]  print_report+0x118/0x5f0
[   18.979200]  kasan_report+0xdc/0x128
[   18.979298]  __asan_report_store1_noabort+0x20/0x30
[   18.979390]  kmalloc_oob_right+0x528/0x5f0
[   18.979484]  kunit_try_run_case+0x170/0x3f0
[   18.979589]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.979696]  kthread+0x24c/0x2d0
[   18.979786]  ret_from_fork+0x10/0x20
[   18.979892] 
[   18.985506] Allocated by task 125:
[   18.985973]  kasan_save_stack+0x3c/0x68
[   18.986386]  kasan_save_track+0x20/0x40
[   18.986872]  kasan_save_alloc_info+0x40/0x58
[   18.987284]  __kasan_kmalloc+0xd4/0xd8
[   18.987744]  __kmalloc_cache_noprof+0x154/0x320
[   18.988281]  kmalloc_oob_right+0xb8/0x5f0
[   18.988698]  kunit_try_run_case+0x170/0x3f0
[   18.989115]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.989625]  kthread+0x24c/0x2d0
[   18.990069]  ret_from_fork+0x10/0x20
[   18.990525] 
[   18.990802] The buggy address belongs to the object at fff00000c64acc00
[   18.990802]  which belongs to the cache kmalloc-128 of size 128
[   18.991662] The buggy address is located 5 bytes to the right of
[   18.991662]  allocated 115-byte region [fff00000c64acc00, fff00000c64acc73)
[   18.992630] 
[   18.992933] The buggy address belongs to the physical page:
[   18.993411] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064ac
[   18.994153] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.994771] page_type: f5(slab)
[   18.995168] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.995868] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   18.996464] page dumped because: kasan: bad access detected
[   18.996905] 
[   18.997167] Memory state around the buggy address:
[   18.997555]  fff00000c64acb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.998255]  fff00000c64acb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.998750] >fff00000c64acc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.999362]                                                                 ^
[   18.999963]  fff00000c64acc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.000616]  fff00000c64acd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.001265] ==================================================================
[   19.003418] ==================================================================
[   19.004069] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x588/0x5f0
[   19.004788] Read of size 1 at addr fff00000c64acc80 by task kunit_try_catch/125
[   19.005427] 
[   19.005712] CPU: 1 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   19.005932] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.005999] Hardware name: linux,dummy-virt (DT)
[   19.006087] Call trace:
[   19.006149]  dump_backtrace+0x9c/0x128
[   19.006274]  show_stack+0x20/0x38
[   19.006364]  dump_stack_lvl+0x8c/0xd0
[   19.006467]  print_report+0x118/0x5f0
[   19.006569]  kasan_report+0xdc/0x128
[   19.006652]  __asan_report_load1_noabort+0x20/0x30
[   19.006711]  kmalloc_oob_right+0x588/0x5f0
[   19.006756]  kunit_try_run_case+0x170/0x3f0
[   19.006803]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.006851]  kthread+0x24c/0x2d0
[   19.006892]  ret_from_fork+0x10/0x20
[   19.006939] 
[   19.012068] Allocated by task 125:
[   19.012440]  kasan_save_stack+0x3c/0x68
[   19.012814]  kasan_save_track+0x20/0x40
[   19.013260]  kasan_save_alloc_info+0x40/0x58
[   19.013792]  __kasan_kmalloc+0xd4/0xd8
[   19.014210]  __kmalloc_cache_noprof+0x154/0x320
[   19.014704]  kmalloc_oob_right+0xb8/0x5f0
[   19.015151]  kunit_try_run_case+0x170/0x3f0
[   19.015649]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.016179]  kthread+0x24c/0x2d0
[   19.016510]  ret_from_fork+0x10/0x20
[   19.016945] 
[   19.017226] The buggy address belongs to the object at fff00000c64acc00
[   19.017226]  which belongs to the cache kmalloc-128 of size 128
[   19.017996] The buggy address is located 13 bytes to the right of
[   19.017996]  allocated 115-byte region [fff00000c64acc00, fff00000c64acc73)
[   19.019020] 
[   19.019331] The buggy address belongs to the physical page:
[   19.019725] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064ac
[   19.020447] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.020915] page_type: f5(slab)
[   19.021377] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.022048] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   19.022693] page dumped because: kasan: bad access detected
[   19.023166] 
[   19.023448] Memory state around the buggy address:
[   19.023862]  fff00000c64acb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.024488]  fff00000c64acc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.025185] >fff00000c64acc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.025616]                    ^
[   19.026025]  fff00000c64acd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.026665]  fff00000c64acd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.027299] ==================================================================
[   18.940440] ==================================================================
[   18.941601] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x56c/0x5f0
[   18.943446] Write of size 1 at addr fff00000c64acc73 by task kunit_try_catch/125
[   18.945118] 
[   18.946671] CPU: 1 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G                 N 6.12.32-rc1 #1
[   18.947410] Tainted: [N]=TEST
[   18.947497] Hardware name: linux,dummy-virt (DT)
[   18.947953] Call trace:
[   18.948007]  dump_backtrace+0x9c/0x128
[   18.948113]  show_stack+0x20/0x38
[   18.948157]  dump_stack_lvl+0x8c/0xd0
[   18.948208]  print_report+0x118/0x5f0
[   18.948294]  kasan_report+0xdc/0x128
[   18.948346]  __asan_report_store1_noabort+0x20/0x30
[   18.948393]  kmalloc_oob_right+0x56c/0x5f0
[   18.948438]  kunit_try_run_case+0x170/0x3f0
[   18.948485]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.948533]  kthread+0x24c/0x2d0
[   18.948576]  ret_from_fork+0x10/0x20
[   18.948718] 
[   18.954068] Allocated by task 125:
[   18.954690]  kasan_save_stack+0x3c/0x68
[   18.955212]  kasan_save_track+0x20/0x40
[   18.955648]  kasan_save_alloc_info+0x40/0x58
[   18.956057]  __kasan_kmalloc+0xd4/0xd8
[   18.956542]  __kmalloc_cache_noprof+0x154/0x320
[   18.957087]  kmalloc_oob_right+0xb8/0x5f0
[   18.957456]  kunit_try_run_case+0x170/0x3f0
[   18.957956]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.958526]  kthread+0x24c/0x2d0
[   18.958961]  ret_from_fork+0x10/0x20
[   18.959430] 
[   18.959800] The buggy address belongs to the object at fff00000c64acc00
[   18.959800]  which belongs to the cache kmalloc-128 of size 128
[   18.960768] The buggy address is located 0 bytes to the right of
[   18.960768]  allocated 115-byte region [fff00000c64acc00, fff00000c64acc73)
[   18.961772] 
[   18.962286] The buggy address belongs to the physical page:
[   18.963172] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064ac
[   18.964082] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.965088] page_type: f5(slab)
[   18.966051] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.966624] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   18.967412] page dumped because: kasan: bad access detected
[   18.967902] 
[   18.968196] Memory state around the buggy address:
[   18.969060]  fff00000c64acb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.969671]  fff00000c64acb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.970330] >fff00000c64acc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.970905]                                                              ^
[   18.971576]  fff00000c64acc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.972181]  fff00000c64acd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.972859] ==================================================================