Hay
Date
June 7, 2025, 10:40 a.m.
Failure - log-parser-boot - internal-error-oops-oops-preempt-smp
[  109.797396] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
[  109.798316] Modules linked in:
[  109.799162] CPU: 1 UID: 0 PID: 616 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[  109.800112] Tainted: [B]=BAD_PAGE, [N]=TEST
[  109.800682] Hardware name: linux,dummy-virt (DT)
[  109.801470] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  109.802400] pc : kunit_test_null_dereference+0x70/0x170
[  109.803052] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[  109.803938] sp : ffff8000833d7dc0
[  109.804474] x29: ffff8000833d7e20 x28: 0000000000000000 x27: 0000000000000000
[  109.805617] x26: 0000000000000000 x25: 0000000000000000 x24: fff00000c4119a00
[  109.806541] x23: ffffa652679b2730 x22: ffffa652679bb300 x21: fff00000c4119a08
[  109.808305] x20: 1ffff0001067afb8 x19: ffff8000800879f0 x18: ffffc1ffc327fd40
[  109.809412] x17: ffffa652669e205c x16: ffffa652669e1d9c x15: ffffa6526796f678
[  109.810373] x14: 1ffe00001b4a3bc0 x13: 0000000000000000 x12: fffd8000182bbd9a
[  109.811346] x11: 1ffe0000182bbd99 x10: fffd8000182bbd99 x9 : ffffa652679b27b8
[  109.812536] x8 : ffff8000833d7cb8 x7 : 0000000000000000 x6 : 0000000041b58ab3
[  109.813505] x5 : ffff70001067afb8 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[  109.814429] x2 : dfff800000000000 x1 : fff00000c15de400 x0 : ffff8000800879f0
[  109.816085] Call trace:
[  109.816404]  kunit_test_null_dereference+0x70/0x170
[  109.816975]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  109.817519]  kthread+0x24c/0x2d0
[  109.818014]  ret_from_fork+0x10/0x20
[  109.819237] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[  109.820476] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[   54.949034] ==================================================================
[   54.949661] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[   54.949661] 
[   54.950528] Use-after-free read at 0x00000000bbeec1da (in kfence-#173):
[   54.951188]  test_krealloc+0x51c/0x830
[   54.951882]  kunit_try_run_case+0x170/0x3f0
[   54.952444]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.953085]  kthread+0x24c/0x2d0
[   54.953519]  ret_from_fork+0x10/0x20
[   54.954070] 
[   54.954409] kfence-#173: 0x00000000bbeec1da-0x000000000ade2ffa, size=32, cache=kmalloc-32
[   54.954409] 
[   54.955243] allocated by task 317 on cpu 1 at 54.948249s (0.006981s ago):
[   54.956112]  test_alloc+0x29c/0x628
[   54.956615]  test_krealloc+0xc0/0x830
[   54.957150]  kunit_try_run_case+0x170/0x3f0
[   54.957761]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.958441]  kthread+0x24c/0x2d0
[   54.958888]  ret_from_fork+0x10/0x20
[   54.959361] 
[   54.959669] freed by task 317 on cpu 1 at 54.948519s (0.011136s ago):
[   54.960365]  krealloc_noprof+0xa8/0x1a0
[   54.960922]  test_krealloc+0x1dc/0x830
[   54.961475]  kunit_try_run_case+0x170/0x3f0
[   54.962024]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.962728]  kthread+0x24c/0x2d0
[   54.963266]  ret_from_fork+0x10/0x20
[   54.963739] 
[   54.964066] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   54.965100] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.965566] Hardware name: linux,dummy-virt (DT)
[   54.966151] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[   54.856030] ==================================================================
[   54.856662] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[   54.856662] 
[   54.857570] Use-after-free read at 0x00000000d7c69ba7 (in kfence-#172):
[   54.858558]  test_memcache_typesafe_by_rcu+0x280/0x560
[   54.859579]  kunit_try_run_case+0x170/0x3f0
[   54.860406]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.861044]  kthread+0x24c/0x2d0
[   54.861525]  ret_from_fork+0x10/0x20
[   54.862057] 
[   54.862417] kfence-#172: 0x00000000d7c69ba7-0x000000001053e2fc, size=32, cache=test
[   54.862417] 
[   54.863357] allocated by task 315 on cpu 0 at 54.844386s (0.018957s ago):
[   54.864141]  test_alloc+0x230/0x628
[   54.864617]  test_memcache_typesafe_by_rcu+0x15c/0x560
[   54.865241]  kunit_try_run_case+0x170/0x3f0
[   54.865781]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.866411]  kthread+0x24c/0x2d0
[   54.866892]  ret_from_fork+0x10/0x20
[   54.867510] 
[   54.867826] freed by task 315 on cpu 0 at 54.844528s (0.023284s ago):
[   54.868556]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[   54.869192]  kunit_try_run_case+0x170/0x3f0
[   54.869752]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.870382]  kthread+0x24c/0x2d0
[   54.870883]  ret_from_fork+0x10/0x20
[   54.871329] 
[   54.871694] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   54.872649] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.873216] Hardware name: linux,dummy-virt (DT)
[   54.873743] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[   34.061063] ==================================================================
[   34.062180] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   34.062180] 
[   34.063073] Invalid read at 0x00000000ad1b4288:
[   34.063833]  test_invalid_access+0xdc/0x1f0
[   34.064501]  kunit_try_run_case+0x170/0x3f0
[   34.065701]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.066324]  kthread+0x24c/0x2d0
[   34.066846]  ret_from_fork+0x10/0x20
[   34.068118] 
[   34.068545] CPU: 1 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   34.069691] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.070292] Hardware name: linux,dummy-virt (DT)
[   34.070928] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[   33.832353] ==================================================================
[   33.833024] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   33.833024] 
[   33.833888] Corrupted memory at 0x00000000e491deac [ ! . . . . . . . . . . . . . . . ] (in kfence-#168):
[   33.836242]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   33.836870]  kunit_try_run_case+0x170/0x3f0
[   33.837535]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.837815]  kthread+0x24c/0x2d0
[   33.838116]  ret_from_fork+0x10/0x20
[   33.838750] 
[   33.839118] kfence-#168: 0x00000000a3edaf2c-0x000000009a42f602, size=73, cache=kmalloc-96
[   33.839118] 
[   33.840268] allocated by task 305 on cpu 0 at 33.831976s (0.008280s ago):
[   33.841064]  test_alloc+0x29c/0x628
[   33.841614]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   33.842289]  kunit_try_run_case+0x170/0x3f0
[   33.842799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.843574]  kthread+0x24c/0x2d0
[   33.844126]  ret_from_fork+0x10/0x20
[   33.844683] 
[   33.845039] freed by task 305 on cpu 0 at 33.832199s (0.012828s ago):
[   33.845631]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   33.846238]  kunit_try_run_case+0x170/0x3f0
[   33.846646]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.847479]  kthread+0x24c/0x2d0
[   33.848877]  ret_from_fork+0x10/0x20
[   33.850105] 
[   33.851105] CPU: 0 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   33.851913] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.852331] Hardware name: linux,dummy-virt (DT)
[   33.852731] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[   33.728278] ==================================================================
[   33.728863] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   33.728863] 
[   33.729694] Out-of-bounds read at 0x00000000417de951 (105B right of kfence-#167):
[   33.730409]  test_kmalloc_aligned_oob_read+0x238/0x468
[   33.731083]  kunit_try_run_case+0x170/0x3f0
[   33.731661]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.732238]  kthread+0x24c/0x2d0
[   33.732878]  ret_from_fork+0x10/0x20
[   33.733481] 
[   33.733765] kfence-#167: 0x000000003010bc0a-0x00000000deb59836, size=73, cache=kmalloc-96
[   33.733765] 
[   33.734785] allocated by task 303 on cpu 0 at 33.727955s (0.006818s ago):
[   33.735597]  test_alloc+0x29c/0x628
[   33.736153]  test_kmalloc_aligned_oob_read+0x100/0x468
[   33.736817]  kunit_try_run_case+0x170/0x3f0
[   33.737369]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.738032]  kthread+0x24c/0x2d0
[   33.738518]  ret_from_fork+0x10/0x20
[   33.739000] 
[   33.739405] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   33.740210] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.740722] Hardware name: linux,dummy-virt (DT)
[   33.741345] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[   30.088251] ==================================================================
[   30.089004] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   30.089004] 
[   30.089814] Corrupted memory at 0x000000007272b330 [ ! ] (in kfence-#132):
[   30.090878]  test_corruption+0x1d8/0x378
[   30.091364]  kunit_try_run_case+0x170/0x3f0
[   30.091941]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.092635]  kthread+0x24c/0x2d0
[   30.093209]  ret_from_fork+0x10/0x20
[   30.093675] 
[   30.094003] kfence-#132: 0x000000008a69b099-0x00000000e6f880c8, size=32, cache=test
[   30.094003] 
[   30.094899] allocated by task 293 on cpu 0 at 30.088068s (0.006819s ago):
[   30.095817]  test_alloc+0x230/0x628
[   30.096337]  test_corruption+0x198/0x378
[   30.096845]  kunit_try_run_case+0x170/0x3f0
[   30.097456]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.098119]  kthread+0x24c/0x2d0
[   30.098598]  ret_from_fork+0x10/0x20
[   30.099101] 
[   30.099427] freed by task 293 on cpu 0 at 30.088144s (0.011270s ago):
[   30.100276]  test_corruption+0x1d8/0x378
[   30.100816]  kunit_try_run_case+0x170/0x3f0
[   30.101347]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.102033]  kthread+0x24c/0x2d0
[   30.102530]  ret_from_fork+0x10/0x20
[   30.102980] 
[   30.103336] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   30.104284] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.104818] Hardware name: linux,dummy-virt (DT)
[   30.105403] ==================================================================
[   29.984137] ==================================================================
[   29.984799] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   29.984799] 
[   29.985612] Corrupted memory at 0x00000000a9aeeb8c [ ! . . . . . . . . . . . . . . . ] (in kfence-#131):
[   29.987921]  test_corruption+0x120/0x378
[   29.988436]  kunit_try_run_case+0x170/0x3f0
[   29.989004]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.989688]  kthread+0x24c/0x2d0
[   29.990155]  ret_from_fork+0x10/0x20
[   29.990629] 
[   29.990974] kfence-#131: 0x00000000588180a2-0x00000000a6c8ee9b, size=32, cache=test
[   29.990974] 
[   29.991819] allocated by task 293 on cpu 0 at 29.983937s (0.007869s ago):
[   29.992698]  test_alloc+0x230/0x628
[   29.993162]  test_corruption+0xdc/0x378
[   29.993714]  kunit_try_run_case+0x170/0x3f0
[   29.994263]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.994893]  kthread+0x24c/0x2d0
[   29.995435]  ret_from_fork+0x10/0x20
[   29.995951] 
[   29.996264] freed by task 293 on cpu 0 at 29.984029s (0.012222s ago):
[   29.997069]  test_corruption+0x120/0x378
[   29.997596]  kunit_try_run_case+0x170/0x3f0
[   29.998155]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.998784]  kthread+0x24c/0x2d0
[   29.999286]  ret_from_fork+0x10/0x20
[   29.999787] 
[   30.000159] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   30.001023] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.001564] Hardware name: linux,dummy-virt (DT)
[   30.002049] ==================================================================
[   29.776380] ==================================================================
[   29.777094] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   29.777094] 
[   29.777912] Corrupted memory at 0x00000000c504de6d [ ! . . . . . . . . . . . . . . . ] (in kfence-#129):
[   29.781063]  test_corruption+0x278/0x378
[   29.781629]  kunit_try_run_case+0x170/0x3f0
[   29.782251]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.782896]  kthread+0x24c/0x2d0
[   29.783460]  ret_from_fork+0x10/0x20
[   29.784031] 
[   29.784420] kfence-#129: 0x00000000221fb4b9-0x000000001a23840d, size=32, cache=kmalloc-32
[   29.784420] 
[   29.785451] allocated by task 291 on cpu 0 at 29.775947s (0.009492s ago):
[   29.786291]  test_alloc+0x29c/0x628
[   29.786893]  test_corruption+0xdc/0x378
[   29.787467]  kunit_try_run_case+0x170/0x3f0
[   29.788131]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.788890]  kthread+0x24c/0x2d0
[   29.789431]  ret_from_fork+0x10/0x20
[   29.790053] 
[   29.790397] freed by task 291 on cpu 0 at 29.776108s (0.014276s ago):
[   29.791206]  test_corruption+0x278/0x378
[   29.791816]  kunit_try_run_case+0x170/0x3f0
[   29.792400]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.793092]  kthread+0x24c/0x2d0
[   29.793601]  ret_from_fork+0x10/0x20
[   29.794183] 
[   29.794550] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   29.795577] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.796120] Hardware name: linux,dummy-virt (DT)
[   29.796681] ==================================================================
[   29.880341] ==================================================================
[   29.881004] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   29.881004] 
[   29.881886] Corrupted memory at 0x00000000ca89be67 [ ! ] (in kfence-#130):
[   29.883139]  test_corruption+0x284/0x378
[   29.883842]  kunit_try_run_case+0x170/0x3f0
[   29.884469]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.885237]  kthread+0x24c/0x2d0
[   29.885747]  ret_from_fork+0x10/0x20
[   29.886203] 
[   29.886560] kfence-#130: 0x000000007ef76b08-0x000000003317d2f3, size=32, cache=kmalloc-32
[   29.886560] 
[   29.887492] allocated by task 291 on cpu 0 at 29.879994s (0.007486s ago):
[   29.888224]  test_alloc+0x29c/0x628
[   29.888829]  test_corruption+0x198/0x378
[   29.889441]  kunit_try_run_case+0x170/0x3f0
[   29.890114]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.890776]  kthread+0x24c/0x2d0
[   29.891331]  ret_from_fork+0x10/0x20
[   29.891890] 
[   29.892262] freed by task 291 on cpu 0 at 29.880105s (0.012145s ago):
[   29.893098]  test_corruption+0x284/0x378
[   29.893698]  kunit_try_run_case+0x170/0x3f0
[   29.894329]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.895013]  kthread+0x24c/0x2d0
[   29.895549]  ret_from_fork+0x10/0x20
[   29.896127] 
[   29.896465] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   29.897507] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.898072] Hardware name: linux,dummy-virt (DT)
[   29.898654] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[   29.672123] ==================================================================
[   29.672630] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   29.672630] 
[   29.673369] Invalid free of 0x000000007d35d05f (in kfence-#128):
[   29.674084]  test_invalid_addr_free+0xec/0x238
[   29.674699]  kunit_try_run_case+0x170/0x3f0
[   29.675379]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.676216]  kthread+0x24c/0x2d0
[   29.676701]  ret_from_fork+0x10/0x20
[   29.677393] 
[   29.677739] kfence-#128: 0x00000000d8eaf51b-0x00000000140c8b7e, size=32, cache=test
[   29.677739] 
[   29.678643] allocated by task 289 on cpu 1 at 29.671930s (0.006701s ago):
[   29.679590]  test_alloc+0x230/0x628
[   29.680198]  test_invalid_addr_free+0xd4/0x238
[   29.680824]  kunit_try_run_case+0x170/0x3f0
[   29.681455]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.682123]  kthread+0x24c/0x2d0
[   29.682686]  ret_from_fork+0x10/0x20
[   29.683208] 
[   29.683605] CPU: 1 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   29.684676] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.685237] Hardware name: linux,dummy-virt (DT)
[   29.685809] ==================================================================
[   29.568128] ==================================================================
[   29.568848] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   29.568848] 
[   29.569677] Invalid free of 0x00000000fd8cd7a0 (in kfence-#127):
[   29.570375]  test_invalid_addr_free+0x1ac/0x238
[   29.570927]  kunit_try_run_case+0x170/0x3f0
[   29.571450]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.572123]  kthread+0x24c/0x2d0
[   29.572626]  ret_from_fork+0x10/0x20
[   29.573137] 
[   29.573466] kfence-#127: 0x00000000c7952cc9-0x00000000748f4dd1, size=32, cache=kmalloc-32
[   29.573466] 
[   29.574354] allocated by task 287 on cpu 1 at 29.567948s (0.006394s ago):
[   29.575212]  test_alloc+0x29c/0x628
[   29.575662]  test_invalid_addr_free+0xd4/0x238
[   29.576278]  kunit_try_run_case+0x170/0x3f0
[   29.576780]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.577397]  kthread+0x24c/0x2d0
[   29.577914]  ret_from_fork+0x10/0x20
[   29.578392] 
[   29.578765] CPU: 1 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   29.579719] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.580229] Hardware name: linux,dummy-virt (DT)
[   29.580785] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[   29.360297] ==================================================================
[   29.360944] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   29.360944] 
[   29.361727] Invalid free of 0x0000000047a28b9b (in kfence-#125):
[   29.362481]  test_double_free+0x1bc/0x238
[   29.363147]  kunit_try_run_case+0x170/0x3f0
[   29.363823]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.364422]  kthread+0x24c/0x2d0
[   29.365095]  ret_from_fork+0x10/0x20
[   29.365625] 
[   29.366019] kfence-#125: 0x0000000047a28b9b-0x00000000579daf7c, size=32, cache=kmalloc-32
[   29.366019] 
[   29.367076] allocated by task 283 on cpu 1 at 29.359924s (0.007139s ago):
[   29.367866]  test_alloc+0x29c/0x628
[   29.368416]  test_double_free+0xd4/0x238
[   29.368980]  kunit_try_run_case+0x170/0x3f0
[   29.369575]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.370263]  kthread+0x24c/0x2d0
[   29.370765]  ret_from_fork+0x10/0x20
[   29.371298] 
[   29.371678] freed by task 283 on cpu 1 at 29.360039s (0.011595s ago):
[   29.372441]  test_double_free+0x1ac/0x238
[   29.373058]  kunit_try_run_case+0x170/0x3f0
[   29.373463]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.374010]  kthread+0x24c/0x2d0
[   29.374500]  ret_from_fork+0x10/0x20
[   29.374914] 
[   29.375214] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   29.375899] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.376468] Hardware name: linux,dummy-virt (DT)
[   29.377028] ==================================================================
[   29.464220] ==================================================================
[   29.464874] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   29.464874] 
[   29.465675] Invalid free of 0x000000003411e921 (in kfence-#126):
[   29.466329]  test_double_free+0x100/0x238
[   29.466844]  kunit_try_run_case+0x170/0x3f0
[   29.467353]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.468095]  kthread+0x24c/0x2d0
[   29.468593]  ret_from_fork+0x10/0x20
[   29.469150] 
[   29.469509] kfence-#126: 0x000000003411e921-0x000000004924a39b, size=32, cache=test
[   29.469509] 
[   29.470364] allocated by task 285 on cpu 0 at 29.463919s (0.006432s ago):
[   29.471160]  test_alloc+0x230/0x628
[   29.471666]  test_double_free+0xd4/0x238
[   29.472223]  kunit_try_run_case+0x170/0x3f0
[   29.472781]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.473495]  kthread+0x24c/0x2d0
[   29.473940]  ret_from_fork+0x10/0x20
[   29.474398] 
[   29.474720] freed by task 285 on cpu 0 at 29.464012s (0.010696s ago):
[   29.475556]  test_double_free+0xf0/0x238
[   29.476105]  kunit_try_run_case+0x170/0x3f0
[   29.476654]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.477294]  kthread+0x24c/0x2d0
[   29.477780]  ret_from_fork+0x10/0x20
[   29.478330] 
[   29.478678] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   29.479606] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.480141] Hardware name: linux,dummy-virt (DT)
[   29.480666] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[   29.256301] ==================================================================
[   29.256986] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   29.256986] 
[   29.257859] Use-after-free read at 0x00000000afc7ef0e (in kfence-#124):
[   29.258517]  test_use_after_free_read+0x114/0x248
[   29.259350]  kunit_try_run_case+0x170/0x3f0
[   29.260115]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.260729]  kthread+0x24c/0x2d0
[   29.261330]  ret_from_fork+0x10/0x20
[   29.261895] 
[   29.262216] kfence-#124: 0x00000000afc7ef0e-0x00000000d637a397, size=32, cache=test
[   29.262216] 
[   29.263094] allocated by task 281 on cpu 1 at 29.256000s (0.007082s ago):
[   29.263871]  test_alloc+0x230/0x628
[   29.264386]  test_use_after_free_read+0xd0/0x248
[   29.265027]  kunit_try_run_case+0x170/0x3f0
[   29.265647]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.266219]  kthread+0x24c/0x2d0
[   29.266777]  ret_from_fork+0x10/0x20
[   29.267258] 
[   29.267575] freed by task 281 on cpu 1 at 29.256081s (0.011481s ago):
[   29.268338]  test_use_after_free_read+0xf0/0x248
[   29.268974]  kunit_try_run_case+0x170/0x3f0
[   29.269553]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.270133]  kthread+0x24c/0x2d0
[   29.270628]  ret_from_fork+0x10/0x20
[   29.271149] 
[   29.271508] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   29.272407] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.272927] Hardware name: linux,dummy-virt (DT)
[   29.273559] ==================================================================
[   29.152616] ==================================================================
[   29.153283] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   29.153283] 
[   29.154193] Use-after-free read at 0x00000000168ec30a (in kfence-#123):
[   29.154882]  test_use_after_free_read+0x114/0x248
[   29.155609]  kunit_try_run_case+0x170/0x3f0
[   29.156228]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.156989]  kthread+0x24c/0x2d0
[   29.157553]  ret_from_fork+0x10/0x20
[   29.158207] 
[   29.158542] kfence-#123: 0x00000000168ec30a-0x00000000e8bd9b7c, size=32, cache=kmalloc-32
[   29.158542] 
[   29.159485] allocated by task 279 on cpu 0 at 29.152272s (0.007200s ago):
[   29.160328]  test_alloc+0x29c/0x628
[   29.160934]  test_use_after_free_read+0xd0/0x248
[   29.161561]  kunit_try_run_case+0x170/0x3f0
[   29.162195]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.162871]  kthread+0x24c/0x2d0
[   29.163409]  ret_from_fork+0x10/0x20
[   29.163973] 
[   29.164318] freed by task 279 on cpu 0 at 29.152382s (0.011924s ago):
[   29.165144]  test_use_after_free_read+0x1c0/0x248
[   29.165780]  kunit_try_run_case+0x170/0x3f0
[   29.166323]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.167086]  kthread+0x24c/0x2d0
[   29.167601]  ret_from_fork+0x10/0x20
[   29.168171] 
[   29.168575] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   29.169610] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.170170] Hardware name: linux,dummy-virt (DT)
[   29.170747] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[   29.048310] ==================================================================
[   29.049046] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   29.049046] 
[   29.049782] Out-of-bounds write at 0x00000000fc9eccce (1B left of kfence-#122):
[   29.050591]  test_out_of_bounds_write+0x100/0x240
[   29.051207]  kunit_try_run_case+0x170/0x3f0
[   29.051876]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.052736]  kthread+0x24c/0x2d0
[   29.053400]  ret_from_fork+0x10/0x20
[   29.053933] 
[   29.054328] kfence-#122: 0x000000009596f362-0x00000000a62b33bd, size=32, cache=test
[   29.054328] 
[   29.055337] allocated by task 277 on cpu 0 at 29.048158s (0.007165s ago):
[   29.056174]  test_alloc+0x230/0x628
[   29.056738]  test_out_of_bounds_write+0xc8/0x240
[   29.057420]  kunit_try_run_case+0x170/0x3f0
[   29.058081]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.058761]  kthread+0x24c/0x2d0
[   29.059336]  ret_from_fork+0x10/0x20
[   29.059885] 
[   29.060310] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   29.061338] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.061877] Hardware name: linux,dummy-virt (DT)
[   29.062474] ==================================================================
[   28.528237] ==================================================================
[   28.529027] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   28.529027] 
[   28.529805] Out-of-bounds write at 0x0000000095851409 (1B left of kfence-#117):
[   28.530633]  test_out_of_bounds_write+0x100/0x240
[   28.531298]  kunit_try_run_case+0x170/0x3f0
[   28.531853]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.532464]  kthread+0x24c/0x2d0
[   28.533001]  ret_from_fork+0x10/0x20
[   28.533520] 
[   28.533841] kfence-#117: 0x0000000068332b06-0x00000000823c80ae, size=32, cache=kmalloc-32
[   28.533841] 
[   28.534730] allocated by task 275 on cpu 1 at 28.527997s (0.006720s ago):
[   28.535510]  test_alloc+0x29c/0x628
[   28.536027]  test_out_of_bounds_write+0xc8/0x240
[   28.536626]  kunit_try_run_case+0x170/0x3f0
[   28.537189]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.537819]  kthread+0x24c/0x2d0
[   28.538362]  ret_from_fork+0x10/0x20
[   28.538879] 
[   28.539259] CPU: 1 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   28.540082] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.540637] Hardware name: linux,dummy-virt (DT)
[   28.541232] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[   28.112194] ==================================================================
[   28.113086] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   28.113086] 
[   28.113876] Out-of-bounds read at 0x00000000d35d9ce5 (1B left of kfence-#113):
[   28.114732]  test_out_of_bounds_read+0x114/0x3e0
[   28.115393]  kunit_try_run_case+0x170/0x3f0
[   28.115941]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.116619]  kthread+0x24c/0x2d0
[   28.117141]  ret_from_fork+0x10/0x20
[   28.117632] 
[   28.117981] kfence-#113: 0x0000000051753030-0x00000000917ddf2a, size=32, cache=test
[   28.117981] 
[   28.118898] allocated by task 273 on cpu 1 at 28.112039s (0.006846s ago):
[   28.119774]  test_alloc+0x230/0x628
[   28.120298]  test_out_of_bounds_read+0xdc/0x3e0
[   28.120882]  kunit_try_run_case+0x170/0x3f0
[   28.121444]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.122173]  kthread+0x24c/0x2d0
[   28.122635]  ret_from_fork+0x10/0x20
[   28.123154] 
[   28.123510] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   28.124403] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.124979] Hardware name: linux,dummy-virt (DT)
[   28.125569] ==================================================================
[   27.592726] ==================================================================
[   27.593526] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   27.593526] 
[   27.594387] Out-of-bounds read at 0x000000002394b17b (1B left of kfence-#108):
[   27.595282]  test_out_of_bounds_read+0x114/0x3e0
[   27.595889]  kunit_try_run_case+0x170/0x3f0
[   27.596433]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.597082]  kthread+0x24c/0x2d0
[   27.597556]  ret_from_fork+0x10/0x20
[   27.598050] 
[   27.598383] kfence-#108: 0x000000006c7a8b0d-0x000000008dee2002, size=32, cache=kmalloc-32
[   27.598383] 
[   27.599412] allocated by task 271 on cpu 0 at 27.592216s (0.007183s ago):
[   27.600244]  test_alloc+0x29c/0x628
[   27.600734]  test_out_of_bounds_read+0xdc/0x3e0
[   27.601417]  kunit_try_run_case+0x170/0x3f0
[   27.601987]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.602674]  kthread+0x24c/0x2d0
[   27.603235]  ret_from_fork+0x10/0x20
[   27.603893] 
[   27.604271] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   27.605222] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.605696] Hardware name: linux,dummy-virt (DT)
[   27.606259] ==================================================================
[   28.216054] ==================================================================
[   28.217010] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   28.217010] 
[   28.217933] Out-of-bounds read at 0x00000000c8be080f (32B right of kfence-#114):
[   28.218645]  test_out_of_bounds_read+0x1c8/0x3e0
[   28.219274]  kunit_try_run_case+0x170/0x3f0
[   28.219803]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.220523]  kthread+0x24c/0x2d0
[   28.221013]  ret_from_fork+0x10/0x20
[   28.221441] 
[   28.221769] kfence-#114: 0x00000000ff60bf9b-0x0000000099f0a02d, size=32, cache=test
[   28.221769] 
[   28.222828] allocated by task 273 on cpu 1 at 28.215920s (0.006896s ago):
[   28.223641]  test_alloc+0x230/0x628
[   28.224092]  test_out_of_bounds_read+0x198/0x3e0
[   28.224683]  kunit_try_run_case+0x170/0x3f0
[   28.225312]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.225910]  kthread+0x24c/0x2d0
[   28.226430]  ret_from_fork+0x10/0x20
[   28.226998] 
[   28.227340] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   28.228274] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.228808] Hardware name: linux,dummy-virt (DT)
[   28.229421] ==================================================================
[   27.696561] ==================================================================
[   27.697324] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   27.697324] 
[   27.698178] Out-of-bounds read at 0x000000003de6f4fc (32B right of kfence-#109):
[   27.699057]  test_out_of_bounds_read+0x1c8/0x3e0
[   27.699787]  kunit_try_run_case+0x170/0x3f0
[   27.700306]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.700950]  kthread+0x24c/0x2d0
[   27.701507]  ret_from_fork+0x10/0x20
[   27.702058] 
[   27.702411] kfence-#109: 0x00000000efef25f7-0x00000000dbe5f2cb, size=32, cache=kmalloc-32
[   27.702411] 
[   27.703337] allocated by task 271 on cpu 0 at 27.696159s (0.007166s ago):
[   27.704093]  test_alloc+0x29c/0x628
[   27.704593]  test_out_of_bounds_read+0x198/0x3e0
[   27.705150]  kunit_try_run_case+0x170/0x3f0
[   27.705692]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.706377]  kthread+0x24c/0x2d0
[   27.706813]  ret_from_fork+0x10/0x20
[   27.707349] 
[   27.707690] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   27.708658] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.709156] Hardware name: linux,dummy-virt (DT)
[   27.709736] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-kfree_sensitive
[   21.783283] ==================================================================
[   21.784029] BUG: KFENCE: invalid free in kfree_sensitive+0x80/0xb0
[   21.784029] 
[   21.785019] Invalid free of 0x00000000257a260f (in kfence-#81):
[   21.785794]  kfree_sensitive+0x80/0xb0
[   21.786506]  kmalloc_double_kzfree+0x174/0x318
[   21.787200]  kunit_try_run_case+0x170/0x3f0
[   21.788597]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.789148]  kthread+0x24c/0x2d0
[   21.789498]  ret_from_fork+0x10/0x20
[   21.789859] 
[   21.790106] kfence-#81: 0x00000000257a260f-0x000000006aca8a8b, size=16, cache=kmalloc-16
[   21.790106] 
[   21.791405] allocated by task 180 on cpu 1 at 21.757367s (0.034027s ago):
[   21.792178]  kmalloc_double_kzfree+0xb8/0x318
[   21.792907]  kunit_try_run_case+0x170/0x3f0
[   21.793621]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.794341]  kthread+0x24c/0x2d0
[   21.794785]  ret_from_fork+0x10/0x20
[   21.795254] 
[   21.795575] freed by task 180 on cpu 1 at 21.757455s (0.038108s ago):
[   21.796323]  kfree_sensitive+0x80/0xb0
[   21.796793]  kmalloc_double_kzfree+0x120/0x318
[   21.797512]  kunit_try_run_case+0x170/0x3f0
[   21.798025]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.798679]  kthread+0x24c/0x2d0
[   21.799150]  ret_from_fork+0x10/0x20
[   21.800609] 
[   21.801027] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   21.801946] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.802497] Hardware name: linux,dummy-virt (DT)
[   21.803045] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-write-in-__memset
[   21.758674] ==================================================================
[   21.760415] BUG: KFENCE: use-after-free write in __memset+0x84/0x188
[   21.760415] 
[   21.761326] Use-after-free write at 0x00000000257a260f (in kfence-#81):
[   21.762670]  __memset+0x84/0x188
[   21.763284]  kmalloc_double_kzfree+0x174/0x318
[   21.764125]  kunit_try_run_case+0x170/0x3f0
[   21.764708]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.765475]  kthread+0x24c/0x2d0
[   21.766053]  ret_from_fork+0x10/0x20
[   21.766665] 
[   21.767489] kfence-#81: 0x00000000257a260f-0x000000006aca8a8b, size=16, cache=kmalloc-16
[   21.767489] 
[   21.768516] allocated by task 180 on cpu 1 at 21.757367s (0.011080s ago):
[   21.769566]  kmalloc_double_kzfree+0xb8/0x318
[   21.770206]  kunit_try_run_case+0x170/0x3f0
[   21.770806]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.771463]  kthread+0x24c/0x2d0
[   21.772140]  ret_from_fork+0x10/0x20
[   21.772746] 
[   21.773375] freed by task 180 on cpu 1 at 21.757455s (0.015744s ago):
[   21.774244]  kfree_sensitive+0x80/0xb0
[   21.774748]  kmalloc_double_kzfree+0x120/0x318
[   21.775371]  kunit_try_run_case+0x170/0x3f0
[   21.776160]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.776896]  kthread+0x24c/0x2d0
[   21.777322]  ret_from_fork+0x10/0x20
[   21.777786] 
[   21.778232] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   21.779287] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.779843] Hardware name: linux,dummy-virt (DT)
[   21.781080] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[   27.313818] ==================================================================
[   27.315084] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x50c/0x5b0
[   27.316375] Read of size 1 at addr ffff8000801097f8 by task kunit_try_catch/257
[   27.317706] 
[   27.318006] CPU: 1 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   27.318187] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.318253] Hardware name: linux,dummy-virt (DT)
[   27.318330] Call trace:
[   27.318390]  dump_backtrace+0x9c/0x128
[   27.318512]  show_stack+0x20/0x38
[   27.318646]  dump_stack_lvl+0x8c/0xd0
[   27.318800]  print_report+0x310/0x5f0
[   27.318935]  kasan_report+0xdc/0x128
[   27.319092]  __asan_report_load1_noabort+0x20/0x30
[   27.319183]  vmalloc_oob+0x50c/0x5b0
[   27.319235]  kunit_try_run_case+0x170/0x3f0
[   27.319309]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.319391]  kthread+0x24c/0x2d0
[   27.319440]  ret_from_fork+0x10/0x20
[   27.319491] 
[   27.325789] The buggy address belongs to the virtual mapping at
[   27.325789]  [ffff800080109000, ffff80008010b000) created by:
[   27.325789]  vmalloc_oob+0x98/0x5b0
[   27.327362] 
[   27.327780] The buggy address belongs to the physical page:
[   27.328394] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10428a
[   27.329389] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.330123] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   27.331114] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   27.331892] page dumped because: kasan: bad access detected
[   27.332649] 
[   27.333054] Memory state around the buggy address:
[   27.333664]  ffff800080109680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.334442]  ffff800080109700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.335460] >ffff800080109780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   27.336191]                                                                 ^
[   27.337033]  ffff800080109800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   27.337782]  ffff800080109880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   27.338440] ==================================================================
[   27.288189] ==================================================================
[   27.289656] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x560/0x5b0
[   27.290488] Read of size 1 at addr ffff8000801097f3 by task kunit_try_catch/257
[   27.291134] 
[   27.292415] CPU: 1 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   27.292525] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.292561] Hardware name: linux,dummy-virt (DT)
[   27.292603] Call trace:
[   27.292633]  dump_backtrace+0x9c/0x128
[   27.292692]  show_stack+0x20/0x38
[   27.292738]  dump_stack_lvl+0x8c/0xd0
[   27.292806]  print_report+0x310/0x5f0
[   27.292856]  kasan_report+0xdc/0x128
[   27.292902]  __asan_report_load1_noabort+0x20/0x30
[   27.292955]  vmalloc_oob+0x560/0x5b0
[   27.293036]  kunit_try_run_case+0x170/0x3f0
[   27.293093]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.293152]  kthread+0x24c/0x2d0
[   27.293202]  ret_from_fork+0x10/0x20
[   27.293252] 
[   27.300702] The buggy address belongs to the virtual mapping at
[   27.300702]  [ffff800080109000, ffff80008010b000) created by:
[   27.300702]  vmalloc_oob+0x98/0x5b0
[   27.302218] 
[   27.302635] The buggy address belongs to the physical page:
[   27.303275] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10428a
[   27.304574] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.305395] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   27.306225] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   27.307026] page dumped because: kasan: bad access detected
[   27.307784] 
[   27.308284] Memory state around the buggy address:
[   27.309415]  ffff800080109680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.309999]  ffff800080109700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.310327] >ffff800080109780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   27.310639]                                                              ^
[   27.310941]  ffff800080109800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   27.311284]  ffff800080109880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   27.312317] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   24.986152] ==================================================================
[   24.987845] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4210/0x49c8
[   24.988611] Read of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   24.989805] 
[   24.990206] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.990475] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.990546] Hardware name: linux,dummy-virt (DT)
[   24.990593] Call trace:
[   24.990623]  dump_backtrace+0x9c/0x128
[   24.990726]  show_stack+0x20/0x38
[   24.990782]  dump_stack_lvl+0x8c/0xd0
[   24.990830]  print_report+0x118/0x5f0
[   24.990886]  kasan_report+0xdc/0x128
[   24.990934]  __asan_report_load4_noabort+0x20/0x30
[   24.991021]  kasan_atomics_helper+0x4210/0x49c8
[   24.991082]  kasan_atomics+0x1a0/0x2e8
[   24.991135]  kunit_try_run_case+0x170/0x3f0
[   24.991184]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.991241]  kthread+0x24c/0x2d0
[   24.991290]  ret_from_fork+0x10/0x20
[   24.991343] 
[   24.999088] Allocated by task 253:
[   24.999755]  kasan_save_stack+0x3c/0x68
[   25.000279]  kasan_save_track+0x20/0x40
[   25.000773]  kasan_save_alloc_info+0x40/0x58
[   25.001398]  __kasan_kmalloc+0xd4/0xd8
[   25.001899]  __kmalloc_cache_noprof+0x154/0x320
[   25.002695]  kasan_atomics+0xb8/0x2e8
[   25.003224]  kunit_try_run_case+0x170/0x3f0
[   25.004060]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.004650]  kthread+0x24c/0x2d0
[   25.005177]  ret_from_fork+0x10/0x20
[   25.005721] 
[   25.006080] The buggy address belongs to the object at fff00000c4205580
[   25.006080]  which belongs to the cache kmalloc-64 of size 64
[   25.007107] The buggy address is located 0 bytes to the right of
[   25.007107]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   25.008928] 
[   25.009283] The buggy address belongs to the physical page:
[   25.009945] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   25.010741] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.011696] page_type: f5(slab)
[   25.012215] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.013033] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.013877] page dumped because: kasan: bad access detected
[   25.014649] 
[   25.014992] Memory state around the buggy address:
[   25.015546]  fff00000c4205480: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   25.016587]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.017328] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.018086]                                      ^
[   25.018680]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.019698]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.020443] ==================================================================
[   26.408980] ==================================================================
[   26.409906] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf94/0x49c8
[   26.410697] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.412022] 
[   26.412441] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.412644] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.412728] Hardware name: linux,dummy-virt (DT)
[   26.412832] Call trace:
[   26.412893]  dump_backtrace+0x9c/0x128
[   26.412952]  show_stack+0x20/0x38
[   26.413034]  dump_stack_lvl+0x8c/0xd0
[   26.413085]  print_report+0x118/0x5f0
[   26.413134]  kasan_report+0xdc/0x128
[   26.413180]  kasan_check_range+0x100/0x1a8
[   26.413231]  __kasan_check_write+0x20/0x30
[   26.413281]  kasan_atomics_helper+0xf94/0x49c8
[   26.413338]  kasan_atomics+0x1a0/0x2e8
[   26.413389]  kunit_try_run_case+0x170/0x3f0
[   26.413441]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.413497]  kthread+0x24c/0x2d0
[   26.413548]  ret_from_fork+0x10/0x20
[   26.413599] 
[   26.420294] Allocated by task 253:
[   26.420761]  kasan_save_stack+0x3c/0x68
[   26.421350]  kasan_save_track+0x20/0x40
[   26.421866]  kasan_save_alloc_info+0x40/0x58
[   26.422410]  __kasan_kmalloc+0xd4/0xd8
[   26.422925]  __kmalloc_cache_noprof+0x154/0x320
[   26.423518]  kasan_atomics+0xb8/0x2e8
[   26.424030]  kunit_try_run_case+0x170/0x3f0
[   26.424526]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.425237]  kthread+0x24c/0x2d0
[   26.425642]  ret_from_fork+0x10/0x20
[   26.426267] 
[   26.426596] The buggy address belongs to the object at fff00000c4205580
[   26.426596]  which belongs to the cache kmalloc-64 of size 64
[   26.427696] The buggy address is located 0 bytes to the right of
[   26.427696]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.428940] 
[   26.429330] The buggy address belongs to the physical page:
[   26.430038] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.430949] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.431689] page_type: f5(slab)
[   26.432179] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.432898] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.433580] page dumped because: kasan: bad access detected
[   26.434189] 
[   26.434524] Memory state around the buggy address:
[   26.435070]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.435794]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.436574] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.437354]                                      ^
[   26.437885]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.438637]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.439363] ==================================================================
[   25.061040] ==================================================================
[   25.062164] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f8/0x49c8
[   25.062836] Read of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   25.063561] 
[   25.063913] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   25.064132] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.064203] Hardware name: linux,dummy-virt (DT)
[   25.064281] Call trace:
[   25.064347]  dump_backtrace+0x9c/0x128
[   25.064454]  show_stack+0x20/0x38
[   25.064551]  dump_stack_lvl+0x8c/0xd0
[   25.064655]  print_report+0x118/0x5f0
[   25.064780]  kasan_report+0xdc/0x128
[   25.064902]  kasan_check_range+0x100/0x1a8
[   25.065077]  __kasan_check_read+0x20/0x30
[   25.065248]  kasan_atomics_helper+0x1f8/0x49c8
[   25.065411]  kasan_atomics+0x1a0/0x2e8
[   25.065533]  kunit_try_run_case+0x170/0x3f0
[   25.065649]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.065762]  kthread+0x24c/0x2d0
[   25.065817]  ret_from_fork+0x10/0x20
[   25.065867] 
[   25.075991] Allocated by task 253:
[   25.076581]  kasan_save_stack+0x3c/0x68
[   25.077253]  kasan_save_track+0x20/0x40
[   25.077821]  kasan_save_alloc_info+0x40/0x58
[   25.078510]  __kasan_kmalloc+0xd4/0xd8
[   25.079108]  __kmalloc_cache_noprof+0x154/0x320
[   25.080121]  kasan_atomics+0xb8/0x2e8
[   25.080791]  kunit_try_run_case+0x170/0x3f0
[   25.081446]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.082213]  kthread+0x24c/0x2d0
[   25.082758]  ret_from_fork+0x10/0x20
[   25.083352] 
[   25.083855] The buggy address belongs to the object at fff00000c4205580
[   25.083855]  which belongs to the cache kmalloc-64 of size 64
[   25.085318] The buggy address is located 0 bytes to the right of
[   25.085318]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   25.086700] 
[   25.087038] The buggy address belongs to the physical page:
[   25.088436] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   25.089418] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.090120] page_type: f5(slab)
[   25.090696] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.091903] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.092784] page dumped because: kasan: bad access detected
[   25.093425] 
[   25.093774] Memory state around the buggy address:
[   25.094388]  fff00000c4205480: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   25.095203]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.096559] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.097449]                                      ^
[   25.097954]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.098638]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.099770] ==================================================================
[   25.216165] ==================================================================
[   25.216900] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x344/0x49c8
[   25.217573] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   25.218395] 
[   25.218740] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   25.218946] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.219045] Hardware name: linux,dummy-virt (DT)
[   25.219135] Call trace:
[   25.219207]  dump_backtrace+0x9c/0x128
[   25.219334]  show_stack+0x20/0x38
[   25.219500]  dump_stack_lvl+0x8c/0xd0
[   25.219622]  print_report+0x118/0x5f0
[   25.219738]  kasan_report+0xdc/0x128
[   25.219858]  kasan_check_range+0x100/0x1a8
[   25.219995]  __kasan_check_write+0x20/0x30
[   25.220122]  kasan_atomics_helper+0x344/0x49c8
[   25.220243]  kasan_atomics+0x1a0/0x2e8
[   25.220404]  kunit_try_run_case+0x170/0x3f0
[   25.220522]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.220653]  kthread+0x24c/0x2d0
[   25.220777]  ret_from_fork+0x10/0x20
[   25.220895] 
[   25.228095] Allocated by task 253:
[   25.228720]  kasan_save_stack+0x3c/0x68
[   25.229362]  kasan_save_track+0x20/0x40
[   25.229913]  kasan_save_alloc_info+0x40/0x58
[   25.230461]  __kasan_kmalloc+0xd4/0xd8
[   25.230891]  __kmalloc_cache_noprof+0x154/0x320
[   25.231575]  kasan_atomics+0xb8/0x2e8
[   25.232182]  kunit_try_run_case+0x170/0x3f0
[   25.232810]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.233432]  kthread+0x24c/0x2d0
[   25.233897]  ret_from_fork+0x10/0x20
[   25.234403] 
[   25.234733] The buggy address belongs to the object at fff00000c4205580
[   25.234733]  which belongs to the cache kmalloc-64 of size 64
[   25.235938] The buggy address is located 0 bytes to the right of
[   25.235938]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   25.237329] 
[   25.237608] The buggy address belongs to the physical page:
[   25.239068] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   25.239837] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.240442] page_type: f5(slab)
[   25.240942] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.243003] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.244626] page dumped because: kasan: bad access detected
[   25.245698] 
[   25.246138] Memory state around the buggy address:
[   25.246718]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.247787]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.248587] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.249532]                                      ^
[   25.250122]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.250930]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.251808] ==================================================================
[   25.552651] ==================================================================
[   25.553430] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6bc/0x49c8
[   25.554222] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   25.555033] 
[   25.555390] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   25.555591] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.555704] Hardware name: linux,dummy-virt (DT)
[   25.555793] Call trace:
[   25.555867]  dump_backtrace+0x9c/0x128
[   25.556009]  show_stack+0x20/0x38
[   25.556130]  dump_stack_lvl+0x8c/0xd0
[   25.556249]  print_report+0x118/0x5f0
[   25.556369]  kasan_report+0xdc/0x128
[   25.556485]  kasan_check_range+0x100/0x1a8
[   25.556603]  __kasan_check_write+0x20/0x30
[   25.556729]  kasan_atomics_helper+0x6bc/0x49c8
[   25.556866]  kasan_atomics+0x1a0/0x2e8
[   25.557008]  kunit_try_run_case+0x170/0x3f0
[   25.557129]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.557201]  kthread+0x24c/0x2d0
[   25.557250]  ret_from_fork+0x10/0x20
[   25.557300] 
[   25.563993] Allocated by task 253:
[   25.564474]  kasan_save_stack+0x3c/0x68
[   25.565075]  kasan_save_track+0x20/0x40
[   25.565693]  kasan_save_alloc_info+0x40/0x58
[   25.566241]  __kasan_kmalloc+0xd4/0xd8
[   25.566730]  __kmalloc_cache_noprof+0x154/0x320
[   25.567368]  kasan_atomics+0xb8/0x2e8
[   25.567867]  kunit_try_run_case+0x170/0x3f0
[   25.568429]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.569246]  kthread+0x24c/0x2d0
[   25.569744]  ret_from_fork+0x10/0x20
[   25.570679] 
[   25.571153] The buggy address belongs to the object at fff00000c4205580
[   25.571153]  which belongs to the cache kmalloc-64 of size 64
[   25.572238] The buggy address is located 0 bytes to the right of
[   25.572238]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   25.573802] 
[   25.574244] The buggy address belongs to the physical page:
[   25.574912] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   25.575886] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.576718] page_type: f5(slab)
[   25.577219] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.577995] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.578744] page dumped because: kasan: bad access detected
[   25.579531] 
[   25.580018] Memory state around the buggy address:
[   25.580530]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.581219]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.581938] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.582670]                                      ^
[   25.583228]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.583914]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.584672] ==================================================================
[   25.101201] ==================================================================
[   25.101978] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x25c/0x49c8
[   25.102649] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   25.103590] 
[   25.103987] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   25.104192] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.104276] Hardware name: linux,dummy-virt (DT)
[   25.104362] Call trace:
[   25.104461]  dump_backtrace+0x9c/0x128
[   25.104574]  show_stack+0x20/0x38
[   25.104676]  dump_stack_lvl+0x8c/0xd0
[   25.104789]  print_report+0x118/0x5f0
[   25.104886]  kasan_report+0xdc/0x128
[   25.105006]  kasan_check_range+0x100/0x1a8
[   25.105119]  __kasan_check_write+0x20/0x30
[   25.105286]  kasan_atomics_helper+0x25c/0x49c8
[   25.105417]  kasan_atomics+0x1a0/0x2e8
[   25.105538]  kunit_try_run_case+0x170/0x3f0
[   25.105651]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.105734]  kthread+0x24c/0x2d0
[   25.105785]  ret_from_fork+0x10/0x20
[   25.105836] 
[   25.114394] Allocated by task 253:
[   25.114919]  kasan_save_stack+0x3c/0x68
[   25.115877]  kasan_save_track+0x20/0x40
[   25.116515]  kasan_save_alloc_info+0x40/0x58
[   25.117072]  __kasan_kmalloc+0xd4/0xd8
[   25.117690]  __kmalloc_cache_noprof+0x154/0x320
[   25.118334]  kasan_atomics+0xb8/0x2e8
[   25.118980]  kunit_try_run_case+0x170/0x3f0
[   25.119516]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.120109]  kthread+0x24c/0x2d0
[   25.120508]  ret_from_fork+0x10/0x20
[   25.120955] 
[   25.122003] The buggy address belongs to the object at fff00000c4205580
[   25.122003]  which belongs to the cache kmalloc-64 of size 64
[   25.123442] The buggy address is located 0 bytes to the right of
[   25.123442]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   25.125059] 
[   25.125566] The buggy address belongs to the physical page:
[   25.126243] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   25.126980] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.127693] page_type: f5(slab)
[   25.128199] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.128996] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.129730] page dumped because: kasan: bad access detected
[   25.130743] 
[   25.131035] Memory state around the buggy address:
[   25.131614]  fff00000c4205480: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   25.132534]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.133242] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.134405]                                      ^
[   25.134893]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.135594]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.136606] ==================================================================
[   25.922813] ==================================================================
[   25.923597] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f34/0x49c8
[   25.924493] Read of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   25.925313] 
[   25.925625] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   25.925850] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.925938] Hardware name: linux,dummy-virt (DT)
[   25.926050] Call trace:
[   25.926125]  dump_backtrace+0x9c/0x128
[   25.926254]  show_stack+0x20/0x38
[   25.926374]  dump_stack_lvl+0x8c/0xd0
[   25.926500]  print_report+0x118/0x5f0
[   25.926615]  kasan_report+0xdc/0x128
[   25.926718]  __asan_report_load4_noabort+0x20/0x30
[   25.926780]  kasan_atomics_helper+0x3f34/0x49c8
[   25.926835]  kasan_atomics+0x1a0/0x2e8
[   25.926887]  kunit_try_run_case+0x170/0x3f0
[   25.926938]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.927026]  kthread+0x24c/0x2d0
[   25.927078]  ret_from_fork+0x10/0x20
[   25.927130] 
[   25.933463] Allocated by task 253:
[   25.933938]  kasan_save_stack+0x3c/0x68
[   25.934532]  kasan_save_track+0x20/0x40
[   25.935103]  kasan_save_alloc_info+0x40/0x58
[   25.935665]  __kasan_kmalloc+0xd4/0xd8
[   25.936170]  __kmalloc_cache_noprof+0x154/0x320
[   25.936701]  kasan_atomics+0xb8/0x2e8
[   25.937239]  kunit_try_run_case+0x170/0x3f0
[   25.937819]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.938498]  kthread+0x24c/0x2d0
[   25.938980]  ret_from_fork+0x10/0x20
[   25.939439] 
[   25.939760] The buggy address belongs to the object at fff00000c4205580
[   25.939760]  which belongs to the cache kmalloc-64 of size 64
[   25.940951] The buggy address is located 0 bytes to the right of
[   25.940951]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   25.942286] 
[   25.942607] The buggy address belongs to the physical page:
[   25.943153] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   25.944020] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.944668] page_type: f5(slab)
[   25.945201] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.946507] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.947453] page dumped because: kasan: bad access detected
[   25.948059] 
[   25.948357] Memory state around the buggy address:
[   25.948872]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.949665]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.950433] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.951392]                                      ^
[   25.951826]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.954514]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.956391] ==================================================================
[   26.791743] ==================================================================
[   26.792356] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x406c/0x49c8
[   26.793321] Read of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.794129] 
[   26.794481] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.794697] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.794784] Hardware name: linux,dummy-virt (DT)
[   26.794876] Call trace:
[   26.794951]  dump_backtrace+0x9c/0x128
[   26.795094]  show_stack+0x20/0x38
[   26.795214]  dump_stack_lvl+0x8c/0xd0
[   26.795333]  print_report+0x118/0x5f0
[   26.795631]  kasan_report+0xdc/0x128
[   26.795757]  __asan_report_load8_noabort+0x20/0x30
[   26.795898]  kasan_atomics_helper+0x406c/0x49c8
[   26.796053]  kasan_atomics+0x1a0/0x2e8
[   26.796178]  kunit_try_run_case+0x170/0x3f0
[   26.796266]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.796327]  kthread+0x24c/0x2d0
[   26.796378]  ret_from_fork+0x10/0x20
[   26.796429] 
[   26.802616] Allocated by task 253:
[   26.803121]  kasan_save_stack+0x3c/0x68
[   26.803722]  kasan_save_track+0x20/0x40
[   26.804284]  kasan_save_alloc_info+0x40/0x58
[   26.804909]  __kasan_kmalloc+0xd4/0xd8
[   26.805471]  __kmalloc_cache_noprof+0x154/0x320
[   26.805998]  kasan_atomics+0xb8/0x2e8
[   26.806564]  kunit_try_run_case+0x170/0x3f0
[   26.807244]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.807908]  kthread+0x24c/0x2d0
[   26.808429]  ret_from_fork+0x10/0x20
[   26.808887] 
[   26.809227] The buggy address belongs to the object at fff00000c4205580
[   26.809227]  which belongs to the cache kmalloc-64 of size 64
[   26.810487] The buggy address is located 0 bytes to the right of
[   26.810487]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.811691] 
[   26.812047] The buggy address belongs to the physical page:
[   26.812605] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.813428] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.814445] page_type: f5(slab)
[   26.814852] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.816065] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.816996] page dumped because: kasan: bad access detected
[   26.817542] 
[   26.817823] Memory state around the buggy address:
[   26.818469]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.819407]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.820233] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.821036]                                      ^
[   26.821699]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.822543]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.823337] ==================================================================
[   26.239863] ==================================================================
[   26.240595] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe3c/0x49c8
[   26.241458] Read of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.242237] 
[   26.242617] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.242819] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.242909] Hardware name: linux,dummy-virt (DT)
[   26.243017] Call trace:
[   26.243091]  dump_backtrace+0x9c/0x128
[   26.243215]  show_stack+0x20/0x38
[   26.243333]  dump_stack_lvl+0x8c/0xd0
[   26.243455]  print_report+0x118/0x5f0
[   26.243591]  kasan_report+0xdc/0x128
[   26.243710]  kasan_check_range+0x100/0x1a8
[   26.243832]  __kasan_check_read+0x20/0x30
[   26.243981]  kasan_atomics_helper+0xe3c/0x49c8
[   26.244114]  kasan_atomics+0x1a0/0x2e8
[   26.244236]  kunit_try_run_case+0x170/0x3f0
[   26.244364]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.244479]  kthread+0x24c/0x2d0
[   26.244533]  ret_from_fork+0x10/0x20
[   26.244585] 
[   26.251253] Allocated by task 253:
[   26.251775]  kasan_save_stack+0x3c/0x68
[   26.252399]  kasan_save_track+0x20/0x40
[   26.252883]  kasan_save_alloc_info+0x40/0x58
[   26.253461]  __kasan_kmalloc+0xd4/0xd8
[   26.253920]  __kmalloc_cache_noprof+0x154/0x320
[   26.254546]  kasan_atomics+0xb8/0x2e8
[   26.255132]  kunit_try_run_case+0x170/0x3f0
[   26.255706]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.257112]  kthread+0x24c/0x2d0
[   26.257595]  ret_from_fork+0x10/0x20
[   26.258110] 
[   26.258399] The buggy address belongs to the object at fff00000c4205580
[   26.258399]  which belongs to the cache kmalloc-64 of size 64
[   26.259520] The buggy address is located 0 bytes to the right of
[   26.259520]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.260803] 
[   26.261123] The buggy address belongs to the physical page:
[   26.261759] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.262829] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.263573] page_type: f5(slab)
[   26.264030] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.264799] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.265550] page dumped because: kasan: bad access detected
[   26.266158] 
[   26.266478] Memory state around the buggy address:
[   26.267041]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.267725]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.268469] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.269195]                                      ^
[   26.269762]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.270464]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.271216] ==================================================================
[   26.373486] ==================================================================
[   26.374162] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf28/0x49c8
[   26.374952] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.375638] 
[   26.376037] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.376238] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.376326] Hardware name: linux,dummy-virt (DT)
[   26.376419] Call trace:
[   26.376491]  dump_backtrace+0x9c/0x128
[   26.376615]  show_stack+0x20/0x38
[   26.376732]  dump_stack_lvl+0x8c/0xd0
[   26.376862]  print_report+0x118/0x5f0
[   26.376996]  kasan_report+0xdc/0x128
[   26.377114]  kasan_check_range+0x100/0x1a8
[   26.377194]  __kasan_check_write+0x20/0x30
[   26.377246]  kasan_atomics_helper+0xf28/0x49c8
[   26.377300]  kasan_atomics+0x1a0/0x2e8
[   26.377351]  kunit_try_run_case+0x170/0x3f0
[   26.377400]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.377455]  kthread+0x24c/0x2d0
[   26.377504]  ret_from_fork+0x10/0x20
[   26.377554] 
[   26.386085] Allocated by task 253:
[   26.386673]  kasan_save_stack+0x3c/0x68
[   26.387313]  kasan_save_track+0x20/0x40
[   26.387974]  kasan_save_alloc_info+0x40/0x58
[   26.388657]  __kasan_kmalloc+0xd4/0xd8
[   26.389165]  __kmalloc_cache_noprof+0x154/0x320
[   26.389677]  kasan_atomics+0xb8/0x2e8
[   26.390424]  kunit_try_run_case+0x170/0x3f0
[   26.390951]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.391536]  kthread+0x24c/0x2d0
[   26.392010]  ret_from_fork+0x10/0x20
[   26.392543] 
[   26.392977] The buggy address belongs to the object at fff00000c4205580
[   26.392977]  which belongs to the cache kmalloc-64 of size 64
[   26.394161] The buggy address is located 0 bytes to the right of
[   26.394161]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.395367] 
[   26.395707] The buggy address belongs to the physical page:
[   26.396386] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.397343] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.398090] page_type: f5(slab)
[   26.398551] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.399357] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.400191] page dumped because: kasan: bad access detected
[   26.400939] 
[   26.401394] Memory state around the buggy address:
[   26.401851]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.402770]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.403640] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.404479]                                      ^
[   26.405189]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.406031]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.406843] ==================================================================
[   26.550796] ==================================================================
[   26.551582] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1144/0x49c8
[   26.552412] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.553577] 
[   26.554020] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.554218] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.554347] Hardware name: linux,dummy-virt (DT)
[   26.554441] Call trace:
[   26.554502]  dump_backtrace+0x9c/0x128
[   26.554564]  show_stack+0x20/0x38
[   26.554610]  dump_stack_lvl+0x8c/0xd0
[   26.554656]  print_report+0x118/0x5f0
[   26.554703]  kasan_report+0xdc/0x128
[   26.554751]  kasan_check_range+0x100/0x1a8
[   26.554802]  __kasan_check_write+0x20/0x30
[   26.554852]  kasan_atomics_helper+0x1144/0x49c8
[   26.554906]  kasan_atomics+0x1a0/0x2e8
[   26.554955]  kunit_try_run_case+0x170/0x3f0
[   26.555035]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.555092]  kthread+0x24c/0x2d0
[   26.555142]  ret_from_fork+0x10/0x20
[   26.555192] 
[   26.562525] Allocated by task 253:
[   26.563109]  kasan_save_stack+0x3c/0x68
[   26.563692]  kasan_save_track+0x20/0x40
[   26.564245]  kasan_save_alloc_info+0x40/0x58
[   26.565020]  __kasan_kmalloc+0xd4/0xd8
[   26.565539]  __kmalloc_cache_noprof+0x154/0x320
[   26.566243]  kasan_atomics+0xb8/0x2e8
[   26.566789]  kunit_try_run_case+0x170/0x3f0
[   26.567426]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.568153]  kthread+0x24c/0x2d0
[   26.568627]  ret_from_fork+0x10/0x20
[   26.569281] 
[   26.569617] The buggy address belongs to the object at fff00000c4205580
[   26.569617]  which belongs to the cache kmalloc-64 of size 64
[   26.571286] The buggy address is located 0 bytes to the right of
[   26.571286]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.572456] 
[   26.573011] The buggy address belongs to the physical page:
[   26.573572] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.574558] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.575310] page_type: f5(slab)
[   26.575807] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.576653] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.577473] page dumped because: kasan: bad access detected
[   26.578110] 
[   26.578455] Memory state around the buggy address:
[   26.579035]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.579796]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.580610] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.581437]                                      ^
[   26.582008]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.582790]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.583579] ==================================================================
[   26.857213] ==================================================================
[   26.857751] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1518/0x49c8
[   26.858705] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.859622] 
[   26.860015] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.860217] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.860302] Hardware name: linux,dummy-virt (DT)
[   26.860394] Call trace:
[   26.860471]  dump_backtrace+0x9c/0x128
[   26.860597]  show_stack+0x20/0x38
[   26.860715]  dump_stack_lvl+0x8c/0xd0
[   26.860841]  print_report+0x118/0x5f0
[   26.860978]  kasan_report+0xdc/0x128
[   26.861100]  kasan_check_range+0x100/0x1a8
[   26.861226]  __kasan_check_write+0x20/0x30
[   26.861351]  kasan_atomics_helper+0x1518/0x49c8
[   26.861486]  kasan_atomics+0x1a0/0x2e8
[   26.861613]  kunit_try_run_case+0x170/0x3f0
[   26.861725]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.861791]  kthread+0x24c/0x2d0
[   26.861843]  ret_from_fork+0x10/0x20
[   26.861892] 
[   26.868740] Allocated by task 253:
[   26.869242]  kasan_save_stack+0x3c/0x68
[   26.869827]  kasan_save_track+0x20/0x40
[   26.870333]  kasan_save_alloc_info+0x40/0x58
[   26.870870]  __kasan_kmalloc+0xd4/0xd8
[   26.871322]  __kmalloc_cache_noprof+0x154/0x320
[   26.872068]  kasan_atomics+0xb8/0x2e8
[   26.872627]  kunit_try_run_case+0x170/0x3f0
[   26.873240]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.873830]  kthread+0x24c/0x2d0
[   26.874351]  ret_from_fork+0x10/0x20
[   26.874878] 
[   26.875231] The buggy address belongs to the object at fff00000c4205580
[   26.875231]  which belongs to the cache kmalloc-64 of size 64
[   26.876331] The buggy address is located 0 bytes to the right of
[   26.876331]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.877539] 
[   26.877869] The buggy address belongs to the physical page:
[   26.878477] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.879229] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.880081] page_type: f5(slab)
[   26.880533] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.881329] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.882082] page dumped because: kasan: bad access detected
[   26.882725] 
[   26.883067] Memory state around the buggy address:
[   26.883646]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.884453]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.885182] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.885912]                                      ^
[   26.886493]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.887245]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.887938] ==================================================================
[   26.688659] ==================================================================
[   26.689306] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1300/0x49c8
[   26.690072] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.690981] 
[   26.691312] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.691545] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.691630] Hardware name: linux,dummy-virt (DT)
[   26.691722] Call trace:
[   26.691799]  dump_backtrace+0x9c/0x128
[   26.691927]  show_stack+0x20/0x38
[   26.692065]  dump_stack_lvl+0x8c/0xd0
[   26.692185]  print_report+0x118/0x5f0
[   26.692303]  kasan_report+0xdc/0x128
[   26.692403]  kasan_check_range+0x100/0x1a8
[   26.692457]  __kasan_check_write+0x20/0x30
[   26.692508]  kasan_atomics_helper+0x1300/0x49c8
[   26.692563]  kasan_atomics+0x1a0/0x2e8
[   26.692613]  kunit_try_run_case+0x170/0x3f0
[   26.692662]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.692718]  kthread+0x24c/0x2d0
[   26.692781]  ret_from_fork+0x10/0x20
[   26.692834] 
[   26.699494] Allocated by task 253:
[   26.700002]  kasan_save_stack+0x3c/0x68
[   26.700546]  kasan_save_track+0x20/0x40
[   26.701138]  kasan_save_alloc_info+0x40/0x58
[   26.701677]  __kasan_kmalloc+0xd4/0xd8
[   26.702158]  __kmalloc_cache_noprof+0x154/0x320
[   26.702866]  kasan_atomics+0xb8/0x2e8
[   26.703440]  kunit_try_run_case+0x170/0x3f0
[   26.703989]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.704532]  kthread+0x24c/0x2d0
[   26.705076]  ret_from_fork+0x10/0x20
[   26.705619] 
[   26.705945] The buggy address belongs to the object at fff00000c4205580
[   26.705945]  which belongs to the cache kmalloc-64 of size 64
[   26.707216] The buggy address is located 0 bytes to the right of
[   26.707216]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.708407] 
[   26.708776] The buggy address belongs to the physical page:
[   26.709346] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.710219] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.710895] page_type: f5(slab)
[   26.711417] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.712345] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.713089] page dumped because: kasan: bad access detected
[   26.713655] 
[   26.714025] Memory state around the buggy address:
[   26.714582]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.715286]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.716058] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.716730]                                      ^
[   26.717327]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.718067]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.718788] ==================================================================
[   25.995683] ==================================================================
[   25.996396] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f24/0x49c8
[   25.998252] Read of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   25.999198] 
[   25.999583] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   25.999848] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.999940] Hardware name: linux,dummy-virt (DT)
[   26.000051] Call trace:
[   26.000091]  dump_backtrace+0x9c/0x128
[   26.000151]  show_stack+0x20/0x38
[   26.000199]  dump_stack_lvl+0x8c/0xd0
[   26.000249]  print_report+0x118/0x5f0
[   26.000300]  kasan_report+0xdc/0x128
[   26.000351]  __asan_report_load4_noabort+0x20/0x30
[   26.000407]  kasan_atomics_helper+0x3f24/0x49c8
[   26.000464]  kasan_atomics+0x1a0/0x2e8
[   26.000518]  kunit_try_run_case+0x170/0x3f0
[   26.000569]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.000627]  kthread+0x24c/0x2d0
[   26.000677]  ret_from_fork+0x10/0x20
[   26.000728] 
[   26.008033] Allocated by task 253:
[   26.008468]  kasan_save_stack+0x3c/0x68
[   26.009010]  kasan_save_track+0x20/0x40
[   26.009551]  kasan_save_alloc_info+0x40/0x58
[   26.010187]  __kasan_kmalloc+0xd4/0xd8
[   26.010838]  __kmalloc_cache_noprof+0x154/0x320
[   26.011561]  kasan_atomics+0xb8/0x2e8
[   26.012062]  kunit_try_run_case+0x170/0x3f0
[   26.012754]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.013453]  kthread+0x24c/0x2d0
[   26.013999]  ret_from_fork+0x10/0x20
[   26.014540] 
[   26.014917] The buggy address belongs to the object at fff00000c4205580
[   26.014917]  which belongs to the cache kmalloc-64 of size 64
[   26.016155] The buggy address is located 0 bytes to the right of
[   26.016155]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.017471] 
[   26.017810] The buggy address belongs to the physical page:
[   26.018414] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.019325] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.020093] page_type: f5(slab)
[   26.020591] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.021459] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.022273] page dumped because: kasan: bad access detected
[   26.022883] 
[   26.023249] Memory state around the buggy address:
[   26.023847]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.024727]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.025535] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.026307]                                      ^
[   26.026901]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.027693]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.028506] ==================================================================
[   25.586203] ==================================================================
[   25.586882] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x728/0x49c8
[   25.588781] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   25.589753] 
[   25.590074] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   25.590277] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.590365] Hardware name: linux,dummy-virt (DT)
[   25.590454] Call trace:
[   25.590514]  dump_backtrace+0x9c/0x128
[   25.590589]  show_stack+0x20/0x38
[   25.590653]  dump_stack_lvl+0x8c/0xd0
[   25.590731]  print_report+0x118/0x5f0
[   25.590779]  kasan_report+0xdc/0x128
[   25.590828]  kasan_check_range+0x100/0x1a8
[   25.590879]  __kasan_check_write+0x20/0x30
[   25.590929]  kasan_atomics_helper+0x728/0x49c8
[   25.591010]  kasan_atomics+0x1a0/0x2e8
[   25.591064]  kunit_try_run_case+0x170/0x3f0
[   25.591113]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.591169]  kthread+0x24c/0x2d0
[   25.591216]  ret_from_fork+0x10/0x20
[   25.591267] 
[   25.597893] Allocated by task 253:
[   25.598493]  kasan_save_stack+0x3c/0x68
[   25.599142]  kasan_save_track+0x20/0x40
[   25.599618]  kasan_save_alloc_info+0x40/0x58
[   25.600200]  __kasan_kmalloc+0xd4/0xd8
[   25.600715]  __kmalloc_cache_noprof+0x154/0x320
[   25.601329]  kasan_atomics+0xb8/0x2e8
[   25.601825]  kunit_try_run_case+0x170/0x3f0
[   25.602416]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.603804]  kthread+0x24c/0x2d0
[   25.604221]  ret_from_fork+0x10/0x20
[   25.604684] 
[   25.604979] The buggy address belongs to the object at fff00000c4205580
[   25.604979]  which belongs to the cache kmalloc-64 of size 64
[   25.606115] The buggy address is located 0 bytes to the right of
[   25.606115]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   25.607323] 
[   25.607596] The buggy address belongs to the physical page:
[   25.608269] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   25.609078] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.609730] page_type: f5(slab)
[   25.610260] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.611098] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.611825] page dumped because: kasan: bad access detected
[   25.612448] 
[   25.612791] Memory state around the buggy address:
[   25.613322]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.614174]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.615018] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.615721]                                      ^
[   25.616340]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.617050]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.617774] ==================================================================
[   27.067396] ==================================================================
[   27.068853] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f5c/0x49c8
[   27.069933] Read of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   27.070767] 
[   27.071151] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   27.071395] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.071510] Hardware name: linux,dummy-virt (DT)
[   27.071607] Call trace:
[   27.071685]  dump_backtrace+0x9c/0x128
[   27.071815]  show_stack+0x20/0x38
[   27.072001]  dump_stack_lvl+0x8c/0xd0
[   27.072287]  print_report+0x118/0x5f0
[   27.072361]  kasan_report+0xdc/0x128
[   27.072421]  __asan_report_load8_noabort+0x20/0x30
[   27.072488]  kasan_atomics_helper+0x3f5c/0x49c8
[   27.072548]  kasan_atomics+0x1a0/0x2e8
[   27.072601]  kunit_try_run_case+0x170/0x3f0
[   27.072652]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.072711]  kthread+0x24c/0x2d0
[   27.072773]  ret_from_fork+0x10/0x20
[   27.072831] 
[   27.081188] Allocated by task 253:
[   27.081699]  kasan_save_stack+0x3c/0x68
[   27.082232]  kasan_save_track+0x20/0x40
[   27.082776]  kasan_save_alloc_info+0x40/0x58
[   27.083338]  __kasan_kmalloc+0xd4/0xd8
[   27.084056]  __kmalloc_cache_noprof+0x154/0x320
[   27.084541]  kasan_atomics+0xb8/0x2e8
[   27.084912]  kunit_try_run_case+0x170/0x3f0
[   27.085322]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.085810]  kthread+0x24c/0x2d0
[   27.086890]  ret_from_fork+0x10/0x20
[   27.087944] 
[   27.088293] The buggy address belongs to the object at fff00000c4205580
[   27.088293]  which belongs to the cache kmalloc-64 of size 64
[   27.089423] The buggy address is located 0 bytes to the right of
[   27.089423]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   27.090550] 
[   27.090880] The buggy address belongs to the physical page:
[   27.091722] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   27.092522] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.093531] page_type: f5(slab)
[   27.094461] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.095770] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   27.096597] page dumped because: kasan: bad access detected
[   27.097357] 
[   27.097666] Memory state around the buggy address:
[   27.098477]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.099343]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.100217] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.101080]                                      ^
[   27.101615]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.102613]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.103473] ==================================================================
[   26.923349] ==================================================================
[   26.924283] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15f0/0x49c8
[   26.925238] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.926315] 
[   26.926705] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.927009] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.927097] Hardware name: linux,dummy-virt (DT)
[   26.927187] Call trace:
[   26.927260]  dump_backtrace+0x9c/0x128
[   26.927349]  show_stack+0x20/0x38
[   26.927399]  dump_stack_lvl+0x8c/0xd0
[   26.927446]  print_report+0x118/0x5f0
[   26.927494]  kasan_report+0xdc/0x128
[   26.927542]  kasan_check_range+0x100/0x1a8
[   26.927594]  __kasan_check_write+0x20/0x30
[   26.927645]  kasan_atomics_helper+0x15f0/0x49c8
[   26.927702]  kasan_atomics+0x1a0/0x2e8
[   26.927756]  kunit_try_run_case+0x170/0x3f0
[   26.927809]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.927867]  kthread+0x24c/0x2d0
[   26.927918]  ret_from_fork+0x10/0x20
[   26.927995] 
[   26.935319] Allocated by task 253:
[   26.936017]  kasan_save_stack+0x3c/0x68
[   26.936674]  kasan_save_track+0x20/0x40
[   26.937369]  kasan_save_alloc_info+0x40/0x58
[   26.938082]  __kasan_kmalloc+0xd4/0xd8
[   26.938507]  __kmalloc_cache_noprof+0x154/0x320
[   26.939383]  kasan_atomics+0xb8/0x2e8
[   26.940018]  kunit_try_run_case+0x170/0x3f0
[   26.940709]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.941476]  kthread+0x24c/0x2d0
[   26.942026]  ret_from_fork+0x10/0x20
[   26.942655] 
[   26.943061] The buggy address belongs to the object at fff00000c4205580
[   26.943061]  which belongs to the cache kmalloc-64 of size 64
[   26.944379] The buggy address is located 0 bytes to the right of
[   26.944379]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.945736] 
[   26.946150] The buggy address belongs to the physical page:
[   26.946783] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.947705] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.948534] page_type: f5(slab)
[   26.949075] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.949954] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.950780] page dumped because: kasan: bad access detected
[   26.951497] 
[   26.951863] Memory state around the buggy address:
[   26.952503]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.953359]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.954219] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.955016]                                      ^
[   26.955661]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.956505]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.957347] ==================================================================
[   25.857657] ==================================================================
[   25.858441] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xabc/0x49c8
[   25.860102] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   25.860827] 
[   25.861169] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   25.861373] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.861458] Hardware name: linux,dummy-virt (DT)
[   25.861553] Call trace:
[   25.861624]  dump_backtrace+0x9c/0x128
[   25.861739]  show_stack+0x20/0x38
[   25.861838]  dump_stack_lvl+0x8c/0xd0
[   25.861909]  print_report+0x118/0x5f0
[   25.861985]  kasan_report+0xdc/0x128
[   25.862038]  kasan_check_range+0x100/0x1a8
[   25.862090]  __kasan_check_write+0x20/0x30
[   25.862139]  kasan_atomics_helper+0xabc/0x49c8
[   25.862195]  kasan_atomics+0x1a0/0x2e8
[   25.862247]  kunit_try_run_case+0x170/0x3f0
[   25.862300]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.862356]  kthread+0x24c/0x2d0
[   25.862406]  ret_from_fork+0x10/0x20
[   25.862458] 
[   25.869167] Allocated by task 253:
[   25.869624]  kasan_save_stack+0x3c/0x68
[   25.870147]  kasan_save_track+0x20/0x40
[   25.870771]  kasan_save_alloc_info+0x40/0x58
[   25.871466]  __kasan_kmalloc+0xd4/0xd8
[   25.871975]  __kmalloc_cache_noprof+0x154/0x320
[   25.872599]  kasan_atomics+0xb8/0x2e8
[   25.873127]  kunit_try_run_case+0x170/0x3f0
[   25.873705]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.874422]  kthread+0x24c/0x2d0
[   25.874976]  ret_from_fork+0x10/0x20
[   25.875440] 
[   25.875764] The buggy address belongs to the object at fff00000c4205580
[   25.875764]  which belongs to the cache kmalloc-64 of size 64
[   25.877092] The buggy address is located 0 bytes to the right of
[   25.877092]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   25.878324] 
[   25.878662] The buggy address belongs to the physical page:
[   25.879227] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   25.880174] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.880884] page_type: f5(slab)
[   25.881375] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.882173] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.882948] page dumped because: kasan: bad access detected
[   25.883596] 
[   25.883935] Memory state around the buggy address:
[   25.884539]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.885345]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.886149] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.886886]                                      ^
[   25.887528]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.888292]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.889145] ==================================================================
[   25.403730] ==================================================================
[   25.404501] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50c/0x49c8
[   25.405438] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   25.406649] 
[   25.407116] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   25.407322] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.407421] Hardware name: linux,dummy-virt (DT)
[   25.407512] Call trace:
[   25.407580]  dump_backtrace+0x9c/0x128
[   25.407700]  show_stack+0x20/0x38
[   25.407830]  dump_stack_lvl+0x8c/0xd0
[   25.407944]  print_report+0x118/0x5f0
[   25.408071]  kasan_report+0xdc/0x128
[   25.408171]  kasan_check_range+0x100/0x1a8
[   25.408281]  __kasan_check_write+0x20/0x30
[   25.408384]  kasan_atomics_helper+0x50c/0x49c8
[   25.408498]  kasan_atomics+0x1a0/0x2e8
[   25.408620]  kunit_try_run_case+0x170/0x3f0
[   25.408740]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.408843]  kthread+0x24c/0x2d0
[   25.408897]  ret_from_fork+0x10/0x20
[   25.408946] 
[   25.417816] Allocated by task 253:
[   25.418676]  kasan_save_stack+0x3c/0x68
[   25.419401]  kasan_save_track+0x20/0x40
[   25.420060]  kasan_save_alloc_info+0x40/0x58
[   25.420471]  __kasan_kmalloc+0xd4/0xd8
[   25.420885]  __kmalloc_cache_noprof+0x154/0x320
[   25.421336]  kasan_atomics+0xb8/0x2e8
[   25.421713]  kunit_try_run_case+0x170/0x3f0
[   25.422344]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.423524]  kthread+0x24c/0x2d0
[   25.425844]  ret_from_fork+0x10/0x20
[   25.426846] 
[   25.427291] The buggy address belongs to the object at fff00000c4205580
[   25.427291]  which belongs to the cache kmalloc-64 of size 64
[   25.430431] The buggy address is located 0 bytes to the right of
[   25.430431]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   25.433718] 
[   25.434247] The buggy address belongs to the physical page:
[   25.435055] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   25.436362] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.437032] page_type: f5(slab)
[   25.437495] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.438185] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.438940] page dumped because: kasan: bad access detected
[   25.440244] 
[   25.440598] Memory state around the buggy address:
[   25.441123]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.441836]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.442574] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.443710]                                      ^
[   25.444191]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.444883]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.445609] ==================================================================
[   26.993326] ==================================================================
[   26.994135] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f18/0x49c8
[   26.995009] Read of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.996023] 
[   26.996407] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.996653] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.996778] Hardware name: linux,dummy-virt (DT)
[   26.996876] Call trace:
[   26.996952]  dump_backtrace+0x9c/0x128
[   26.997145]  show_stack+0x20/0x38
[   26.997268]  dump_stack_lvl+0x8c/0xd0
[   26.997407]  print_report+0x118/0x5f0
[   26.997550]  kasan_report+0xdc/0x128
[   26.997604]  __asan_report_load8_noabort+0x20/0x30
[   26.997663]  kasan_atomics_helper+0x3f18/0x49c8
[   26.997719]  kasan_atomics+0x1a0/0x2e8
[   26.997771]  kunit_try_run_case+0x170/0x3f0
[   26.997821]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.997879]  kthread+0x24c/0x2d0
[   26.997931]  ret_from_fork+0x10/0x20
[   26.998012] 
[   27.005746] Allocated by task 253:
[   27.006128]  kasan_save_stack+0x3c/0x68
[   27.006512]  kasan_save_track+0x20/0x40
[   27.006901]  kasan_save_alloc_info+0x40/0x58
[   27.009105]  __kasan_kmalloc+0xd4/0xd8
[   27.010096]  __kmalloc_cache_noprof+0x154/0x320
[   27.011791]  kasan_atomics+0xb8/0x2e8
[   27.013077]  kunit_try_run_case+0x170/0x3f0
[   27.014391]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.015928]  kthread+0x24c/0x2d0
[   27.016802]  ret_from_fork+0x10/0x20
[   27.017501] 
[   27.017936] The buggy address belongs to the object at fff00000c4205580
[   27.017936]  which belongs to the cache kmalloc-64 of size 64
[   27.019157] The buggy address is located 0 bytes to the right of
[   27.019157]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   27.020378] 
[   27.020738] The buggy address belongs to the physical page:
[   27.021426] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   27.022280] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.023069] page_type: f5(slab)
[   27.023607] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.024484] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   27.025307] page dumped because: kasan: bad access detected
[   27.025952] 
[   27.026302] Memory state around the buggy address:
[   27.026929]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.027742]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.028525] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.029310]                                      ^
[   27.029915]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.030712]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.031456] ==================================================================
[   25.366395] ==================================================================
[   25.367143] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x49c8
[   25.368305] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   25.369226] 
[   25.369586] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   25.369774] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.369844] Hardware name: linux,dummy-virt (DT)
[   25.369926] Call trace:
[   25.370008]  dump_backtrace+0x9c/0x128
[   25.370135]  show_stack+0x20/0x38
[   25.370255]  dump_stack_lvl+0x8c/0xd0
[   25.370379]  print_report+0x118/0x5f0
[   25.370542]  kasan_report+0xdc/0x128
[   25.370662]  kasan_check_range+0x100/0x1a8
[   25.370780]  __kasan_check_write+0x20/0x30
[   25.370948]  kasan_atomics_helper+0x4a0/0x49c8
[   25.371097]  kasan_atomics+0x1a0/0x2e8
[   25.371244]  kunit_try_run_case+0x170/0x3f0
[   25.371431]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.371584]  kthread+0x24c/0x2d0
[   25.371696]  ret_from_fork+0x10/0x20
[   25.371804] 
[   25.380235] Allocated by task 253:
[   25.381151]  kasan_save_stack+0x3c/0x68
[   25.381645]  kasan_save_track+0x20/0x40
[   25.382327]  kasan_save_alloc_info+0x40/0x58
[   25.383033]  __kasan_kmalloc+0xd4/0xd8
[   25.384044]  __kmalloc_cache_noprof+0x154/0x320
[   25.385521]  kasan_atomics+0xb8/0x2e8
[   25.386229]  kunit_try_run_case+0x170/0x3f0
[   25.386900]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.387983]  kthread+0x24c/0x2d0
[   25.388562]  ret_from_fork+0x10/0x20
[   25.389127] 
[   25.389271] The buggy address belongs to the object at fff00000c4205580
[   25.389271]  which belongs to the cache kmalloc-64 of size 64
[   25.389753] The buggy address is located 0 bytes to the right of
[   25.389753]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   25.390732] 
[   25.391081] The buggy address belongs to the physical page:
[   25.391788] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   25.393539] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.394400] page_type: f5(slab)
[   25.394608] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.394943] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.396023] page dumped because: kasan: bad access detected
[   25.396735] 
[   25.397307] Memory state around the buggy address:
[   25.398102]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.398856]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.399619] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.400332]                                      ^
[   25.401129]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.401863]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.402590] ==================================================================
[   25.181160] ==================================================================
[   25.181732] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4264/0x49c8
[   25.182586] Read of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   25.183337] 
[   25.183777] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   25.184002] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.184082] Hardware name: linux,dummy-virt (DT)
[   25.184159] Call trace:
[   25.184213]  dump_backtrace+0x9c/0x128
[   25.184319]  show_stack+0x20/0x38
[   25.184422]  dump_stack_lvl+0x8c/0xd0
[   25.184524]  print_report+0x118/0x5f0
[   25.184616]  kasan_report+0xdc/0x128
[   25.184712]  __asan_report_load4_noabort+0x20/0x30
[   25.184834]  kasan_atomics_helper+0x4264/0x49c8
[   25.184938]  kasan_atomics+0x1a0/0x2e8
[   25.185069]  kunit_try_run_case+0x170/0x3f0
[   25.185173]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.185286]  kthread+0x24c/0x2d0
[   25.185380]  ret_from_fork+0x10/0x20
[   25.185482] 
[   25.192190] Allocated by task 253:
[   25.192772]  kasan_save_stack+0x3c/0x68
[   25.193547]  kasan_save_track+0x20/0x40
[   25.194348]  kasan_save_alloc_info+0x40/0x58
[   25.195034]  __kasan_kmalloc+0xd4/0xd8
[   25.195625]  __kmalloc_cache_noprof+0x154/0x320
[   25.196357]  kasan_atomics+0xb8/0x2e8
[   25.196922]  kunit_try_run_case+0x170/0x3f0
[   25.197523]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.198198]  kthread+0x24c/0x2d0
[   25.198605]  ret_from_fork+0x10/0x20
[   25.199054] 
[   25.199432] The buggy address belongs to the object at fff00000c4205580
[   25.199432]  which belongs to the cache kmalloc-64 of size 64
[   25.201108] The buggy address is located 0 bytes to the right of
[   25.201108]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   25.202414] 
[   25.202737] The buggy address belongs to the physical page:
[   25.204693] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   25.205462] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.206205] page_type: f5(slab)
[   25.206667] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.207897] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.209061] page dumped because: kasan: bad access detected
[   25.209614] 
[   25.209919] Memory state around the buggy address:
[   25.210486]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.211232]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.212006] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.212686]                                      ^
[   25.213432]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.214314]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.214908] ==================================================================
[   26.959697] ==================================================================
[   26.960312] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x165c/0x49c8
[   26.961234] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.962199] 
[   26.962615] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.962937] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.963054] Hardware name: linux,dummy-virt (DT)
[   26.963147] Call trace:
[   26.963221]  dump_backtrace+0x9c/0x128
[   26.963463]  show_stack+0x20/0x38
[   26.963578]  dump_stack_lvl+0x8c/0xd0
[   26.963633]  print_report+0x118/0x5f0
[   26.963683]  kasan_report+0xdc/0x128
[   26.963731]  kasan_check_range+0x100/0x1a8
[   26.963783]  __kasan_check_write+0x20/0x30
[   26.963834]  kasan_atomics_helper+0x165c/0x49c8
[   26.963889]  kasan_atomics+0x1a0/0x2e8
[   26.963940]  kunit_try_run_case+0x170/0x3f0
[   26.964021]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.964081]  kthread+0x24c/0x2d0
[   26.964134]  ret_from_fork+0x10/0x20
[   26.964184] 
[   26.971900] Allocated by task 253:
[   26.972478]  kasan_save_stack+0x3c/0x68
[   26.973416]  kasan_save_track+0x20/0x40
[   26.974111]  kasan_save_alloc_info+0x40/0x58
[   26.974651]  __kasan_kmalloc+0xd4/0xd8
[   26.975189]  __kmalloc_cache_noprof+0x154/0x320
[   26.975825]  kasan_atomics+0xb8/0x2e8
[   26.976398]  kunit_try_run_case+0x170/0x3f0
[   26.977058]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.977559]  kthread+0x24c/0x2d0
[   26.977770]  ret_from_fork+0x10/0x20
[   26.978031] 
[   26.978358] The buggy address belongs to the object at fff00000c4205580
[   26.978358]  which belongs to the cache kmalloc-64 of size 64
[   26.979555] The buggy address is located 0 bytes to the right of
[   26.979555]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.980774] 
[   26.981168] The buggy address belongs to the physical page:
[   26.981825] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.982804] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.983512] page_type: f5(slab)
[   26.984116] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.985006] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.985785] page dumped because: kasan: bad access detected
[   26.986431] 
[   26.986763] Memory state around the buggy address:
[   26.987385]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.988209]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.989000] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.989743]                                      ^
[   26.990361]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.991151]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.991903] ==================================================================
[   27.105994] ==================================================================
[   27.106642] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1780/0x49c8
[   27.107576] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   27.108656] 
[   27.109014] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   27.109180] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.109224] Hardware name: linux,dummy-virt (DT)
[   27.109274] Call trace:
[   27.109342]  dump_backtrace+0x9c/0x128
[   27.109469]  show_stack+0x20/0x38
[   27.109585]  dump_stack_lvl+0x8c/0xd0
[   27.109702]  print_report+0x118/0x5f0
[   27.109819]  kasan_report+0xdc/0x128
[   27.109873]  kasan_check_range+0x100/0x1a8
[   27.109926]  __kasan_check_write+0x20/0x30
[   27.110007]  kasan_atomics_helper+0x1780/0x49c8
[   27.110068]  kasan_atomics+0x1a0/0x2e8
[   27.110119]  kunit_try_run_case+0x170/0x3f0
[   27.110170]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.110225]  kthread+0x24c/0x2d0
[   27.110276]  ret_from_fork+0x10/0x20
[   27.110328] 
[   27.116996] Allocated by task 253:
[   27.117409]  kasan_save_stack+0x3c/0x68
[   27.117990]  kasan_save_track+0x20/0x40
[   27.118480]  kasan_save_alloc_info+0x40/0x58
[   27.118982]  __kasan_kmalloc+0xd4/0xd8
[   27.119552]  __kmalloc_cache_noprof+0x154/0x320
[   27.120207]  kasan_atomics+0xb8/0x2e8
[   27.120736]  kunit_try_run_case+0x170/0x3f0
[   27.121311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.122059]  kthread+0x24c/0x2d0
[   27.122652]  ret_from_fork+0x10/0x20
[   27.123200] 
[   27.123510] The buggy address belongs to the object at fff00000c4205580
[   27.123510]  which belongs to the cache kmalloc-64 of size 64
[   27.124623] The buggy address is located 0 bytes to the right of
[   27.124623]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   27.125817] 
[   27.126206] The buggy address belongs to the physical page:
[   27.126875] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   27.127818] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.128522] page_type: f5(slab)
[   27.129057] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.129817] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   27.130652] page dumped because: kasan: bad access detected
[   27.131223] 
[   27.131546] Memory state around the buggy address:
[   27.132141]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.132895]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.133589] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.134401]                                      ^
[   27.134905]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.135694]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.136464] ==================================================================
[   25.485655] ==================================================================
[   25.486335] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5e4/0x49c8
[   25.487230] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   25.488004] 
[   25.488334] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   25.488505] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.488568] Hardware name: linux,dummy-virt (DT)
[   25.488653] Call trace:
[   25.488721]  dump_backtrace+0x9c/0x128
[   25.488854]  show_stack+0x20/0x38
[   25.488987]  dump_stack_lvl+0x8c/0xd0
[   25.489113]  print_report+0x118/0x5f0
[   25.489230]  kasan_report+0xdc/0x128
[   25.489353]  kasan_check_range+0x100/0x1a8
[   25.489476]  __kasan_check_write+0x20/0x30
[   25.489606]  kasan_atomics_helper+0x5e4/0x49c8
[   25.489734]  kasan_atomics+0x1a0/0x2e8
[   25.489856]  kunit_try_run_case+0x170/0x3f0
[   25.490039]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.490206]  kthread+0x24c/0x2d0
[   25.490371]  ret_from_fork+0x10/0x20
[   25.490497] 
[   25.497989] Allocated by task 253:
[   25.498543]  kasan_save_stack+0x3c/0x68
[   25.499080]  kasan_save_track+0x20/0x40
[   25.499693]  kasan_save_alloc_info+0x40/0x58
[   25.500362]  __kasan_kmalloc+0xd4/0xd8
[   25.500899]  __kmalloc_cache_noprof+0x154/0x320
[   25.501563]  kasan_atomics+0xb8/0x2e8
[   25.502183]  kunit_try_run_case+0x170/0x3f0
[   25.502779]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.503475]  kthread+0x24c/0x2d0
[   25.503939]  ret_from_fork+0x10/0x20
[   25.504647] 
[   25.504950] The buggy address belongs to the object at fff00000c4205580
[   25.504950]  which belongs to the cache kmalloc-64 of size 64
[   25.506186] The buggy address is located 0 bytes to the right of
[   25.506186]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   25.507530] 
[   25.507904] The buggy address belongs to the physical page:
[   25.508649] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   25.509595] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.510452] page_type: f5(slab)
[   25.510988] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.511812] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.512599] page dumped because: kasan: bad access detected
[   25.513275] 
[   25.513605] Memory state around the buggy address:
[   25.514227]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.515039]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.515810] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.516579]                                      ^
[   25.517190]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.517949]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.518706] ==================================================================
[   25.023320] ==================================================================
[   25.024491] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40e4/0x49c8
[   25.024917] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   25.025955] 
[   25.026363] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   25.026579] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.026665] Hardware name: linux,dummy-virt (DT)
[   25.026759] Call trace:
[   25.026835]  dump_backtrace+0x9c/0x128
[   25.026978]  show_stack+0x20/0x38
[   25.027095]  dump_stack_lvl+0x8c/0xd0
[   25.027207]  print_report+0x118/0x5f0
[   25.027320]  kasan_report+0xdc/0x128
[   25.027482]  __asan_report_store4_noabort+0x20/0x30
[   25.027606]  kasan_atomics_helper+0x40e4/0x49c8
[   25.027727]  kasan_atomics+0x1a0/0x2e8
[   25.027826]  kunit_try_run_case+0x170/0x3f0
[   25.027882]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.027937]  kthread+0x24c/0x2d0
[   25.028021]  ret_from_fork+0x10/0x20
[   25.028074] 
[   25.034905] Allocated by task 253:
[   25.035861]  kasan_save_stack+0x3c/0x68
[   25.036499]  kasan_save_track+0x20/0x40
[   25.037526]  kasan_save_alloc_info+0x40/0x58
[   25.038448]  __kasan_kmalloc+0xd4/0xd8
[   25.039104]  __kmalloc_cache_noprof+0x154/0x320
[   25.040131]  kasan_atomics+0xb8/0x2e8
[   25.040563]  kunit_try_run_case+0x170/0x3f0
[   25.041123]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.042047]  kthread+0x24c/0x2d0
[   25.042382]  ret_from_fork+0x10/0x20
[   25.042929] 
[   25.043296] The buggy address belongs to the object at fff00000c4205580
[   25.043296]  which belongs to the cache kmalloc-64 of size 64
[   25.044618] The buggy address is located 0 bytes to the right of
[   25.044618]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   25.046132] 
[   25.046482] The buggy address belongs to the physical page:
[   25.047027] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   25.048251] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.048850] page_type: f5(slab)
[   25.049253] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.050099] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.050915] page dumped because: kasan: bad access detected
[   25.051826] 
[   25.052214] Memory state around the buggy address:
[   25.052794]  fff00000c4205480: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   25.053636]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.054516] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.055284]                                      ^
[   25.056227]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.057421]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.058748] ==================================================================
[   25.138444] ==================================================================
[   25.139204] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2c4/0x49c8
[   25.140042] Read of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   25.140823] 
[   25.141223] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   25.141468] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.141555] Hardware name: linux,dummy-virt (DT)
[   25.141641] Call trace:
[   25.141706]  dump_backtrace+0x9c/0x128
[   25.141973]  show_stack+0x20/0x38
[   25.142094]  dump_stack_lvl+0x8c/0xd0
[   25.142416]  print_report+0x118/0x5f0
[   25.142580]  kasan_report+0xdc/0x128
[   25.142697]  kasan_check_range+0x100/0x1a8
[   25.142760]  __kasan_check_read+0x20/0x30
[   25.142813]  kasan_atomics_helper+0x2c4/0x49c8
[   25.142865]  kasan_atomics+0x1a0/0x2e8
[   25.142918]  kunit_try_run_case+0x170/0x3f0
[   25.142994]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.143057]  kthread+0x24c/0x2d0
[   25.143108]  ret_from_fork+0x10/0x20
[   25.143157] 
[   25.150718] Allocated by task 253:
[   25.151238]  kasan_save_stack+0x3c/0x68
[   25.151710]  kasan_save_track+0x20/0x40
[   25.152144]  kasan_save_alloc_info+0x40/0x58
[   25.152607]  __kasan_kmalloc+0xd4/0xd8
[   25.155288]  __kmalloc_cache_noprof+0x154/0x320
[   25.156660]  kasan_atomics+0xb8/0x2e8
[   25.157084]  kunit_try_run_case+0x170/0x3f0
[   25.157726]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.158414]  kthread+0x24c/0x2d0
[   25.159131]  ret_from_fork+0x10/0x20
[   25.160326] 
[   25.160593] The buggy address belongs to the object at fff00000c4205580
[   25.160593]  which belongs to the cache kmalloc-64 of size 64
[   25.162762] The buggy address is located 0 bytes to the right of
[   25.162762]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   25.165590] 
[   25.166085] The buggy address belongs to the physical page:
[   25.166948] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   25.168516] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.170008] page_type: f5(slab)
[   25.170527] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.171713] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.172522] page dumped because: kasan: bad access detected
[   25.173184] 
[   25.173502] Memory state around the buggy address:
[   25.174148]  fff00000c4205480: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   25.175012]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.175771] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.176932]                                      ^
[   25.177514]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.178452]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.179233] ==================================================================
[   26.201573] ==================================================================
[   26.202316] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f6c/0x49c8
[   26.203129] Read of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.204283] 
[   26.204580] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.204814] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.204906] Hardware name: linux,dummy-virt (DT)
[   26.205023] Call trace:
[   26.205097]  dump_backtrace+0x9c/0x128
[   26.205223]  show_stack+0x20/0x38
[   26.205341]  dump_stack_lvl+0x8c/0xd0
[   26.205459]  print_report+0x118/0x5f0
[   26.205573]  kasan_report+0xdc/0x128
[   26.205636]  __asan_report_load4_noabort+0x20/0x30
[   26.205690]  kasan_atomics_helper+0x3f6c/0x49c8
[   26.205745]  kasan_atomics+0x1a0/0x2e8
[   26.205796]  kunit_try_run_case+0x170/0x3f0
[   26.205847]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.205901]  kthread+0x24c/0x2d0
[   26.205950]  ret_from_fork+0x10/0x20
[   26.206031] 
[   26.212231] Allocated by task 253:
[   26.213263]  kasan_save_stack+0x3c/0x68
[   26.213736]  kasan_save_track+0x20/0x40
[   26.214314]  kasan_save_alloc_info+0x40/0x58
[   26.214936]  __kasan_kmalloc+0xd4/0xd8
[   26.217485]  __kmalloc_cache_noprof+0x154/0x320
[   26.217901]  kasan_atomics+0xb8/0x2e8
[   26.218296]  kunit_try_run_case+0x170/0x3f0
[   26.218698]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.220863]  kthread+0x24c/0x2d0
[   26.222349]  ret_from_fork+0x10/0x20
[   26.223705] 
[   26.224558] The buggy address belongs to the object at fff00000c4205580
[   26.224558]  which belongs to the cache kmalloc-64 of size 64
[   26.226679] The buggy address is located 0 bytes to the right of
[   26.226679]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.228027] 
[   26.228362] The buggy address belongs to the physical page:
[   26.228998] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.229861] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.230587] page_type: f5(slab)
[   26.231066] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.231796] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.232593] page dumped because: kasan: bad access detected
[   26.233190] 
[   26.233507] Memory state around the buggy address:
[   26.234030]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.234867]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.235674] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.236426]                                      ^
[   26.237000]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.237711]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.238419] ==================================================================
[   26.340726] ==================================================================
[   26.342020] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3fc4/0x49c8
[   26.342906] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.344196] 
[   26.344660] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.344888] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.345114] Hardware name: linux,dummy-virt (DT)
[   26.345159] Call trace:
[   26.345192]  dump_backtrace+0x9c/0x128
[   26.345251]  show_stack+0x20/0x38
[   26.345299]  dump_stack_lvl+0x8c/0xd0
[   26.345347]  print_report+0x118/0x5f0
[   26.345394]  kasan_report+0xdc/0x128
[   26.345441]  __asan_report_store8_noabort+0x20/0x30
[   26.345494]  kasan_atomics_helper+0x3fc4/0x49c8
[   26.345548]  kasan_atomics+0x1a0/0x2e8
[   26.345599]  kunit_try_run_case+0x170/0x3f0
[   26.345648]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.345704]  kthread+0x24c/0x2d0
[   26.345752]  ret_from_fork+0x10/0x20
[   26.345803] 
[   26.352418] Allocated by task 253:
[   26.352990]  kasan_save_stack+0x3c/0x68
[   26.353573]  kasan_save_track+0x20/0x40
[   26.354181]  kasan_save_alloc_info+0x40/0x58
[   26.354784]  __kasan_kmalloc+0xd4/0xd8
[   26.355302]  __kmalloc_cache_noprof+0x154/0x320
[   26.355978]  kasan_atomics+0xb8/0x2e8
[   26.356486]  kunit_try_run_case+0x170/0x3f0
[   26.357164]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.357886]  kthread+0x24c/0x2d0
[   26.358422]  ret_from_fork+0x10/0x20
[   26.359029] 
[   26.359357] The buggy address belongs to the object at fff00000c4205580
[   26.359357]  which belongs to the cache kmalloc-64 of size 64
[   26.360674] The buggy address is located 0 bytes to the right of
[   26.360674]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.361947] 
[   26.362306] The buggy address belongs to the physical page:
[   26.362887] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.363571] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.364332] page_type: f5(slab)
[   26.364827] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.365644] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.366453] page dumped because: kasan: bad access detected
[   26.367028] 
[   26.367365] Memory state around the buggy address:
[   26.367926]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.368663]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.369390] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.370081]                                      ^
[   26.370691]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.371431]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.372176] ==================================================================
[   26.653312] ==================================================================
[   26.654150] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1288/0x49c8
[   26.655467] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.656460] 
[   26.656947] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.657169] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.657290] Hardware name: linux,dummy-virt (DT)
[   26.657383] Call trace:
[   26.657458]  dump_backtrace+0x9c/0x128
[   26.657549]  show_stack+0x20/0x38
[   26.657597]  dump_stack_lvl+0x8c/0xd0
[   26.657644]  print_report+0x118/0x5f0
[   26.657691]  kasan_report+0xdc/0x128
[   26.657738]  kasan_check_range+0x100/0x1a8
[   26.657788]  __kasan_check_write+0x20/0x30
[   26.657840]  kasan_atomics_helper+0x1288/0x49c8
[   26.657895]  kasan_atomics+0x1a0/0x2e8
[   26.657949]  kunit_try_run_case+0x170/0x3f0
[   26.658035]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.658094]  kthread+0x24c/0x2d0
[   26.658145]  ret_from_fork+0x10/0x20
[   26.658196] 
[   26.666336] Allocated by task 253:
[   26.666844]  kasan_save_stack+0x3c/0x68
[   26.667455]  kasan_save_track+0x20/0x40
[   26.667934]  kasan_save_alloc_info+0x40/0x58
[   26.668593]  __kasan_kmalloc+0xd4/0xd8
[   26.669229]  __kmalloc_cache_noprof+0x154/0x320
[   26.669853]  kasan_atomics+0xb8/0x2e8
[   26.670368]  kunit_try_run_case+0x170/0x3f0
[   26.671015]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.671688]  kthread+0x24c/0x2d0
[   26.672201]  ret_from_fork+0x10/0x20
[   26.672797] 
[   26.673196] The buggy address belongs to the object at fff00000c4205580
[   26.673196]  which belongs to the cache kmalloc-64 of size 64
[   26.674382] The buggy address is located 0 bytes to the right of
[   26.674382]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.675693] 
[   26.676090] The buggy address belongs to the physical page:
[   26.676754] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.677599] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.678325] page_type: f5(slab)
[   26.678850] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.679651] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.680485] page dumped because: kasan: bad access detected
[   26.681189] 
[   26.681537] Memory state around the buggy address:
[   26.682106]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.682855]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.683662] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.684344]                                      ^
[   26.685008]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.685951]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.686700] ==================================================================
[   26.824990] ==================================================================
[   26.825719] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14ac/0x49c8
[   26.826733] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.827490] 
[   26.828095] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.828795] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.828834] Hardware name: linux,dummy-virt (DT)
[   26.828873] Call trace:
[   26.828904]  dump_backtrace+0x9c/0x128
[   26.828992]  show_stack+0x20/0x38
[   26.829112]  dump_stack_lvl+0x8c/0xd0
[   26.829230]  print_report+0x118/0x5f0
[   26.829341]  kasan_report+0xdc/0x128
[   26.829395]  kasan_check_range+0x100/0x1a8
[   26.829447]  __kasan_check_write+0x20/0x30
[   26.829498]  kasan_atomics_helper+0x14ac/0x49c8
[   26.829554]  kasan_atomics+0x1a0/0x2e8
[   26.829606]  kunit_try_run_case+0x170/0x3f0
[   26.829656]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.829713]  kthread+0x24c/0x2d0
[   26.829764]  ret_from_fork+0x10/0x20
[   26.829812] 
[   26.836521] Allocated by task 253:
[   26.837049]  kasan_save_stack+0x3c/0x68
[   26.837694]  kasan_save_track+0x20/0x40
[   26.838258]  kasan_save_alloc_info+0x40/0x58
[   26.838765]  __kasan_kmalloc+0xd4/0xd8
[   26.839325]  __kmalloc_cache_noprof+0x154/0x320
[   26.840101]  kasan_atomics+0xb8/0x2e8
[   26.840572]  kunit_try_run_case+0x170/0x3f0
[   26.841170]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.841781]  kthread+0x24c/0x2d0
[   26.842248]  ret_from_fork+0x10/0x20
[   26.842793] 
[   26.843143] The buggy address belongs to the object at fff00000c4205580
[   26.843143]  which belongs to the cache kmalloc-64 of size 64
[   26.844152] The buggy address is located 0 bytes to the right of
[   26.844152]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.845295] 
[   26.845627] The buggy address belongs to the physical page:
[   26.846372] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.847166] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.847954] page_type: f5(slab)
[   26.848380] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.849223] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.850020] page dumped because: kasan: bad access detected
[   26.850673] 
[   26.851284] Memory state around the buggy address:
[   26.851827]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.852563]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.853281] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.854034]                                      ^
[   26.854601]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.855321]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.856097] ==================================================================
[   25.329363] ==================================================================
[   25.330440] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x434/0x49c8
[   25.331200] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   25.332217] 
[   25.332574] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   25.332779] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.332858] Hardware name: linux,dummy-virt (DT)
[   25.332943] Call trace:
[   25.333037]  dump_backtrace+0x9c/0x128
[   25.333165]  show_stack+0x20/0x38
[   25.333279]  dump_stack_lvl+0x8c/0xd0
[   25.333396]  print_report+0x118/0x5f0
[   25.333513]  kasan_report+0xdc/0x128
[   25.333607]  kasan_check_range+0x100/0x1a8
[   25.333661]  __kasan_check_write+0x20/0x30
[   25.333712]  kasan_atomics_helper+0x434/0x49c8
[   25.333765]  kasan_atomics+0x1a0/0x2e8
[   25.333815]  kunit_try_run_case+0x170/0x3f0
[   25.333864]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.333919]  kthread+0x24c/0x2d0
[   25.333995]  ret_from_fork+0x10/0x20
[   25.334058] 
[   25.342472] Allocated by task 253:
[   25.342938]  kasan_save_stack+0x3c/0x68
[   25.344184]  kasan_save_track+0x20/0x40
[   25.344737]  kasan_save_alloc_info+0x40/0x58
[   25.345493]  __kasan_kmalloc+0xd4/0xd8
[   25.345872]  __kmalloc_cache_noprof+0x154/0x320
[   25.346314]  kasan_atomics+0xb8/0x2e8
[   25.346687]  kunit_try_run_case+0x170/0x3f0
[   25.347840]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.348850]  kthread+0x24c/0x2d0
[   25.349552]  ret_from_fork+0x10/0x20
[   25.349982] 
[   25.350407] The buggy address belongs to the object at fff00000c4205580
[   25.350407]  which belongs to the cache kmalloc-64 of size 64
[   25.351598] The buggy address is located 0 bytes to the right of
[   25.351598]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   25.353092] 
[   25.353411] The buggy address belongs to the physical page:
[   25.353999] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   25.354871] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.355753] page_type: f5(slab)
[   25.356223] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.357167] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.358002] page dumped because: kasan: bad access detected
[   25.358606] 
[   25.358985] Memory state around the buggy address:
[   25.359656]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.360560]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.361643] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.362467]                                      ^
[   25.363059]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.363908]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.364854] ==================================================================
[   25.447074] ==================================================================
[   25.447750] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x578/0x49c8
[   25.449239] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   25.450824] 
[   25.451307] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   25.451551] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.451632] Hardware name: linux,dummy-virt (DT)
[   25.451716] Call trace:
[   25.451781]  dump_backtrace+0x9c/0x128
[   25.451922]  show_stack+0x20/0x38
[   25.452036]  dump_stack_lvl+0x8c/0xd0
[   25.452141]  print_report+0x118/0x5f0
[   25.452237]  kasan_report+0xdc/0x128
[   25.452344]  kasan_check_range+0x100/0x1a8
[   25.452463]  __kasan_check_write+0x20/0x30
[   25.452560]  kasan_atomics_helper+0x578/0x49c8
[   25.452616]  kasan_atomics+0x1a0/0x2e8
[   25.452667]  kunit_try_run_case+0x170/0x3f0
[   25.452714]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.452783]  kthread+0x24c/0x2d0
[   25.452835]  ret_from_fork+0x10/0x20
[   25.452885] 
[   25.460944] Allocated by task 253:
[   25.461356]  kasan_save_stack+0x3c/0x68
[   25.461937]  kasan_save_track+0x20/0x40
[   25.462510]  kasan_save_alloc_info+0x40/0x58
[   25.463000]  __kasan_kmalloc+0xd4/0xd8
[   25.463583]  __kmalloc_cache_noprof+0x154/0x320
[   25.465020]  kasan_atomics+0xb8/0x2e8
[   25.465469]  kunit_try_run_case+0x170/0x3f0
[   25.466228]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.467028]  kthread+0x24c/0x2d0
[   25.467546]  ret_from_fork+0x10/0x20
[   25.468003] 
[   25.468286] The buggy address belongs to the object at fff00000c4205580
[   25.468286]  which belongs to the cache kmalloc-64 of size 64
[   25.470266] The buggy address is located 0 bytes to the right of
[   25.470266]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   25.471906] 
[   25.472287] The buggy address belongs to the physical page:
[   25.472930] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   25.473787] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.474528] page_type: f5(slab)
[   25.475026] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.476626] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.477563] page dumped because: kasan: bad access detected
[   25.478242] 
[   25.478705] Memory state around the buggy address:
[   25.479282]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.480377]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.481129] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.481979]                                      ^
[   25.482629]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.483447]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.484318] ==================================================================
[   26.169126] ==================================================================
[   26.170008] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xda0/0x49c8
[   26.171181] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.172464] 
[   26.172799] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.173025] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.173107] Hardware name: linux,dummy-virt (DT)
[   26.173199] Call trace:
[   26.173275]  dump_backtrace+0x9c/0x128
[   26.173365]  show_stack+0x20/0x38
[   26.173413]  dump_stack_lvl+0x8c/0xd0
[   26.173461]  print_report+0x118/0x5f0
[   26.173506]  kasan_report+0xdc/0x128
[   26.173552]  kasan_check_range+0x100/0x1a8
[   26.173601]  __kasan_check_write+0x20/0x30
[   26.173650]  kasan_atomics_helper+0xda0/0x49c8
[   26.173705]  kasan_atomics+0x1a0/0x2e8
[   26.173755]  kunit_try_run_case+0x170/0x3f0
[   26.173802]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.173857]  kthread+0x24c/0x2d0
[   26.173903]  ret_from_fork+0x10/0x20
[   26.173951] 
[   26.180703] Allocated by task 253:
[   26.181262]  kasan_save_stack+0x3c/0x68
[   26.181860]  kasan_save_track+0x20/0x40
[   26.182315]  kasan_save_alloc_info+0x40/0x58
[   26.182911]  __kasan_kmalloc+0xd4/0xd8
[   26.183488]  __kmalloc_cache_noprof+0x154/0x320
[   26.184128]  kasan_atomics+0xb8/0x2e8
[   26.184661]  kunit_try_run_case+0x170/0x3f0
[   26.185186]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.185855]  kthread+0x24c/0x2d0
[   26.186403]  ret_from_fork+0x10/0x20
[   26.186875] 
[   26.187204] The buggy address belongs to the object at fff00000c4205580
[   26.187204]  which belongs to the cache kmalloc-64 of size 64
[   26.188296] The buggy address is located 0 bytes to the right of
[   26.188296]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.189560] 
[   26.189877] The buggy address belongs to the physical page:
[   26.190591] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.191508] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.192246] page_type: f5(slab)
[   26.192725] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.193584] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.194398] page dumped because: kasan: bad access detected
[   26.195017] 
[   26.195302] Memory state around the buggy address:
[   26.195984]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.196665]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.197436] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.198233]                                      ^
[   26.198718]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.199620]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.200268] ==================================================================
[   26.064274] ==================================================================
[   26.065348] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f4c/0x49c8
[   26.066374] Read of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.068143] 
[   26.068535] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.068690] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.068789] Hardware name: linux,dummy-virt (DT)
[   26.068887] Call trace:
[   26.068971]  dump_backtrace+0x9c/0x128
[   26.069117]  show_stack+0x20/0x38
[   26.069250]  dump_stack_lvl+0x8c/0xd0
[   26.069306]  print_report+0x118/0x5f0
[   26.069354]  kasan_report+0xdc/0x128
[   26.069400]  __asan_report_load4_noabort+0x20/0x30
[   26.069457]  kasan_atomics_helper+0x3f4c/0x49c8
[   26.069510]  kasan_atomics+0x1a0/0x2e8
[   26.069559]  kunit_try_run_case+0x170/0x3f0
[   26.069609]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.069663]  kthread+0x24c/0x2d0
[   26.069713]  ret_from_fork+0x10/0x20
[   26.069764] 
[   26.076642] Allocated by task 253:
[   26.077070]  kasan_save_stack+0x3c/0x68
[   26.077621]  kasan_save_track+0x20/0x40
[   26.078122]  kasan_save_alloc_info+0x40/0x58
[   26.078728]  __kasan_kmalloc+0xd4/0xd8
[   26.079353]  __kmalloc_cache_noprof+0x154/0x320
[   26.080013]  kasan_atomics+0xb8/0x2e8
[   26.080620]  kunit_try_run_case+0x170/0x3f0
[   26.081259]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.081917]  kthread+0x24c/0x2d0
[   26.082468]  ret_from_fork+0x10/0x20
[   26.083044] 
[   26.083402] The buggy address belongs to the object at fff00000c4205580
[   26.083402]  which belongs to the cache kmalloc-64 of size 64
[   26.084646] The buggy address is located 0 bytes to the right of
[   26.084646]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.085980] 
[   26.086321] The buggy address belongs to the physical page:
[   26.087020] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.087929] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.088666] page_type: f5(slab)
[   26.089287] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.090130] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.090919] page dumped because: kasan: bad access detected
[   26.091570] 
[   26.091894] Memory state around the buggy address:
[   26.092522]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.093360]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.094132] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.094887]                                      ^
[   26.095467]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.096228]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.096825] ==================================================================
[   26.760261] ==================================================================
[   26.761071] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x141c/0x49c8
[   26.761913] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.762624] 
[   26.762997] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.763202] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.763287] Hardware name: linux,dummy-virt (DT)
[   26.763379] Call trace:
[   26.763477]  dump_backtrace+0x9c/0x128
[   26.763603]  show_stack+0x20/0x38
[   26.763714]  dump_stack_lvl+0x8c/0xd0
[   26.763827]  print_report+0x118/0x5f0
[   26.763920]  kasan_report+0xdc/0x128
[   26.763997]  kasan_check_range+0x100/0x1a8
[   26.764053]  __kasan_check_write+0x20/0x30
[   26.764103]  kasan_atomics_helper+0x141c/0x49c8
[   26.764158]  kasan_atomics+0x1a0/0x2e8
[   26.764208]  kunit_try_run_case+0x170/0x3f0
[   26.764257]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.764314]  kthread+0x24c/0x2d0
[   26.764363]  ret_from_fork+0x10/0x20
[   26.764414] 
[   26.771045] Allocated by task 253:
[   26.771478]  kasan_save_stack+0x3c/0x68
[   26.771950]  kasan_save_track+0x20/0x40
[   26.772540]  kasan_save_alloc_info+0x40/0x58
[   26.773058]  __kasan_kmalloc+0xd4/0xd8
[   26.773491]  __kmalloc_cache_noprof+0x154/0x320
[   26.774196]  kasan_atomics+0xb8/0x2e8
[   26.774747]  kunit_try_run_case+0x170/0x3f0
[   26.775351]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.775980]  kthread+0x24c/0x2d0
[   26.776503]  ret_from_fork+0x10/0x20
[   26.776957] 
[   26.777287] The buggy address belongs to the object at fff00000c4205580
[   26.777287]  which belongs to the cache kmalloc-64 of size 64
[   26.778513] The buggy address is located 0 bytes to the right of
[   26.778513]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.779689] 
[   26.780029] The buggy address belongs to the physical page:
[   26.780518] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.781721] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.782906] page_type: f5(slab)
[   26.783427] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.784275] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.785047] page dumped because: kasan: bad access detected
[   26.785604] 
[   26.785905] Memory state around the buggy address:
[   26.786482]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.787221]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.787953] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.788667]                                      ^
[   26.789218]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.789991]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.790697] ==================================================================
[   27.202073] ==================================================================
[   27.203002] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f88/0x49c8
[   27.204094] Read of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   27.205069] 
[   27.205459] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   27.205680] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.205769] Hardware name: linux,dummy-virt (DT)
[   27.205861] Call trace:
[   27.205896]  dump_backtrace+0x9c/0x128
[   27.205955]  show_stack+0x20/0x38
[   27.206035]  dump_stack_lvl+0x8c/0xd0
[   27.206086]  print_report+0x118/0x5f0
[   27.206133]  kasan_report+0xdc/0x128
[   27.206179]  __asan_report_load8_noabort+0x20/0x30
[   27.206236]  kasan_atomics_helper+0x3f88/0x49c8
[   27.206295]  kasan_atomics+0x1a0/0x2e8
[   27.206348]  kunit_try_run_case+0x170/0x3f0
[   27.206399]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.206456]  kthread+0x24c/0x2d0
[   27.206507]  ret_from_fork+0x10/0x20
[   27.206560] 
[   27.212716] Allocated by task 253:
[   27.213224]  kasan_save_stack+0x3c/0x68
[   27.213791]  kasan_save_track+0x20/0x40
[   27.214383]  kasan_save_alloc_info+0x40/0x58
[   27.214919]  __kasan_kmalloc+0xd4/0xd8
[   27.215530]  __kmalloc_cache_noprof+0x154/0x320
[   27.216214]  kasan_atomics+0xb8/0x2e8
[   27.216834]  kunit_try_run_case+0x170/0x3f0
[   27.217342]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.218059]  kthread+0x24c/0x2d0
[   27.218511]  ret_from_fork+0x10/0x20
[   27.219014] 
[   27.219342] The buggy address belongs to the object at fff00000c4205580
[   27.219342]  which belongs to the cache kmalloc-64 of size 64
[   27.220450] The buggy address is located 0 bytes to the right of
[   27.220450]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   27.221721] 
[   27.222061] The buggy address belongs to the physical page:
[   27.222648] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   27.223475] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.224142] page_type: f5(slab)
[   27.224663] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.225397] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   27.226221] page dumped because: kasan: bad access detected
[   27.226816] 
[   27.227158] Memory state around the buggy address:
[   27.227690]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.228413]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.229125] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.229808]                                      ^
[   27.230506]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.231162]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.231917] ==================================================================
[   25.254202] ==================================================================
[   25.254756] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x49c8
[   25.255664] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   25.256451] 
[   25.256831] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   25.257073] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.257161] Hardware name: linux,dummy-virt (DT)
[   25.257259] Call trace:
[   25.257337]  dump_backtrace+0x9c/0x128
[   25.257468]  show_stack+0x20/0x38
[   25.257591]  dump_stack_lvl+0x8c/0xd0
[   25.257715]  print_report+0x118/0x5f0
[   25.257834]  kasan_report+0xdc/0x128
[   25.257950]  __asan_report_store4_noabort+0x20/0x30
[   25.258152]  kasan_atomics_helper+0x40fc/0x49c8
[   25.258297]  kasan_atomics+0x1a0/0x2e8
[   25.258359]  kunit_try_run_case+0x170/0x3f0
[   25.258410]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.258468]  kthread+0x24c/0x2d0
[   25.258518]  ret_from_fork+0x10/0x20
[   25.258569] 
[   25.266495] Allocated by task 253:
[   25.266983]  kasan_save_stack+0x3c/0x68
[   25.268674]  kasan_save_track+0x20/0x40
[   25.269141]  kasan_save_alloc_info+0x40/0x58
[   25.269767]  __kasan_kmalloc+0xd4/0xd8
[   25.270330]  __kmalloc_cache_noprof+0x154/0x320
[   25.270917]  kasan_atomics+0xb8/0x2e8
[   25.271879]  kunit_try_run_case+0x170/0x3f0
[   25.272696]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.273446]  kthread+0x24c/0x2d0
[   25.273977]  ret_from_fork+0x10/0x20
[   25.274518] 
[   25.274900] The buggy address belongs to the object at fff00000c4205580
[   25.274900]  which belongs to the cache kmalloc-64 of size 64
[   25.276613] The buggy address is located 0 bytes to the right of
[   25.276613]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   25.277788] 
[   25.278371] The buggy address belongs to the physical page:
[   25.279028] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   25.280244] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.280926] page_type: f5(slab)
[   25.281560] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.282480] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.283352] page dumped because: kasan: bad access detected
[   25.284056] 
[   25.284342] Memory state around the buggy address:
[   25.284911]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.285613]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.287056] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.287645]                                      ^
[   25.288574]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.289438]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.290320] ==================================================================
[   25.725893] ==================================================================
[   25.727009] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4440/0x49c8
[   25.728043] Read of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   25.728834] 
[   25.729193] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   25.729424] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.729511] Hardware name: linux,dummy-virt (DT)
[   25.729609] Call trace:
[   25.729680]  dump_backtrace+0x9c/0x128
[   25.729813]  show_stack+0x20/0x38
[   25.729908]  dump_stack_lvl+0x8c/0xd0
[   25.729992]  print_report+0x118/0x5f0
[   25.730049]  kasan_report+0xdc/0x128
[   25.730096]  __asan_report_load4_noabort+0x20/0x30
[   25.730151]  kasan_atomics_helper+0x4440/0x49c8
[   25.730208]  kasan_atomics+0x1a0/0x2e8
[   25.730260]  kunit_try_run_case+0x170/0x3f0
[   25.730312]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.730369]  kthread+0x24c/0x2d0
[   25.730422]  ret_from_fork+0x10/0x20
[   25.730477] 
[   25.736856] Allocated by task 253:
[   25.737417]  kasan_save_stack+0x3c/0x68
[   25.737942]  kasan_save_track+0x20/0x40
[   25.738511]  kasan_save_alloc_info+0x40/0x58
[   25.739044]  __kasan_kmalloc+0xd4/0xd8
[   25.739652]  __kmalloc_cache_noprof+0x154/0x320
[   25.740230]  kasan_atomics+0xb8/0x2e8
[   25.740742]  kunit_try_run_case+0x170/0x3f0
[   25.741316]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.741929]  kthread+0x24c/0x2d0
[   25.742472]  ret_from_fork+0x10/0x20
[   25.743126] 
[   25.743455] The buggy address belongs to the object at fff00000c4205580
[   25.743455]  which belongs to the cache kmalloc-64 of size 64
[   25.744561] The buggy address is located 0 bytes to the right of
[   25.744561]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   25.745749] 
[   25.746142] The buggy address belongs to the physical page:
[   25.746767] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   25.747509] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.748291] page_type: f5(slab)
[   25.748803] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.749722] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.750462] page dumped because: kasan: bad access detected
[   25.751083] 
[   25.751431] Memory state around the buggy address:
[   25.752050]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.752758]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.753591] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.754380]                                      ^
[   25.754955]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.755646]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.756404] ==================================================================
[   26.440372] ==================================================================
[   26.441235] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1000/0x49c8
[   26.441927] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.443169] 
[   26.443866] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.444089] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.444174] Hardware name: linux,dummy-virt (DT)
[   26.444286] Call trace:
[   26.444371]  dump_backtrace+0x9c/0x128
[   26.444495]  show_stack+0x20/0x38
[   26.444566]  dump_stack_lvl+0x8c/0xd0
[   26.444616]  print_report+0x118/0x5f0
[   26.444666]  kasan_report+0xdc/0x128
[   26.444714]  kasan_check_range+0x100/0x1a8
[   26.444772]  __kasan_check_write+0x20/0x30
[   26.444828]  kasan_atomics_helper+0x1000/0x49c8
[   26.444883]  kasan_atomics+0x1a0/0x2e8
[   26.444935]  kunit_try_run_case+0x170/0x3f0
[   26.445017]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.445078]  kthread+0x24c/0x2d0
[   26.445128]  ret_from_fork+0x10/0x20
[   26.445178] 
[   26.452212] Allocated by task 253:
[   26.452778]  kasan_save_stack+0x3c/0x68
[   26.453441]  kasan_save_track+0x20/0x40
[   26.454054]  kasan_save_alloc_info+0x40/0x58
[   26.454611]  __kasan_kmalloc+0xd4/0xd8
[   26.455206]  __kmalloc_cache_noprof+0x154/0x320
[   26.455879]  kasan_atomics+0xb8/0x2e8
[   26.456487]  kunit_try_run_case+0x170/0x3f0
[   26.457098]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.457808]  kthread+0x24c/0x2d0
[   26.458340]  ret_from_fork+0x10/0x20
[   26.458892] 
[   26.459276] The buggy address belongs to the object at fff00000c4205580
[   26.459276]  which belongs to the cache kmalloc-64 of size 64
[   26.460474] The buggy address is located 0 bytes to the right of
[   26.460474]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.461800] 
[   26.462195] The buggy address belongs to the physical page:
[   26.462812] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.463685] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.464304] page_type: f5(slab)
[   26.464759] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.465624] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.466381] page dumped because: kasan: bad access detected
[   26.466988] 
[   26.467266] Memory state around the buggy address:
[   26.467874]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.468618]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.469371] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.470045]                                      ^
[   26.470627]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.471449]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.472236] ==================================================================
[   25.618953] ==================================================================
[   25.619693] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7a0/0x49c8
[   25.620610] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   25.621409] 
[   25.621828] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   25.622054] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.622180] Hardware name: linux,dummy-virt (DT)
[   25.622276] Call trace:
[   25.622350]  dump_backtrace+0x9c/0x128
[   25.622477]  show_stack+0x20/0x38
[   25.622594]  dump_stack_lvl+0x8c/0xd0
[   25.622716]  print_report+0x118/0x5f0
[   25.622836]  kasan_report+0xdc/0x128
[   25.622955]  kasan_check_range+0x100/0x1a8
[   25.623098]  __kasan_check_write+0x20/0x30
[   25.623162]  kasan_atomics_helper+0x7a0/0x49c8
[   25.623217]  kasan_atomics+0x1a0/0x2e8
[   25.623268]  kunit_try_run_case+0x170/0x3f0
[   25.623318]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.623373]  kthread+0x24c/0x2d0
[   25.623424]  ret_from_fork+0x10/0x20
[   25.623474] 
[   25.630110] Allocated by task 253:
[   25.630505]  kasan_save_stack+0x3c/0x68
[   25.631146]  kasan_save_track+0x20/0x40
[   25.631764]  kasan_save_alloc_info+0x40/0x58
[   25.632370]  __kasan_kmalloc+0xd4/0xd8
[   25.632810]  __kmalloc_cache_noprof+0x154/0x320
[   25.633581]  kasan_atomics+0xb8/0x2e8
[   25.634978]  kunit_try_run_case+0x170/0x3f0
[   25.635581]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.636166]  kthread+0x24c/0x2d0
[   25.636567]  ret_from_fork+0x10/0x20
[   25.637233] 
[   25.637698] The buggy address belongs to the object at fff00000c4205580
[   25.637698]  which belongs to the cache kmalloc-64 of size 64
[   25.638940] The buggy address is located 0 bytes to the right of
[   25.638940]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   25.640500] 
[   25.640795] The buggy address belongs to the physical page:
[   25.641393] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   25.642261] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.643190] page_type: f5(slab)
[   25.643755] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.644659] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.645538] page dumped because: kasan: bad access detected
[   25.646232] 
[   25.646647] Memory state around the buggy address:
[   25.647285]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.648120]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.648941] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.649736]                                      ^
[   25.650381]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.651268]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.652047] ==================================================================
[   25.654255] ==================================================================
[   25.654940] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x810/0x49c8
[   25.655846] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   25.657036] 
[   25.657383] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   25.657759] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.657798] Hardware name: linux,dummy-virt (DT)
[   25.657837] Call trace:
[   25.657869]  dump_backtrace+0x9c/0x128
[   25.657926]  show_stack+0x20/0x38
[   25.658005]  dump_stack_lvl+0x8c/0xd0
[   25.658058]  print_report+0x118/0x5f0
[   25.658105]  kasan_report+0xdc/0x128
[   25.658151]  kasan_check_range+0x100/0x1a8
[   25.658201]  __kasan_check_write+0x20/0x30
[   25.658250]  kasan_atomics_helper+0x810/0x49c8
[   25.658305]  kasan_atomics+0x1a0/0x2e8
[   25.658356]  kunit_try_run_case+0x170/0x3f0
[   25.658405]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.658461]  kthread+0x24c/0x2d0
[   25.658511]  ret_from_fork+0x10/0x20
[   25.658562] 
[   25.665427] Allocated by task 253:
[   25.665994]  kasan_save_stack+0x3c/0x68
[   25.666590]  kasan_save_track+0x20/0x40
[   25.667167]  kasan_save_alloc_info+0x40/0x58
[   25.667763]  __kasan_kmalloc+0xd4/0xd8
[   25.668207]  __kmalloc_cache_noprof+0x154/0x320
[   25.669000]  kasan_atomics+0xb8/0x2e8
[   25.669627]  kunit_try_run_case+0x170/0x3f0
[   25.670272]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.671003]  kthread+0x24c/0x2d0
[   25.671582]  ret_from_fork+0x10/0x20
[   25.672073] 
[   25.672447] The buggy address belongs to the object at fff00000c4205580
[   25.672447]  which belongs to the cache kmalloc-64 of size 64
[   25.673456] The buggy address is located 0 bytes to the right of
[   25.673456]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   25.674614] 
[   25.674944] The buggy address belongs to the physical page:
[   25.675571] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   25.676379] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.677070] page_type: f5(slab)
[   25.677475] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.678329] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.679099] page dumped because: kasan: bad access detected
[   25.679736] 
[   25.680092] Memory state around the buggy address:
[   25.680649]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.681433]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.682274] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.682904]                                      ^
[   25.683544]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.684242]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.684804] ==================================================================
[   25.757622] ==================================================================
[   25.758422] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x978/0x49c8
[   25.759116] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   25.759723] 
[   25.759938] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   25.760218] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.760331] Hardware name: linux,dummy-virt (DT)
[   25.760484] Call trace:
[   25.760558]  dump_backtrace+0x9c/0x128
[   25.760685]  show_stack+0x20/0x38
[   25.760806]  dump_stack_lvl+0x8c/0xd0
[   25.760929]  print_report+0x118/0x5f0
[   25.761068]  kasan_report+0xdc/0x128
[   25.761184]  kasan_check_range+0x100/0x1a8
[   25.761377]  __kasan_check_write+0x20/0x30
[   25.761511]  kasan_atomics_helper+0x978/0x49c8
[   25.761645]  kasan_atomics+0x1a0/0x2e8
[   25.761740]  kunit_try_run_case+0x170/0x3f0
[   25.761797]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.761856]  kthread+0x24c/0x2d0
[   25.761907]  ret_from_fork+0x10/0x20
[   25.761976] 
[   25.770235] Allocated by task 253:
[   25.770643]  kasan_save_stack+0x3c/0x68
[   25.771331]  kasan_save_track+0x20/0x40
[   25.771974]  kasan_save_alloc_info+0x40/0x58
[   25.772540]  __kasan_kmalloc+0xd4/0xd8
[   25.773149]  __kmalloc_cache_noprof+0x154/0x320
[   25.773764]  kasan_atomics+0xb8/0x2e8
[   25.774439]  kunit_try_run_case+0x170/0x3f0
[   25.775029]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.775733]  kthread+0x24c/0x2d0
[   25.776236]  ret_from_fork+0x10/0x20
[   25.776795] 
[   25.777184] The buggy address belongs to the object at fff00000c4205580
[   25.777184]  which belongs to the cache kmalloc-64 of size 64
[   25.778418] The buggy address is located 0 bytes to the right of
[   25.778418]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   25.779643] 
[   25.780008] The buggy address belongs to the physical page:
[   25.780703] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   25.781572] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.782336] page_type: f5(slab)
[   25.782848] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.783700] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.784552] page dumped because: kasan: bad access detected
[   25.785196] 
[   25.785549] Memory state around the buggy address:
[   25.786162]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.786984]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.787767] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.788561]                                      ^
[   25.789134]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.789900]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.790779] ==================================================================
[   26.474101] ==================================================================
[   26.474829] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x106c/0x49c8
[   26.475725] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.476623] 
[   26.476942] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.477408] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.477479] Hardware name: linux,dummy-virt (DT)
[   26.477553] Call trace:
[   26.477613]  dump_backtrace+0x9c/0x128
[   26.477725]  show_stack+0x20/0x38
[   26.477819]  dump_stack_lvl+0x8c/0xd0
[   26.477923]  print_report+0x118/0x5f0
[   26.478055]  kasan_report+0xdc/0x128
[   26.478164]  kasan_check_range+0x100/0x1a8
[   26.478281]  __kasan_check_write+0x20/0x30
[   26.478395]  kasan_atomics_helper+0x106c/0x49c8
[   26.478515]  kasan_atomics+0x1a0/0x2e8
[   26.478629]  kunit_try_run_case+0x170/0x3f0
[   26.478743]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.478858]  kthread+0x24c/0x2d0
[   26.478979]  ret_from_fork+0x10/0x20
[   26.479092] 
[   26.493022] Allocated by task 253:
[   26.493571]  kasan_save_stack+0x3c/0x68
[   26.494078]  kasan_save_track+0x20/0x40
[   26.494717]  kasan_save_alloc_info+0x40/0x58
[   26.495328]  __kasan_kmalloc+0xd4/0xd8
[   26.495890]  __kmalloc_cache_noprof+0x154/0x320
[   26.496559]  kasan_atomics+0xb8/0x2e8
[   26.497114]  kunit_try_run_case+0x170/0x3f0
[   26.497691]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.498400]  kthread+0x24c/0x2d0
[   26.498895]  ret_from_fork+0x10/0x20
[   26.499456] 
[   26.499805] The buggy address belongs to the object at fff00000c4205580
[   26.499805]  which belongs to the cache kmalloc-64 of size 64
[   26.501028] The buggy address is located 0 bytes to the right of
[   26.501028]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.502283] 
[   26.502595] The buggy address belongs to the physical page:
[   26.503217] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.504153] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.504899] page_type: f5(slab)
[   26.505404] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.506248] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.507045] page dumped because: kasan: bad access detected
[   26.507667] 
[   26.508005] Memory state around the buggy address:
[   26.508592]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.509450]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.510255] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.511006]                                      ^
[   26.511578]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.512361]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.513173] ==================================================================
[   26.720317] ==================================================================
[   26.721065] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1370/0x49c8
[   26.721925] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.723997] 
[   26.724340] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.724545] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.724630] Hardware name: linux,dummy-virt (DT)
[   26.724718] Call trace:
[   26.724800]  dump_backtrace+0x9c/0x128
[   26.724919]  show_stack+0x20/0x38
[   26.725023]  dump_stack_lvl+0x8c/0xd0
[   26.725079]  print_report+0x118/0x5f0
[   26.725125]  kasan_report+0xdc/0x128
[   26.725171]  kasan_check_range+0x100/0x1a8
[   26.725219]  __kasan_check_write+0x20/0x30
[   26.725270]  kasan_atomics_helper+0x1370/0x49c8
[   26.725325]  kasan_atomics+0x1a0/0x2e8
[   26.725374]  kunit_try_run_case+0x170/0x3f0
[   26.725423]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.725480]  kthread+0x24c/0x2d0
[   26.725530]  ret_from_fork+0x10/0x20
[   26.725580] 
[   26.732523] Allocated by task 253:
[   26.733063]  kasan_save_stack+0x3c/0x68
[   26.733749]  kasan_save_track+0x20/0x40
[   26.734325]  kasan_save_alloc_info+0x40/0x58
[   26.734944]  __kasan_kmalloc+0xd4/0xd8
[   26.735487]  __kmalloc_cache_noprof+0x154/0x320
[   26.736144]  kasan_atomics+0xb8/0x2e8
[   26.736675]  kunit_try_run_case+0x170/0x3f0
[   26.737255]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.737911]  kthread+0x24c/0x2d0
[   26.738412]  ret_from_fork+0x10/0x20
[   26.738939] 
[   26.739277] The buggy address belongs to the object at fff00000c4205580
[   26.739277]  which belongs to the cache kmalloc-64 of size 64
[   26.740360] The buggy address is located 0 bytes to the right of
[   26.740360]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.741679] 
[   26.742569] The buggy address belongs to the physical page:
[   26.743831] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.744452] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.744995] page_type: f5(slab)
[   26.745363] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.745911] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.750203] page dumped because: kasan: bad access detected
[   26.751760] 
[   26.752381] Memory state around the buggy address:
[   26.754099]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.754822]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.755531] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.756324]                                      ^
[   26.756920]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.757672]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.758343] ==================================================================
[   26.584804] ==================================================================
[   26.585516] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11b0/0x49c8
[   26.586228] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.587273] 
[   26.587569] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.587773] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.587857] Hardware name: linux,dummy-virt (DT)
[   26.588001] Call trace:
[   26.588073]  dump_backtrace+0x9c/0x128
[   26.588200]  show_stack+0x20/0x38
[   26.588367]  dump_stack_lvl+0x8c/0xd0
[   26.588487]  print_report+0x118/0x5f0
[   26.588589]  kasan_report+0xdc/0x128
[   26.588640]  kasan_check_range+0x100/0x1a8
[   26.588690]  __kasan_check_write+0x20/0x30
[   26.588746]  kasan_atomics_helper+0x11b0/0x49c8
[   26.588817]  kasan_atomics+0x1a0/0x2e8
[   26.588871]  kunit_try_run_case+0x170/0x3f0
[   26.588922]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.589006]  kthread+0x24c/0x2d0
[   26.589063]  ret_from_fork+0x10/0x20
[   26.589114] 
[   26.597124] Allocated by task 253:
[   26.597632]  kasan_save_stack+0x3c/0x68
[   26.598203]  kasan_save_track+0x20/0x40
[   26.598814]  kasan_save_alloc_info+0x40/0x58
[   26.599536]  __kasan_kmalloc+0xd4/0xd8
[   26.600074]  __kmalloc_cache_noprof+0x154/0x320
[   26.600648]  kasan_atomics+0xb8/0x2e8
[   26.601269]  kunit_try_run_case+0x170/0x3f0
[   26.601880]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.602596]  kthread+0x24c/0x2d0
[   26.603111]  ret_from_fork+0x10/0x20
[   26.603713] 
[   26.604062] The buggy address belongs to the object at fff00000c4205580
[   26.604062]  which belongs to the cache kmalloc-64 of size 64
[   26.605240] The buggy address is located 0 bytes to the right of
[   26.605240]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.606550] 
[   26.606928] The buggy address belongs to the physical page:
[   26.607580] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.608491] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.609269] page_type: f5(slab)
[   26.609806] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.610664] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.611465] page dumped because: kasan: bad access detected
[   26.612094] 
[   26.612455] Memory state around the buggy address:
[   26.613071]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.613878]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.614671] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.615488]                                      ^
[   26.616068]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.616890]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.617649] ==================================================================
[   26.134839] ==================================================================
[   26.135557] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f40/0x49c8
[   26.136525] Read of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.137471] 
[   26.138003] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.138227] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.138426] Hardware name: linux,dummy-virt (DT)
[   26.138526] Call trace:
[   26.138598]  dump_backtrace+0x9c/0x128
[   26.138725]  show_stack+0x20/0x38
[   26.138807]  dump_stack_lvl+0x8c/0xd0
[   26.138882]  print_report+0x118/0x5f0
[   26.138933]  kasan_report+0xdc/0x128
[   26.139004]  __asan_report_load4_noabort+0x20/0x30
[   26.139064]  kasan_atomics_helper+0x3f40/0x49c8
[   26.139120]  kasan_atomics+0x1a0/0x2e8
[   26.139169]  kunit_try_run_case+0x170/0x3f0
[   26.139216]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.139272]  kthread+0x24c/0x2d0
[   26.139320]  ret_from_fork+0x10/0x20
[   26.139370] 
[   26.146084] Allocated by task 253:
[   26.146621]  kasan_save_stack+0x3c/0x68
[   26.147354]  kasan_save_track+0x20/0x40
[   26.147890]  kasan_save_alloc_info+0x40/0x58
[   26.148589]  __kasan_kmalloc+0xd4/0xd8
[   26.149164]  __kmalloc_cache_noprof+0x154/0x320
[   26.149887]  kasan_atomics+0xb8/0x2e8
[   26.150461]  kunit_try_run_case+0x170/0x3f0
[   26.151178]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.151890]  kthread+0x24c/0x2d0
[   26.152344]  ret_from_fork+0x10/0x20
[   26.152897] 
[   26.153270] The buggy address belongs to the object at fff00000c4205580
[   26.153270]  which belongs to the cache kmalloc-64 of size 64
[   26.154479] The buggy address is located 0 bytes to the right of
[   26.154479]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.155802] 
[   26.156168] The buggy address belongs to the physical page:
[   26.156788] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.157772] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.158682] page_type: f5(slab)
[   26.159504] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.160352] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.161238] page dumped because: kasan: bad access detected
[   26.161845] 
[   26.162379] Memory state around the buggy address:
[   26.162906]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.163627]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.164372] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.165111]                                      ^
[   26.165646]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.166373]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.167143] ==================================================================
[   25.520141] ==================================================================
[   25.521150] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x650/0x49c8
[   25.522327] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   25.523274] 
[   25.523745] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   25.523987] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.524072] Hardware name: linux,dummy-virt (DT)
[   25.524165] Call trace:
[   25.524223]  dump_backtrace+0x9c/0x128
[   25.524284]  show_stack+0x20/0x38
[   25.524329]  dump_stack_lvl+0x8c/0xd0
[   25.524377]  print_report+0x118/0x5f0
[   25.524422]  kasan_report+0xdc/0x128
[   25.524470]  kasan_check_range+0x100/0x1a8
[   25.524519]  __kasan_check_write+0x20/0x30
[   25.524568]  kasan_atomics_helper+0x650/0x49c8
[   25.524622]  kasan_atomics+0x1a0/0x2e8
[   25.524672]  kunit_try_run_case+0x170/0x3f0
[   25.524719]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.524788]  kthread+0x24c/0x2d0
[   25.524837]  ret_from_fork+0x10/0x20
[   25.524887] 
[   25.531535] Allocated by task 253:
[   25.532050]  kasan_save_stack+0x3c/0x68
[   25.532669]  kasan_save_track+0x20/0x40
[   25.533204]  kasan_save_alloc_info+0x40/0x58
[   25.533812]  __kasan_kmalloc+0xd4/0xd8
[   25.534462]  __kmalloc_cache_noprof+0x154/0x320
[   25.535102]  kasan_atomics+0xb8/0x2e8
[   25.535535]  kunit_try_run_case+0x170/0x3f0
[   25.536084]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.536852]  kthread+0x24c/0x2d0
[   25.537411]  ret_from_fork+0x10/0x20
[   25.538047] 
[   25.538416] The buggy address belongs to the object at fff00000c4205580
[   25.538416]  which belongs to the cache kmalloc-64 of size 64
[   25.539507] The buggy address is located 0 bytes to the right of
[   25.539507]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   25.540832] 
[   25.541188] The buggy address belongs to the physical page:
[   25.541972] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   25.542815] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.543482] page_type: f5(slab)
[   25.544167] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.544939] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.545664] page dumped because: kasan: bad access detected
[   25.546275] 
[   25.546596] Memory state around the buggy address:
[   25.547137]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.547901]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.548570] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.549351]                                      ^
[   25.549899]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.550639]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.551409] ==================================================================
[   25.960381] ==================================================================
[   25.962049] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xbc8/0x49c8
[   25.963293] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   25.964379] 
[   25.964708] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   25.965163] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.965206] Hardware name: linux,dummy-virt (DT)
[   25.965289] Call trace:
[   25.965325]  dump_backtrace+0x9c/0x128
[   25.965382]  show_stack+0x20/0x38
[   25.965429]  dump_stack_lvl+0x8c/0xd0
[   25.965477]  print_report+0x118/0x5f0
[   25.965524]  kasan_report+0xdc/0x128
[   25.965568]  kasan_check_range+0x100/0x1a8
[   25.965615]  __kasan_check_write+0x20/0x30
[   25.965664]  kasan_atomics_helper+0xbc8/0x49c8
[   25.965716]  kasan_atomics+0x1a0/0x2e8
[   25.965765]  kunit_try_run_case+0x170/0x3f0
[   25.965814]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.965870]  kthread+0x24c/0x2d0
[   25.965919]  ret_from_fork+0x10/0x20
[   25.966031] 
[   25.974302] Allocated by task 253:
[   25.974898]  kasan_save_stack+0x3c/0x68
[   25.975619]  kasan_save_track+0x20/0x40
[   25.976238]  kasan_save_alloc_info+0x40/0x58
[   25.976845]  __kasan_kmalloc+0xd4/0xd8
[   25.977432]  __kmalloc_cache_noprof+0x154/0x320
[   25.978009]  kasan_atomics+0xb8/0x2e8
[   25.978571]  kunit_try_run_case+0x170/0x3f0
[   25.979209]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.979863]  kthread+0x24c/0x2d0
[   25.980442]  ret_from_fork+0x10/0x20
[   25.980993] 
[   25.981370] The buggy address belongs to the object at fff00000c4205580
[   25.981370]  which belongs to the cache kmalloc-64 of size 64
[   25.982560] The buggy address is located 0 bytes to the right of
[   25.982560]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   25.983504] 
[   25.983645] The buggy address belongs to the physical page:
[   25.983902] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   25.985172] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.985887] page_type: f5(slab)
[   25.986368] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.987237] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.988032] page dumped because: kasan: bad access detected
[   25.988662] 
[   25.989050] Memory state around the buggy address:
[   25.989601]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.990454]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.991246] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.992026]                                      ^
[   25.992642]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.993423]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.994201] ==================================================================
[   25.825284] ==================================================================
[   25.826030] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa50/0x49c8
[   25.826851] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   25.827632] 
[   25.828056] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   25.828262] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.828345] Hardware name: linux,dummy-virt (DT)
[   25.828439] Call trace:
[   25.828507]  dump_backtrace+0x9c/0x128
[   25.828634]  show_stack+0x20/0x38
[   25.828747]  dump_stack_lvl+0x8c/0xd0
[   25.828873]  print_report+0x118/0x5f0
[   25.829010]  kasan_report+0xdc/0x128
[   25.829130]  kasan_check_range+0x100/0x1a8
[   25.829251]  __kasan_check_write+0x20/0x30
[   25.829375]  kasan_atomics_helper+0xa50/0x49c8
[   25.829505]  kasan_atomics+0x1a0/0x2e8
[   25.829592]  kunit_try_run_case+0x170/0x3f0
[   25.829642]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.829700]  kthread+0x24c/0x2d0
[   25.829751]  ret_from_fork+0x10/0x20
[   25.829803] 
[   25.836479] Allocated by task 253:
[   25.836944]  kasan_save_stack+0x3c/0x68
[   25.837541]  kasan_save_track+0x20/0x40
[   25.838074]  kasan_save_alloc_info+0x40/0x58
[   25.838643]  __kasan_kmalloc+0xd4/0xd8
[   25.839175]  __kmalloc_cache_noprof+0x154/0x320
[   25.839766]  kasan_atomics+0xb8/0x2e8
[   25.840240]  kunit_try_run_case+0x170/0x3f0
[   25.840829]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.841578]  kthread+0x24c/0x2d0
[   25.842080]  ret_from_fork+0x10/0x20
[   25.842554] 
[   25.842886] The buggy address belongs to the object at fff00000c4205580
[   25.842886]  which belongs to the cache kmalloc-64 of size 64
[   25.844023] The buggy address is located 0 bytes to the right of
[   25.844023]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   25.845153] 
[   25.845434] The buggy address belongs to the physical page:
[   25.846127] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   25.847001] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.847699] page_type: f5(slab)
[   25.848271] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.849028] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.849801] page dumped because: kasan: bad access detected
[   25.850396] 
[   25.850707] Memory state around the buggy address:
[   25.851264]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.852391]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.853051] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.853881]                                      ^
[   25.854436]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.855190]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.855903] ==================================================================
[   27.033084] ==================================================================
[   27.034193] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16f0/0x49c8
[   27.035082] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   27.036061] 
[   27.036441] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   27.036674] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.036797] Hardware name: linux,dummy-virt (DT)
[   27.036891] Call trace:
[   27.036984]  dump_backtrace+0x9c/0x128
[   27.037157]  show_stack+0x20/0x38
[   27.037277]  dump_stack_lvl+0x8c/0xd0
[   27.037445]  print_report+0x118/0x5f0
[   27.037550]  kasan_report+0xdc/0x128
[   27.037603]  kasan_check_range+0x100/0x1a8
[   27.037654]  __kasan_check_write+0x20/0x30
[   27.037749]  kasan_atomics_helper+0x16f0/0x49c8
[   27.037810]  kasan_atomics+0x1a0/0x2e8
[   27.037864]  kunit_try_run_case+0x170/0x3f0
[   27.037918]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.038004]  kthread+0x24c/0x2d0
[   27.038060]  ret_from_fork+0x10/0x20
[   27.038112] 
[   27.045349] Allocated by task 253:
[   27.045748]  kasan_save_stack+0x3c/0x68
[   27.046455]  kasan_save_track+0x20/0x40
[   27.047037]  kasan_save_alloc_info+0x40/0x58
[   27.047634]  __kasan_kmalloc+0xd4/0xd8
[   27.048296]  __kmalloc_cache_noprof+0x154/0x320
[   27.048913]  kasan_atomics+0xb8/0x2e8
[   27.049540]  kunit_try_run_case+0x170/0x3f0
[   27.050015]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.050762]  kthread+0x24c/0x2d0
[   27.051251]  ret_from_fork+0x10/0x20
[   27.051866] 
[   27.052236] The buggy address belongs to the object at fff00000c4205580
[   27.052236]  which belongs to the cache kmalloc-64 of size 64
[   27.053467] The buggy address is located 0 bytes to the right of
[   27.053467]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   27.054747] 
[   27.055107] The buggy address belongs to the physical page:
[   27.055813] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   27.056675] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.057452] page_type: f5(slab)
[   27.058019] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.058849] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   27.059626] page dumped because: kasan: bad access detected
[   27.060260] 
[   27.060617] Memory state around the buggy address:
[   27.061261]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.062021]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.062838] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.063604]                                      ^
[   27.064205]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.065008]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.065777] ==================================================================
[   26.272801] ==================================================================
[   26.273466] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40c0/0x49c8
[   26.274470] Read of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.275160] 
[   26.275731] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.275845] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.275882] Hardware name: linux,dummy-virt (DT)
[   26.275924] Call trace:
[   26.275955]  dump_backtrace+0x9c/0x128
[   26.276105]  show_stack+0x20/0x38
[   26.276222]  dump_stack_lvl+0x8c/0xd0
[   26.276345]  print_report+0x118/0x5f0
[   26.276468]  kasan_report+0xdc/0x128
[   26.276589]  __asan_report_load8_noabort+0x20/0x30
[   26.276723]  kasan_atomics_helper+0x40c0/0x49c8
[   26.276865]  kasan_atomics+0x1a0/0x2e8
[   26.277016]  kunit_try_run_case+0x170/0x3f0
[   26.277139]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.277281]  kthread+0x24c/0x2d0
[   26.277390]  ret_from_fork+0x10/0x20
[   26.277501] 
[   26.284659] Allocated by task 253:
[   26.285128]  kasan_save_stack+0x3c/0x68
[   26.285907]  kasan_save_track+0x20/0x40
[   26.286551]  kasan_save_alloc_info+0x40/0x58
[   26.287202]  __kasan_kmalloc+0xd4/0xd8
[   26.287664]  __kmalloc_cache_noprof+0x154/0x320
[   26.288202]  kasan_atomics+0xb8/0x2e8
[   26.288650]  kunit_try_run_case+0x170/0x3f0
[   26.289458]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.290118]  kthread+0x24c/0x2d0
[   26.290627]  ret_from_fork+0x10/0x20
[   26.291182] 
[   26.291538] The buggy address belongs to the object at fff00000c4205580
[   26.291538]  which belongs to the cache kmalloc-64 of size 64
[   26.292933] The buggy address is located 0 bytes to the right of
[   26.292933]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.294121] 
[   26.294447] The buggy address belongs to the physical page:
[   26.295060] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.295998] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.296759] page_type: f5(slab)
[   26.297339] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.298163] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.298972] page dumped because: kasan: bad access detected
[   26.299595] 
[   26.299948] Memory state around the buggy address:
[   26.300515]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.301368]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.302155] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.302973]                                      ^
[   26.303573]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.304354]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.305130] ==================================================================
[   26.029948] ==================================================================
[   26.030922] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc64/0x49c8
[   26.031790] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.032613] 
[   26.032998] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.033249] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.033317] Hardware name: linux,dummy-virt (DT)
[   26.033359] Call trace:
[   26.033390]  dump_backtrace+0x9c/0x128
[   26.033470]  show_stack+0x20/0x38
[   26.033588]  dump_stack_lvl+0x8c/0xd0
[   26.033752]  print_report+0x118/0x5f0
[   26.033881]  kasan_report+0xdc/0x128
[   26.034045]  kasan_check_range+0x100/0x1a8
[   26.034172]  __kasan_check_write+0x20/0x30
[   26.034229]  kasan_atomics_helper+0xc64/0x49c8
[   26.034284]  kasan_atomics+0x1a0/0x2e8
[   26.034336]  kunit_try_run_case+0x170/0x3f0
[   26.034384]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.034441]  kthread+0x24c/0x2d0
[   26.034492]  ret_from_fork+0x10/0x20
[   26.034549] 
[   26.041740] Allocated by task 253:
[   26.042214]  kasan_save_stack+0x3c/0x68
[   26.042865]  kasan_save_track+0x20/0x40
[   26.043433]  kasan_save_alloc_info+0x40/0x58
[   26.044053]  __kasan_kmalloc+0xd4/0xd8
[   26.044625]  __kmalloc_cache_noprof+0x154/0x320
[   26.045287]  kasan_atomics+0xb8/0x2e8
[   26.045892]  kunit_try_run_case+0x170/0x3f0
[   26.046479]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.047217]  kthread+0x24c/0x2d0
[   26.047785]  ret_from_fork+0x10/0x20
[   26.048373] 
[   26.048722] The buggy address belongs to the object at fff00000c4205580
[   26.048722]  which belongs to the cache kmalloc-64 of size 64
[   26.050010] The buggy address is located 0 bytes to the right of
[   26.050010]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.051298] 
[   26.051678] The buggy address belongs to the physical page:
[   26.052289] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.053206] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.053987] page_type: f5(slab)
[   26.054466] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.055348] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.056157] page dumped because: kasan: bad access detected
[   26.056788] 
[   26.057117] Memory state around the buggy address:
[   26.057663]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.058537]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.059364] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.060247]                                      ^
[   26.060793]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.061451]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.062333] ==================================================================
[   27.137560] ==================================================================
[   27.138323] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f78/0x49c8
[   27.139174] Read of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   27.140000] 
[   27.140333] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   27.140553] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.140642] Hardware name: linux,dummy-virt (DT)
[   27.140738] Call trace:
[   27.140823]  dump_backtrace+0x9c/0x128
[   27.140951]  show_stack+0x20/0x38
[   27.141091]  dump_stack_lvl+0x8c/0xd0
[   27.141183]  print_report+0x118/0x5f0
[   27.141280]  kasan_report+0xdc/0x128
[   27.141395]  __asan_report_load8_noabort+0x20/0x30
[   27.141530]  kasan_atomics_helper+0x3f78/0x49c8
[   27.141666]  kasan_atomics+0x1a0/0x2e8
[   27.141793]  kunit_try_run_case+0x170/0x3f0
[   27.141893]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.141955]  kthread+0x24c/0x2d0
[   27.142038]  ret_from_fork+0x10/0x20
[   27.142092] 
[   27.149205] Allocated by task 253:
[   27.149616]  kasan_save_stack+0x3c/0x68
[   27.150213]  kasan_save_track+0x20/0x40
[   27.150721]  kasan_save_alloc_info+0x40/0x58
[   27.151222]  __kasan_kmalloc+0xd4/0xd8
[   27.151773]  __kmalloc_cache_noprof+0x154/0x320
[   27.152504]  kasan_atomics+0xb8/0x2e8
[   27.152979]  kunit_try_run_case+0x170/0x3f0
[   27.153563]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.154286]  kthread+0x24c/0x2d0
[   27.154708]  ret_from_fork+0x10/0x20
[   27.155250] 
[   27.155536] The buggy address belongs to the object at fff00000c4205580
[   27.155536]  which belongs to the cache kmalloc-64 of size 64
[   27.156678] The buggy address is located 0 bytes to the right of
[   27.156678]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   27.157923] 
[   27.158287] The buggy address belongs to the physical page:
[   27.158887] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   27.159567] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.160356] page_type: f5(slab)
[   27.160856] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.161648] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   27.162448] page dumped because: kasan: bad access detected
[   27.163041] 
[   27.163333] Memory state around the buggy address:
[   27.163858]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.164607]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.165275] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.165899]                                      ^
[   27.166543]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.167306]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.168049] ==================================================================
[   26.306276] ==================================================================
[   26.307001] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb0/0x49c8
[   26.307856] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.308694] 
[   26.309104] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.309311] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.309394] Hardware name: linux,dummy-virt (DT)
[   26.309485] Call trace:
[   26.309578]  dump_backtrace+0x9c/0x128
[   26.309731]  show_stack+0x20/0x38
[   26.309844]  dump_stack_lvl+0x8c/0xd0
[   26.309997]  print_report+0x118/0x5f0
[   26.310163]  kasan_report+0xdc/0x128
[   26.310314]  kasan_check_range+0x100/0x1a8
[   26.310435]  __kasan_check_write+0x20/0x30
[   26.310510]  kasan_atomics_helper+0xeb0/0x49c8
[   26.310565]  kasan_atomics+0x1a0/0x2e8
[   26.310616]  kunit_try_run_case+0x170/0x3f0
[   26.310665]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.310722]  kthread+0x24c/0x2d0
[   26.310771]  ret_from_fork+0x10/0x20
[   26.310819] 
[   26.318645] Allocated by task 253:
[   26.319021]  kasan_save_stack+0x3c/0x68
[   26.319398]  kasan_save_track+0x20/0x40
[   26.319765]  kasan_save_alloc_info+0x40/0x58
[   26.321031]  __kasan_kmalloc+0xd4/0xd8
[   26.321469]  __kmalloc_cache_noprof+0x154/0x320
[   26.322034]  kasan_atomics+0xb8/0x2e8
[   26.322564]  kunit_try_run_case+0x170/0x3f0
[   26.323175]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.323848]  kthread+0x24c/0x2d0
[   26.324466]  ret_from_fork+0x10/0x20
[   26.325038] 
[   26.325353] The buggy address belongs to the object at fff00000c4205580
[   26.325353]  which belongs to the cache kmalloc-64 of size 64
[   26.326478] The buggy address is located 0 bytes to the right of
[   26.326478]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.327746] 
[   26.328139] The buggy address belongs to the physical page:
[   26.328810] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.329689] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.330501] page_type: f5(slab)
[   26.331026] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.331868] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.332822] page dumped because: kasan: bad access detected
[   26.333385] 
[   26.333660] Memory state around the buggy address:
[   26.334551]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.335456]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.336322] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.337194]                                      ^
[   26.337906]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.338796]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.339644] ==================================================================
[   27.233430] ==================================================================
[   27.234137] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18a4/0x49c8
[   27.235383] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   27.236276] 
[   27.236672] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   27.236948] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.237050] Hardware name: linux,dummy-virt (DT)
[   27.237142] Call trace:
[   27.237211]  dump_backtrace+0x9c/0x128
[   27.237334]  show_stack+0x20/0x38
[   27.237423]  dump_stack_lvl+0x8c/0xd0
[   27.237475]  print_report+0x118/0x5f0
[   27.237526]  kasan_report+0xdc/0x128
[   27.237574]  kasan_check_range+0x100/0x1a8
[   27.237624]  __kasan_check_write+0x20/0x30
[   27.237673]  kasan_atomics_helper+0x18a4/0x49c8
[   27.237730]  kasan_atomics+0x1a0/0x2e8
[   27.237781]  kunit_try_run_case+0x170/0x3f0
[   27.237832]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.237888]  kthread+0x24c/0x2d0
[   27.237939]  ret_from_fork+0x10/0x20
[   27.238027] 
[   27.245351] Allocated by task 253:
[   27.245946]  kasan_save_stack+0x3c/0x68
[   27.246526]  kasan_save_track+0x20/0x40
[   27.247218]  kasan_save_alloc_info+0x40/0x58
[   27.247859]  __kasan_kmalloc+0xd4/0xd8
[   27.248537]  __kmalloc_cache_noprof+0x154/0x320
[   27.249266]  kasan_atomics+0xb8/0x2e8
[   27.249795]  kunit_try_run_case+0x170/0x3f0
[   27.250444]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.251036]  kthread+0x24c/0x2d0
[   27.251603]  ret_from_fork+0x10/0x20
[   27.252162] 
[   27.252440] The buggy address belongs to the object at fff00000c4205580
[   27.252440]  which belongs to the cache kmalloc-64 of size 64
[   27.253528] The buggy address is located 0 bytes to the right of
[   27.253528]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   27.254542] 
[   27.254818] The buggy address belongs to the physical page:
[   27.255584] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   27.256579] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.257386] page_type: f5(slab)
[   27.258017] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.258864] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   27.259757] page dumped because: kasan: bad access detected
[   27.260318] 
[   27.260664] Memory state around the buggy address:
[   27.261314]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.262135]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.262974] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.263709]                                      ^
[   27.264310]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.265040]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.265842] ==================================================================
[   25.687271] ==================================================================
[   25.688649] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8d8/0x49c8
[   25.690871] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   25.692090] 
[   25.692374] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   25.692571] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.692647] Hardware name: linux,dummy-virt (DT)
[   25.692734] Call trace:
[   25.692805]  dump_backtrace+0x9c/0x128
[   25.692920]  show_stack+0x20/0x38
[   25.693347]  dump_stack_lvl+0x8c/0xd0
[   25.693529]  print_report+0x118/0x5f0
[   25.693652]  kasan_report+0xdc/0x128
[   25.693754]  kasan_check_range+0x100/0x1a8
[   25.693864]  __kasan_check_write+0x20/0x30
[   25.693998]  kasan_atomics_helper+0x8d8/0x49c8
[   25.694124]  kasan_atomics+0x1a0/0x2e8
[   25.694237]  kunit_try_run_case+0x170/0x3f0
[   25.694349]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.694476]  kthread+0x24c/0x2d0
[   25.694580]  ret_from_fork+0x10/0x20
[   25.694681] 
[   25.703886] Allocated by task 253:
[   25.704400]  kasan_save_stack+0x3c/0x68
[   25.704922]  kasan_save_track+0x20/0x40
[   25.705519]  kasan_save_alloc_info+0x40/0x58
[   25.706145]  __kasan_kmalloc+0xd4/0xd8
[   25.706701]  __kmalloc_cache_noprof+0x154/0x320
[   25.707239]  kasan_atomics+0xb8/0x2e8
[   25.707811]  kunit_try_run_case+0x170/0x3f0
[   25.708420]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.709142]  kthread+0x24c/0x2d0
[   25.709618]  ret_from_fork+0x10/0x20
[   25.710111] 
[   25.710432] The buggy address belongs to the object at fff00000c4205580
[   25.710432]  which belongs to the cache kmalloc-64 of size 64
[   25.711540] The buggy address is located 0 bytes to the right of
[   25.711540]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   25.712729] 
[   25.713097] The buggy address belongs to the physical page:
[   25.713755] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   25.714528] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.715223] page_type: f5(slab)
[   25.715666] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.716522] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.717318] page dumped because: kasan: bad access detected
[   25.718003] 
[   25.718326] Memory state around the buggy address:
[   25.718896]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.719643]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.720398] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.721200]                                      ^
[   25.721866]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.722549]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.723276] ==================================================================
[   25.792823] ==================================================================
[   25.793704] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x9e4/0x49c8
[   25.794579] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   25.795625] 
[   25.796246] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   25.796422] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.796537] Hardware name: linux,dummy-virt (DT)
[   25.796632] Call trace:
[   25.796705]  dump_backtrace+0x9c/0x128
[   25.796796]  show_stack+0x20/0x38
[   25.796846]  dump_stack_lvl+0x8c/0xd0
[   25.796896]  print_report+0x118/0x5f0
[   25.796943]  kasan_report+0xdc/0x128
[   25.797026]  kasan_check_range+0x100/0x1a8
[   25.797077]  __kasan_check_write+0x20/0x30
[   25.797128]  kasan_atomics_helper+0x9e4/0x49c8
[   25.797183]  kasan_atomics+0x1a0/0x2e8
[   25.797233]  kunit_try_run_case+0x170/0x3f0
[   25.797283]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.797339]  kthread+0x24c/0x2d0
[   25.797394]  ret_from_fork+0x10/0x20
[   25.797444] 
[   25.804629] Allocated by task 253:
[   25.805229]  kasan_save_stack+0x3c/0x68
[   25.805714]  kasan_save_track+0x20/0x40
[   25.806293]  kasan_save_alloc_info+0x40/0x58
[   25.806832]  __kasan_kmalloc+0xd4/0xd8
[   25.807299]  __kmalloc_cache_noprof+0x154/0x320
[   25.807916]  kasan_atomics+0xb8/0x2e8
[   25.808430]  kunit_try_run_case+0x170/0x3f0
[   25.808918]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.809616]  kthread+0x24c/0x2d0
[   25.810034]  ret_from_fork+0x10/0x20
[   25.810506] 
[   25.810830] The buggy address belongs to the object at fff00000c4205580
[   25.810830]  which belongs to the cache kmalloc-64 of size 64
[   25.812065] The buggy address is located 0 bytes to the right of
[   25.812065]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   25.813244] 
[   25.813557] The buggy address belongs to the physical page:
[   25.814087] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   25.814850] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.815652] page_type: f5(slab)
[   25.816165] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.817098] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.817861] page dumped because: kasan: bad access detected
[   25.818474] 
[   25.818772] Memory state around the buggy address:
[   25.819327]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.820058]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.820867] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.821481]                                      ^
[   25.822123]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.823084]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.823887] ==================================================================
[   25.292205] ==================================================================
[   25.293340] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3c8/0x49c8
[   25.294167] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   25.295623] 
[   25.296132] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   25.296341] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.296424] Hardware name: linux,dummy-virt (DT)
[   25.296513] Call trace:
[   25.296677]  dump_backtrace+0x9c/0x128
[   25.296864]  show_stack+0x20/0x38
[   25.296918]  dump_stack_lvl+0x8c/0xd0
[   25.296999]  print_report+0x118/0x5f0
[   25.297054]  kasan_report+0xdc/0x128
[   25.297099]  kasan_check_range+0x100/0x1a8
[   25.297149]  __kasan_check_write+0x20/0x30
[   25.297196]  kasan_atomics_helper+0x3c8/0x49c8
[   25.297250]  kasan_atomics+0x1a0/0x2e8
[   25.297298]  kunit_try_run_case+0x170/0x3f0
[   25.297346]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.297402]  kthread+0x24c/0x2d0
[   25.297449]  ret_from_fork+0x10/0x20
[   25.297500] 
[   25.305600] Allocated by task 253:
[   25.306051]  kasan_save_stack+0x3c/0x68
[   25.306644]  kasan_save_track+0x20/0x40
[   25.308271]  kasan_save_alloc_info+0x40/0x58
[   25.309057]  __kasan_kmalloc+0xd4/0xd8
[   25.309620]  __kmalloc_cache_noprof+0x154/0x320
[   25.310232]  kasan_atomics+0xb8/0x2e8
[   25.310729]  kunit_try_run_case+0x170/0x3f0
[   25.311302]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.311941]  kthread+0x24c/0x2d0
[   25.312382]  ret_from_fork+0x10/0x20
[   25.312935] 
[   25.313546] The buggy address belongs to the object at fff00000c4205580
[   25.313546]  which belongs to the cache kmalloc-64 of size 64
[   25.314702] The buggy address is located 0 bytes to the right of
[   25.314702]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   25.316453] 
[   25.316816] The buggy address belongs to the physical page:
[   25.317454] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   25.318178] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.318890] page_type: f5(slab)
[   25.319650] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.320705] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.321648] page dumped because: kasan: bad access detected
[   25.322290] 
[   25.322640] Memory state around the buggy address:
[   25.323237]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.324318]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.324646] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.325154]                                      ^
[   25.325661]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.326425]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.327159] ==================================================================
[   25.890441] ==================================================================
[   25.891258] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb28/0x49c8
[   25.892126] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   25.892889] 
[   25.893277] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   25.893489] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.893576] Hardware name: linux,dummy-virt (DT)
[   25.893673] Call trace:
[   25.893743]  dump_backtrace+0x9c/0x128
[   25.893868]  show_stack+0x20/0x38
[   25.893998]  dump_stack_lvl+0x8c/0xd0
[   25.894119]  print_report+0x118/0x5f0
[   25.894243]  kasan_report+0xdc/0x128
[   25.894356]  kasan_check_range+0x100/0x1a8
[   25.894475]  __kasan_check_write+0x20/0x30
[   25.894597]  kasan_atomics_helper+0xb28/0x49c8
[   25.894728]  kasan_atomics+0x1a0/0x2e8
[   25.894816]  kunit_try_run_case+0x170/0x3f0
[   25.894866]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.894923]  kthread+0x24c/0x2d0
[   25.895009]  ret_from_fork+0x10/0x20
[   25.895067] 
[   25.901824] Allocated by task 253:
[   25.902228]  kasan_save_stack+0x3c/0x68
[   25.902781]  kasan_save_track+0x20/0x40
[   25.903369]  kasan_save_alloc_info+0x40/0x58
[   25.904019]  __kasan_kmalloc+0xd4/0xd8
[   25.904504]  __kmalloc_cache_noprof+0x154/0x320
[   25.905058]  kasan_atomics+0xb8/0x2e8
[   25.905665]  kunit_try_run_case+0x170/0x3f0
[   25.906251]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.906871]  kthread+0x24c/0x2d0
[   25.907376]  ret_from_fork+0x10/0x20
[   25.907886] 
[   25.908213] The buggy address belongs to the object at fff00000c4205580
[   25.908213]  which belongs to the cache kmalloc-64 of size 64
[   25.909412] The buggy address is located 0 bytes to the right of
[   25.909412]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   25.910574] 
[   25.910848] The buggy address belongs to the physical page:
[   25.911484] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   25.912398] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.913130] page_type: f5(slab)
[   25.913603] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.914374] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   25.915179] page dumped because: kasan: bad access detected
[   25.915816] 
[   25.916145] Memory state around the buggy address:
[   25.916627]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.917514]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.918229] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.919036]                                      ^
[   25.919568]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.920361]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.921109] ==================================================================
[   26.514701] ==================================================================
[   26.516182] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10d8/0x49c8
[   26.516932] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.517695] 
[   26.518262] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.518525] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.518637] Hardware name: linux,dummy-virt (DT)
[   26.518729] Call trace:
[   26.518802]  dump_backtrace+0x9c/0x128
[   26.518941]  show_stack+0x20/0x38
[   26.519089]  dump_stack_lvl+0x8c/0xd0
[   26.519197]  print_report+0x118/0x5f0
[   26.519253]  kasan_report+0xdc/0x128
[   26.519300]  kasan_check_range+0x100/0x1a8
[   26.519350]  __kasan_check_write+0x20/0x30
[   26.519401]  kasan_atomics_helper+0x10d8/0x49c8
[   26.519455]  kasan_atomics+0x1a0/0x2e8
[   26.519505]  kunit_try_run_case+0x170/0x3f0
[   26.519554]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.519609]  kthread+0x24c/0x2d0
[   26.519660]  ret_from_fork+0x10/0x20
[   26.519711] 
[   26.526884] Allocated by task 253:
[   26.527519]  kasan_save_stack+0x3c/0x68
[   26.528097]  kasan_save_track+0x20/0x40
[   26.528644]  kasan_save_alloc_info+0x40/0x58
[   26.529320]  __kasan_kmalloc+0xd4/0xd8
[   26.529765]  __kmalloc_cache_noprof+0x154/0x320
[   26.530565]  kasan_atomics+0xb8/0x2e8
[   26.531044]  kunit_try_run_case+0x170/0x3f0
[   26.531728]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.532462]  kthread+0x24c/0x2d0
[   26.533037]  ret_from_fork+0x10/0x20
[   26.533589] 
[   26.534017] The buggy address belongs to the object at fff00000c4205580
[   26.534017]  which belongs to the cache kmalloc-64 of size 64
[   26.535158] The buggy address is located 0 bytes to the right of
[   26.535158]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.536438] 
[   26.536799] The buggy address belongs to the physical page:
[   26.537479] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.538390] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.539041] page_type: f5(slab)
[   26.539440] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.540561] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.541533] page dumped because: kasan: bad access detected
[   26.542149] 
[   26.542690] Memory state around the buggy address:
[   26.543589]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.544452]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.545287] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.546142]                                      ^
[   26.546848]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.547593]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.548491] ==================================================================
[   26.619144] ==================================================================
[   26.619714] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x121c/0x49c8
[   26.620854] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.622425] 
[   26.623059] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.623281] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.623366] Hardware name: linux,dummy-virt (DT)
[   26.623447] Call trace:
[   26.623516]  dump_backtrace+0x9c/0x128
[   26.623630]  show_stack+0x20/0x38
[   26.623734]  dump_stack_lvl+0x8c/0xd0
[   26.623856]  print_report+0x118/0x5f0
[   26.624066]  kasan_report+0xdc/0x128
[   26.624172]  kasan_check_range+0x100/0x1a8
[   26.624227]  __kasan_check_write+0x20/0x30
[   26.624278]  kasan_atomics_helper+0x121c/0x49c8
[   26.624335]  kasan_atomics+0x1a0/0x2e8
[   26.624386]  kunit_try_run_case+0x170/0x3f0
[   26.624435]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.624491]  kthread+0x24c/0x2d0
[   26.624541]  ret_from_fork+0x10/0x20
[   26.624591] 
[   26.632326] Allocated by task 253:
[   26.632947]  kasan_save_stack+0x3c/0x68
[   26.633614]  kasan_save_track+0x20/0x40
[   26.634079]  kasan_save_alloc_info+0x40/0x58
[   26.634828]  __kasan_kmalloc+0xd4/0xd8
[   26.635504]  __kmalloc_cache_noprof+0x154/0x320
[   26.636217]  kasan_atomics+0xb8/0x2e8
[   26.636812]  kunit_try_run_case+0x170/0x3f0
[   26.637496]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.638090]  kthread+0x24c/0x2d0
[   26.638499]  ret_from_fork+0x10/0x20
[   26.638938] 
[   26.639679] The buggy address belongs to the object at fff00000c4205580
[   26.639679]  which belongs to the cache kmalloc-64 of size 64
[   26.640755] The buggy address is located 0 bytes to the right of
[   26.640755]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.642064] 
[   26.642383] The buggy address belongs to the physical page:
[   26.643032] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.643810] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.644576] page_type: f5(slab)
[   26.645158] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.645988] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.646755] page dumped because: kasan: bad access detected
[   26.647354] 
[   26.647691] Memory state around the buggy address:
[   26.648250]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.649011]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.649835] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.650500]                                      ^
[   26.650988]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.651541]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.652098] ==================================================================
[   26.099305] ==================================================================
[   26.100042] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd00/0x49c8
[   26.100740] Write of size 4 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.101469] 
[   26.102032] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.102275] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.102359] Hardware name: linux,dummy-virt (DT)
[   26.102452] Call trace:
[   26.102580]  dump_backtrace+0x9c/0x128
[   26.102736]  show_stack+0x20/0x38
[   26.102805]  dump_stack_lvl+0x8c/0xd0
[   26.102855]  print_report+0x118/0x5f0
[   26.102900]  kasan_report+0xdc/0x128
[   26.102946]  kasan_check_range+0x100/0x1a8
[   26.103030]  __kasan_check_write+0x20/0x30
[   26.103085]  kasan_atomics_helper+0xd00/0x49c8
[   26.103139]  kasan_atomics+0x1a0/0x2e8
[   26.103187]  kunit_try_run_case+0x170/0x3f0
[   26.103234]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.103290]  kthread+0x24c/0x2d0
[   26.103338]  ret_from_fork+0x10/0x20
[   26.103388] 
[   26.111312] Allocated by task 253:
[   26.111850]  kasan_save_stack+0x3c/0x68
[   26.112514]  kasan_save_track+0x20/0x40
[   26.113159]  kasan_save_alloc_info+0x40/0x58
[   26.113921]  __kasan_kmalloc+0xd4/0xd8
[   26.114579]  __kmalloc_cache_noprof+0x154/0x320
[   26.115396]  kasan_atomics+0xb8/0x2e8
[   26.115945]  kunit_try_run_case+0x170/0x3f0
[   26.116418]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.117057]  kthread+0x24c/0x2d0
[   26.117627]  ret_from_fork+0x10/0x20
[   26.118139] 
[   26.118660] The buggy address belongs to the object at fff00000c4205580
[   26.118660]  which belongs to the cache kmalloc-64 of size 64
[   26.119909] The buggy address is located 0 bytes to the right of
[   26.119909]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.121367] 
[   26.121736] The buggy address belongs to the physical page:
[   26.122480] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.123436] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.124271] page_type: f5(slab)
[   26.124793] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.125682] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.126522] page dumped because: kasan: bad access detected
[   26.127225] 
[   26.127570] Memory state around the buggy address:
[   26.128313]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.129135]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.130005] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.130792]                                      ^
[   26.131444]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.132278]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.133109] ==================================================================
[   26.889659] ==================================================================
[   26.890422] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1584/0x49c8
[   26.891182] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   26.892124] 
[   26.892512] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   26.892719] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.892851] Hardware name: linux,dummy-virt (DT)
[   26.892943] Call trace:
[   26.893069]  dump_backtrace+0x9c/0x128
[   26.893197]  show_stack+0x20/0x38
[   26.893317]  dump_stack_lvl+0x8c/0xd0
[   26.893419]  print_report+0x118/0x5f0
[   26.893473]  kasan_report+0xdc/0x128
[   26.893523]  kasan_check_range+0x100/0x1a8
[   26.893577]  __kasan_check_write+0x20/0x30
[   26.893628]  kasan_atomics_helper+0x1584/0x49c8
[   26.893683]  kasan_atomics+0x1a0/0x2e8
[   26.893735]  kunit_try_run_case+0x170/0x3f0
[   26.893784]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.893841]  kthread+0x24c/0x2d0
[   26.893892]  ret_from_fork+0x10/0x20
[   26.893940] 
[   26.901219] Allocated by task 253:
[   26.901675]  kasan_save_stack+0x3c/0x68
[   26.902435]  kasan_save_track+0x20/0x40
[   26.903112]  kasan_save_alloc_info+0x40/0x58
[   26.903756]  __kasan_kmalloc+0xd4/0xd8
[   26.904404]  __kmalloc_cache_noprof+0x154/0x320
[   26.905017]  kasan_atomics+0xb8/0x2e8
[   26.905619]  kunit_try_run_case+0x170/0x3f0
[   26.906227]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.906980]  kthread+0x24c/0x2d0
[   26.907482]  ret_from_fork+0x10/0x20
[   26.908011] 
[   26.908345] The buggy address belongs to the object at fff00000c4205580
[   26.908345]  which belongs to the cache kmalloc-64 of size 64
[   26.909604] The buggy address is located 0 bytes to the right of
[   26.909604]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   26.910780] 
[   26.911117] The buggy address belongs to the physical page:
[   26.911702] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   26.912539] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.913378] page_type: f5(slab)
[   26.913982] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   26.914811] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   26.915659] page dumped because: kasan: bad access detected
[   26.916244] 
[   26.916602] Memory state around the buggy address:
[   26.917220]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.918008]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.918729] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.919635]                                      ^
[   26.920335]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.921237]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.922030] ==================================================================
[   27.170141] ==================================================================
[   27.170681] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1810/0x49c8
[   27.171614] Write of size 8 at addr fff00000c42055b0 by task kunit_try_catch/253
[   27.172374] 
[   27.172703] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   27.172885] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.172978] Hardware name: linux,dummy-virt (DT)
[   27.173058] Call trace:
[   27.173111]  dump_backtrace+0x9c/0x128
[   27.173214]  show_stack+0x20/0x38
[   27.173306]  dump_stack_lvl+0x8c/0xd0
[   27.173406]  print_report+0x118/0x5f0
[   27.173516]  kasan_report+0xdc/0x128
[   27.173638]  kasan_check_range+0x100/0x1a8
[   27.173754]  __kasan_check_write+0x20/0x30
[   27.173877]  kasan_atomics_helper+0x1810/0x49c8
[   27.174025]  kasan_atomics+0x1a0/0x2e8
[   27.174152]  kunit_try_run_case+0x170/0x3f0
[   27.174282]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.174423]  kthread+0x24c/0x2d0
[   27.174548]  ret_from_fork+0x10/0x20
[   27.174670] 
[   27.181251] Allocated by task 253:
[   27.181775]  kasan_save_stack+0x3c/0x68
[   27.182332]  kasan_save_track+0x20/0x40
[   27.182873]  kasan_save_alloc_info+0x40/0x58
[   27.183523]  __kasan_kmalloc+0xd4/0xd8
[   27.184037]  __kmalloc_cache_noprof+0x154/0x320
[   27.184543]  kasan_atomics+0xb8/0x2e8
[   27.185113]  kunit_try_run_case+0x170/0x3f0
[   27.185656]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.186352]  kthread+0x24c/0x2d0
[   27.186760]  ret_from_fork+0x10/0x20
[   27.187320] 
[   27.187656] The buggy address belongs to the object at fff00000c4205580
[   27.187656]  which belongs to the cache kmalloc-64 of size 64
[   27.188745] The buggy address is located 0 bytes to the right of
[   27.188745]  allocated 48-byte region [fff00000c4205580, fff00000c42055b0)
[   27.190002] 
[   27.190336] The buggy address belongs to the physical page:
[   27.191084] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104205
[   27.191894] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.192707] page_type: f5(slab)
[   27.193241] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   27.193916] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   27.194748] page dumped because: kasan: bad access detected
[   27.195419] 
[   27.195752] Memory state around the buggy address:
[   27.196276]  fff00000c4205480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.197163]  fff00000c4205500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.197930] >fff00000c4205580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.198631]                                      ^
[   27.199400]  fff00000c4205600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.199916]  fff00000c4205680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.200802] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   24.719945] ==================================================================
[   24.721111] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1e4/0xc08
[   24.721849] Write of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249
[   24.722787] 
[   24.723193] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.723415] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.723495] Hardware name: linux,dummy-virt (DT)
[   24.724009] Call trace:
[   24.724087]  dump_backtrace+0x9c/0x128
[   24.724248]  show_stack+0x20/0x38
[   24.724366]  dump_stack_lvl+0x8c/0xd0
[   24.724475]  print_report+0x118/0x5f0
[   24.724529]  kasan_report+0xdc/0x128
[   24.724577]  kasan_check_range+0x100/0x1a8
[   24.724627]  __kasan_check_write+0x20/0x30
[   24.724677]  kasan_bitops_test_and_modify.constprop.0+0x1e4/0xc08
[   24.724742]  kasan_bitops_generic+0x120/0x1d0
[   24.724808]  kunit_try_run_case+0x170/0x3f0
[   24.724861]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.724920]  kthread+0x24c/0x2d0
[   24.724996]  ret_from_fork+0x10/0x20
[   24.725055] 
[   24.732343] Allocated by task 249:
[   24.733197]  kasan_save_stack+0x3c/0x68
[   24.734510]  kasan_save_track+0x20/0x40
[   24.735115]  kasan_save_alloc_info+0x40/0x58
[   24.736452]  __kasan_kmalloc+0xd4/0xd8
[   24.737123]  __kmalloc_cache_noprof+0x154/0x320
[   24.737831]  kasan_bitops_generic+0xa0/0x1d0
[   24.738405]  kunit_try_run_case+0x170/0x3f0
[   24.739038]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.740160]  kthread+0x24c/0x2d0
[   24.740557]  ret_from_fork+0x10/0x20
[   24.740985] 
[   24.741557] The buggy address belongs to the object at fff00000c662ada0
[   24.741557]  which belongs to the cache kmalloc-16 of size 16
[   24.743156] The buggy address is located 8 bytes inside of
[   24.743156]  allocated 9-byte region [fff00000c662ada0, fff00000c662ada9)
[   24.744861] 
[   24.745323] The buggy address belongs to the physical page:
[   24.745850] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a
[   24.746873] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.748068] page_type: f5(slab)
[   24.748552] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   24.749286] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.749923] page dumped because: kasan: bad access detected
[   24.750598] 
[   24.750881] Memory state around the buggy address:
[   24.751932]  fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc
[   24.752709]  fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.753662] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.754508]                                   ^
[   24.755209]  fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.756203]  fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.756841] ==================================================================
[   24.643452] ==================================================================
[   24.644523] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x104/0xc08
[   24.645372] Write of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249
[   24.646276] 
[   24.646703] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.646979] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.647065] Hardware name: linux,dummy-virt (DT)
[   24.647164] Call trace:
[   24.647239]  dump_backtrace+0x9c/0x128
[   24.647460]  show_stack+0x20/0x38
[   24.647578]  dump_stack_lvl+0x8c/0xd0
[   24.647694]  print_report+0x118/0x5f0
[   24.647801]  kasan_report+0xdc/0x128
[   24.647906]  kasan_check_range+0x100/0x1a8
[   24.648038]  __kasan_check_write+0x20/0x30
[   24.648153]  kasan_bitops_test_and_modify.constprop.0+0x104/0xc08
[   24.648298]  kasan_bitops_generic+0x120/0x1d0
[   24.648421]  kunit_try_run_case+0x170/0x3f0
[   24.648549]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.648684]  kthread+0x24c/0x2d0
[   24.648811]  ret_from_fork+0x10/0x20
[   24.648914] 
[   24.657162] Allocated by task 249:
[   24.657623]  kasan_save_stack+0x3c/0x68
[   24.658218]  kasan_save_track+0x20/0x40
[   24.658803]  kasan_save_alloc_info+0x40/0x58
[   24.659524]  __kasan_kmalloc+0xd4/0xd8
[   24.659974]  __kmalloc_cache_noprof+0x154/0x320
[   24.660710]  kasan_bitops_generic+0xa0/0x1d0
[   24.661989]  kunit_try_run_case+0x170/0x3f0
[   24.662866]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.664030]  kthread+0x24c/0x2d0
[   24.664504]  ret_from_fork+0x10/0x20
[   24.665064] 
[   24.665401] The buggy address belongs to the object at fff00000c662ada0
[   24.665401]  which belongs to the cache kmalloc-16 of size 16
[   24.666571] The buggy address is located 8 bytes inside of
[   24.666571]  allocated 9-byte region [fff00000c662ada0, fff00000c662ada9)
[   24.667889] 
[   24.668377] The buggy address belongs to the physical page:
[   24.668982] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a
[   24.669912] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.670533] page_type: f5(slab)
[   24.671059] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   24.671923] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.673065] page dumped because: kasan: bad access detected
[   24.673722] 
[   24.674208] Memory state around the buggy address:
[   24.675153]  fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc
[   24.676060]  fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.677293] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.678005]                                   ^
[   24.678559]  fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.679398]  fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.680633] ==================================================================
[   24.866075] ==================================================================
[   24.866770] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x34c/0xc08
[   24.867795] Write of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249
[   24.868553] 
[   24.868889] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.869128] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.869215] Hardware name: linux,dummy-virt (DT)
[   24.869313] Call trace:
[   24.869392]  dump_backtrace+0x9c/0x128
[   24.869521]  show_stack+0x20/0x38
[   24.869641]  dump_stack_lvl+0x8c/0xd0
[   24.869764]  print_report+0x118/0x5f0
[   24.869888]  kasan_report+0xdc/0x128
[   24.870027]  kasan_check_range+0x100/0x1a8
[   24.870151]  __kasan_check_write+0x20/0x30
[   24.870280]  kasan_bitops_test_and_modify.constprop.0+0x34c/0xc08
[   24.870426]  kasan_bitops_generic+0x120/0x1d0
[   24.870496]  kunit_try_run_case+0x170/0x3f0
[   24.870548]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.870605]  kthread+0x24c/0x2d0
[   24.870652]  ret_from_fork+0x10/0x20
[   24.870706] 
[   24.877504] Allocated by task 249:
[   24.877902]  kasan_save_stack+0x3c/0x68
[   24.878569]  kasan_save_track+0x20/0x40
[   24.879222]  kasan_save_alloc_info+0x40/0x58
[   24.879684]  __kasan_kmalloc+0xd4/0xd8
[   24.880196]  __kmalloc_cache_noprof+0x154/0x320
[   24.880911]  kasan_bitops_generic+0xa0/0x1d0
[   24.881634]  kunit_try_run_case+0x170/0x3f0
[   24.882163]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.882832]  kthread+0x24c/0x2d0
[   24.883263]  ret_from_fork+0x10/0x20
[   24.883850] 
[   24.884166] The buggy address belongs to the object at fff00000c662ada0
[   24.884166]  which belongs to the cache kmalloc-16 of size 16
[   24.885326] The buggy address is located 8 bytes inside of
[   24.885326]  allocated 9-byte region [fff00000c662ada0, fff00000c662ada9)
[   24.886411] 
[   24.886742] The buggy address belongs to the physical page:
[   24.887301] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a
[   24.888232] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.888973] page_type: f5(slab)
[   24.889404] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   24.890772] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.892509] page dumped because: kasan: bad access detected
[   24.892987] 
[   24.893224] Memory state around the buggy address:
[   24.893613]  fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc
[   24.896196]  fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.898474] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.900356]                                   ^
[   24.901662]  fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.902562]  fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.903423] ==================================================================
[   24.832928] ==================================================================
[   24.833764] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xb14/0xc08
[   24.835173] Read of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249
[   24.836045] 
[   24.836390] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.836637] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.836728] Hardware name: linux,dummy-virt (DT)
[   24.836872] Call trace:
[   24.836946]  dump_backtrace+0x9c/0x128
[   24.837088]  show_stack+0x20/0x38
[   24.837256]  dump_stack_lvl+0x8c/0xd0
[   24.837426]  print_report+0x118/0x5f0
[   24.837545]  kasan_report+0xdc/0x128
[   24.837645]  __asan_report_load8_noabort+0x20/0x30
[   24.837703]  kasan_bitops_test_and_modify.constprop.0+0xb14/0xc08
[   24.837766]  kasan_bitops_generic+0x120/0x1d0
[   24.837820]  kunit_try_run_case+0x170/0x3f0
[   24.837869]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.837924]  kthread+0x24c/0x2d0
[   24.837997]  ret_from_fork+0x10/0x20
[   24.838055] 
[   24.845000] Allocated by task 249:
[   24.845435]  kasan_save_stack+0x3c/0x68
[   24.846041]  kasan_save_track+0x20/0x40
[   24.846671]  kasan_save_alloc_info+0x40/0x58
[   24.847273]  __kasan_kmalloc+0xd4/0xd8
[   24.847850]  __kmalloc_cache_noprof+0x154/0x320
[   24.848562]  kasan_bitops_generic+0xa0/0x1d0
[   24.849140]  kunit_try_run_case+0x170/0x3f0
[   24.849727]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.850448]  kthread+0x24c/0x2d0
[   24.851021]  ret_from_fork+0x10/0x20
[   24.851540] 
[   24.851862] The buggy address belongs to the object at fff00000c662ada0
[   24.851862]  which belongs to the cache kmalloc-16 of size 16
[   24.853140] The buggy address is located 8 bytes inside of
[   24.853140]  allocated 9-byte region [fff00000c662ada0, fff00000c662ada9)
[   24.854354] 
[   24.854726] The buggy address belongs to the physical page:
[   24.855282] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a
[   24.856231] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.857088] page_type: f5(slab)
[   24.857549] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   24.858334] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.859163] page dumped because: kasan: bad access detected
[   24.859782] 
[   24.860120] Memory state around the buggy address:
[   24.860652]  fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc
[   24.861415]  fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.862133] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.862836]                                   ^
[   24.863443]  fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.864129]  fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.864912] ==================================================================
[   24.682181] ==================================================================
[   24.682908] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xc08
[   24.685051] Read of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249
[   24.686325] 
[   24.686697] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.686899] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.686941] Hardware name: linux,dummy-virt (DT)
[   24.687085] Call trace:
[   24.687159]  dump_backtrace+0x9c/0x128
[   24.687281]  show_stack+0x20/0x38
[   24.687414]  dump_stack_lvl+0x8c/0xd0
[   24.687543]  print_report+0x118/0x5f0
[   24.687656]  kasan_report+0xdc/0x128
[   24.687734]  __asan_report_load8_noabort+0x20/0x30
[   24.687790]  kasan_bitops_test_and_modify.constprop.0+0xa48/0xc08
[   24.687853]  kasan_bitops_generic+0x120/0x1d0
[   24.687906]  kunit_try_run_case+0x170/0x3f0
[   24.687956]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.688045]  kthread+0x24c/0x2d0
[   24.688093]  ret_from_fork+0x10/0x20
[   24.688143] 
[   24.695501] Allocated by task 249:
[   24.696236]  kasan_save_stack+0x3c/0x68
[   24.696848]  kasan_save_track+0x20/0x40
[   24.697490]  kasan_save_alloc_info+0x40/0x58
[   24.698132]  __kasan_kmalloc+0xd4/0xd8
[   24.698692]  __kmalloc_cache_noprof+0x154/0x320
[   24.699342]  kasan_bitops_generic+0xa0/0x1d0
[   24.699923]  kunit_try_run_case+0x170/0x3f0
[   24.700809]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.701432]  kthread+0x24c/0x2d0
[   24.701779]  ret_from_fork+0x10/0x20
[   24.702451] 
[   24.702780] The buggy address belongs to the object at fff00000c662ada0
[   24.702780]  which belongs to the cache kmalloc-16 of size 16
[   24.705025] The buggy address is located 8 bytes inside of
[   24.705025]  allocated 9-byte region [fff00000c662ada0, fff00000c662ada9)
[   24.706270] 
[   24.706646] The buggy address belongs to the physical page:
[   24.707233] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a
[   24.708357] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.709491] page_type: f5(slab)
[   24.710007] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   24.710886] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.712025] page dumped because: kasan: bad access detected
[   24.713024] 
[   24.713385] Memory state around the buggy address:
[   24.713979]  fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc
[   24.714693]  fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.715415] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.716666]                                   ^
[   24.717337]  fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.718091]  fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.718795] ==================================================================
[   24.905932] ==================================================================
[   24.906985] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xc08
[   24.908320] Read of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249
[   24.909039] 
[   24.909266] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.909368] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.909404] Hardware name: linux,dummy-virt (DT)
[   24.909444] Call trace:
[   24.909474]  dump_backtrace+0x9c/0x128
[   24.909527]  show_stack+0x20/0x38
[   24.909573]  dump_stack_lvl+0x8c/0xd0
[   24.909625]  print_report+0x118/0x5f0
[   24.909672]  kasan_report+0xdc/0x128
[   24.909717]  __asan_report_load8_noabort+0x20/0x30
[   24.909770]  kasan_bitops_test_and_modify.constprop.0+0xa84/0xc08
[   24.909831]  kasan_bitops_generic+0x120/0x1d0
[   24.909886]  kunit_try_run_case+0x170/0x3f0
[   24.909935]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.910401]  kthread+0x24c/0x2d0
[   24.910595]  ret_from_fork+0x10/0x20
[   24.910715] 
[   24.917919] Allocated by task 249:
[   24.918370]  kasan_save_stack+0x3c/0x68
[   24.918912]  kasan_save_track+0x20/0x40
[   24.919517]  kasan_save_alloc_info+0x40/0x58
[   24.920159]  __kasan_kmalloc+0xd4/0xd8
[   24.920780]  __kmalloc_cache_noprof+0x154/0x320
[   24.921392]  kasan_bitops_generic+0xa0/0x1d0
[   24.921928]  kunit_try_run_case+0x170/0x3f0
[   24.922481]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.923128]  kthread+0x24c/0x2d0
[   24.923589]  ret_from_fork+0x10/0x20
[   24.924126] 
[   24.924451] The buggy address belongs to the object at fff00000c662ada0
[   24.924451]  which belongs to the cache kmalloc-16 of size 16
[   24.925700] The buggy address is located 8 bytes inside of
[   24.925700]  allocated 9-byte region [fff00000c662ada0, fff00000c662ada9)
[   24.926747] 
[   24.927091] The buggy address belongs to the physical page:
[   24.927689] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a
[   24.928484] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.929274] page_type: f5(slab)
[   24.929758] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   24.930576] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.931031] page dumped because: kasan: bad access detected
[   24.931467] 
[   24.932049] Memory state around the buggy address:
[   24.932827]  fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc
[   24.933545]  fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.934292] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.935109]                                   ^
[   24.935694]  fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.936467]  fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.937240] ==================================================================
[   24.797572] ==================================================================
[   24.798296] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x26c/0xc08
[   24.799053] Write of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249
[   24.800063] 
[   24.800360] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.800583] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.800671] Hardware name: linux,dummy-virt (DT)
[   24.800777] Call trace:
[   24.800866]  dump_backtrace+0x9c/0x128
[   24.801021]  show_stack+0x20/0x38
[   24.801166]  dump_stack_lvl+0x8c/0xd0
[   24.801294]  print_report+0x118/0x5f0
[   24.801412]  kasan_report+0xdc/0x128
[   24.801526]  kasan_check_range+0x100/0x1a8
[   24.801635]  __kasan_check_write+0x20/0x30
[   24.801734]  kasan_bitops_test_and_modify.constprop.0+0x26c/0xc08
[   24.801861]  kasan_bitops_generic+0x120/0x1d0
[   24.802029]  kunit_try_run_case+0x170/0x3f0
[   24.802187]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.802340]  kthread+0x24c/0x2d0
[   24.802483]  ret_from_fork+0x10/0x20
[   24.802587] 
[   24.810682] Allocated by task 249:
[   24.811250]  kasan_save_stack+0x3c/0x68
[   24.811709]  kasan_save_track+0x20/0x40
[   24.812223]  kasan_save_alloc_info+0x40/0x58
[   24.813003]  __kasan_kmalloc+0xd4/0xd8
[   24.813840]  __kmalloc_cache_noprof+0x154/0x320
[   24.814426]  kasan_bitops_generic+0xa0/0x1d0
[   24.814891]  kunit_try_run_case+0x170/0x3f0
[   24.815551]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.816355]  kthread+0x24c/0x2d0
[   24.816952]  ret_from_fork+0x10/0x20
[   24.817561] 
[   24.817931] The buggy address belongs to the object at fff00000c662ada0
[   24.817931]  which belongs to the cache kmalloc-16 of size 16
[   24.819173] The buggy address is located 8 bytes inside of
[   24.819173]  allocated 9-byte region [fff00000c662ada0, fff00000c662ada9)
[   24.820474] 
[   24.820851] The buggy address belongs to the physical page:
[   24.821528] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a
[   24.822388] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.823203] page_type: f5(slab)
[   24.823708] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   24.824560] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.825317] page dumped because: kasan: bad access detected
[   24.826024] 
[   24.826401] Memory state around the buggy address:
[   24.827013]  fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc
[   24.827805]  fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.828617] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.829420]                                   ^
[   24.830015]  fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.830800]  fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.831528] ==================================================================
[   24.938759] ==================================================================
[   24.939389] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xc08
[   24.940356] Read of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249
[   24.942042] 
[   24.942599] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.942846] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.942931] Hardware name: linux,dummy-virt (DT)
[   24.943011] Call trace:
[   24.943043]  dump_backtrace+0x9c/0x128
[   24.943100]  show_stack+0x20/0x38
[   24.943146]  dump_stack_lvl+0x8c/0xd0
[   24.943198]  print_report+0x118/0x5f0
[   24.943246]  kasan_report+0xdc/0x128
[   24.943291]  __asan_report_load8_noabort+0x20/0x30
[   24.943344]  kasan_bitops_test_and_modify.constprop.0+0xacc/0xc08
[   24.943407]  kasan_bitops_generic+0x120/0x1d0
[   24.943461]  kunit_try_run_case+0x170/0x3f0
[   24.943510]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.943567]  kthread+0x24c/0x2d0
[   24.943613]  ret_from_fork+0x10/0x20
[   24.943664] 
[   24.951219] Allocated by task 249:
[   24.951873]  kasan_save_stack+0x3c/0x68
[   24.952449]  kasan_save_track+0x20/0x40
[   24.953155]  kasan_save_alloc_info+0x40/0x58
[   24.953747]  __kasan_kmalloc+0xd4/0xd8
[   24.954518]  __kmalloc_cache_noprof+0x154/0x320
[   24.955153]  kasan_bitops_generic+0xa0/0x1d0
[   24.955890]  kunit_try_run_case+0x170/0x3f0
[   24.956482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.957165]  kthread+0x24c/0x2d0
[   24.957657]  ret_from_fork+0x10/0x20
[   24.958208] 
[   24.958538] The buggy address belongs to the object at fff00000c662ada0
[   24.958538]  which belongs to the cache kmalloc-16 of size 16
[   24.959812] The buggy address is located 8 bytes inside of
[   24.959812]  allocated 9-byte region [fff00000c662ada0, fff00000c662ada9)
[   24.961106] 
[   24.961389] The buggy address belongs to the physical page:
[   24.962011] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a
[   24.962793] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.963491] page_type: f5(slab)
[   24.963907] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   24.964846] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.965717] page dumped because: kasan: bad access detected
[   24.966358] 
[   24.966681] Memory state around the buggy address:
[   24.967301]  fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc
[   24.968065]  fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.968826] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.969627]                                   ^
[   24.970188]  fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.970942]  fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.971690] ==================================================================
[   24.758223] ==================================================================
[   24.758820] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa90/0xc08
[   24.759922] Read of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249
[   24.760749] 
[   24.761358] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.761570] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.761649] Hardware name: linux,dummy-virt (DT)
[   24.761740] Call trace:
[   24.761845]  dump_backtrace+0x9c/0x128
[   24.761982]  show_stack+0x20/0x38
[   24.762098]  dump_stack_lvl+0x8c/0xd0
[   24.762292]  print_report+0x118/0x5f0
[   24.762411]  kasan_report+0xdc/0x128
[   24.762526]  __asan_report_load8_noabort+0x20/0x30
[   24.762653]  kasan_bitops_test_and_modify.constprop.0+0xa90/0xc08
[   24.762750]  kasan_bitops_generic+0x120/0x1d0
[   24.762805]  kunit_try_run_case+0x170/0x3f0
[   24.762854]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.762910]  kthread+0x24c/0x2d0
[   24.762955]  ret_from_fork+0x10/0x20
[   24.763038] 
[   24.772788] Allocated by task 249:
[   24.773548]  kasan_save_stack+0x3c/0x68
[   24.774026]  kasan_save_track+0x20/0x40
[   24.774435]  kasan_save_alloc_info+0x40/0x58
[   24.775158]  __kasan_kmalloc+0xd4/0xd8
[   24.776221]  __kmalloc_cache_noprof+0x154/0x320
[   24.776779]  kasan_bitops_generic+0xa0/0x1d0
[   24.777429]  kunit_try_run_case+0x170/0x3f0
[   24.778063]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.778770]  kthread+0x24c/0x2d0
[   24.779319]  ret_from_fork+0x10/0x20
[   24.780010] 
[   24.780524] The buggy address belongs to the object at fff00000c662ada0
[   24.780524]  which belongs to the cache kmalloc-16 of size 16
[   24.782067] The buggy address is located 8 bytes inside of
[   24.782067]  allocated 9-byte region [fff00000c662ada0, fff00000c662ada9)
[   24.783950] 
[   24.784472] The buggy address belongs to the physical page:
[   24.785663] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a
[   24.786624] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.787433] page_type: f5(slab)
[   24.787941] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   24.788839] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.789592] page dumped because: kasan: bad access detected
[   24.790183] 
[   24.790521] Memory state around the buggy address:
[   24.791091]  fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc
[   24.791954]  fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.792859] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.793667]                                   ^
[   24.794315]  fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.795110]  fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.795979] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[   24.407630] ==================================================================
[   24.408793] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2c4/0xbf8
[   24.409497] Write of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249
[   24.410233] 
[   24.411487] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.411699] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.411782] Hardware name: linux,dummy-virt (DT)
[   24.411866] Call trace:
[   24.411936]  dump_backtrace+0x9c/0x128
[   24.412066]  show_stack+0x20/0x38
[   24.412146]  dump_stack_lvl+0x8c/0xd0
[   24.412199]  print_report+0x118/0x5f0
[   24.412245]  kasan_report+0xdc/0x128
[   24.412289]  kasan_check_range+0x100/0x1a8
[   24.412339]  __kasan_check_write+0x20/0x30
[   24.412386]  kasan_bitops_modify.constprop.0+0x2c4/0xbf8
[   24.412445]  kasan_bitops_generic+0x114/0x1d0
[   24.412498]  kunit_try_run_case+0x170/0x3f0
[   24.412544]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.412601]  kthread+0x24c/0x2d0
[   24.412645]  ret_from_fork+0x10/0x20
[   24.412693] 
[   24.421275] Allocated by task 249:
[   24.421933]  kasan_save_stack+0x3c/0x68
[   24.422664]  kasan_save_track+0x20/0x40
[   24.423219]  kasan_save_alloc_info+0x40/0x58
[   24.424140]  __kasan_kmalloc+0xd4/0xd8
[   24.424781]  __kmalloc_cache_noprof+0x154/0x320
[   24.425404]  kasan_bitops_generic+0xa0/0x1d0
[   24.426076]  kunit_try_run_case+0x170/0x3f0
[   24.426683]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.427230]  kthread+0x24c/0x2d0
[   24.428088]  ret_from_fork+0x10/0x20
[   24.428616] 
[   24.429133] The buggy address belongs to the object at fff00000c662ada0
[   24.429133]  which belongs to the cache kmalloc-16 of size 16
[   24.430444] The buggy address is located 8 bytes inside of
[   24.430444]  allocated 9-byte region [fff00000c662ada0, fff00000c662ada9)
[   24.431570] 
[   24.431867] The buggy address belongs to the physical page:
[   24.432582] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a
[   24.433537] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.434239] page_type: f5(slab)
[   24.434813] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   24.435664] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.436644] page dumped because: kasan: bad access detected
[   24.437461] 
[   24.437852] Memory state around the buggy address:
[   24.438364]  fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc
[   24.439262]  fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.440148] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.440945]                                   ^
[   24.441607]  fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.443007]  fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.443989] ==================================================================
[   24.290286] ==================================================================
[   24.291061] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbf8
[   24.292009] Read of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249
[   24.292920] 
[   24.293345] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.293554] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.293701] Hardware name: linux,dummy-virt (DT)
[   24.293786] Call trace:
[   24.293863]  dump_backtrace+0x9c/0x128
[   24.294002]  show_stack+0x20/0x38
[   24.294156]  dump_stack_lvl+0x8c/0xd0
[   24.294279]  print_report+0x118/0x5f0
[   24.294397]  kasan_report+0xdc/0x128
[   24.294513]  __asan_report_load8_noabort+0x20/0x30
[   24.294674]  kasan_bitops_modify.constprop.0+0xa80/0xbf8
[   24.294819]  kasan_bitops_generic+0x114/0x1d0
[   24.294926]  kunit_try_run_case+0x170/0x3f0
[   24.295004]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.295068]  kthread+0x24c/0x2d0
[   24.295116]  ret_from_fork+0x10/0x20
[   24.295168] 
[   24.302099] Allocated by task 249:
[   24.302496]  kasan_save_stack+0x3c/0x68
[   24.303071]  kasan_save_track+0x20/0x40
[   24.304050]  kasan_save_alloc_info+0x40/0x58
[   24.304642]  __kasan_kmalloc+0xd4/0xd8
[   24.305204]  __kmalloc_cache_noprof+0x154/0x320
[   24.305822]  kasan_bitops_generic+0xa0/0x1d0
[   24.307208]  kunit_try_run_case+0x170/0x3f0
[   24.308353]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.309141]  kthread+0x24c/0x2d0
[   24.309681]  ret_from_fork+0x10/0x20
[   24.310165] 
[   24.310453] The buggy address belongs to the object at fff00000c662ada0
[   24.310453]  which belongs to the cache kmalloc-16 of size 16
[   24.311757] The buggy address is located 8 bytes inside of
[   24.311757]  allocated 9-byte region [fff00000c662ada0, fff00000c662ada9)
[   24.313479] 
[   24.313881] The buggy address belongs to the physical page:
[   24.314544] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a
[   24.315544] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.316398] page_type: f5(slab)
[   24.316609] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   24.316994] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.318222] page dumped because: kasan: bad access detected
[   24.318945] 
[   24.319253] Memory state around the buggy address:
[   24.319810]  fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc
[   24.320497]  fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.321885] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.322611]                                   ^
[   24.323153]  fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.324314]  fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.325012] ==================================================================
[   24.251155] ==================================================================
[   24.252916] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x104/0xbf8
[   24.254147] Write of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249
[   24.255270] 
[   24.255600] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.255851] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.255931] Hardware name: linux,dummy-virt (DT)
[   24.256036] Call trace:
[   24.256097]  dump_backtrace+0x9c/0x128
[   24.256205]  show_stack+0x20/0x38
[   24.256307]  dump_stack_lvl+0x8c/0xd0
[   24.256405]  print_report+0x118/0x5f0
[   24.256510]  kasan_report+0xdc/0x128
[   24.256625]  kasan_check_range+0x100/0x1a8
[   24.256743]  __kasan_check_write+0x20/0x30
[   24.256855]  kasan_bitops_modify.constprop.0+0x104/0xbf8
[   24.256918]  kasan_bitops_generic+0x114/0x1d0
[   24.257019]  kunit_try_run_case+0x170/0x3f0
[   24.257082]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.257137]  kthread+0x24c/0x2d0
[   24.257183]  ret_from_fork+0x10/0x20
[   24.257234] 
[   24.266936] Allocated by task 249:
[   24.267316]  kasan_save_stack+0x3c/0x68
[   24.268419]  kasan_save_track+0x20/0x40
[   24.268909]  kasan_save_alloc_info+0x40/0x58
[   24.269403]  __kasan_kmalloc+0xd4/0xd8
[   24.269854]  __kmalloc_cache_noprof+0x154/0x320
[   24.270375]  kasan_bitops_generic+0xa0/0x1d0
[   24.270938]  kunit_try_run_case+0x170/0x3f0
[   24.271482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.272372]  kthread+0x24c/0x2d0
[   24.272812]  ret_from_fork+0x10/0x20
[   24.273221] 
[   24.273437] The buggy address belongs to the object at fff00000c662ada0
[   24.273437]  which belongs to the cache kmalloc-16 of size 16
[   24.274351] The buggy address is located 8 bytes inside of
[   24.274351]  allocated 9-byte region [fff00000c662ada0, fff00000c662ada9)
[   24.276700] 
[   24.277181] The buggy address belongs to the physical page:
[   24.277980] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a
[   24.278894] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.279650] page_type: f5(slab)
[   24.280101] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   24.280811] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.281694] page dumped because: kasan: bad access detected
[   24.282320] 
[   24.282653] Memory state around the buggy address:
[   24.283797]  fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc
[   24.284592]  fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.285353] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.286334]                                   ^
[   24.286894]  fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.287670]  fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.288630] ==================================================================
[   24.365688] ==================================================================
[   24.367157] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xabc/0xbf8
[   24.369372] Read of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249
[   24.370516] 
[   24.370955] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.371289] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.371372] Hardware name: linux,dummy-virt (DT)
[   24.371461] Call trace:
[   24.371524]  dump_backtrace+0x9c/0x128
[   24.371633]  show_stack+0x20/0x38
[   24.371729]  dump_stack_lvl+0x8c/0xd0
[   24.373289]  print_report+0x118/0x5f0
[   24.373386]  kasan_report+0xdc/0x128
[   24.373480]  __asan_report_load8_noabort+0x20/0x30
[   24.373582]  kasan_bitops_modify.constprop.0+0xabc/0xbf8
[   24.373708]  kasan_bitops_generic+0x114/0x1d0
[   24.373835]  kunit_try_run_case+0x170/0x3f0
[   24.373994]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.374092]  kthread+0x24c/0x2d0
[   24.374143]  ret_from_fork+0x10/0x20
[   24.374193] 
[   24.383342] Allocated by task 249:
[   24.384026]  kasan_save_stack+0x3c/0x68
[   24.384588]  kasan_save_track+0x20/0x40
[   24.385260]  kasan_save_alloc_info+0x40/0x58
[   24.386052]  __kasan_kmalloc+0xd4/0xd8
[   24.386616]  __kmalloc_cache_noprof+0x154/0x320
[   24.387292]  kasan_bitops_generic+0xa0/0x1d0
[   24.388020]  kunit_try_run_case+0x170/0x3f0
[   24.388665]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.389528]  kthread+0x24c/0x2d0
[   24.390059]  ret_from_fork+0x10/0x20
[   24.390706] 
[   24.391192] The buggy address belongs to the object at fff00000c662ada0
[   24.391192]  which belongs to the cache kmalloc-16 of size 16
[   24.392650] The buggy address is located 8 bytes inside of
[   24.392650]  allocated 9-byte region [fff00000c662ada0, fff00000c662ada9)
[   24.393824] 
[   24.394165] The buggy address belongs to the physical page:
[   24.394828] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a
[   24.395860] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.396565] page_type: f5(slab)
[   24.397064] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   24.397806] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.398780] page dumped because: kasan: bad access detected
[   24.399587] 
[   24.400012] Memory state around the buggy address:
[   24.400613]  fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc
[   24.401486]  fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.402298] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.403078]                                   ^
[   24.403771]  fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.404735]  fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.405783] ==================================================================
[   24.559742] ==================================================================
[   24.560507] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3c8/0xbf8
[   24.562205] Write of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249
[   24.563026] 
[   24.563369] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.563878] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.563984] Hardware name: linux,dummy-virt (DT)
[   24.564085] Call trace:
[   24.564156]  dump_backtrace+0x9c/0x128
[   24.564281]  show_stack+0x20/0x38
[   24.564402]  dump_stack_lvl+0x8c/0xd0
[   24.564522]  print_report+0x118/0x5f0
[   24.564600]  kasan_report+0xdc/0x128
[   24.564649]  kasan_check_range+0x100/0x1a8
[   24.564699]  __kasan_check_write+0x20/0x30
[   24.564746]  kasan_bitops_modify.constprop.0+0x3c8/0xbf8
[   24.564816]  kasan_bitops_generic+0x114/0x1d0
[   24.564869]  kunit_try_run_case+0x170/0x3f0
[   24.564916]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.565000]  kthread+0x24c/0x2d0
[   24.565052]  ret_from_fork+0x10/0x20
[   24.565102] 
[   24.572729] Allocated by task 249:
[   24.573586]  kasan_save_stack+0x3c/0x68
[   24.574184]  kasan_save_track+0x20/0x40
[   24.574641]  kasan_save_alloc_info+0x40/0x58
[   24.575237]  __kasan_kmalloc+0xd4/0xd8
[   24.576653]  __kmalloc_cache_noprof+0x154/0x320
[   24.577270]  kasan_bitops_generic+0xa0/0x1d0
[   24.577798]  kunit_try_run_case+0x170/0x3f0
[   24.578354]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.578976]  kthread+0x24c/0x2d0
[   24.579781]  ret_from_fork+0x10/0x20
[   24.580329] 
[   24.580659] The buggy address belongs to the object at fff00000c662ada0
[   24.580659]  which belongs to the cache kmalloc-16 of size 16
[   24.581787] The buggy address is located 8 bytes inside of
[   24.581787]  allocated 9-byte region [fff00000c662ada0, fff00000c662ada9)
[   24.583009] 
[   24.583312] The buggy address belongs to the physical page:
[   24.584014] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a
[   24.584878] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.586545] page_type: f5(slab)
[   24.586998] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   24.587952] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.588761] page dumped because: kasan: bad access detected
[   24.589400] 
[   24.589724] Memory state around the buggy address:
[   24.590933]  fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc
[   24.591874]  fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.592731] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.593609]                                   ^
[   24.594176]  fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.595113]  fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.596135] ==================================================================
[   24.326397] ==================================================================
[   24.327354] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1e4/0xbf8
[   24.328496] Write of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249
[   24.329384] 
[   24.329731] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.329937] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.330031] Hardware name: linux,dummy-virt (DT)
[   24.330119] Call trace:
[   24.330179]  dump_backtrace+0x9c/0x128
[   24.330283]  show_stack+0x20/0x38
[   24.330378]  dump_stack_lvl+0x8c/0xd0
[   24.330492]  print_report+0x118/0x5f0
[   24.330607]  kasan_report+0xdc/0x128
[   24.330719]  kasan_check_range+0x100/0x1a8
[   24.330777]  __kasan_check_write+0x20/0x30
[   24.330829]  kasan_bitops_modify.constprop.0+0x1e4/0xbf8
[   24.330889]  kasan_bitops_generic+0x114/0x1d0
[   24.330946]  kunit_try_run_case+0x170/0x3f0
[   24.331150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.331283]  kthread+0x24c/0x2d0
[   24.331415]  ret_from_fork+0x10/0x20
[   24.331539] 
[   24.340187] Allocated by task 249:
[   24.340802]  kasan_save_stack+0x3c/0x68
[   24.341256]  kasan_save_track+0x20/0x40
[   24.341800]  kasan_save_alloc_info+0x40/0x58
[   24.342516]  __kasan_kmalloc+0xd4/0xd8
[   24.343282]  __kmalloc_cache_noprof+0x154/0x320
[   24.344103]  kasan_bitops_generic+0xa0/0x1d0
[   24.344709]  kunit_try_run_case+0x170/0x3f0
[   24.345475]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.346323]  kthread+0x24c/0x2d0
[   24.346877]  ret_from_fork+0x10/0x20
[   24.347557] 
[   24.347922] The buggy address belongs to the object at fff00000c662ada0
[   24.347922]  which belongs to the cache kmalloc-16 of size 16
[   24.349998] The buggy address is located 8 bytes inside of
[   24.349998]  allocated 9-byte region [fff00000c662ada0, fff00000c662ada9)
[   24.351544] 
[   24.351896] The buggy address belongs to the physical page:
[   24.352747] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a
[   24.354163] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.355296] page_type: f5(slab)
[   24.355813] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   24.356431] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.357014] page dumped because: kasan: bad access detected
[   24.357629] 
[   24.358000] Memory state around the buggy address:
[   24.358680]  fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc
[   24.359532]  fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.360717] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.361914]                                   ^
[   24.362242]  fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.362563]  fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.362871] ==================================================================
[   24.483082] ==================================================================
[   24.483716] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xb28/0xbf8
[   24.484955] Read of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249
[   24.485540] 
[   24.485799] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.486038] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.486196] Hardware name: linux,dummy-virt (DT)
[   24.486451] Call trace:
[   24.486693]  dump_backtrace+0x9c/0x128
[   24.486820]  show_stack+0x20/0x38
[   24.486935]  dump_stack_lvl+0x8c/0xd0
[   24.487075]  print_report+0x118/0x5f0
[   24.487189]  kasan_report+0xdc/0x128
[   24.487286]  __asan_report_load8_noabort+0x20/0x30
[   24.487345]  kasan_bitops_modify.constprop.0+0xb28/0xbf8
[   24.487467]  kasan_bitops_generic+0x114/0x1d0
[   24.487587]  kunit_try_run_case+0x170/0x3f0
[   24.487701]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.487823]  kthread+0x24c/0x2d0
[   24.487926]  ret_from_fork+0x10/0x20
[   24.488048] 
[   24.496697] Allocated by task 249:
[   24.497738]  kasan_save_stack+0x3c/0x68
[   24.498273]  kasan_save_track+0x20/0x40
[   24.498851]  kasan_save_alloc_info+0x40/0x58
[   24.499493]  __kasan_kmalloc+0xd4/0xd8
[   24.500404]  __kmalloc_cache_noprof+0x154/0x320
[   24.501024]  kasan_bitops_generic+0xa0/0x1d0
[   24.501649]  kunit_try_run_case+0x170/0x3f0
[   24.502221]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.502887]  kthread+0x24c/0x2d0
[   24.503555]  ret_from_fork+0x10/0x20
[   24.504051] 
[   24.505146] The buggy address belongs to the object at fff00000c662ada0
[   24.505146]  which belongs to the cache kmalloc-16 of size 16
[   24.506141] The buggy address is located 8 bytes inside of
[   24.506141]  allocated 9-byte region [fff00000c662ada0, fff00000c662ada9)
[   24.507638] 
[   24.508008] The buggy address belongs to the physical page:
[   24.508887] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a
[   24.509693] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.510448] page_type: f5(slab)
[   24.510973] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   24.512358] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.513210] page dumped because: kasan: bad access detected
[   24.513828] 
[   24.514162] Memory state around the buggy address:
[   24.514804]  fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc
[   24.515942]  fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.516694] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.517431]                                   ^
[   24.518052]  fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.518888]  fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.520578] ==================================================================
[   24.446653] ==================================================================
[   24.447238] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x334/0xbf8
[   24.448360] Write of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249
[   24.449496] 
[   24.449764] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.449978] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.450064] Hardware name: linux,dummy-virt (DT)
[   24.450157] Call trace:
[   24.450229]  dump_backtrace+0x9c/0x128
[   24.450353]  show_stack+0x20/0x38
[   24.450467]  dump_stack_lvl+0x8c/0xd0
[   24.450589]  print_report+0x118/0x5f0
[   24.450652]  kasan_report+0xdc/0x128
[   24.450699]  kasan_check_range+0x100/0x1a8
[   24.450747]  __kasan_check_write+0x20/0x30
[   24.450798]  kasan_bitops_modify.constprop.0+0x334/0xbf8
[   24.450858]  kasan_bitops_generic+0x114/0x1d0
[   24.450911]  kunit_try_run_case+0x170/0x3f0
[   24.450986]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.451050]  kthread+0x24c/0x2d0
[   24.451101]  ret_from_fork+0x10/0x20
[   24.451153] 
[   24.459234] Allocated by task 249:
[   24.459894]  kasan_save_stack+0x3c/0x68
[   24.460561]  kasan_save_track+0x20/0x40
[   24.461207]  kasan_save_alloc_info+0x40/0x58
[   24.461756]  __kasan_kmalloc+0xd4/0xd8
[   24.462336]  __kmalloc_cache_noprof+0x154/0x320
[   24.462918]  kasan_bitops_generic+0xa0/0x1d0
[   24.464383]  kunit_try_run_case+0x170/0x3f0
[   24.464809]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.465498]  kthread+0x24c/0x2d0
[   24.466025]  ret_from_fork+0x10/0x20
[   24.466589] 
[   24.466972] The buggy address belongs to the object at fff00000c662ada0
[   24.466972]  which belongs to the cache kmalloc-16 of size 16
[   24.467917] The buggy address is located 8 bytes inside of
[   24.467917]  allocated 9-byte region [fff00000c662ada0, fff00000c662ada9)
[   24.469539] 
[   24.469872] The buggy address belongs to the physical page:
[   24.470545] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a
[   24.471520] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.472298] page_type: f5(slab)
[   24.472865] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   24.473802] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.474578] page dumped because: kasan: bad access detected
[   24.475171] 
[   24.475820] Memory state around the buggy address:
[   24.476455]  fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc
[   24.477198]  fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.477900] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.478724]                                   ^
[   24.479300]  fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.480281]  fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.481023] ==================================================================
[   24.521781] ==================================================================
[   24.522495] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x358/0xbf8
[   24.523359] Write of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249
[   24.524519] 
[   24.524851] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.525079] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.525163] Hardware name: linux,dummy-virt (DT)
[   24.525256] Call trace:
[   24.525329]  dump_backtrace+0x9c/0x128
[   24.525453]  show_stack+0x20/0x38
[   24.525565]  dump_stack_lvl+0x8c/0xd0
[   24.525692]  print_report+0x118/0x5f0
[   24.525806]  kasan_report+0xdc/0x128
[   24.525925]  kasan_check_range+0x100/0x1a8
[   24.526066]  __kasan_check_write+0x20/0x30
[   24.526194]  kasan_bitops_modify.constprop.0+0x358/0xbf8
[   24.526330]  kasan_bitops_generic+0x114/0x1d0
[   24.526424]  kunit_try_run_case+0x170/0x3f0
[   24.526476]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.526530]  kthread+0x24c/0x2d0
[   24.526576]  ret_from_fork+0x10/0x20
[   24.526626] 
[   24.535049] Allocated by task 249:
[   24.535784]  kasan_save_stack+0x3c/0x68
[   24.536668]  kasan_save_track+0x20/0x40
[   24.537710]  kasan_save_alloc_info+0x40/0x58
[   24.538441]  __kasan_kmalloc+0xd4/0xd8
[   24.539029]  __kmalloc_cache_noprof+0x154/0x320
[   24.539956]  kasan_bitops_generic+0xa0/0x1d0
[   24.540458]  kunit_try_run_case+0x170/0x3f0
[   24.541089]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.541904]  kthread+0x24c/0x2d0
[   24.542403]  ret_from_fork+0x10/0x20
[   24.542912] 
[   24.543225] The buggy address belongs to the object at fff00000c662ada0
[   24.543225]  which belongs to the cache kmalloc-16 of size 16
[   24.544704] The buggy address is located 8 bytes inside of
[   24.544704]  allocated 9-byte region [fff00000c662ada0, fff00000c662ada9)
[   24.546296] 
[   24.546612] The buggy address belongs to the physical page:
[   24.547558] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a
[   24.548751] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.549586] page_type: f5(slab)
[   24.550006] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   24.550742] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.551466] page dumped because: kasan: bad access detected
[   24.551984] 
[   24.552915] Memory state around the buggy address:
[   24.553628]  fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc
[   24.554371]  fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.555051] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.556424]                                   ^
[   24.556824]  fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.557900]  fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.558618] ==================================================================
[   24.598144] ==================================================================
[   24.598767] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa5c/0xbf8
[   24.600165] Read of size 8 at addr fff00000c662ada8 by task kunit_try_catch/249
[   24.601000] 
[   24.601522] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.601745] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.601884] Hardware name: linux,dummy-virt (DT)
[   24.602022] Call trace:
[   24.602095]  dump_backtrace+0x9c/0x128
[   24.602155]  show_stack+0x20/0x38
[   24.602199]  dump_stack_lvl+0x8c/0xd0
[   24.602253]  print_report+0x118/0x5f0
[   24.602302]  kasan_report+0xdc/0x128
[   24.602350]  __asan_report_load8_noabort+0x20/0x30
[   24.602404]  kasan_bitops_modify.constprop.0+0xa5c/0xbf8
[   24.602462]  kasan_bitops_generic+0x114/0x1d0
[   24.602515]  kunit_try_run_case+0x170/0x3f0
[   24.602565]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.602622]  kthread+0x24c/0x2d0
[   24.602669]  ret_from_fork+0x10/0x20
[   24.602719] 
[   24.610865] Allocated by task 249:
[   24.611294]  kasan_save_stack+0x3c/0x68
[   24.611995]  kasan_save_track+0x20/0x40
[   24.613325]  kasan_save_alloc_info+0x40/0x58
[   24.613931]  __kasan_kmalloc+0xd4/0xd8
[   24.614572]  __kmalloc_cache_noprof+0x154/0x320
[   24.615288]  kasan_bitops_generic+0xa0/0x1d0
[   24.616259]  kunit_try_run_case+0x170/0x3f0
[   24.616969]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.617672]  kthread+0x24c/0x2d0
[   24.618219]  ret_from_fork+0x10/0x20
[   24.618852] 
[   24.619085] The buggy address belongs to the object at fff00000c662ada0
[   24.619085]  which belongs to the cache kmalloc-16 of size 16
[   24.621123] The buggy address is located 8 bytes inside of
[   24.621123]  allocated 9-byte region [fff00000c662ada0, fff00000c662ada9)
[   24.622464] 
[   24.622858] The buggy address belongs to the physical page:
[   24.623887] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a
[   24.624556] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.625189] page_type: f5(slab)
[   24.625588] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   24.627067] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   24.627646] page dumped because: kasan: bad access detected
[   24.629168] 
[   24.630056] Memory state around the buggy address:
[   24.631366]  fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc
[   24.633668]  fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.636459] >fff00000c662ad80: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   24.637896]                                   ^
[   24.639784]  fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.640929]  fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.642180] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen
[   24.197934] ==================================================================
[   24.199329] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88
[   24.200120] Read of size 1 at addr fff00000c41f1950 by task kunit_try_catch/247
[   24.201656] 
[   24.202155] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.202377] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.202458] Hardware name: linux,dummy-virt (DT)
[   24.202505] Call trace:
[   24.202535]  dump_backtrace+0x9c/0x128
[   24.202592]  show_stack+0x20/0x38
[   24.202637]  dump_stack_lvl+0x8c/0xd0
[   24.202686]  print_report+0x118/0x5f0
[   24.202732]  kasan_report+0xdc/0x128
[   24.202778]  __asan_report_load1_noabort+0x20/0x30
[   24.202831]  strnlen+0x80/0x88
[   24.202878]  kasan_strings+0x398/0x938
[   24.202925]  kunit_try_run_case+0x170/0x3f0
[   24.203001]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.203065]  kthread+0x24c/0x2d0
[   24.203111]  ret_from_fork+0x10/0x20
[   24.203161] 
[   24.211891] Allocated by task 247:
[   24.212981]  kasan_save_stack+0x3c/0x68
[   24.214094]  kasan_save_track+0x20/0x40
[   24.214709]  kasan_save_alloc_info+0x40/0x58
[   24.215140]  __kasan_kmalloc+0xd4/0xd8
[   24.216090]  __kmalloc_cache_noprof+0x154/0x320
[   24.216945]  kasan_strings+0xb0/0x938
[   24.217514]  kunit_try_run_case+0x170/0x3f0
[   24.218136]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.218809]  kthread+0x24c/0x2d0
[   24.219316]  ret_from_fork+0x10/0x20
[   24.220329] 
[   24.220476] Freed by task 247:
[   24.220657]  kasan_save_stack+0x3c/0x68
[   24.220896]  kasan_save_track+0x20/0x40
[   24.221294]  kasan_save_free_info+0x4c/0x78
[   24.221863]  __kasan_slab_free+0x6c/0x98
[   24.222638]  kfree+0x110/0x3b8
[   24.223067]  kasan_strings+0x128/0x938
[   24.223759]  kunit_try_run_case+0x170/0x3f0
[   24.224354]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.225036]  kthread+0x24c/0x2d0
[   24.225502]  ret_from_fork+0x10/0x20
[   24.226375] 
[   24.226752] The buggy address belongs to the object at fff00000c41f1940
[   24.226752]  which belongs to the cache kmalloc-32 of size 32
[   24.228635] The buggy address is located 16 bytes inside of
[   24.228635]  freed 32-byte region [fff00000c41f1940, fff00000c41f1960)
[   24.229892] 
[   24.230298] The buggy address belongs to the physical page:
[   24.230871] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1041f1
[   24.231921] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.232939] page_type: f5(slab)
[   24.233497] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   24.234397] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   24.235193] page dumped because: kasan: bad access detected
[   24.236349] 
[   24.236746] Memory state around the buggy address:
[   24.237420]  fff00000c41f1800: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   24.238253]  fff00000c41f1880: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   24.239042] >fff00000c41f1900: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   24.240039]                                                  ^
[   24.241070]  fff00000c41f1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.241807]  fff00000c41f1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.242480] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen
[   24.154210] ==================================================================
[   24.154925] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   24.155711] Read of size 1 at addr fff00000c41f1950 by task kunit_try_catch/247
[   24.156438] 
[   24.156664] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.156774] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.156810] Hardware name: linux,dummy-virt (DT)
[   24.156849] Call trace:
[   24.156877]  dump_backtrace+0x9c/0x128
[   24.156935]  show_stack+0x20/0x38
[   24.157039]  dump_stack_lvl+0x8c/0xd0
[   24.157158]  print_report+0x118/0x5f0
[   24.157281]  kasan_report+0xdc/0x128
[   24.157397]  __asan_report_load1_noabort+0x20/0x30
[   24.157527]  strlen+0xa8/0xb0
[   24.157643]  kasan_strings+0x334/0x938
[   24.157771]  kunit_try_run_case+0x170/0x3f0
[   24.157893]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.158042]  kthread+0x24c/0x2d0
[   24.158157]  ret_from_fork+0x10/0x20
[   24.158275] 
[   24.166325] Allocated by task 247:
[   24.166817]  kasan_save_stack+0x3c/0x68
[   24.167281]  kasan_save_track+0x20/0x40
[   24.168035]  kasan_save_alloc_info+0x40/0x58
[   24.168654]  __kasan_kmalloc+0xd4/0xd8
[   24.169212]  __kmalloc_cache_noprof+0x154/0x320
[   24.169847]  kasan_strings+0xb0/0x938
[   24.170379]  kunit_try_run_case+0x170/0x3f0
[   24.170923]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.171666]  kthread+0x24c/0x2d0
[   24.172174]  ret_from_fork+0x10/0x20
[   24.172700] 
[   24.173037] Freed by task 247:
[   24.173464]  kasan_save_stack+0x3c/0x68
[   24.174930]  kasan_save_track+0x20/0x40
[   24.175343]  kasan_save_free_info+0x4c/0x78
[   24.176097]  __kasan_slab_free+0x6c/0x98
[   24.176622]  kfree+0x110/0x3b8
[   24.177509]  kasan_strings+0x128/0x938
[   24.177905]  kunit_try_run_case+0x170/0x3f0
[   24.178630]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.179423]  kthread+0x24c/0x2d0
[   24.180083]  ret_from_fork+0x10/0x20
[   24.180511] 
[   24.180797] The buggy address belongs to the object at fff00000c41f1940
[   24.180797]  which belongs to the cache kmalloc-32 of size 32
[   24.181887] The buggy address is located 16 bytes inside of
[   24.181887]  freed 32-byte region [fff00000c41f1940, fff00000c41f1960)
[   24.184130] 
[   24.184532] The buggy address belongs to the physical page:
[   24.185165] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1041f1
[   24.185898] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.186825] page_type: f5(slab)
[   24.187265] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   24.188521] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   24.189240] page dumped because: kasan: bad access detected
[   24.189988] 
[   24.190460] Memory state around the buggy address:
[   24.191173]  fff00000c41f1800: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   24.192155]  fff00000c41f1880: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   24.192876] >fff00000c41f1900: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   24.193606]                                                  ^
[   24.194205]  fff00000c41f1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.195127]  fff00000c41f1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.196205] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[   24.109226] ==================================================================
[   24.109996] BUG: KASAN: slab-use-after-free in kasan_strings+0x894/0x938
[   24.110698] Read of size 1 at addr fff00000c41f1950 by task kunit_try_catch/247
[   24.111463] 
[   24.112729] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.112980] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.113067] Hardware name: linux,dummy-virt (DT)
[   24.113159] Call trace:
[   24.113236]  dump_backtrace+0x9c/0x128
[   24.113355]  show_stack+0x20/0x38
[   24.113464]  dump_stack_lvl+0x8c/0xd0
[   24.113528]  print_report+0x118/0x5f0
[   24.113577]  kasan_report+0xdc/0x128
[   24.113627]  __asan_report_load1_noabort+0x20/0x30
[   24.113680]  kasan_strings+0x894/0x938
[   24.113730]  kunit_try_run_case+0x170/0x3f0
[   24.113778]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.113835]  kthread+0x24c/0x2d0
[   24.113883]  ret_from_fork+0x10/0x20
[   24.113934] 
[   24.121141] Allocated by task 247:
[   24.121549]  kasan_save_stack+0x3c/0x68
[   24.122322]  kasan_save_track+0x20/0x40
[   24.123544]  kasan_save_alloc_info+0x40/0x58
[   24.124397]  __kasan_kmalloc+0xd4/0xd8
[   24.125018]  __kmalloc_cache_noprof+0x154/0x320
[   24.125572]  kasan_strings+0xb0/0x938
[   24.126171]  kunit_try_run_case+0x170/0x3f0
[   24.126744]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.127462]  kthread+0x24c/0x2d0
[   24.128342]  ret_from_fork+0x10/0x20
[   24.128752] 
[   24.128936] Freed by task 247:
[   24.129488]  kasan_save_stack+0x3c/0x68
[   24.130074]  kasan_save_track+0x20/0x40
[   24.130617]  kasan_save_free_info+0x4c/0x78
[   24.131133]  __kasan_slab_free+0x6c/0x98
[   24.131577]  kfree+0x110/0x3b8
[   24.132068]  kasan_strings+0x128/0x938
[   24.133215]  kunit_try_run_case+0x170/0x3f0
[   24.133860]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.134545]  kthread+0x24c/0x2d0
[   24.135111]  ret_from_fork+0x10/0x20
[   24.136079] 
[   24.136444] The buggy address belongs to the object at fff00000c41f1940
[   24.136444]  which belongs to the cache kmalloc-32 of size 32
[   24.137895] The buggy address is located 16 bytes inside of
[   24.137895]  freed 32-byte region [fff00000c41f1940, fff00000c41f1960)
[   24.139007] 
[   24.139325] The buggy address belongs to the physical page:
[   24.140488] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1041f1
[   24.141300] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.142338] page_type: f5(slab)
[   24.142742] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   24.143799] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   24.145154] page dumped because: kasan: bad access detected
[   24.145897] 
[   24.146372] Memory state around the buggy address:
[   24.147070]  fff00000c41f1800: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   24.148070]  fff00000c41f1880: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   24.148807] >fff00000c41f1900: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   24.149516]                                                  ^
[   24.150229]  fff00000c41f1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.151020]  fff00000c41f1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.151867] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
[   24.058659] ==================================================================
[   24.059488] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   24.060074] Read of size 1 at addr fff00000c41f1950 by task kunit_try_catch/247
[   24.060839] 
[   24.061203] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.061784] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.061873] Hardware name: linux,dummy-virt (DT)
[   24.061984] Call trace:
[   24.062062]  dump_backtrace+0x9c/0x128
[   24.062193]  show_stack+0x20/0x38
[   24.062313]  dump_stack_lvl+0x8c/0xd0
[   24.062438]  print_report+0x118/0x5f0
[   24.062560]  kasan_report+0xdc/0x128
[   24.062683]  __asan_report_load1_noabort+0x20/0x30
[   24.062764]  strcmp+0xc0/0xc8
[   24.062812]  kasan_strings+0x254/0x938
[   24.062860]  kunit_try_run_case+0x170/0x3f0
[   24.062910]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.062992]  kthread+0x24c/0x2d0
[   24.063045]  ret_from_fork+0x10/0x20
[   24.063098] 
[   24.071052] Allocated by task 247:
[   24.071562]  kasan_save_stack+0x3c/0x68
[   24.072164]  kasan_save_track+0x20/0x40
[   24.072688]  kasan_save_alloc_info+0x40/0x58
[   24.073308]  __kasan_kmalloc+0xd4/0xd8
[   24.073888]  __kmalloc_cache_noprof+0x154/0x320
[   24.075295]  kasan_strings+0xb0/0x938
[   24.075861]  kunit_try_run_case+0x170/0x3f0
[   24.076402]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.077173]  kthread+0x24c/0x2d0
[   24.077667]  ret_from_fork+0x10/0x20
[   24.078281] 
[   24.078645] Freed by task 247:
[   24.079110]  kasan_save_stack+0x3c/0x68
[   24.080241]  kasan_save_track+0x20/0x40
[   24.080763]  kasan_save_free_info+0x4c/0x78
[   24.081703]  __kasan_slab_free+0x6c/0x98
[   24.082354]  kfree+0x110/0x3b8
[   24.082955]  kasan_strings+0x128/0x938
[   24.083476]  kunit_try_run_case+0x170/0x3f0
[   24.084364]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.084853]  kthread+0x24c/0x2d0
[   24.085191]  ret_from_fork+0x10/0x20
[   24.085533] 
[   24.085738] The buggy address belongs to the object at fff00000c41f1940
[   24.085738]  which belongs to the cache kmalloc-32 of size 32
[   24.086711] The buggy address is located 16 bytes inside of
[   24.086711]  freed 32-byte region [fff00000c41f1940, fff00000c41f1960)
[   24.088061] 
[   24.089049] The buggy address belongs to the physical page:
[   24.089747] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1041f1
[   24.090624] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.091408] page_type: f5(slab)
[   24.091909] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   24.094083] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   24.094626] page dumped because: kasan: bad access detected
[   24.095102] 
[   24.095331] Memory state around the buggy address:
[   24.098873]  fff00000c41f1800: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   24.100980]  fff00000c41f1880: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   24.103044] >fff00000c41f1900: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   24.105087]                                                  ^
[   24.105986]  fff00000c41f1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.106770]  fff00000c41f1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.107536] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strrchr
[   24.014843] ==================================================================
[   24.015992] BUG: KASAN: slab-use-after-free in strrchr+0x6c/0x78
[   24.016683] Read of size 1 at addr fff00000c41f1950 by task kunit_try_catch/247
[   24.018060] 
[   24.018396] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   24.018599] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.018685] Hardware name: linux,dummy-virt (DT)
[   24.018776] Call trace:
[   24.018847]  dump_backtrace+0x9c/0x128
[   24.018985]  show_stack+0x20/0x38
[   24.019106]  dump_stack_lvl+0x8c/0xd0
[   24.019230]  print_report+0x118/0x5f0
[   24.019350]  kasan_report+0xdc/0x128
[   24.019533]  __asan_report_load1_noabort+0x20/0x30
[   24.019654]  strrchr+0x6c/0x78
[   24.019757]  kasan_strings+0x1f0/0x938
[   24.019841]  kunit_try_run_case+0x170/0x3f0
[   24.019893]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.019951]  kthread+0x24c/0x2d0
[   24.020028]  ret_from_fork+0x10/0x20
[   24.020079] 
[   24.028201] Allocated by task 247:
[   24.028666]  kasan_save_stack+0x3c/0x68
[   24.029232]  kasan_save_track+0x20/0x40
[   24.029707]  kasan_save_alloc_info+0x40/0x58
[   24.030268]  __kasan_kmalloc+0xd4/0xd8
[   24.030795]  __kmalloc_cache_noprof+0x154/0x320
[   24.032223]  kasan_strings+0xb0/0x938
[   24.032607]  kunit_try_run_case+0x170/0x3f0
[   24.033154]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.033796]  kthread+0x24c/0x2d0
[   24.034278]  ret_from_fork+0x10/0x20
[   24.034734] 
[   24.035089] Freed by task 247:
[   24.035560]  kasan_save_stack+0x3c/0x68
[   24.036117]  kasan_save_track+0x20/0x40
[   24.036605]  kasan_save_free_info+0x4c/0x78
[   24.037566]  __kasan_slab_free+0x6c/0x98
[   24.038142]  kfree+0x110/0x3b8
[   24.038588]  kasan_strings+0x128/0x938
[   24.039078]  kunit_try_run_case+0x170/0x3f0
[   24.040286]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.040908]  kthread+0x24c/0x2d0
[   24.041435]  ret_from_fork+0x10/0x20
[   24.041920] 
[   24.042393] The buggy address belongs to the object at fff00000c41f1940
[   24.042393]  which belongs to the cache kmalloc-32 of size 32
[   24.043850] The buggy address is located 16 bytes inside of
[   24.043850]  freed 32-byte region [fff00000c41f1940, fff00000c41f1960)
[   24.044998] 
[   24.045326] The buggy address belongs to the physical page:
[   24.045910] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1041f1
[   24.046764] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.048105] page_type: f5(slab)
[   24.048516] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   24.049306] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   24.050058] page dumped because: kasan: bad access detected
[   24.050650] 
[   24.051000] Memory state around the buggy address:
[   24.051600]  fff00000c41f1800: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   24.052697]  fff00000c41f1880: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   24.053488] >fff00000c41f1900: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   24.054233]                                                  ^
[   24.054872]  fff00000c41f1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.055792]  fff00000c41f1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.056539] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strchr
[   23.970242] ==================================================================
[   23.971243] BUG: KASAN: slab-use-after-free in strchr+0xcc/0xd8
[   23.972323] Read of size 1 at addr fff00000c41f1950 by task kunit_try_catch/247
[   23.973080] 
[   23.973414] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   23.973584] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.973624] Hardware name: linux,dummy-virt (DT)
[   23.973672] Call trace:
[   23.974270]  dump_backtrace+0x9c/0x128
[   23.974405]  show_stack+0x20/0x38
[   23.974473]  dump_stack_lvl+0x8c/0xd0
[   23.974529]  print_report+0x118/0x5f0
[   23.974578]  kasan_report+0xdc/0x128
[   23.974625]  __asan_report_load1_noabort+0x20/0x30
[   23.974678]  strchr+0xcc/0xd8
[   23.974726]  kasan_strings+0x18c/0x938
[   23.974776]  kunit_try_run_case+0x170/0x3f0
[   23.974826]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.974883]  kthread+0x24c/0x2d0
[   23.974929]  ret_from_fork+0x10/0x20
[   23.975016] 
[   23.984332] Allocated by task 247:
[   23.984911]  kasan_save_stack+0x3c/0x68
[   23.985490]  kasan_save_track+0x20/0x40
[   23.986137]  kasan_save_alloc_info+0x40/0x58
[   23.986706]  __kasan_kmalloc+0xd4/0xd8
[   23.987241]  __kmalloc_cache_noprof+0x154/0x320
[   23.988790]  kasan_strings+0xb0/0x938
[   23.989433]  kunit_try_run_case+0x170/0x3f0
[   23.989849]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.990653]  kthread+0x24c/0x2d0
[   23.991203]  ret_from_fork+0x10/0x20
[   23.991984] 
[   23.992582] Freed by task 247:
[   23.993063]  kasan_save_stack+0x3c/0x68
[   23.993585]  kasan_save_track+0x20/0x40
[   23.994113]  kasan_save_free_info+0x4c/0x78
[   23.994643]  __kasan_slab_free+0x6c/0x98
[   23.995152]  kfree+0x110/0x3b8
[   23.995653]  kasan_strings+0x128/0x938
[   23.996145]  kunit_try_run_case+0x170/0x3f0
[   23.996731]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.998118]  kthread+0x24c/0x2d0
[   23.998612]  ret_from_fork+0x10/0x20
[   23.999079] 
[   23.999411] The buggy address belongs to the object at fff00000c41f1940
[   23.999411]  which belongs to the cache kmalloc-32 of size 32
[   24.000938] The buggy address is located 16 bytes inside of
[   24.000938]  freed 32-byte region [fff00000c41f1940, fff00000c41f1960)
[   24.002092] 
[   24.002398] The buggy address belongs to the physical page:
[   24.002943] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1041f1
[   24.004692] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.005426] page_type: f5(slab)
[   24.005905] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   24.006699] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   24.007762] page dumped because: kasan: bad access detected
[   24.008398] 
[   24.008718] Memory state around the buggy address:
[   24.009305]  fff00000c41f1800: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   24.010009]  fff00000c41f1880: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   24.010769] >fff00000c41f1900: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   24.011520]                                                  ^
[   24.012535]  fff00000c41f1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.012872]  fff00000c41f1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.013583] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[   23.924420] ==================================================================
[   23.925504] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   23.926324] Read of size 1 at addr fff00000c41f1818 by task kunit_try_catch/245
[   23.927162] 
[   23.927527] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   23.927746] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.927787] Hardware name: linux,dummy-virt (DT)
[   23.927830] Call trace:
[   23.927861]  dump_backtrace+0x9c/0x128
[   23.928540]  show_stack+0x20/0x38
[   23.928649]  dump_stack_lvl+0x8c/0xd0
[   23.928754]  print_report+0x118/0x5f0
[   23.928874]  kasan_report+0xdc/0x128
[   23.928985]  __asan_report_load1_noabort+0x20/0x30
[   23.929050]  memcmp+0x198/0x1d8
[   23.929096]  kasan_memcmp+0x170/0x310
[   23.929147]  kunit_try_run_case+0x170/0x3f0
[   23.929198]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.929255]  kthread+0x24c/0x2d0
[   23.929305]  ret_from_fork+0x10/0x20
[   23.929358] 
[   23.937476] Allocated by task 245:
[   23.938573]  kasan_save_stack+0x3c/0x68
[   23.939075]  kasan_save_track+0x20/0x40
[   23.940198]  kasan_save_alloc_info+0x40/0x58
[   23.940933]  __kasan_kmalloc+0xd4/0xd8
[   23.941591]  __kmalloc_cache_noprof+0x154/0x320
[   23.942307]  kasan_memcmp+0xbc/0x310
[   23.942933]  kunit_try_run_case+0x170/0x3f0
[   23.943659]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.944684]  kthread+0x24c/0x2d0
[   23.945623]  ret_from_fork+0x10/0x20
[   23.946288] 
[   23.946600] The buggy address belongs to the object at fff00000c41f1800
[   23.946600]  which belongs to the cache kmalloc-32 of size 32
[   23.947885] The buggy address is located 0 bytes to the right of
[   23.947885]  allocated 24-byte region [fff00000c41f1800, fff00000c41f1818)
[   23.949562] 
[   23.949946] The buggy address belongs to the physical page:
[   23.950569] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1041f1
[   23.951671] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.952856] page_type: f5(slab)
[   23.953326] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   23.954237] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   23.954955] page dumped because: kasan: bad access detected
[   23.955712] 
[   23.956104] Memory state around the buggy address:
[   23.956816]  fff00000c41f1700: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   23.957579]  fff00000c41f1780: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   23.958335] >fff00000c41f1800: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.959072]                             ^
[   23.959567]  fff00000c41f1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.960325]  fff00000c41f1900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.961632] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memchr
[   23.879032] ==================================================================
[   23.880238] BUG: KASAN: slab-out-of-bounds in memchr+0x78/0x88
[   23.881206] Read of size 1 at addr fff00000c41f1758 by task kunit_try_catch/243
[   23.882020] 
[   23.882517] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   23.882737] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.882822] Hardware name: linux,dummy-virt (DT)
[   23.882928] Call trace:
[   23.883031]  dump_backtrace+0x9c/0x128
[   23.883136]  show_stack+0x20/0x38
[   23.883188]  dump_stack_lvl+0x8c/0xd0
[   23.883239]  print_report+0x118/0x5f0
[   23.883331]  kasan_report+0xdc/0x128
[   23.883439]  __asan_report_load1_noabort+0x20/0x30
[   23.883555]  memchr+0x78/0x88
[   23.883655]  kasan_memchr+0x150/0x2f0
[   23.883750]  kunit_try_run_case+0x170/0x3f0
[   23.883854]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.883992]  kthread+0x24c/0x2d0
[   23.884265]  ret_from_fork+0x10/0x20
[   23.884323] 
[   23.891690] Allocated by task 243:
[   23.892757]  kasan_save_stack+0x3c/0x68
[   23.893811]  kasan_save_track+0x20/0x40
[   23.894385]  kasan_save_alloc_info+0x40/0x58
[   23.895052]  __kasan_kmalloc+0xd4/0xd8
[   23.895851]  __kmalloc_cache_noprof+0x154/0x320
[   23.896491]  kasan_memchr+0xb0/0x2f0
[   23.897062]  kunit_try_run_case+0x170/0x3f0
[   23.897648]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.898341]  kthread+0x24c/0x2d0
[   23.898861]  ret_from_fork+0x10/0x20
[   23.899403] 
[   23.900239] The buggy address belongs to the object at fff00000c41f1740
[   23.900239]  which belongs to the cache kmalloc-32 of size 32
[   23.901735] The buggy address is located 0 bytes to the right of
[   23.901735]  allocated 24-byte region [fff00000c41f1740, fff00000c41f1758)
[   23.902985] 
[   23.903269] The buggy address belongs to the physical page:
[   23.904358] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1041f1
[   23.905445] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.906286] page_type: f5(slab)
[   23.906736] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   23.907871] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   23.909435] page dumped because: kasan: bad access detected
[   23.909939] 
[   23.910509] Memory state around the buggy address:
[   23.911311]  fff00000c41f1600: 00 00 07 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   23.912186]  fff00000c41f1680: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   23.912901] >fff00000c41f1700: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   23.913578]                                                     ^
[   23.914218]  fff00000c41f1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.914910]  fff00000c41f1800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.916495] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[   23.844039] ==================================================================
[   23.845263] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2e4/0x348
[   23.846023] Read of size 1 at addr ffff800080bd7bea by task kunit_try_catch/241
[   23.846694] 
[   23.847054] CPU: 0 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   23.847260] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.847337] Hardware name: linux,dummy-virt (DT)
[   23.847572] Call trace:
[   23.847648]  dump_backtrace+0x9c/0x128
[   23.847768]  show_stack+0x20/0x38
[   23.847877]  dump_stack_lvl+0x8c/0xd0
[   23.848012]  print_report+0x310/0x5f0
[   23.848127]  kasan_report+0xdc/0x128
[   23.848190]  __asan_report_load1_noabort+0x20/0x30
[   23.848243]  kasan_alloca_oob_right+0x2e4/0x348
[   23.848295]  kunit_try_run_case+0x170/0x3f0
[   23.848343]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.848396]  kthread+0x24c/0x2d0
[   23.848443]  ret_from_fork+0x10/0x20
[   23.848489] 
[   23.856640] The buggy address belongs to stack of task kunit_try_catch/241
[   23.857434] 
[   23.857823] The buggy address belongs to the virtual mapping at
[   23.857823]  [ffff800080bd0000, ffff800080bd9000) created by:
[   23.857823]  kernel_clone+0x150/0x7a8
[   23.858861] 
[   23.859074] The buggy address belongs to the physical page:
[   23.860306] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1041e7
[   23.861272] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.862073] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   23.863035] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.863981] page dumped because: kasan: bad access detected
[   23.864853] 
[   23.865178] Memory state around the buggy address:
[   23.865726]  ffff800080bd7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.866548]  ffff800080bd7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.867408] >ffff800080bd7b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   23.868256]                                                           ^
[   23.869419]  ffff800080bd7c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2
[   23.870299]  ffff800080bd7c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00
[   23.871073] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[   23.801203] ==================================================================
[   23.801755] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2c0/0x318
[   23.802247] Read of size 1 at addr ffff800080bc7bdf by task kunit_try_catch/239
[   23.804132] 
[   23.804456] CPU: 0 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   23.804661] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.804785] Hardware name: linux,dummy-virt (DT)
[   23.805070] Call trace:
[   23.805133]  dump_backtrace+0x9c/0x128
[   23.805271]  show_stack+0x20/0x38
[   23.805381]  dump_stack_lvl+0x8c/0xd0
[   23.805481]  print_report+0x310/0x5f0
[   23.805588]  kasan_report+0xdc/0x128
[   23.805653]  __asan_report_load1_noabort+0x20/0x30
[   23.805706]  kasan_alloca_oob_left+0x2c0/0x318
[   23.805755]  kunit_try_run_case+0x170/0x3f0
[   23.805802]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.805855]  kthread+0x24c/0x2d0
[   23.805902]  ret_from_fork+0x10/0x20
[   23.805950] 
[   23.814662] The buggy address belongs to stack of task kunit_try_catch/239
[   23.815613] 
[   23.815955] The buggy address belongs to the virtual mapping at
[   23.815955]  [ffff800080bc0000, ffff800080bc9000) created by:
[   23.815955]  kernel_clone+0x150/0x7a8
[   23.817660] 
[   23.818025] The buggy address belongs to the physical page:
[   23.818734] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1041f7
[   23.819829] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.821194] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   23.822156] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.822990] page dumped because: kasan: bad access detected
[   23.824147] 
[   23.824302] Memory state around the buggy address:
[   23.824537]  ffff800080bc7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.824859]  ffff800080bc7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.825452] >ffff800080bc7b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   23.826346]                                                     ^
[   23.826888]  ffff800080bc7c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2
[   23.827557]  ffff800080bc7c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00
[   23.829391] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[   23.760559] ==================================================================
[   23.761942] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x240/0x278
[   23.762692] Read of size 1 at addr ffff800080ba7cba by task kunit_try_catch/237
[   23.763429] 
[   23.763951] CPU: 1 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   23.764155] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.764236] Hardware name: linux,dummy-virt (DT)
[   23.764319] Call trace:
[   23.764389]  dump_backtrace+0x9c/0x128
[   23.764509]  show_stack+0x20/0x38
[   23.764618]  dump_stack_lvl+0x8c/0xd0
[   23.764736]  print_report+0x310/0x5f0
[   23.764861]  kasan_report+0xdc/0x128
[   23.764990]  __asan_report_load1_noabort+0x20/0x30
[   23.765113]  kasan_stack_oob+0x240/0x278
[   23.765171]  kunit_try_run_case+0x170/0x3f0
[   23.765219]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.765273]  kthread+0x24c/0x2d0
[   23.765319]  ret_from_fork+0x10/0x20
[   23.765365] 
[   23.773066] The buggy address belongs to stack of task kunit_try_catch/237
[   23.773973]  and is located at offset 138 in frame:
[   23.774578]  kasan_stack_oob+0x0/0x278
[   23.775330] 
[   23.776253] This frame has 4 objects:
[   23.777169]  [48, 49) '__assertion'
[   23.777282]  [64, 72) 'array'
[   23.777657]  [96, 112) '__assertion'
[   23.778125]  [128, 138) 'stack_array'
[   23.778635] 
[   23.779291] The buggy address belongs to the virtual mapping at
[   23.779291]  [ffff800080ba0000, ffff800080ba9000) created by:
[   23.779291]  kernel_clone+0x150/0x7a8
[   23.780809] 
[   23.781193] The buggy address belongs to the physical page:
[   23.781849] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104206
[   23.782703] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.783469] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   23.785054] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.785927] page dumped because: kasan: bad access detected
[   23.786557] 
[   23.786909] Memory state around the buggy address:
[   23.787750]  ffff800080ba7b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.788612]  ffff800080ba7c00: 00 00 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2
[   23.789442] >ffff800080ba7c80: f2 f2 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00
[   23.790205]                                         ^
[   23.790848]  ffff800080ba7d00: 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00
[   23.791629]  ffff800080ba7d80: f2 f2 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00
[   23.793029] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   23.718468] ==================================================================
[   23.719606] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x220/0x258
[   23.721340] Read of size 1 at addr ffffa6526de046cd by task kunit_try_catch/233
[   23.722033] 
[   23.722392] CPU: 1 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   23.722598] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.722671] Hardware name: linux,dummy-virt (DT)
[   23.722759] Call trace:
[   23.722832]  dump_backtrace+0x9c/0x128
[   23.722954]  show_stack+0x20/0x38
[   23.723096]  dump_stack_lvl+0x8c/0xd0
[   23.723223]  print_report+0x310/0x5f0
[   23.723449]  kasan_report+0xdc/0x128
[   23.723579]  __asan_report_load1_noabort+0x20/0x30
[   23.723695]  kasan_global_oob_right+0x220/0x258
[   23.723803]  kunit_try_run_case+0x170/0x3f0
[   23.723909]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.724037]  kthread+0x24c/0x2d0
[   23.724140]  ret_from_fork+0x10/0x20
[   23.724259] 
[   23.731378] The buggy address belongs to the variable:
[   23.733208]  global_array+0xd/0x40
[   23.734102] 
[   23.734785] The buggy address belongs to the virtual mapping at
[   23.734785]  [ffffa6526c180000, ffffa6526dec1000) created by:
[   23.734785]  paging_init+0x66c/0x7d0
[   23.736383] 
[   23.737316] The buggy address belongs to the physical page:
[   23.737942] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47804
[   23.738727] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   23.739938] raw: 03fffe0000002000 ffffc1ffc01e0108 ffffc1ffc01e0108 0000000000000000
[   23.740625] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.741359] page dumped because: kasan: bad access detected
[   23.741932] 
[   23.742251] Memory state around the buggy address:
[   23.742845]  ffffa6526de04580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.744029]  ffffa6526de04600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.744772] >ffffa6526de04680: 00 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9
[   23.745473]                                               ^
[   23.746058]  ffffa6526de04700: 02 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9
[   23.746803]  ffffa6526de04780: 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9
[   23.747458] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[   23.684074] ==================================================================
[   23.685336] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x124/0x2b0
[   23.686199] Free of addr fff00000c6a28001 by task kunit_try_catch/231
[   23.686885] 
[   23.687245] CPU: 0 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   23.687480] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.687562] Hardware name: linux,dummy-virt (DT)
[   23.687652] Call trace:
[   23.687717]  dump_backtrace+0x9c/0x128
[   23.687836]  show_stack+0x20/0x38
[   23.687945]  dump_stack_lvl+0x8c/0xd0
[   23.688082]  print_report+0x118/0x5f0
[   23.688199]  kasan_report_invalid_free+0xc0/0xe8
[   23.688323]  __kasan_mempool_poison_object+0xfc/0x150
[   23.688454]  mempool_free+0x28c/0x328
[   23.688579]  mempool_kmalloc_invalid_free_helper+0x124/0x2b0
[   23.688756]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   23.688877]  kunit_try_run_case+0x170/0x3f0
[   23.688929]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.689012]  kthread+0x24c/0x2d0
[   23.689062]  ret_from_fork+0x10/0x20
[   23.689112] 
[   23.696296] The buggy address belongs to the physical page:
[   23.696946] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106a28
[   23.697870] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.698813] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.699955] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.700758] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.701596] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.702513] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.703284] head: 0bfffe0000000002 ffffc1ffc31a8a01 ffffffffffffffff 0000000000000000
[   23.704168] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   23.704920] page dumped because: kasan: bad access detected
[   23.705614] 
[   23.705934] Memory state around the buggy address:
[   23.707166]  fff00000c6a27f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.708095]  fff00000c6a27f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.708831] >fff00000c6a28000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.709478]                    ^
[   23.709954]  fff00000c6a28080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.710756]  fff00000c6a28100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.711659] ==================================================================
[   23.640137] ==================================================================
[   23.640666] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x124/0x2b0
[   23.641118] Free of addr fff00000c424c901 by task kunit_try_catch/229
[   23.642533] 
[   23.642940] CPU: 0 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   23.643209] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.643292] Hardware name: linux,dummy-virt (DT)
[   23.643392] Call trace:
[   23.643477]  dump_backtrace+0x9c/0x128
[   23.643587]  show_stack+0x20/0x38
[   23.643681]  dump_stack_lvl+0x8c/0xd0
[   23.643731]  print_report+0x118/0x5f0
[   23.643775]  kasan_report_invalid_free+0xc0/0xe8
[   23.643825]  check_slab_allocation+0xfc/0x108
[   23.643872]  __kasan_mempool_poison_object+0x78/0x150
[   23.643927]  mempool_free+0x28c/0x328
[   23.644008]  mempool_kmalloc_invalid_free_helper+0x124/0x2b0
[   23.644070]  mempool_kmalloc_invalid_free+0xc0/0x118
[   23.644125]  kunit_try_run_case+0x170/0x3f0
[   23.644172]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.644227]  kthread+0x24c/0x2d0
[   23.644275]  ret_from_fork+0x10/0x20
[   23.644322] 
[   23.653659] Allocated by task 229:
[   23.654200]  kasan_save_stack+0x3c/0x68
[   23.654740]  kasan_save_track+0x20/0x40
[   23.655365]  kasan_save_alloc_info+0x40/0x58
[   23.656093]  __kasan_mempool_unpoison_object+0x11c/0x180
[   23.656925]  remove_element+0x130/0x1f8
[   23.657527]  mempool_alloc_preallocated+0x58/0xc0
[   23.658179]  mempool_kmalloc_invalid_free_helper+0x94/0x2b0
[   23.658872]  mempool_kmalloc_invalid_free+0xc0/0x118
[   23.659687]  kunit_try_run_case+0x170/0x3f0
[   23.660197]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.660851]  kthread+0x24c/0x2d0
[   23.661299]  ret_from_fork+0x10/0x20
[   23.661762] 
[   23.662311] The buggy address belongs to the object at fff00000c424c900
[   23.662311]  which belongs to the cache kmalloc-128 of size 128
[   23.663614] The buggy address is located 1 bytes inside of
[   23.663614]  128-byte region [fff00000c424c900, fff00000c424c980)
[   23.664673] 
[   23.665040] The buggy address belongs to the physical page:
[   23.665618] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10424c
[   23.666406] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.667174] page_type: f5(slab)
[   23.667897] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   23.668691] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   23.669420] page dumped because: kasan: bad access detected
[   23.670092] 
[   23.670388] Memory state around the buggy address:
[   23.670948]  fff00000c424c800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.671846]  fff00000c424c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.672567] >fff00000c424c900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.673304]                    ^
[   23.673741]  fff00000c424c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.674532]  fff00000c424ca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.675259] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[   23.561389] ==================================================================
[   23.562408] BUG: KASAN: double-free in mempool_double_free_helper+0x15c/0x2f8
[   23.563026] Free of addr fff00000c6a74000 by task kunit_try_catch/225
[   23.564475] 
[   23.566235] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   23.566451] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.566533] Hardware name: linux,dummy-virt (DT)
[   23.566626] Call trace:
[   23.566689]  dump_backtrace+0x9c/0x128
[   23.566800]  show_stack+0x20/0x38
[   23.566900]  dump_stack_lvl+0x8c/0xd0
[   23.567044]  print_report+0x118/0x5f0
[   23.567140]  kasan_report_invalid_free+0xc0/0xe8
[   23.567246]  __kasan_mempool_poison_object+0x14c/0x150
[   23.567349]  mempool_free+0x28c/0x328
[   23.567455]  mempool_double_free_helper+0x15c/0x2f8
[   23.567558]  mempool_kmalloc_large_double_free+0xc0/0x118
[   23.567663]  kunit_try_run_case+0x170/0x3f0
[   23.567753]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.567857]  kthread+0x24c/0x2d0
[   23.567943]  ret_from_fork+0x10/0x20
[   23.568068] 
[   23.582854] The buggy address belongs to the physical page:
[   23.584060] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106a74
[   23.584655] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.585449] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.586245] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.587031] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.587800] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.588601] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.589406] head: 0bfffe0000000002 ffffc1ffc31a9d01 ffffffffffffffff 0000000000000000
[   23.590246] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   23.591009] page dumped because: kasan: bad access detected
[   23.591552] 
[   23.591856] Memory state around the buggy address:
[   23.593027]  fff00000c6a73f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.593749]  fff00000c6a73f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.594483] >fff00000c6a74000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.595202]                    ^
[   23.595645]  fff00000c6a74080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.596389]  fff00000c6a74100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.597481] ==================================================================
[   23.605599] ==================================================================
[   23.606634] BUG: KASAN: double-free in mempool_double_free_helper+0x15c/0x2f8
[   23.607419] Free of addr fff00000c6a74000 by task kunit_try_catch/227
[   23.608108] 
[   23.608454] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   23.608672] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.608757] Hardware name: linux,dummy-virt (DT)
[   23.608856] Call trace:
[   23.608923]  dump_backtrace+0x9c/0x128
[   23.609102]  show_stack+0x20/0x38
[   23.609219]  dump_stack_lvl+0x8c/0xd0
[   23.609334]  print_report+0x118/0x5f0
[   23.609484]  kasan_report_invalid_free+0xc0/0xe8
[   23.609606]  __kasan_mempool_poison_pages+0xe0/0xe8
[   23.609725]  mempool_free+0x24c/0x328
[   23.609844]  mempool_double_free_helper+0x15c/0x2f8
[   23.609979]  mempool_page_alloc_double_free+0xbc/0x118
[   23.610100]  kunit_try_run_case+0x170/0x3f0
[   23.610198]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.610308]  kthread+0x24c/0x2d0
[   23.610412]  ret_from_fork+0x10/0x20
[   23.610490] 
[   23.618878] The buggy address belongs to the physical page:
[   23.619932] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106a74
[   23.620849] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.621677] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   23.622532] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.623286] page dumped because: kasan: bad access detected
[   23.624602] 
[   23.624932] Memory state around the buggy address:
[   23.625503]  fff00000c6a73f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.626458]  fff00000c6a73f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.627233] >fff00000c6a74000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.628284]                    ^
[   23.628700]  fff00000c6a74080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.629441]  fff00000c6a74100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.630187] ==================================================================
[   23.512344] ==================================================================
[   23.513618] BUG: KASAN: double-free in mempool_double_free_helper+0x15c/0x2f8
[   23.514390] Free of addr fff00000c424c200 by task kunit_try_catch/223
[   23.515121] 
[   23.515473] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   23.515691] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.515776] Hardware name: linux,dummy-virt (DT)
[   23.515867] Call trace:
[   23.515931]  dump_backtrace+0x9c/0x128
[   23.516074]  show_stack+0x20/0x38
[   23.516179]  dump_stack_lvl+0x8c/0xd0
[   23.516294]  print_report+0x118/0x5f0
[   23.516401]  kasan_report_invalid_free+0xc0/0xe8
[   23.516517]  check_slab_allocation+0xd4/0x108
[   23.516670]  __kasan_mempool_poison_object+0x78/0x150
[   23.516789]  mempool_free+0x28c/0x328
[   23.516851]  mempool_double_free_helper+0x15c/0x2f8
[   23.516905]  mempool_kmalloc_double_free+0xc0/0x118
[   23.516983]  kunit_try_run_case+0x170/0x3f0
[   23.517040]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.517095]  kthread+0x24c/0x2d0
[   23.517142]  ret_from_fork+0x10/0x20
[   23.517192] 
[   23.523174] Allocated by task 223:
[   23.523579]  kasan_save_stack+0x3c/0x68
[   23.524389]  kasan_save_track+0x20/0x40
[   23.524976]  kasan_save_alloc_info+0x40/0x58
[   23.525585]  __kasan_mempool_unpoison_object+0x11c/0x180
[   23.526278]  remove_element+0x130/0x1f8
[   23.526789]  mempool_alloc_preallocated+0x58/0xc0
[   23.527348]  mempool_double_free_helper+0x94/0x2f8
[   23.528238]  mempool_kmalloc_double_free+0xc0/0x118
[   23.528938]  kunit_try_run_case+0x170/0x3f0
[   23.529429]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.530166]  kthread+0x24c/0x2d0
[   23.530624]  ret_from_fork+0x10/0x20
[   23.531141] 
[   23.532399] Freed by task 223:
[   23.532844]  kasan_save_stack+0x3c/0x68
[   23.533553]  kasan_save_track+0x20/0x40
[   23.534134]  kasan_save_free_info+0x4c/0x78
[   23.534648]  __kasan_mempool_poison_object+0xc0/0x150
[   23.535315]  mempool_free+0x28c/0x328
[   23.536021]  mempool_double_free_helper+0x104/0x2f8
[   23.536639]  mempool_kmalloc_double_free+0xc0/0x118
[   23.537279]  kunit_try_run_case+0x170/0x3f0
[   23.537897]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.538567]  kthread+0x24c/0x2d0
[   23.538996]  ret_from_fork+0x10/0x20
[   23.539773] 
[   23.540150] The buggy address belongs to the object at fff00000c424c200
[   23.540150]  which belongs to the cache kmalloc-128 of size 128
[   23.541508] The buggy address is located 0 bytes inside of
[   23.541508]  128-byte region [fff00000c424c200, fff00000c424c280)
[   23.542506] 
[   23.542819] The buggy address belongs to the physical page:
[   23.543733] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10424c
[   23.544534] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.545243] page_type: f5(slab)
[   23.545692] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   23.546447] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   23.547225] page dumped because: kasan: bad access detected
[   23.548055] 
[   23.548356] Memory state around the buggy address:
[   23.548862]  fff00000c424c100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.549560]  fff00000c424c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.550322] >fff00000c424c200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.551088]                    ^
[   23.551719]  fff00000c424c280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.552490]  fff00000c424c300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.553236] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[   23.377097] ==================================================================
[   23.378323] BUG: KASAN: use-after-free in mempool_uaf_helper+0x320/0x348
[   23.379138] Read of size 1 at addr fff00000c6a24000 by task kunit_try_catch/217
[   23.380696] 
[   23.381019] CPU: 0 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   23.381396] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.381501] Hardware name: linux,dummy-virt (DT)
[   23.381564] Call trace:
[   23.381596]  dump_backtrace+0x9c/0x128
[   23.381653]  show_stack+0x20/0x38
[   23.381742]  dump_stack_lvl+0x8c/0xd0
[   23.381799]  print_report+0x118/0x5f0
[   23.381843]  kasan_report+0xdc/0x128
[   23.381885]  __asan_report_load1_noabort+0x20/0x30
[   23.381938]  mempool_uaf_helper+0x320/0x348
[   23.382017]  mempool_kmalloc_large_uaf+0xc4/0x120
[   23.382076]  kunit_try_run_case+0x170/0x3f0
[   23.382125]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.382179]  kthread+0x24c/0x2d0
[   23.382224]  ret_from_fork+0x10/0x20
[   23.382274] 
[   23.390290] The buggy address belongs to the physical page:
[   23.391044] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106a24
[   23.392256] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.393177] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.394039] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.394933] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.395947] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.396826] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.397627] head: 0bfffe0000000002 ffffc1ffc31a8901 ffffffffffffffff 0000000000000000
[   23.398349] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   23.399286] page dumped because: kasan: bad access detected
[   23.400127] 
[   23.400563] Memory state around the buggy address:
[   23.401131]  fff00000c6a23f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.402130]  fff00000c6a23f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.402892] >fff00000c6a24000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.403788]                    ^
[   23.404431]  fff00000c6a24080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.405235]  fff00000c6a24100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.405885] ==================================================================
[   23.479726] ==================================================================
[   23.480900] BUG: KASAN: use-after-free in mempool_uaf_helper+0x320/0x348
[   23.481602] Read of size 1 at addr fff00000c6a74000 by task kunit_try_catch/221
[   23.482750] 
[   23.483249] CPU: 1 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   23.483668] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.483746] Hardware name: linux,dummy-virt (DT)
[   23.483830] Call trace:
[   23.483879]  dump_backtrace+0x9c/0x128
[   23.483939]  show_stack+0x20/0x38
[   23.484016]  dump_stack_lvl+0x8c/0xd0
[   23.484072]  print_report+0x118/0x5f0
[   23.484116]  kasan_report+0xdc/0x128
[   23.484160]  __asan_report_load1_noabort+0x20/0x30
[   23.484213]  mempool_uaf_helper+0x320/0x348
[   23.484262]  mempool_page_alloc_uaf+0xc0/0x118
[   23.484312]  kunit_try_run_case+0x170/0x3f0
[   23.484364]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.484419]  kthread+0x24c/0x2d0
[   23.484466]  ret_from_fork+0x10/0x20
[   23.484515] 
[   23.492003] The buggy address belongs to the physical page:
[   23.492622] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106a74
[   23.493675] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.494624] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   23.495860] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.496580] page dumped because: kasan: bad access detected
[   23.497223] 
[   23.497523] Memory state around the buggy address:
[   23.498150]  fff00000c6a73f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.498843]  fff00000c6a73f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.500035] >fff00000c6a74000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.500787]                    ^
[   23.501248]  fff00000c6a74080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.502003]  fff00000c6a74100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.502716] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[   23.417794] ==================================================================
[   23.418915] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x320/0x348
[   23.419876] Read of size 1 at addr fff00000c4222240 by task kunit_try_catch/219
[   23.421573] 
[   23.421933] CPU: 1 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   23.422162] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.422229] Hardware name: linux,dummy-virt (DT)
[   23.422303] Call trace:
[   23.422358]  dump_backtrace+0x9c/0x128
[   23.422464]  show_stack+0x20/0x38
[   23.422556]  dump_stack_lvl+0x8c/0xd0
[   23.422672]  print_report+0x118/0x5f0
[   23.422782]  kasan_report+0xdc/0x128
[   23.422896]  __asan_report_load1_noabort+0x20/0x30
[   23.423037]  mempool_uaf_helper+0x320/0x348
[   23.423128]  mempool_slab_uaf+0xc0/0x118
[   23.423182]  kunit_try_run_case+0x170/0x3f0
[   23.423231]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.423285]  kthread+0x24c/0x2d0
[   23.423330]  ret_from_fork+0x10/0x20
[   23.423460] 
[   23.431516] Allocated by task 219:
[   23.432017]  kasan_save_stack+0x3c/0x68
[   23.432719]  kasan_save_track+0x20/0x40
[   23.433401]  kasan_save_alloc_info+0x40/0x58
[   23.434035]  __kasan_mempool_unpoison_object+0xbc/0x180
[   23.434650]  remove_element+0x16c/0x1f8
[   23.435105]  mempool_alloc_preallocated+0x58/0xc0
[   23.435801]  mempool_uaf_helper+0xa4/0x348
[   23.436412]  mempool_slab_uaf+0xc0/0x118
[   23.437442]  kunit_try_run_case+0x170/0x3f0
[   23.438115]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.438844]  kthread+0x24c/0x2d0
[   23.439451]  ret_from_fork+0x10/0x20
[   23.440296] 
[   23.440755] Freed by task 219:
[   23.441378]  kasan_save_stack+0x3c/0x68
[   23.442039]  kasan_save_track+0x20/0x40
[   23.442505]  kasan_save_free_info+0x4c/0x78
[   23.443066]  __kasan_mempool_poison_object+0xc0/0x150
[   23.444177]  mempool_free+0x28c/0x328
[   23.444670]  mempool_uaf_helper+0x108/0x348
[   23.445207]  mempool_slab_uaf+0xc0/0x118
[   23.445673]  kunit_try_run_case+0x170/0x3f0
[   23.446451]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.447071]  kthread+0x24c/0x2d0
[   23.447760]  ret_from_fork+0x10/0x20
[   23.448404] 
[   23.448845] The buggy address belongs to the object at fff00000c4222240
[   23.448845]  which belongs to the cache test_cache of size 123
[   23.450063] The buggy address is located 0 bytes inside of
[   23.450063]  freed 123-byte region [fff00000c4222240, fff00000c42222bb)
[   23.451148] 
[   23.452153] The buggy address belongs to the physical page:
[   23.452647] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104222
[   23.453599] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.454400] page_type: f5(slab)
[   23.454882] raw: 0bfffe0000000000 fff00000c4182500 dead000000000122 0000000000000000
[   23.455816] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000
[   23.456904] page dumped because: kasan: bad access detected
[   23.457616] 
[   23.458072] Memory state around the buggy address:
[   23.458511]  fff00000c4222100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.459167]  fff00000c4222180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.460148] >fff00000c4222200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   23.461372]                                            ^
[   23.461847]  fff00000c4222280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.462688]  fff00000c4222300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.463675] ==================================================================
[   23.324539] ==================================================================
[   23.325788] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x320/0x348
[   23.326459] Read of size 1 at addr fff00000c420b400 by task kunit_try_catch/215
[   23.327733] 
[   23.328305] CPU: 1 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   23.328695] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.328773] Hardware name: linux,dummy-virt (DT)
[   23.328853] Call trace:
[   23.328913]  dump_backtrace+0x9c/0x128
[   23.329048]  show_stack+0x20/0x38
[   23.329109]  dump_stack_lvl+0x8c/0xd0
[   23.329162]  print_report+0x118/0x5f0
[   23.329207]  kasan_report+0xdc/0x128
[   23.329251]  __asan_report_load1_noabort+0x20/0x30
[   23.329303]  mempool_uaf_helper+0x320/0x348
[   23.329351]  mempool_kmalloc_uaf+0xc4/0x120
[   23.329400]  kunit_try_run_case+0x170/0x3f0
[   23.329448]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.329499]  kthread+0x24c/0x2d0
[   23.329549]  ret_from_fork+0x10/0x20
[   23.329597] 
[   23.337573] Allocated by task 215:
[   23.338261]  kasan_save_stack+0x3c/0x68
[   23.338945]  kasan_save_track+0x20/0x40
[   23.340116]  kasan_save_alloc_info+0x40/0x58
[   23.340745]  __kasan_mempool_unpoison_object+0x11c/0x180
[   23.341464]  remove_element+0x130/0x1f8
[   23.342075]  mempool_alloc_preallocated+0x58/0xc0
[   23.342737]  mempool_uaf_helper+0xa4/0x348
[   23.343354]  mempool_kmalloc_uaf+0xc4/0x120
[   23.344197]  kunit_try_run_case+0x170/0x3f0
[   23.344848]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.345555]  kthread+0x24c/0x2d0
[   23.346124]  ret_from_fork+0x10/0x20
[   23.346723] 
[   23.347088] Freed by task 215:
[   23.347851]  kasan_save_stack+0x3c/0x68
[   23.348520]  kasan_save_track+0x20/0x40
[   23.349121]  kasan_save_free_info+0x4c/0x78
[   23.349763]  __kasan_mempool_poison_object+0xc0/0x150
[   23.350513]  mempool_free+0x28c/0x328
[   23.351100]  mempool_uaf_helper+0x108/0x348
[   23.351933]  mempool_kmalloc_uaf+0xc4/0x120
[   23.352540]  kunit_try_run_case+0x170/0x3f0
[   23.353235]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.353928]  kthread+0x24c/0x2d0
[   23.354517]  ret_from_fork+0x10/0x20
[   23.355085] 
[   23.355536] The buggy address belongs to the object at fff00000c420b400
[   23.355536]  which belongs to the cache kmalloc-128 of size 128
[   23.356803] The buggy address is located 0 bytes inside of
[   23.356803]  freed 128-byte region [fff00000c420b400, fff00000c420b480)
[   23.357878] 
[   23.358475] The buggy address belongs to the physical page:
[   23.359245] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10420b
[   23.360503] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.361215] page_type: f5(slab)
[   23.361670] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   23.362530] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   23.363326] page dumped because: kasan: bad access detected
[   23.363946] 
[   23.364498] Memory state around the buggy address:
[   23.365246]  fff00000c420b300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.366031]  fff00000c420b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.366352] >fff00000c420b400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.366657]                    ^
[   23.366843]  fff00000c420b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.367729]  fff00000c420b500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.368506] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[   23.268272] ==================================================================
[   23.269322] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2b8/0x2f8
[   23.270131] Read of size 1 at addr fff00000c424f2bb by task kunit_try_catch/213
[   23.270824] 
[   23.271198] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   23.271408] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.271489] Hardware name: linux,dummy-virt (DT)
[   23.271578] Call trace:
[   23.271642]  dump_backtrace+0x9c/0x128
[   23.271764]  show_stack+0x20/0x38
[   23.271889]  dump_stack_lvl+0x8c/0xd0
[   23.272012]  print_report+0x118/0x5f0
[   23.272125]  kasan_report+0xdc/0x128
[   23.272221]  __asan_report_load1_noabort+0x20/0x30
[   23.272332]  mempool_oob_right_helper+0x2b8/0x2f8
[   23.272440]  mempool_slab_oob_right+0xc0/0x118
[   23.272542]  kunit_try_run_case+0x170/0x3f0
[   23.272638]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.272742]  kthread+0x24c/0x2d0
[   23.272853]  ret_from_fork+0x10/0x20
[   23.273255] 
[   23.281248] Allocated by task 213:
[   23.281734]  kasan_save_stack+0x3c/0x68
[   23.282290]  kasan_save_track+0x20/0x40
[   23.282742]  kasan_save_alloc_info+0x40/0x58
[   23.283273]  __kasan_mempool_unpoison_object+0xbc/0x180
[   23.283954]  remove_element+0x16c/0x1f8
[   23.284534]  mempool_alloc_preallocated+0x58/0xc0
[   23.285155]  mempool_oob_right_helper+0x98/0x2f8
[   23.285779]  mempool_slab_oob_right+0xc0/0x118
[   23.286320]  kunit_try_run_case+0x170/0x3f0
[   23.286907]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.287565]  kthread+0x24c/0x2d0
[   23.288038]  ret_from_fork+0x10/0x20
[   23.288605] 
[   23.288929] The buggy address belongs to the object at fff00000c424f240
[   23.288929]  which belongs to the cache test_cache of size 123
[   23.289768] The buggy address is located 0 bytes to the right of
[   23.289768]  allocated 123-byte region [fff00000c424f240, fff00000c424f2bb)
[   23.290629] 
[   23.290880] The buggy address belongs to the physical page:
[   23.291392] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10424f
[   23.292234] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.293140] page_type: f5(slab)
[   23.293525] raw: 0bfffe0000000000 fff00000c11cd8c0 dead000000000122 0000000000000000
[   23.294301] raw: 0000000000000000 0000000080150015 00000001f5000000 0000000000000000
[   23.295225] page dumped because: kasan: bad access detected
[   23.295914] 
[   23.296208] Memory state around the buggy address:
[   23.296741]  fff00000c424f180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.298778]  fff00000c424f200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   23.299711] >fff00000c424f280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   23.300562]                                         ^
[   23.301062]  fff00000c424f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.302305]  fff00000c424f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.303274] ==================================================================
[   23.226921] ==================================================================
[   23.228665] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2b8/0x2f8
[   23.229548] Read of size 1 at addr fff00000c6a26001 by task kunit_try_catch/211
[   23.230216] 
[   23.230599] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   23.230806] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.230885] Hardware name: linux,dummy-virt (DT)
[   23.230991] Call trace:
[   23.231057]  dump_backtrace+0x9c/0x128
[   23.231179]  show_stack+0x20/0x38
[   23.231287]  dump_stack_lvl+0x8c/0xd0
[   23.231451]  print_report+0x118/0x5f0
[   23.231590]  kasan_report+0xdc/0x128
[   23.231725]  __asan_report_load1_noabort+0x20/0x30
[   23.231842]  mempool_oob_right_helper+0x2b8/0x2f8
[   23.231902]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   23.231983]  kunit_try_run_case+0x170/0x3f0
[   23.232040]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.232093]  kthread+0x24c/0x2d0
[   23.232142]  ret_from_fork+0x10/0x20
[   23.232191] 
[   23.239599] The buggy address belongs to the physical page:
[   23.240230] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106a24
[   23.241337] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.242242] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   23.243039] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.244635] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.245286] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   23.245875] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.246478] head: 0bfffe0000000002 ffffc1ffc31a8901 ffffffffffffffff 0000000000000000
[   23.247796] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   23.248757] page dumped because: kasan: bad access detected
[   23.250497] 
[   23.251217] Memory state around the buggy address:
[   23.253147]  fff00000c6a25f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.253860]  fff00000c6a25f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.254617] >fff00000c6a26000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.255440]                    ^
[   23.255898]  fff00000c6a26080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.256660]  fff00000c6a26100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   23.257700] ==================================================================
[   23.178905] ==================================================================
[   23.180074] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2b8/0x2f8
[   23.180815] Read of size 1 at addr fff00000c418f873 by task kunit_try_catch/209
[   23.181518] 
[   23.181743] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   23.181848] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.181883] Hardware name: linux,dummy-virt (DT)
[   23.181923] Call trace:
[   23.181949]  dump_backtrace+0x9c/0x128
[   23.182098]  show_stack+0x20/0x38
[   23.182201]  dump_stack_lvl+0x8c/0xd0
[   23.182325]  print_report+0x118/0x5f0
[   23.182434]  kasan_report+0xdc/0x128
[   23.182569]  __asan_report_load1_noabort+0x20/0x30
[   23.182700]  mempool_oob_right_helper+0x2b8/0x2f8
[   23.182823]  mempool_kmalloc_oob_right+0xc4/0x120
[   23.182945]  kunit_try_run_case+0x170/0x3f0
[   23.183091]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.183211]  kthread+0x24c/0x2d0
[   23.183328]  ret_from_fork+0x10/0x20
[   23.183446] 
[   23.193935] Allocated by task 209:
[   23.194571]  kasan_save_stack+0x3c/0x68
[   23.195118]  kasan_save_track+0x20/0x40
[   23.195595]  kasan_save_alloc_info+0x40/0x58
[   23.196217]  __kasan_mempool_unpoison_object+0x11c/0x180
[   23.197436]  remove_element+0x130/0x1f8
[   23.198003]  mempool_alloc_preallocated+0x58/0xc0
[   23.198631]  mempool_oob_right_helper+0x98/0x2f8
[   23.199262]  mempool_kmalloc_oob_right+0xc4/0x120
[   23.199828]  kunit_try_run_case+0x170/0x3f0
[   23.200694]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.201382]  kthread+0x24c/0x2d0
[   23.201877]  ret_from_fork+0x10/0x20
[   23.202407] 
[   23.202727] The buggy address belongs to the object at fff00000c418f800
[   23.202727]  which belongs to the cache kmalloc-128 of size 128
[   23.204664] The buggy address is located 0 bytes to the right of
[   23.204664]  allocated 115-byte region [fff00000c418f800, fff00000c418f873)
[   23.205616] 
[   23.205759] The buggy address belongs to the physical page:
[   23.206142] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10418f
[   23.207644] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.208551] page_type: f5(slab)
[   23.209078] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   23.209758] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   23.210499] page dumped because: kasan: bad access detected
[   23.211141] 
[   23.211485] Memory state around the buggy address:
[   23.212299]  fff00000c418f700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.213753]  fff00000c418f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.214828] >fff00000c418f800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   23.215539]                                                              ^
[   23.216291]  fff00000c418f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.217468]  fff00000c418f900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   23.218205] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[   22.573596] ==================================================================
[   22.574193] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x184/0x318
[   22.574544] Read of size 1 at addr fff00000c11cd640 by task kunit_try_catch/203
[   22.574864] 
[   22.575080] CPU: 0 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   22.575201] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.575259] Hardware name: linux,dummy-virt (DT)
[   22.575336] Call trace:
[   22.575413]  dump_backtrace+0x9c/0x128
[   22.575516]  show_stack+0x20/0x38
[   22.575618]  dump_stack_lvl+0x8c/0xd0
[   22.575740]  print_report+0x118/0x5f0
[   22.575850]  kasan_report+0xdc/0x128
[   22.576033]  __kasan_check_byte+0x54/0x70
[   22.576145]  kmem_cache_destroy+0x34/0x218
[   22.576251]  kmem_cache_double_destroy+0x184/0x318
[   22.576367]  kunit_try_run_case+0x170/0x3f0
[   22.576488]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.576872]  kthread+0x24c/0x2d0
[   22.577006]  ret_from_fork+0x10/0x20
[   22.577122] 
[   22.584104] Allocated by task 203:
[   22.584534]  kasan_save_stack+0x3c/0x68
[   22.585063]  kasan_save_track+0x20/0x40
[   22.585603]  kasan_save_alloc_info+0x40/0x58
[   22.586178]  __kasan_slab_alloc+0xa8/0xb0
[   22.586693]  kmem_cache_alloc_noprof+0xf8/0x300
[   22.587264]  __kmem_cache_create_args+0x19c/0x2c8
[   22.588184]  kmem_cache_double_destroy+0xd0/0x318
[   22.588726]  kunit_try_run_case+0x170/0x3f0
[   22.589233]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.589912]  kthread+0x24c/0x2d0
[   22.590419]  ret_from_fork+0x10/0x20
[   22.590906] 
[   22.591189] Freed by task 203:
[   22.592031]  kasan_save_stack+0x3c/0x68
[   22.592568]  kasan_save_track+0x20/0x40
[   22.593144]  kasan_save_free_info+0x4c/0x78
[   22.593654]  __kasan_slab_free+0x6c/0x98
[   22.594203]  kmem_cache_free+0x118/0x460
[   22.594696]  slab_kmem_cache_release+0x38/0x50
[   22.595226]  kmem_cache_release+0x1c/0x30
[   22.596015]  kobject_put+0x17c/0x420
[   22.596458]  sysfs_slab_release+0x1c/0x30
[   22.597054]  kmem_cache_destroy+0x118/0x218
[   22.597628]  kmem_cache_double_destroy+0x130/0x318
[   22.598413]  kunit_try_run_case+0x170/0x3f0
[   22.598977]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.599939]  kthread+0x24c/0x2d0
[   22.600381]  ret_from_fork+0x10/0x20
[   22.600881] 
[   22.601177] The buggy address belongs to the object at fff00000c11cd640
[   22.601177]  which belongs to the cache kmem_cache of size 208
[   22.602321] The buggy address is located 0 bytes inside of
[   22.602321]  freed 208-byte region [fff00000c11cd640, fff00000c11cd710)
[   22.603841] 
[   22.604194] The buggy address belongs to the physical page:
[   22.604756] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1011cd
[   22.605575] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.606265] page_type: f5(slab)
[   22.606720] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000
[   22.607992] raw: 0000000000000000 00000000800c000c 00000001f5000000 0000000000000000
[   22.608752] page dumped because: kasan: bad access detected
[   22.609386] 
[   22.609685] Memory state around the buggy address:
[   22.610247]  fff00000c11cd500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.610948]  fff00000c11cd580: 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc
[   22.611617] >fff00000c11cd600: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   22.612664]                                            ^
[   22.613280]  fff00000c11cd680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.613992]  fff00000c11cd700: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.614715] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[   22.459936] ==================================================================
[   22.461155] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x3a4/0x488
[   22.462152] Read of size 1 at addr fff00000c41fc000 by task kunit_try_catch/201
[   22.462998] 
[   22.463607] CPU: 1 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   22.463792] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.463873] Hardware name: linux,dummy-virt (DT)
[   22.463988] Call trace:
[   22.464056]  dump_backtrace+0x9c/0x128
[   22.464180]  show_stack+0x20/0x38
[   22.464231]  dump_stack_lvl+0x8c/0xd0
[   22.464287]  print_report+0x118/0x5f0
[   22.464335]  kasan_report+0xdc/0x128
[   22.464380]  __asan_report_load1_noabort+0x20/0x30
[   22.464429]  kmem_cache_rcu_uaf+0x3a4/0x488
[   22.464479]  kunit_try_run_case+0x170/0x3f0
[   22.464531]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.464586]  kthread+0x24c/0x2d0
[   22.464633]  ret_from_fork+0x10/0x20
[   22.464682] 
[   22.470477] Allocated by task 201:
[   22.470868]  kasan_save_stack+0x3c/0x68
[   22.471490]  kasan_save_track+0x20/0x40
[   22.472156]  kasan_save_alloc_info+0x40/0x58
[   22.472830]  __kasan_slab_alloc+0xa8/0xb0
[   22.473448]  kmem_cache_alloc_noprof+0xf8/0x300
[   22.474132]  kmem_cache_rcu_uaf+0x130/0x488
[   22.474676]  kunit_try_run_case+0x170/0x3f0
[   22.475345]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.476011]  kthread+0x24c/0x2d0
[   22.476487]  ret_from_fork+0x10/0x20
[   22.477084] 
[   22.477426] Freed by task 0:
[   22.477845]  kasan_save_stack+0x3c/0x68
[   22.478299]  kasan_save_track+0x20/0x40
[   22.478714]  kasan_save_free_info+0x4c/0x78
[   22.479350]  __kasan_slab_free+0x6c/0x98
[   22.480015]  slab_free_after_rcu_debug+0xd0/0x2d0
[   22.480791]  rcu_core+0xa54/0x1df8
[   22.481314]  rcu_core_si+0x18/0x30
[   22.481940]  handle_softirqs+0x36c/0xb18
[   22.482561]  __do_softirq+0x1c/0x28
[   22.483146] 
[   22.483461] Last potentially related work creation:
[   22.484090]  kasan_save_stack+0x3c/0x68
[   22.484609]  __kasan_record_aux_stack+0xbc/0xe8
[   22.485246]  kasan_record_aux_stack_noalloc+0x14/0x20
[   22.485866]  kmem_cache_free+0x28c/0x460
[   22.486413]  kmem_cache_rcu_uaf+0x170/0x488
[   22.487021]  kunit_try_run_case+0x170/0x3f0
[   22.487568]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.488228]  kthread+0x24c/0x2d0
[   22.488712]  ret_from_fork+0x10/0x20
[   22.489242] 
[   22.489599] The buggy address belongs to the object at fff00000c41fc000
[   22.489599]  which belongs to the cache test_cache of size 200
[   22.490685] The buggy address is located 0 bytes inside of
[   22.490685]  freed 200-byte region [fff00000c41fc000, fff00000c41fc0c8)
[   22.491869] 
[   22.492208] The buggy address belongs to the physical page:
[   22.493056] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1041fc
[   22.493940] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.494781] page_type: f5(slab)
[   22.495331] raw: 0bfffe0000000000 fff00000c4182280 dead000000000122 0000000000000000
[   22.496254] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000
[   22.497088] page dumped because: kasan: bad access detected
[   22.497725] 
[   22.498069] Memory state around the buggy address:
[   22.498626]  fff00000c41fbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.499467]  fff00000c41fbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.500208] >fff00000c41fc000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.500906]                    ^
[   22.501387]  fff00000c41fc080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   22.502123]  fff00000c41fc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.502867] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   22.354391] ==================================================================
[   22.356174] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x190/0x3d8
[   22.357118] Free of addr fff00000c41fd001 by task kunit_try_catch/199
[   22.358174] 
[   22.358337] CPU: 1 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   22.358448] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.358480] Hardware name: linux,dummy-virt (DT)
[   22.358522] Call trace:
[   22.358549]  dump_backtrace+0x9c/0x128
[   22.358607]  show_stack+0x20/0x38
[   22.358648]  dump_stack_lvl+0x8c/0xd0
[   22.358698]  print_report+0x118/0x5f0
[   22.358743]  kasan_report_invalid_free+0xc0/0xe8
[   22.358793]  check_slab_allocation+0xfc/0x108
[   22.358839]  __kasan_slab_pre_free+0x2c/0x48
[   22.358885]  kmem_cache_free+0xf0/0x460
[   22.358932]  kmem_cache_invalid_free+0x190/0x3d8
[   22.359008]  kunit_try_run_case+0x170/0x3f0
[   22.359065]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.359119]  kthread+0x24c/0x2d0
[   22.359164]  ret_from_fork+0x10/0x20
[   22.359213] 
[   22.368182] Allocated by task 199:
[   22.368576]  kasan_save_stack+0x3c/0x68
[   22.369184]  kasan_save_track+0x20/0x40
[   22.369903]  kasan_save_alloc_info+0x40/0x58
[   22.370502]  __kasan_slab_alloc+0xa8/0xb0
[   22.371017]  kmem_cache_alloc_noprof+0xf8/0x300
[   22.371829]  kmem_cache_invalid_free+0x130/0x3d8
[   22.372383]  kunit_try_run_case+0x170/0x3f0
[   22.373023]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.373721]  kthread+0x24c/0x2d0
[   22.374204]  ret_from_fork+0x10/0x20
[   22.374778] 
[   22.375132] The buggy address belongs to the object at fff00000c41fd000
[   22.375132]  which belongs to the cache test_cache of size 200
[   22.376619] The buggy address is located 1 bytes inside of
[   22.376619]  200-byte region [fff00000c41fd000, fff00000c41fd0c8)
[   22.377805] 
[   22.378216] The buggy address belongs to the physical page:
[   22.378787] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1041fd
[   22.379751] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.380680] page_type: f5(slab)
[   22.381234] raw: 0bfffe0000000000 fff00000c4182140 dead000000000122 0000000000000000
[   22.382117] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000
[   22.382928] page dumped because: kasan: bad access detected
[   22.383581] 
[   22.383883] Memory state around the buggy address:
[   22.384427]  fff00000c41fcf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.385260]  fff00000c41fcf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.385942] >fff00000c41fd000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.386829]                    ^
[   22.387305]  fff00000c41fd080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   22.388363]  fff00000c41fd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.389667] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   22.292123] ==================================================================
[   22.292661] BUG: KASAN: double-free in kmem_cache_double_free+0x19c/0x3e0
[   22.293060] Free of addr fff00000c4180000 by task kunit_try_catch/197
[   22.293638] 
[   22.294436] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   22.294665] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.294737] Hardware name: linux,dummy-virt (DT)
[   22.294829] Call trace:
[   22.294899]  dump_backtrace+0x9c/0x128
[   22.295040]  show_stack+0x20/0x38
[   22.295147]  dump_stack_lvl+0x8c/0xd0
[   22.295238]  print_report+0x118/0x5f0
[   22.295286]  kasan_report_invalid_free+0xc0/0xe8
[   22.295339]  check_slab_allocation+0xd4/0x108
[   22.295451]  __kasan_slab_pre_free+0x2c/0x48
[   22.295565]  kmem_cache_free+0xf0/0x460
[   22.295670]  kmem_cache_double_free+0x19c/0x3e0
[   22.295751]  kunit_try_run_case+0x170/0x3f0
[   22.295799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.295854]  kthread+0x24c/0x2d0
[   22.295898]  ret_from_fork+0x10/0x20
[   22.295947] 
[   22.304267] Allocated by task 197:
[   22.304726]  kasan_save_stack+0x3c/0x68
[   22.306117]  kasan_save_track+0x20/0x40
[   22.306612]  kasan_save_alloc_info+0x40/0x58
[   22.307207]  __kasan_slab_alloc+0xa8/0xb0
[   22.307956]  kmem_cache_alloc_noprof+0xf8/0x300
[   22.308660]  kmem_cache_double_free+0x130/0x3e0
[   22.309332]  kunit_try_run_case+0x170/0x3f0
[   22.310008]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.310749]  kthread+0x24c/0x2d0
[   22.311289]  ret_from_fork+0x10/0x20
[   22.312324] 
[   22.312585] Freed by task 197:
[   22.312903]  kasan_save_stack+0x3c/0x68
[   22.313416]  kasan_save_track+0x20/0x40
[   22.313915]  kasan_save_free_info+0x4c/0x78
[   22.315627]  __kasan_slab_free+0x6c/0x98
[   22.316564]  kmem_cache_free+0x118/0x460
[   22.317444]  kmem_cache_double_free+0x144/0x3e0
[   22.317944]  kunit_try_run_case+0x170/0x3f0
[   22.318672]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.319332]  kthread+0x24c/0x2d0
[   22.319998]  ret_from_fork+0x10/0x20
[   22.320707] 
[   22.321370] The buggy address belongs to the object at fff00000c4180000
[   22.321370]  which belongs to the cache test_cache of size 200
[   22.322521] The buggy address is located 0 bytes inside of
[   22.322521]  200-byte region [fff00000c4180000, fff00000c41800c8)
[   22.323611] 
[   22.324380] The buggy address belongs to the physical page:
[   22.325250] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104180
[   22.326404] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.327166] page_type: f5(slab)
[   22.327636] raw: 0bfffe0000000000 fff00000c4182000 dead000000000122 0000000000000000
[   22.328441] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000
[   22.329214] page dumped because: kasan: bad access detected
[   22.329878] 
[   22.330234] Memory state around the buggy address:
[   22.330824]  fff00000c417ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.331565]  fff00000c417ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.332583] >fff00000c4180000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.333629]                    ^
[   22.334241]  fff00000c4180080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   22.335126]  fff00000c4180100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.335997] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   22.221062] ==================================================================
[   22.222295] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x350/0x440
[   22.222621] Read of size 1 at addr fff00000c41840c8 by task kunit_try_catch/195
[   22.222943] 
[   22.223278] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   22.223558] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.223640] Hardware name: linux,dummy-virt (DT)
[   22.223729] Call trace:
[   22.223799]  dump_backtrace+0x9c/0x128
[   22.223921]  show_stack+0x20/0x38
[   22.224045]  dump_stack_lvl+0x8c/0xd0
[   22.224161]  print_report+0x118/0x5f0
[   22.224268]  kasan_report+0xdc/0x128
[   22.224378]  __asan_report_load1_noabort+0x20/0x30
[   22.224501]  kmem_cache_oob+0x350/0x440
[   22.224623]  kunit_try_run_case+0x170/0x3f0
[   22.224740]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.224874]  kthread+0x24c/0x2d0
[   22.224991]  ret_from_fork+0x10/0x20
[   22.225138] 
[   22.232309] Allocated by task 195:
[   22.232876]  kasan_save_stack+0x3c/0x68
[   22.233493]  kasan_save_track+0x20/0x40
[   22.234130]  kasan_save_alloc_info+0x40/0x58
[   22.234715]  __kasan_slab_alloc+0xa8/0xb0
[   22.235272]  kmem_cache_alloc_noprof+0xf8/0x300
[   22.236753]  kmem_cache_oob+0x130/0x440
[   22.237338]  kunit_try_run_case+0x170/0x3f0
[   22.237885]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.238524]  kthread+0x24c/0x2d0
[   22.238995]  ret_from_fork+0x10/0x20
[   22.239832] 
[   22.240143] The buggy address belongs to the object at fff00000c4184000
[   22.240143]  which belongs to the cache test_cache of size 200
[   22.241306] The buggy address is located 0 bytes to the right of
[   22.241306]  allocated 200-byte region [fff00000c4184000, fff00000c41840c8)
[   22.242478] 
[   22.242801] The buggy address belongs to the physical page:
[   22.243623] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104184
[   22.244458] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.245205] page_type: f5(slab)
[   22.245704] raw: 0bfffe0000000000 fff00000c5c00dc0 dead000000000122 0000000000000000
[   22.246930] raw: 0000000000000000 00000000800f000f 00000001f5000000 0000000000000000
[   22.247707] page dumped because: kasan: bad access detected
[   22.248338] 
[   22.248643] Memory state around the buggy address:
[   22.249720]  fff00000c4183f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.250433]  fff00000c4184000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.251124] >fff00000c4184080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   22.251868]                                               ^
[   22.252513]  fff00000c4184100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.253276]  fff00000c4184180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.254075] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[   22.148462] ==================================================================
[   22.149366] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x498/0x4c0
[   22.150185] Read of size 8 at addr fff00000c4227340 by task kunit_try_catch/188
[   22.150990] 
[   22.151334] CPU: 1 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   22.151563] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.151641] Hardware name: linux,dummy-virt (DT)
[   22.151730] Call trace:
[   22.151797]  dump_backtrace+0x9c/0x128
[   22.151914]  show_stack+0x20/0x38
[   22.152080]  dump_stack_lvl+0x8c/0xd0
[   22.152208]  print_report+0x118/0x5f0
[   22.152320]  kasan_report+0xdc/0x128
[   22.152427]  __asan_report_load8_noabort+0x20/0x30
[   22.152548]  workqueue_uaf+0x498/0x4c0
[   22.152660]  kunit_try_run_case+0x170/0x3f0
[   22.152805]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.152873]  kthread+0x24c/0x2d0
[   22.152918]  ret_from_fork+0x10/0x20
[   22.152996] 
[   22.160873] Allocated by task 188:
[   22.161479]  kasan_save_stack+0x3c/0x68
[   22.162157]  kasan_save_track+0x20/0x40
[   22.163816]  kasan_save_alloc_info+0x40/0x58
[   22.164432]  __kasan_kmalloc+0xd4/0xd8
[   22.164918]  __kmalloc_cache_noprof+0x154/0x320
[   22.165540]  workqueue_uaf+0x140/0x4c0
[   22.166032]  kunit_try_run_case+0x170/0x3f0
[   22.166583]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.167220]  kthread+0x24c/0x2d0
[   22.168101]  ret_from_fork+0x10/0x20
[   22.168515] 
[   22.168855] Freed by task 32:
[   22.169288]  kasan_save_stack+0x3c/0x68
[   22.169757]  kasan_save_track+0x20/0x40
[   22.170472]  kasan_save_free_info+0x4c/0x78
[   22.171036]  __kasan_slab_free+0x6c/0x98
[   22.171949]  kfree+0x110/0x3b8
[   22.172422]  workqueue_uaf_work+0x18/0x30
[   22.172936]  process_one_work+0x530/0xfa8
[   22.173450]  worker_thread+0x610/0xf18
[   22.173988]  kthread+0x24c/0x2d0
[   22.174466]  ret_from_fork+0x10/0x20
[   22.174996] 
[   22.175313] Last potentially related work creation:
[   22.176714]  kasan_save_stack+0x3c/0x68
[   22.177239]  __kasan_record_aux_stack+0xbc/0xe8
[   22.177813]  kasan_record_aux_stack_noalloc+0x14/0x20
[   22.178522]  __queue_work+0x654/0xfd8
[   22.178871]  queue_work_on+0xbc/0xf8
[   22.179848]  workqueue_uaf+0x218/0x4c0
[   22.180335]  kunit_try_run_case+0x170/0x3f0
[   22.180899]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.181539]  kthread+0x24c/0x2d0
[   22.181995]  ret_from_fork+0x10/0x20
[   22.182461] 
[   22.182778] The buggy address belongs to the object at fff00000c4227340
[   22.182778]  which belongs to the cache kmalloc-32 of size 32
[   22.185536] The buggy address is located 0 bytes inside of
[   22.185536]  freed 32-byte region [fff00000c4227340, fff00000c4227360)
[   22.186670] 
[   22.187069] The buggy address belongs to the physical page:
[   22.187866] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104227
[   22.189162] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.189483] page_type: f5(slab)
[   22.189684] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   22.190110] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   22.190859] page dumped because: kasan: bad access detected
[   22.191538] 
[   22.191805] Memory state around the buggy address:
[   22.192839]  fff00000c4227200: 00 00 05 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   22.193620]  fff00000c4227280: fa fb fb fb fc fc fc fc 00 00 07 fc fc fc fc fc
[   22.194660] >fff00000c4227300: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   22.195318]                                            ^
[   22.196300]  fff00000c4227380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.197392]  fff00000c4227400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.198336] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[   22.080160] ==================================================================
[   22.081157] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   22.081907] Read of size 4 at addr fff00000c4227280 by task swapper/1/0
[   22.082569] 
[   22.082942] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G    B            N 6.12.33-rc1 #1
[   22.083173] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.083251] Hardware name: linux,dummy-virt (DT)
[   22.083340] Call trace:
[   22.083425]  dump_backtrace+0x9c/0x128
[   22.083543]  show_stack+0x20/0x38
[   22.083651]  dump_stack_lvl+0x8c/0xd0
[   22.083777]  print_report+0x118/0x5f0
[   22.083888]  kasan_report+0xdc/0x128
[   22.084050]  __asan_report_load4_noabort+0x20/0x30
[   22.084172]  rcu_uaf_reclaim+0x64/0x70
[   22.084288]  rcu_core+0xa54/0x1df8
[   22.084408]  rcu_core_si+0x18/0x30
[   22.084511]  handle_softirqs+0x36c/0xb18
[   22.084656]  __do_softirq+0x1c/0x28
[   22.084752]  ____do_softirq+0x18/0x30
[   22.084859]  call_on_irq_stack+0x24/0x58
[   22.084952]  do_softirq_own_stack+0x24/0x38
[   22.085070]  irq_exit_rcu+0x1a4/0x268
[   22.085163]  el1_interrupt+0x38/0x58
[   22.085268]  el1h_64_irq_handler+0x18/0x28
[   22.085346]  el1h_64_irq+0x64/0x68
[   22.085388]  arch_local_irq_enable+0x4/0x8
[   22.085443]  do_idle+0x388/0x4f0
[   22.085485]  cpu_startup_entry+0x64/0x80
[   22.085531]  secondary_start_kernel+0x288/0x340
[   22.085584]  __secondary_switched+0xb8/0xc0
[   22.085640] 
[   22.098790] Allocated by task 186:
[   22.099333]  kasan_save_stack+0x3c/0x68
[   22.100107]  kasan_save_track+0x20/0x40
[   22.100676]  kasan_save_alloc_info+0x40/0x58
[   22.101279]  __kasan_kmalloc+0xd4/0xd8
[   22.101862]  __kmalloc_cache_noprof+0x154/0x320
[   22.102537]  rcu_uaf+0xb8/0x2e0
[   22.102928]  kunit_try_run_case+0x170/0x3f0
[   22.103421]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.104720]  kthread+0x24c/0x2d0
[   22.105545]  ret_from_fork+0x10/0x20
[   22.106033] 
[   22.106566] Freed by task 0:
[   22.107385]  kasan_save_stack+0x3c/0x68
[   22.108059]  kasan_save_track+0x20/0x40
[   22.108723]  kasan_save_free_info+0x4c/0x78
[   22.109448]  __kasan_slab_free+0x6c/0x98
[   22.109950]  kfree+0x110/0x3b8
[   22.110648]  rcu_uaf_reclaim+0x28/0x70
[   22.111159]  rcu_core+0xa54/0x1df8
[   22.111909]  rcu_core_si+0x18/0x30
[   22.112478]  handle_softirqs+0x36c/0xb18
[   22.113044]  __do_softirq+0x1c/0x28
[   22.113585] 
[   22.113995] Last potentially related work creation:
[   22.114609]  kasan_save_stack+0x3c/0x68
[   22.115152]  __kasan_record_aux_stack+0xbc/0xe8
[   22.116033]  kasan_record_aux_stack_noalloc+0x14/0x20
[   22.116646]  __call_rcu_common.constprop.0+0x74/0xa18
[   22.117296]  call_rcu+0x18/0x30
[   22.117785]  rcu_uaf+0x150/0x2e0
[   22.118311]  kunit_try_run_case+0x170/0x3f0
[   22.118899]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.119558]  kthread+0x24c/0x2d0
[   22.120209]  ret_from_fork+0x10/0x20
[   22.120670] 
[   22.121028] The buggy address belongs to the object at fff00000c4227280
[   22.121028]  which belongs to the cache kmalloc-32 of size 32
[   22.122123] The buggy address is located 0 bytes inside of
[   22.122123]  freed 32-byte region [fff00000c4227280, fff00000c42272a0)
[   22.123227] 
[   22.123568] The buggy address belongs to the physical page:
[   22.125182] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104227
[   22.126012] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.126699] page_type: f5(slab)
[   22.127284] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   22.128298] raw: 0000000000000000 0000000080400040 00000001f5000000 0000000000000000
[   22.129050] page dumped because: kasan: bad access detected
[   22.129644] 
[   22.129920] Memory state around the buggy address:
[   22.130497]  fff00000c4227180: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   22.131279]  fff00000c4227200: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   22.132259] >fff00000c4227280: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   22.132930]                    ^
[   22.133415]  fff00000c4227300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.134137]  fff00000c4227380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.134908] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[   21.968287] ==================================================================
[   21.968980] BUG: KASAN: slab-use-after-free in ksize_uaf+0x578/0x5d0
[   21.969670] Read of size 1 at addr fff00000c4228300 by task kunit_try_catch/184
[   21.970671] 
[   21.971040] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   21.971250] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.971360] Hardware name: linux,dummy-virt (DT)
[   21.971466] Call trace:
[   21.971532]  dump_backtrace+0x9c/0x128
[   21.971652]  show_stack+0x20/0x38
[   21.972140]  dump_stack_lvl+0x8c/0xd0
[   21.972267]  print_report+0x118/0x5f0
[   21.972412]  kasan_report+0xdc/0x128
[   21.972528]  __asan_report_load1_noabort+0x20/0x30
[   21.972649]  ksize_uaf+0x578/0x5d0
[   21.972763]  kunit_try_run_case+0x170/0x3f0
[   21.972925]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.973073]  kthread+0x24c/0x2d0
[   21.973149]  ret_from_fork+0x10/0x20
[   21.973200] 
[   21.980200] Allocated by task 184:
[   21.980530]  kasan_save_stack+0x3c/0x68
[   21.981121]  kasan_save_track+0x20/0x40
[   21.981738]  kasan_save_alloc_info+0x40/0x58
[   21.982473]  __kasan_kmalloc+0xd4/0xd8
[   21.983111]  __kmalloc_cache_noprof+0x154/0x320
[   21.983645]  ksize_uaf+0xb8/0x5d0
[   21.984517]  kunit_try_run_case+0x170/0x3f0
[   21.985438]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.986390]  kthread+0x24c/0x2d0
[   21.987028]  ret_from_fork+0x10/0x20
[   21.987437] 
[   21.987681] Freed by task 184:
[   21.989210]  kasan_save_stack+0x3c/0x68
[   21.989811]  kasan_save_track+0x20/0x40
[   21.990594]  kasan_save_free_info+0x4c/0x78
[   21.991234]  __kasan_slab_free+0x6c/0x98
[   21.991950]  kfree+0x110/0x3b8
[   21.993928]  ksize_uaf+0x120/0x5d0
[   21.994923]  kunit_try_run_case+0x170/0x3f0
[   21.995428]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.995916]  kthread+0x24c/0x2d0
[   21.996524]  ret_from_fork+0x10/0x20
[   21.996902] 
[   21.997540] The buggy address belongs to the object at fff00000c4228300
[   21.997540]  which belongs to the cache kmalloc-128 of size 128
[   22.000005] The buggy address is located 0 bytes inside of
[   22.000005]  freed 128-byte region [fff00000c4228300, fff00000c4228380)
[   22.001181] 
[   22.001491] The buggy address belongs to the physical page:
[   22.002977] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104228
[   22.005167] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.006016] page_type: f5(slab)
[   22.006638] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.007799] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   22.008775] page dumped because: kasan: bad access detected
[   22.009511] 
[   22.009797] Memory state around the buggy address:
[   22.010595]  fff00000c4228200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.011670]  fff00000c4228280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.012702] >fff00000c4228300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.013513]                    ^
[   22.014113]  fff00000c4228380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.014944]  fff00000c4228400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.016003] ==================================================================
[   21.926425] ==================================================================
[   21.927804] BUG: KASAN: slab-use-after-free in ksize_uaf+0x174/0x5d0
[   21.928504] Read of size 1 at addr fff00000c4228300 by task kunit_try_catch/184
[   21.929123] 
[   21.929438] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   21.929577] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.929612] Hardware name: linux,dummy-virt (DT)
[   21.929671] Call trace:
[   21.929767]  dump_backtrace+0x9c/0x128
[   21.929892]  show_stack+0x20/0x38
[   21.930019]  dump_stack_lvl+0x8c/0xd0
[   21.930138]  print_report+0x118/0x5f0
[   21.930249]  kasan_report+0xdc/0x128
[   21.930356]  __kasan_check_byte+0x54/0x70
[   21.930468]  ksize+0x30/0x88
[   21.930536]  ksize_uaf+0x174/0x5d0
[   21.930583]  kunit_try_run_case+0x170/0x3f0
[   21.930630]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.930684]  kthread+0x24c/0x2d0
[   21.930726]  ret_from_fork+0x10/0x20
[   21.930776] 
[   21.938140] Allocated by task 184:
[   21.938624]  kasan_save_stack+0x3c/0x68
[   21.939109]  kasan_save_track+0x20/0x40
[   21.940024]  kasan_save_alloc_info+0x40/0x58
[   21.940667]  __kasan_kmalloc+0xd4/0xd8
[   21.941242]  __kmalloc_cache_noprof+0x154/0x320
[   21.941974]  ksize_uaf+0xb8/0x5d0
[   21.942479]  kunit_try_run_case+0x170/0x3f0
[   21.943001]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.943678]  kthread+0x24c/0x2d0
[   21.944989]  ret_from_fork+0x10/0x20
[   21.945535] 
[   21.945833] Freed by task 184:
[   21.946350]  kasan_save_stack+0x3c/0x68
[   21.946923]  kasan_save_track+0x20/0x40
[   21.947511]  kasan_save_free_info+0x4c/0x78
[   21.948567]  __kasan_slab_free+0x6c/0x98
[   21.949153]  kfree+0x110/0x3b8
[   21.949624]  ksize_uaf+0x120/0x5d0
[   21.950144]  kunit_try_run_case+0x170/0x3f0
[   21.950693]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.951735]  kthread+0x24c/0x2d0
[   21.952236]  ret_from_fork+0x10/0x20
[   21.952672] 
[   21.952974] The buggy address belongs to the object at fff00000c4228300
[   21.952974]  which belongs to the cache kmalloc-128 of size 128
[   21.954079] The buggy address is located 0 bytes inside of
[   21.954079]  freed 128-byte region [fff00000c4228300, fff00000c4228380)
[   21.955261] 
[   21.955871] The buggy address belongs to the physical page:
[   21.956510] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104228
[   21.957382] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.958170] page_type: f5(slab)
[   21.958641] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.959640] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   21.960387] page dumped because: kasan: bad access detected
[   21.961035] 
[   21.961366] Memory state around the buggy address:
[   21.961937]  fff00000c4228200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.962748]  fff00000c4228280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.963507] >fff00000c4228300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.964726]                    ^
[   21.965386]  fff00000c4228380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.966079]  fff00000c4228400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.966696] ==================================================================
[   22.017129] ==================================================================
[   22.017816] BUG: KASAN: slab-use-after-free in ksize_uaf+0x53c/0x5d0
[   22.018776] Read of size 1 at addr fff00000c4228378 by task kunit_try_catch/184
[   22.019665] 
[   22.020064] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   22.020255] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.020325] Hardware name: linux,dummy-virt (DT)
[   22.020410] Call trace:
[   22.020478]  dump_backtrace+0x9c/0x128
[   22.020589]  show_stack+0x20/0x38
[   22.020702]  dump_stack_lvl+0x8c/0xd0
[   22.020829]  print_report+0x118/0x5f0
[   22.020943]  kasan_report+0xdc/0x128
[   22.021068]  __asan_report_load1_noabort+0x20/0x30
[   22.021190]  ksize_uaf+0x53c/0x5d0
[   22.021247]  kunit_try_run_case+0x170/0x3f0
[   22.021320]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.021375]  kthread+0x24c/0x2d0
[   22.021420]  ret_from_fork+0x10/0x20
[   22.021470] 
[   22.029086] Allocated by task 184:
[   22.029414]  kasan_save_stack+0x3c/0x68
[   22.030006]  kasan_save_track+0x20/0x40
[   22.030507]  kasan_save_alloc_info+0x40/0x58
[   22.031000]  __kasan_kmalloc+0xd4/0xd8
[   22.031528]  __kmalloc_cache_noprof+0x154/0x320
[   22.032581]  ksize_uaf+0xb8/0x5d0
[   22.033289]  kunit_try_run_case+0x170/0x3f0
[   22.033843]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.034469]  kthread+0x24c/0x2d0
[   22.034926]  ret_from_fork+0x10/0x20
[   22.035646] 
[   22.036018] Freed by task 184:
[   22.036410]  kasan_save_stack+0x3c/0x68
[   22.036950]  kasan_save_track+0x20/0x40
[   22.037474]  kasan_save_free_info+0x4c/0x78
[   22.038076]  __kasan_slab_free+0x6c/0x98
[   22.038585]  kfree+0x110/0x3b8
[   22.039090]  ksize_uaf+0x120/0x5d0
[   22.040286]  kunit_try_run_case+0x170/0x3f0
[   22.040676]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.040996]  kthread+0x24c/0x2d0
[   22.041270]  ret_from_fork+0x10/0x20
[   22.042203] 
[   22.042652] The buggy address belongs to the object at fff00000c4228300
[   22.042652]  which belongs to the cache kmalloc-128 of size 128
[   22.043942] The buggy address is located 120 bytes inside of
[   22.043942]  freed 128-byte region [fff00000c4228300, fff00000c4228380)
[   22.045109] 
[   22.045408] The buggy address belongs to the physical page:
[   22.046004] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104228
[   22.046938] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.048112] page_type: f5(slab)
[   22.048631] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.049283] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   22.050109] page dumped because: kasan: bad access detected
[   22.050629] 
[   22.050923] Memory state around the buggy address:
[   22.051581]  fff00000c4228200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.052753]  fff00000c4228280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.053504] >fff00000c4228300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.054180]                                                                 ^
[   22.054909]  fff00000c4228380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.055811]  fff00000c4228400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.056884] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   21.884804] ==================================================================
[   21.885755] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x720
[   21.886636] Read of size 1 at addr fff00000c422827f by task kunit_try_catch/182
[   21.887333] 
[   21.888224] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   21.888500] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.888571] Hardware name: linux,dummy-virt (DT)
[   21.888641] Call trace:
[   21.888702]  dump_backtrace+0x9c/0x128
[   21.888830]  show_stack+0x20/0x38
[   21.888893]  dump_stack_lvl+0x8c/0xd0
[   21.888946]  print_report+0x118/0x5f0
[   21.889022]  kasan_report+0xdc/0x128
[   21.889069]  __asan_report_load1_noabort+0x20/0x30
[   21.889120]  ksize_unpoisons_memory+0x690/0x720
[   21.889173]  kunit_try_run_case+0x170/0x3f0
[   21.889220]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.889274]  kthread+0x24c/0x2d0
[   21.889321]  ret_from_fork+0x10/0x20
[   21.889367] 
[   21.896699] Allocated by task 182:
[   21.897750]  kasan_save_stack+0x3c/0x68
[   21.898412]  kasan_save_track+0x20/0x40
[   21.898987]  kasan_save_alloc_info+0x40/0x58
[   21.899515]  __kasan_kmalloc+0xd4/0xd8
[   21.900496]  __kmalloc_cache_noprof+0x154/0x320
[   21.901094]  ksize_unpoisons_memory+0xc0/0x720
[   21.901653]  kunit_try_run_case+0x170/0x3f0
[   21.902202]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.902803]  kthread+0x24c/0x2d0
[   21.903294]  ret_from_fork+0x10/0x20
[   21.904510] 
[   21.904803] The buggy address belongs to the object at fff00000c4228200
[   21.904803]  which belongs to the cache kmalloc-128 of size 128
[   21.905826] The buggy address is located 12 bytes to the right of
[   21.905826]  allocated 115-byte region [fff00000c4228200, fff00000c4228273)
[   21.907013] 
[   21.907332] The buggy address belongs to the physical page:
[   21.908300] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104228
[   21.909112] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.909820] page_type: f5(slab)
[   21.910320] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.911114] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   21.912221] page dumped because: kasan: bad access detected
[   21.912867] 
[   21.913089] Memory state around the buggy address:
[   21.913521]  fff00000c4228100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.914633]  fff00000c4228180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.915745] >fff00000c4228200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   21.916456]                                                                 ^
[   21.917390]  fff00000c4228280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.918139]  fff00000c4228300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.918859] ==================================================================
[   21.813316] ==================================================================
[   21.814401] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x630/0x720
[   21.815285] Read of size 1 at addr fff00000c4228273 by task kunit_try_catch/182
[   21.816939] 
[   21.817298] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   21.817414] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.817494] Hardware name: linux,dummy-virt (DT)
[   21.817588] Call trace:
[   21.817677]  dump_backtrace+0x9c/0x128
[   21.817826]  show_stack+0x20/0x38
[   21.817896]  dump_stack_lvl+0x8c/0xd0
[   21.817948]  print_report+0x118/0x5f0
[   21.818024]  kasan_report+0xdc/0x128
[   21.818069]  __asan_report_load1_noabort+0x20/0x30
[   21.818120]  ksize_unpoisons_memory+0x630/0x720
[   21.818171]  kunit_try_run_case+0x170/0x3f0
[   21.818217]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.818270]  kthread+0x24c/0x2d0
[   21.818315]  ret_from_fork+0x10/0x20
[   21.818364] 
[   21.825516] Allocated by task 182:
[   21.825944]  kasan_save_stack+0x3c/0x68
[   21.826665]  kasan_save_track+0x20/0x40
[   21.827239]  kasan_save_alloc_info+0x40/0x58
[   21.828091]  __kasan_kmalloc+0xd4/0xd8
[   21.828580]  __kmalloc_cache_noprof+0x154/0x320
[   21.829236]  ksize_unpoisons_memory+0xc0/0x720
[   21.829902]  kunit_try_run_case+0x170/0x3f0
[   21.830527]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.831307]  kthread+0x24c/0x2d0
[   21.832019]  ret_from_fork+0x10/0x20
[   21.832551] 
[   21.832900] The buggy address belongs to the object at fff00000c4228200
[   21.832900]  which belongs to the cache kmalloc-128 of size 128
[   21.834213] The buggy address is located 0 bytes to the right of
[   21.834213]  allocated 115-byte region [fff00000c4228200, fff00000c4228273)
[   21.835978] 
[   21.836246] The buggy address belongs to the physical page:
[   21.837168] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104228
[   21.838071] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.838807] page_type: f5(slab)
[   21.839307] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.840288] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   21.841119] page dumped because: kasan: bad access detected
[   21.841748] 
[   21.842138] Memory state around the buggy address:
[   21.842777]  fff00000c4228100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.843858]  fff00000c4228180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.844623] >fff00000c4228200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   21.845513]                                                              ^
[   21.846185]  fff00000c4228280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.846877]  fff00000c4228300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.847824] ==================================================================
[   21.849738] ==================================================================
[   21.850446] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x720
[   21.851117] Read of size 1 at addr fff00000c4228278 by task kunit_try_catch/182
[   21.851887] 
[   21.852455] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   21.852672] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.852755] Hardware name: linux,dummy-virt (DT)
[   21.852854] Call trace:
[   21.852927]  dump_backtrace+0x9c/0x128
[   21.853059]  show_stack+0x20/0x38
[   21.853166]  dump_stack_lvl+0x8c/0xd0
[   21.853282]  print_report+0x118/0x5f0
[   21.853384]  kasan_report+0xdc/0x128
[   21.853481]  __asan_report_load1_noabort+0x20/0x30
[   21.853654]  ksize_unpoisons_memory+0x628/0x720
[   21.853760]  kunit_try_run_case+0x170/0x3f0
[   21.853854]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.853987]  kthread+0x24c/0x2d0
[   21.854041]  ret_from_fork+0x10/0x20
[   21.854091] 
[   21.860605] Allocated by task 182:
[   21.861073]  kasan_save_stack+0x3c/0x68
[   21.861516]  kasan_save_track+0x20/0x40
[   21.862055]  kasan_save_alloc_info+0x40/0x58
[   21.862629]  __kasan_kmalloc+0xd4/0xd8
[   21.863196]  __kmalloc_cache_noprof+0x154/0x320
[   21.864113]  ksize_unpoisons_memory+0xc0/0x720
[   21.864687]  kunit_try_run_case+0x170/0x3f0
[   21.865294]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.865976]  kthread+0x24c/0x2d0
[   21.866449]  ret_from_fork+0x10/0x20
[   21.866982] 
[   21.867297] The buggy address belongs to the object at fff00000c4228200
[   21.867297]  which belongs to the cache kmalloc-128 of size 128
[   21.868634] The buggy address is located 5 bytes to the right of
[   21.868634]  allocated 115-byte region [fff00000c4228200, fff00000c4228273)
[   21.869747] 
[   21.870105] The buggy address belongs to the physical page:
[   21.870808] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104228
[   21.872428] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.873150] page_type: f5(slab)
[   21.873623] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.874583] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   21.875613] page dumped because: kasan: bad access detected
[   21.876202] 
[   21.876484] Memory state around the buggy address:
[   21.877002]  fff00000c4228100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.877754]  fff00000c4228180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.878510] >fff00000c4228200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   21.879207]                                                                 ^
[   21.880207]  fff00000c4228280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.880953]  fff00000c4228300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.881664] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[   21.693884] ==================================================================
[   21.695008] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x408/0x478
[   21.695915] Read of size 1 at addr fff00000c41e2aa8 by task kunit_try_catch/176
[   21.697623] 
[   21.698094] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   21.698393] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.698433] Hardware name: linux,dummy-virt (DT)
[   21.698474] Call trace:
[   21.698504]  dump_backtrace+0x9c/0x128
[   21.698560]  show_stack+0x20/0x38
[   21.698603]  dump_stack_lvl+0x8c/0xd0
[   21.698649]  print_report+0x118/0x5f0
[   21.698695]  kasan_report+0xdc/0x128
[   21.698739]  __asan_report_load1_noabort+0x20/0x30
[   21.698790]  kmalloc_uaf2+0x408/0x478
[   21.698835]  kunit_try_run_case+0x170/0x3f0
[   21.698883]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.698937]  kthread+0x24c/0x2d0
[   21.699014]  ret_from_fork+0x10/0x20
[   21.699065] 
[   21.707264] Allocated by task 176:
[   21.707748]  kasan_save_stack+0x3c/0x68
[   21.708786]  kasan_save_track+0x20/0x40
[   21.709440]  kasan_save_alloc_info+0x40/0x58
[   21.709844]  __kasan_kmalloc+0xd4/0xd8
[   21.710220]  __kmalloc_cache_noprof+0x154/0x320
[   21.710638]  kmalloc_uaf2+0xc4/0x478
[   21.711478]  kunit_try_run_case+0x170/0x3f0
[   21.712383]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.713404]  kthread+0x24c/0x2d0
[   21.713767]  ret_from_fork+0x10/0x20
[   21.714281] 
[   21.714547] Freed by task 176:
[   21.715912]  kasan_save_stack+0x3c/0x68
[   21.716459]  kasan_save_track+0x20/0x40
[   21.717244]  kasan_save_free_info+0x4c/0x78
[   21.718125]  __kasan_slab_free+0x6c/0x98
[   21.718875]  kfree+0x110/0x3b8
[   21.720881]  kmalloc_uaf2+0x138/0x478
[   21.721603]  kunit_try_run_case+0x170/0x3f0
[   21.722331]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.722804]  kthread+0x24c/0x2d0
[   21.723550]  ret_from_fork+0x10/0x20
[   21.724600] 
[   21.724924] The buggy address belongs to the object at fff00000c41e2a80
[   21.724924]  which belongs to the cache kmalloc-64 of size 64
[   21.726317] The buggy address is located 40 bytes inside of
[   21.726317]  freed 64-byte region [fff00000c41e2a80, fff00000c41e2ac0)
[   21.728558] 
[   21.729309] The buggy address belongs to the physical page:
[   21.729832] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1041e2
[   21.730527] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.732011] page_type: f5(slab)
[   21.732479] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.733913] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   21.735712] page dumped because: kasan: bad access detected
[   21.736420] 
[   21.737115] Memory state around the buggy address:
[   21.737912]  fff00000c41e2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.738759]  fff00000c41e2a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.739433] >fff00000c41e2a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.740539]                                   ^
[   21.741033]  fff00000c41e2b00: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   21.741879]  fff00000c41e2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.742686] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[   21.643199] ==================================================================
[   21.644703] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x17c/0x328
[   21.645487] Write of size 33 at addr fff00000c41e2a00 by task kunit_try_catch/174
[   21.646280] 
[   21.646637] CPU: 0 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   21.646863] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.646939] Hardware name: linux,dummy-virt (DT)
[   21.647042] Call trace:
[   21.647112]  dump_backtrace+0x9c/0x128
[   21.647230]  show_stack+0x20/0x38
[   21.647334]  dump_stack_lvl+0x8c/0xd0
[   21.647516]  print_report+0x118/0x5f0
[   21.647656]  kasan_report+0xdc/0x128
[   21.647766]  kasan_check_range+0x100/0x1a8
[   21.647820]  __asan_memset+0x34/0x78
[   21.647866]  kmalloc_uaf_memset+0x17c/0x328
[   21.647917]  kunit_try_run_case+0x170/0x3f0
[   21.647990]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.648052]  kthread+0x24c/0x2d0
[   21.648099]  ret_from_fork+0x10/0x20
[   21.648147] 
[   21.656517] Allocated by task 174:
[   21.657417]  kasan_save_stack+0x3c/0x68
[   21.658000]  kasan_save_track+0x20/0x40
[   21.658468]  kasan_save_alloc_info+0x40/0x58
[   21.659259]  __kasan_kmalloc+0xd4/0xd8
[   21.659769]  __kmalloc_cache_noprof+0x154/0x320
[   21.660380]  kmalloc_uaf_memset+0xb8/0x328
[   21.661374]  kunit_try_run_case+0x170/0x3f0
[   21.661872]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.662513]  kthread+0x24c/0x2d0
[   21.663007]  ret_from_fork+0x10/0x20
[   21.663472] 
[   21.664229] Freed by task 174:
[   21.664665]  kasan_save_stack+0x3c/0x68
[   21.665202]  kasan_save_track+0x20/0x40
[   21.665686]  kasan_save_free_info+0x4c/0x78
[   21.666196]  __kasan_slab_free+0x6c/0x98
[   21.666773]  kfree+0x110/0x3b8
[   21.667242]  kmalloc_uaf_memset+0x120/0x328
[   21.667917]  kunit_try_run_case+0x170/0x3f0
[   21.668458]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.669135]  kthread+0x24c/0x2d0
[   21.669623]  ret_from_fork+0x10/0x20
[   21.670639] 
[   21.670948] The buggy address belongs to the object at fff00000c41e2a00
[   21.670948]  which belongs to the cache kmalloc-64 of size 64
[   21.672336] The buggy address is located 0 bytes inside of
[   21.672336]  freed 64-byte region [fff00000c41e2a00, fff00000c41e2a40)
[   21.673611] 
[   21.673894] The buggy address belongs to the physical page:
[   21.674553] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1041e2
[   21.675588] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.676392] page_type: f5(slab)
[   21.676832] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.677587] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   21.678546] page dumped because: kasan: bad access detected
[   21.679274] 
[   21.679938] Memory state around the buggy address:
[   21.680561]  fff00000c41e2900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.681399]  fff00000c41e2980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.682235] >fff00000c41e2a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.683043]                    ^
[   21.683805]  fff00000c41e2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.684628]  fff00000c41e2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.685428] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[   21.598212] ==================================================================
[   21.599165] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x30c/0x340
[   21.599892] Read of size 1 at addr fff00000c662ad88 by task kunit_try_catch/172
[   21.600710] 
[   21.601096] CPU: 1 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   21.601301] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.601376] Hardware name: linux,dummy-virt (DT)
[   21.601461] Call trace:
[   21.601527]  dump_backtrace+0x9c/0x128
[   21.601643]  show_stack+0x20/0x38
[   21.601750]  dump_stack_lvl+0x8c/0xd0
[   21.601869]  print_report+0x118/0x5f0
[   21.602000]  kasan_report+0xdc/0x128
[   21.602108]  __asan_report_load1_noabort+0x20/0x30
[   21.602229]  kmalloc_uaf+0x30c/0x340
[   21.602336]  kunit_try_run_case+0x170/0x3f0
[   21.602430]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.602488]  kthread+0x24c/0x2d0
[   21.602532]  ret_from_fork+0x10/0x20
[   21.602584] 
[   21.607609] Allocated by task 172:
[   21.608005]  kasan_save_stack+0x3c/0x68
[   21.608562]  kasan_save_track+0x20/0x40
[   21.609222]  kasan_save_alloc_info+0x40/0x58
[   21.609925]  __kasan_kmalloc+0xd4/0xd8
[   21.610543]  __kmalloc_cache_noprof+0x154/0x320
[   21.611167]  kmalloc_uaf+0xb8/0x340
[   21.612117]  kunit_try_run_case+0x170/0x3f0
[   21.612689]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.613414]  kthread+0x24c/0x2d0
[   21.613902]  ret_from_fork+0x10/0x20
[   21.614426] 
[   21.614736] Freed by task 172:
[   21.615214]  kasan_save_stack+0x3c/0x68
[   21.615750]  kasan_save_track+0x20/0x40
[   21.616240]  kasan_save_free_info+0x4c/0x78
[   21.616688]  __kasan_slab_free+0x6c/0x98
[   21.617294]  kfree+0x110/0x3b8
[   21.617897]  kmalloc_uaf+0x120/0x340
[   21.618430]  kunit_try_run_case+0x170/0x3f0
[   21.619125]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.619862]  kthread+0x24c/0x2d0
[   21.620403]  ret_from_fork+0x10/0x20
[   21.620923] 
[   21.621302] The buggy address belongs to the object at fff00000c662ad80
[   21.621302]  which belongs to the cache kmalloc-16 of size 16
[   21.622467] The buggy address is located 8 bytes inside of
[   21.622467]  freed 16-byte region [fff00000c662ad80, fff00000c662ad90)
[   21.623726] 
[   21.624067] The buggy address belongs to the physical page:
[   21.624737] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a
[   21.625674] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.626498] page_type: f5(slab)
[   21.627063] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.627871] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   21.628690] page dumped because: kasan: bad access detected
[   21.629374] 
[   21.629730] Memory state around the buggy address:
[   21.630316]  fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc
[   21.631048]  fff00000c662ad00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.631734] >fff00000c662ad80: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.632280]                       ^
[   21.632633]  fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.633282]  fff00000c662ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.634147] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   21.553439] ==================================================================
[   21.554426] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x15c/0x2f8
[   21.555226] Read of size 64 at addr fff00000c413b784 by task kunit_try_catch/170
[   21.556013] 
[   21.556567] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   21.556787] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.556863] Hardware name: linux,dummy-virt (DT)
[   21.556912] Call trace:
[   21.556941]  dump_backtrace+0x9c/0x128
[   21.557050]  show_stack+0x20/0x38
[   21.557097]  dump_stack_lvl+0x8c/0xd0
[   21.557146]  print_report+0x118/0x5f0
[   21.557191]  kasan_report+0xdc/0x128
[   21.557232]  kasan_check_range+0x100/0x1a8
[   21.557277]  __asan_memmove+0x3c/0x98
[   21.557319]  kmalloc_memmove_invalid_size+0x15c/0x2f8
[   21.557371]  kunit_try_run_case+0x170/0x3f0
[   21.557416]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.557467]  kthread+0x24c/0x2d0
[   21.557509]  ret_from_fork+0x10/0x20
[   21.557558] 
[   21.565921] Allocated by task 170:
[   21.566438]  kasan_save_stack+0x3c/0x68
[   21.567057]  kasan_save_track+0x20/0x40
[   21.567901]  kasan_save_alloc_info+0x40/0x58
[   21.568518]  __kasan_kmalloc+0xd4/0xd8
[   21.569067]  __kmalloc_cache_noprof+0x154/0x320
[   21.569665]  kmalloc_memmove_invalid_size+0xb8/0x2f8
[   21.570322]  kunit_try_run_case+0x170/0x3f0
[   21.570866]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.571785]  kthread+0x24c/0x2d0
[   21.572290]  ret_from_fork+0x10/0x20
[   21.572860] 
[   21.573240] The buggy address belongs to the object at fff00000c413b780
[   21.573240]  which belongs to the cache kmalloc-64 of size 64
[   21.574487] The buggy address is located 4 bytes inside of
[   21.574487]  allocated 64-byte region [fff00000c413b780, fff00000c413b7c0)
[   21.575865] 
[   21.576235] The buggy address belongs to the physical page:
[   21.577675] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10413b
[   21.578529] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.579247] page_type: f5(slab)
[   21.579706] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.580477] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   21.581504] page dumped because: kasan: bad access detected
[   21.582240] 
[   21.582743] Memory state around the buggy address:
[   21.583493]  fff00000c413b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.584457]  fff00000c413b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.585179] >fff00000c413b780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.585843]                                            ^
[   21.586400]  fff00000c413b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.587080]  fff00000c413b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.587735] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   21.510218] ==================================================================
[   21.511427] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x15c/0x2f8
[   21.512370] Read of size 18446744073709551614 at addr fff00000c413b704 by task kunit_try_catch/168
[   21.513157] 
[   21.513476] CPU: 1 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   21.513610] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.513644] Hardware name: linux,dummy-virt (DT)
[   21.513696] Call trace:
[   21.514053]  dump_backtrace+0x9c/0x128
[   21.514226]  show_stack+0x20/0x38
[   21.514387]  dump_stack_lvl+0x8c/0xd0
[   21.514492]  print_report+0x118/0x5f0
[   21.514542]  kasan_report+0xdc/0x128
[   21.514584]  kasan_check_range+0x100/0x1a8
[   21.514629]  __asan_memmove+0x3c/0x98
[   21.514672]  kmalloc_memmove_negative_size+0x15c/0x2f8
[   21.514723]  kunit_try_run_case+0x170/0x3f0
[   21.514767]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.514818]  kthread+0x24c/0x2d0
[   21.514860]  ret_from_fork+0x10/0x20
[   21.514907] 
[   21.523222] Allocated by task 168:
[   21.523685]  kasan_save_stack+0x3c/0x68
[   21.524402]  kasan_save_track+0x20/0x40
[   21.524980]  kasan_save_alloc_info+0x40/0x58
[   21.525459]  __kasan_kmalloc+0xd4/0xd8
[   21.526045]  __kmalloc_cache_noprof+0x154/0x320
[   21.526606]  kmalloc_memmove_negative_size+0xb8/0x2f8
[   21.527359]  kunit_try_run_case+0x170/0x3f0
[   21.527856]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.528562]  kthread+0x24c/0x2d0
[   21.529067]  ret_from_fork+0x10/0x20
[   21.529545] 
[   21.529848] The buggy address belongs to the object at fff00000c413b700
[   21.529848]  which belongs to the cache kmalloc-64 of size 64
[   21.531174] The buggy address is located 4 bytes inside of
[   21.531174]  64-byte region [fff00000c413b700, fff00000c413b740)
[   21.533285] 
[   21.533744] The buggy address belongs to the physical page:
[   21.534496] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10413b
[   21.535453] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.536210] page_type: f5(slab)
[   21.536629] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.537709] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000
[   21.538314] page dumped because: kasan: bad access detected
[   21.538571] 
[   21.538697] Memory state around the buggy address:
[   21.538930]  fff00000c413b600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.539580]  fff00000c413b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.541159] >fff00000c413b700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   21.541897]                    ^
[   21.542532]  fff00000c413b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.543360]  fff00000c413b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.544242] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[   21.466586] ==================================================================
[   21.468142] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x15c/0x310
[   21.469288] Write of size 16 at addr fff00000c41c1969 by task kunit_try_catch/166
[   21.470122] 
[   21.470478] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   21.470678] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.470751] Hardware name: linux,dummy-virt (DT)
[   21.470837] Call trace:
[   21.470905]  dump_backtrace+0x9c/0x128
[   21.471045]  show_stack+0x20/0x38
[   21.471151]  dump_stack_lvl+0x8c/0xd0
[   21.471268]  print_report+0x118/0x5f0
[   21.471420]  kasan_report+0xdc/0x128
[   21.471529]  kasan_check_range+0x100/0x1a8
[   21.471632]  __asan_memset+0x34/0x78
[   21.471730]  kmalloc_oob_memset_16+0x15c/0x310
[   21.471837]  kunit_try_run_case+0x170/0x3f0
[   21.471937]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.472066]  kthread+0x24c/0x2d0
[   21.472165]  ret_from_fork+0x10/0x20
[   21.472246] 
[   21.480803] Allocated by task 166:
[   21.481201]  kasan_save_stack+0x3c/0x68
[   21.481986]  kasan_save_track+0x20/0x40
[   21.482673]  kasan_save_alloc_info+0x40/0x58
[   21.483234]  __kasan_kmalloc+0xd4/0xd8
[   21.484022]  __kmalloc_cache_noprof+0x154/0x320
[   21.484561]  kmalloc_oob_memset_16+0xb0/0x310
[   21.485125]  kunit_try_run_case+0x170/0x3f0
[   21.485629]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.486251]  kthread+0x24c/0x2d0
[   21.486705]  ret_from_fork+0x10/0x20
[   21.487190] 
[   21.488363] The buggy address belongs to the object at fff00000c41c1900
[   21.488363]  which belongs to the cache kmalloc-128 of size 128
[   21.489371] The buggy address is located 105 bytes inside of
[   21.489371]  allocated 120-byte region [fff00000c41c1900, fff00000c41c1978)
[   21.490543] 
[   21.490859] The buggy address belongs to the physical page:
[   21.491443] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1041c1
[   21.492348] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.493474] page_type: f5(slab)
[   21.493920] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.494574] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   21.495298] page dumped because: kasan: bad access detected
[   21.496570] 
[   21.497085] Memory state around the buggy address:
[   21.497518]  fff00000c41c1800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   21.498417]  fff00000c41c1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.499349] >fff00000c41c1900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.500301]                                                                 ^
[   21.501062]  fff00000c41c1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.502021]  fff00000c41c1a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.502819] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[   21.416297] ==================================================================
[   21.417303] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x15c/0x310
[   21.418000] Write of size 8 at addr fff00000c416b871 by task kunit_try_catch/164
[   21.419322] 
[   21.420008] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   21.420285] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.420353] Hardware name: linux,dummy-virt (DT)
[   21.420393] Call trace:
[   21.420421]  dump_backtrace+0x9c/0x128
[   21.420474]  show_stack+0x20/0x38
[   21.420516]  dump_stack_lvl+0x8c/0xd0
[   21.420563]  print_report+0x118/0x5f0
[   21.420605]  kasan_report+0xdc/0x128
[   21.420646]  kasan_check_range+0x100/0x1a8
[   21.420690]  __asan_memset+0x34/0x78
[   21.420733]  kmalloc_oob_memset_8+0x15c/0x310
[   21.420795]  kunit_try_run_case+0x170/0x3f0
[   21.420842]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.420894]  kthread+0x24c/0x2d0
[   21.420936]  ret_from_fork+0x10/0x20
[   21.421012] 
[   21.428993] Allocated by task 164:
[   21.429491]  kasan_save_stack+0x3c/0x68
[   21.429985]  kasan_save_track+0x20/0x40
[   21.430467]  kasan_save_alloc_info+0x40/0x58
[   21.430985]  __kasan_kmalloc+0xd4/0xd8
[   21.431505]  __kmalloc_cache_noprof+0x154/0x320
[   21.432033]  kmalloc_oob_memset_8+0xb0/0x310
[   21.432598]  kunit_try_run_case+0x170/0x3f0
[   21.433404]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.433986]  kthread+0x24c/0x2d0
[   21.434506]  ret_from_fork+0x10/0x20
[   21.435032] 
[   21.435314] The buggy address belongs to the object at fff00000c416b800
[   21.435314]  which belongs to the cache kmalloc-128 of size 128
[   21.438101] The buggy address is located 113 bytes inside of
[   21.438101]  allocated 120-byte region [fff00000c416b800, fff00000c416b878)
[   21.439836] 
[   21.440149] The buggy address belongs to the physical page:
[   21.441031] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10416b
[   21.441805] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.442512] page_type: f5(slab)
[   21.442951] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.444467] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   21.445245] page dumped because: kasan: bad access detected
[   21.445814] 
[   21.446163] Memory state around the buggy address:
[   21.446706]  fff00000c416b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   21.447645]  fff00000c416b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.448736] >fff00000c416b800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.449513]                                                                 ^
[   21.450096]  fff00000c416b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.450780]  fff00000c416b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.451479] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[   21.372941] ==================================================================
[   21.373887] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x15c/0x318
[   21.374653] Write of size 4 at addr fff00000c41c1775 by task kunit_try_catch/162
[   21.375429] 
[   21.376186] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   21.376870] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.376910] Hardware name: linux,dummy-virt (DT)
[   21.376947] Call trace:
[   21.377003]  dump_backtrace+0x9c/0x128
[   21.377060]  show_stack+0x20/0x38
[   21.377102]  dump_stack_lvl+0x8c/0xd0
[   21.377147]  print_report+0x118/0x5f0
[   21.377191]  kasan_report+0xdc/0x128
[   21.377234]  kasan_check_range+0x100/0x1a8
[   21.377280]  __asan_memset+0x34/0x78
[   21.377324]  kmalloc_oob_memset_4+0x15c/0x318
[   21.377373]  kunit_try_run_case+0x170/0x3f0
[   21.377418]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.377469]  kthread+0x24c/0x2d0
[   21.377515]  ret_from_fork+0x10/0x20
[   21.377563] 
[   21.385843] Allocated by task 162:
[   21.386399]  kasan_save_stack+0x3c/0x68
[   21.386949]  kasan_save_track+0x20/0x40
[   21.387886]  kasan_save_alloc_info+0x40/0x58
[   21.388595]  __kasan_kmalloc+0xd4/0xd8
[   21.388992]  __kmalloc_cache_noprof+0x154/0x320
[   21.389747]  kmalloc_oob_memset_4+0xb0/0x318
[   21.390391]  kunit_try_run_case+0x170/0x3f0
[   21.390942]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.391976]  kthread+0x24c/0x2d0
[   21.392611]  ret_from_fork+0x10/0x20
[   21.393093] 
[   21.393613] The buggy address belongs to the object at fff00000c41c1700
[   21.393613]  which belongs to the cache kmalloc-128 of size 128
[   21.394841] The buggy address is located 117 bytes inside of
[   21.394841]  allocated 120-byte region [fff00000c41c1700, fff00000c41c1778)
[   21.396242] 
[   21.396553] The buggy address belongs to the physical page:
[   21.397525] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1041c1
[   21.398385] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.399133] page_type: f5(slab)
[   21.400033] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.400692] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   21.401503] page dumped because: kasan: bad access detected
[   21.402087] 
[   21.402392] Memory state around the buggy address:
[   21.402868]  fff00000c41c1600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   21.404045]  fff00000c41c1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.404676] >fff00000c41c1700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.405409]                                                                 ^
[   21.406082]  fff00000c41c1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.406799]  fff00000c41c1800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.408211] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[   21.330942] ==================================================================
[   21.331942] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x15c/0x310
[   21.333218] Write of size 2 at addr fff00000c416b577 by task kunit_try_catch/160
[   21.334024] 
[   21.334378] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   21.334617] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.334694] Hardware name: linux,dummy-virt (DT)
[   21.334747] Call trace:
[   21.334773]  dump_backtrace+0x9c/0x128
[   21.334826]  show_stack+0x20/0x38
[   21.334906]  dump_stack_lvl+0x8c/0xd0
[   21.334990]  print_report+0x118/0x5f0
[   21.335041]  kasan_report+0xdc/0x128
[   21.335084]  kasan_check_range+0x100/0x1a8
[   21.335131]  __asan_memset+0x34/0x78
[   21.335178]  kmalloc_oob_memset_2+0x15c/0x310
[   21.335227]  kunit_try_run_case+0x170/0x3f0
[   21.335273]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.335325]  kthread+0x24c/0x2d0
[   21.335366]  ret_from_fork+0x10/0x20
[   21.335413] 
[   21.342504] Allocated by task 160:
[   21.342924]  kasan_save_stack+0x3c/0x68
[   21.343449]  kasan_save_track+0x20/0x40
[   21.344034]  kasan_save_alloc_info+0x40/0x58
[   21.344659]  __kasan_kmalloc+0xd4/0xd8
[   21.345311]  __kmalloc_cache_noprof+0x154/0x320
[   21.345980]  kmalloc_oob_memset_2+0xb0/0x310
[   21.346572]  kunit_try_run_case+0x170/0x3f0
[   21.347174]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.347834]  kthread+0x24c/0x2d0
[   21.348354]  ret_from_fork+0x10/0x20
[   21.348941] 
[   21.349285] The buggy address belongs to the object at fff00000c416b500
[   21.349285]  which belongs to the cache kmalloc-128 of size 128
[   21.350492] The buggy address is located 119 bytes inside of
[   21.350492]  allocated 120-byte region [fff00000c416b500, fff00000c416b578)
[   21.351730] 
[   21.352087] The buggy address belongs to the physical page:
[   21.352778] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10416b
[   21.353711] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.354478] page_type: f5(slab)
[   21.355015] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.355868] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   21.356655] page dumped because: kasan: bad access detected
[   21.357304] 
[   21.357651] Memory state around the buggy address:
[   21.358252]  fff00000c416b400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.359031]  fff00000c416b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.359830] >fff00000c416b500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.360587]                                                                 ^
[   21.361398]  fff00000c416b580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.362185]  fff00000c416b600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.362931] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   21.290241] ==================================================================
[   21.291233] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x150/0x2e8
[   21.292600] Write of size 128 at addr fff00000c416b400 by task kunit_try_catch/158
[   21.293314] 
[   21.293628] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   21.293944] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.294038] Hardware name: linux,dummy-virt (DT)
[   21.294125] Call trace:
[   21.294187]  dump_backtrace+0x9c/0x128
[   21.294299]  show_stack+0x20/0x38
[   21.294401]  dump_stack_lvl+0x8c/0xd0
[   21.294473]  print_report+0x118/0x5f0
[   21.294520]  kasan_report+0xdc/0x128
[   21.294563]  kasan_check_range+0x100/0x1a8
[   21.294610]  __asan_memset+0x34/0x78
[   21.294653]  kmalloc_oob_in_memset+0x150/0x2e8
[   21.294701]  kunit_try_run_case+0x170/0x3f0
[   21.294747]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.294798]  kthread+0x24c/0x2d0
[   21.294841]  ret_from_fork+0x10/0x20
[   21.294888] 
[   21.302424] Allocated by task 158:
[   21.303040]  kasan_save_stack+0x3c/0x68
[   21.303704]  kasan_save_track+0x20/0x40
[   21.304375]  kasan_save_alloc_info+0x40/0x58
[   21.304950]  __kasan_kmalloc+0xd4/0xd8
[   21.305712]  __kmalloc_cache_noprof+0x154/0x320
[   21.306437]  kmalloc_oob_in_memset+0xb0/0x2e8
[   21.307055]  kunit_try_run_case+0x170/0x3f0
[   21.307650]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.308375]  kthread+0x24c/0x2d0
[   21.308955]  ret_from_fork+0x10/0x20
[   21.309508] 
[   21.309928] The buggy address belongs to the object at fff00000c416b400
[   21.309928]  which belongs to the cache kmalloc-128 of size 128
[   21.311268] The buggy address is located 0 bytes inside of
[   21.311268]  allocated 120-byte region [fff00000c416b400, fff00000c416b478)
[   21.312576] 
[   21.312909] The buggy address belongs to the physical page:
[   21.313594] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10416b
[   21.314362] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.315057] page_type: f5(slab)
[   21.315516] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.316368] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   21.317094] page dumped because: kasan: bad access detected
[   21.317723] 
[   21.318067] Memory state around the buggy address:
[   21.318571]  fff00000c416b300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.319382]  fff00000c416b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.320070] >fff00000c416b400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.320842]                                                                 ^
[   21.321492]  fff00000c416b480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.322263]  fff00000c416b500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.322937] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[   21.243241] ==================================================================
[   21.244227] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   21.245008] Read of size 16 at addr fff00000c662ad60 by task kunit_try_catch/156
[   21.245846] 
[   21.246252] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   21.246513] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.246606] Hardware name: linux,dummy-virt (DT)
[   21.246719] Call trace:
[   21.246787]  dump_backtrace+0x9c/0x128
[   21.246902]  show_stack+0x20/0x38
[   21.247024]  dump_stack_lvl+0x8c/0xd0
[   21.247092]  print_report+0x118/0x5f0
[   21.247137]  kasan_report+0xdc/0x128
[   21.247181]  __asan_report_load16_noabort+0x20/0x30
[   21.247231]  kmalloc_uaf_16+0x3bc/0x438
[   21.247276]  kunit_try_run_case+0x170/0x3f0
[   21.247321]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.247373]  kthread+0x24c/0x2d0
[   21.247415]  ret_from_fork+0x10/0x20
[   21.247462] 
[   21.253872] Allocated by task 156:
[   21.254400]  kasan_save_stack+0x3c/0x68
[   21.254887]  kasan_save_track+0x20/0x40
[   21.255547]  kasan_save_alloc_info+0x40/0x58
[   21.256168]  __kasan_kmalloc+0xd4/0xd8
[   21.256740]  __kmalloc_cache_noprof+0x154/0x320
[   21.257363]  kmalloc_uaf_16+0x144/0x438
[   21.257911]  kunit_try_run_case+0x170/0x3f0
[   21.258607]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.259223]  kthread+0x24c/0x2d0
[   21.259783]  ret_from_fork+0x10/0x20
[   21.260353] 
[   21.260690] Freed by task 156:
[   21.261114]  kasan_save_stack+0x3c/0x68
[   21.261713]  kasan_save_track+0x20/0x40
[   21.262289]  kasan_save_free_info+0x4c/0x78
[   21.262880]  __kasan_slab_free+0x6c/0x98
[   21.263438]  kfree+0x110/0x3b8
[   21.263999]  kmalloc_uaf_16+0x198/0x438
[   21.264562]  kunit_try_run_case+0x170/0x3f0
[   21.265166]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.265772]  kthread+0x24c/0x2d0
[   21.266323]  ret_from_fork+0x10/0x20
[   21.266820] 
[   21.267207] The buggy address belongs to the object at fff00000c662ad60
[   21.267207]  which belongs to the cache kmalloc-16 of size 16
[   21.268294] The buggy address is located 0 bytes inside of
[   21.268294]  freed 16-byte region [fff00000c662ad60, fff00000c662ad70)
[   21.269406] 
[   21.269810] The buggy address belongs to the physical page:
[   21.270489] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a
[   21.271345] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.272115] page_type: f5(slab)
[   21.272605] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.273457] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   21.274223] page dumped because: kasan: bad access detected
[   21.274844] 
[   21.275204] Memory state around the buggy address:
[   21.275820]  fff00000c662ac00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.276533]  fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc
[   21.277382] >fff00000c662ad00: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   21.278145]                                                        ^
[   21.278804]  fff00000c662ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.279579]  fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.280328] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[   21.204606] ==================================================================
[   21.205621] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a8/0x400
[   21.206370] Write of size 16 at addr fff00000c662ad00 by task kunit_try_catch/154
[   21.207261] 
[   21.207630] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   21.207845] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.207986] Hardware name: linux,dummy-virt (DT)
[   21.208079] Call trace:
[   21.208146]  dump_backtrace+0x9c/0x128
[   21.208260]  show_stack+0x20/0x38
[   21.208364]  dump_stack_lvl+0x8c/0xd0
[   21.208475]  print_report+0x118/0x5f0
[   21.208537]  kasan_report+0xdc/0x128
[   21.208584]  __asan_report_store16_noabort+0x20/0x30
[   21.208635]  kmalloc_oob_16+0x3a8/0x400
[   21.208680]  kunit_try_run_case+0x170/0x3f0
[   21.208726]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.208790]  kthread+0x24c/0x2d0
[   21.208837]  ret_from_fork+0x10/0x20
[   21.208885] 
[   21.214864] Allocated by task 154:
[   21.215431]  kasan_save_stack+0x3c/0x68
[   21.216080]  kasan_save_track+0x20/0x40
[   21.216507]  kasan_save_alloc_info+0x40/0x58
[   21.216998]  __kasan_kmalloc+0xd4/0xd8
[   21.217608]  __kmalloc_cache_noprof+0x154/0x320
[   21.218313]  kmalloc_oob_16+0xb4/0x400
[   21.218954]  kunit_try_run_case+0x170/0x3f0
[   21.219564]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.220313]  kthread+0x24c/0x2d0
[   21.220870]  ret_from_fork+0x10/0x20
[   21.221413] 
[   21.221754] The buggy address belongs to the object at fff00000c662ad00
[   21.221754]  which belongs to the cache kmalloc-16 of size 16
[   21.222926] The buggy address is located 0 bytes inside of
[   21.222926]  allocated 13-byte region [fff00000c662ad00, fff00000c662ad0d)
[   21.224133] 
[   21.224492] The buggy address belongs to the physical page:
[   21.225139] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a
[   21.225988] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.226754] page_type: f5(slab)
[   21.227214] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   21.227979] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   21.229009] page dumped because: kasan: bad access detected
[   21.229618] 
[   21.229996] Memory state around the buggy address:
[   21.230579]  fff00000c662ac00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   21.231256]  fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc fa fb fc fc
[   21.232090] >fff00000c662ad00: 00 05 fc fc 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.232869]                       ^
[   21.233405]  fff00000c662ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.234213]  fff00000c662ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.234986] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[   21.145495] ==================================================================
[   21.146244] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c4/0x510
[   21.147171] Read of size 1 at addr fff00000c6540800 by task kunit_try_catch/152
[   21.148062] 
[   21.148405] CPU: 1 UID: 0 PID: 152 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   21.148674] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.148784] Hardware name: linux,dummy-virt (DT)
[   21.148870] Call trace:
[   21.148935]  dump_backtrace+0x9c/0x128
[   21.149067]  show_stack+0x20/0x38
[   21.149168]  dump_stack_lvl+0x8c/0xd0
[   21.149308]  print_report+0x118/0x5f0
[   21.149410]  kasan_report+0xdc/0x128
[   21.149515]  __asan_report_load1_noabort+0x20/0x30
[   21.149654]  krealloc_uaf+0x4c4/0x510
[   21.149786]  kunit_try_run_case+0x170/0x3f0
[   21.149884]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.150006]  kthread+0x24c/0x2d0
[   21.150150]  ret_from_fork+0x10/0x20
[   21.150269] 
[   21.157656] Allocated by task 152:
[   21.158216]  kasan_save_stack+0x3c/0x68
[   21.158798]  kasan_save_track+0x20/0x40
[   21.160142]  kasan_save_alloc_info+0x40/0x58
[   21.160749]  __kasan_kmalloc+0xd4/0xd8
[   21.161356]  __kmalloc_cache_noprof+0x154/0x320
[   21.161996]  krealloc_uaf+0xc8/0x510
[   21.162537]  kunit_try_run_case+0x170/0x3f0
[   21.163141]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.164023]  kthread+0x24c/0x2d0
[   21.164530]  ret_from_fork+0x10/0x20
[   21.165113] 
[   21.165481] Freed by task 152:
[   21.166083]  kasan_save_stack+0x3c/0x68
[   21.166539]  kasan_save_track+0x20/0x40
[   21.166988]  kasan_save_free_info+0x4c/0x78
[   21.167885]  __kasan_slab_free+0x6c/0x98
[   21.168867]  kfree+0x110/0x3b8
[   21.169456]  krealloc_uaf+0x130/0x510
[   21.169912]  kunit_try_run_case+0x170/0x3f0
[   21.170417]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.171144]  kthread+0x24c/0x2d0
[   21.171799]  ret_from_fork+0x10/0x20
[   21.172726] 
[   21.173252] The buggy address belongs to the object at fff00000c6540800
[   21.173252]  which belongs to the cache kmalloc-256 of size 256
[   21.174373] The buggy address is located 0 bytes inside of
[   21.174373]  freed 256-byte region [fff00000c6540800, fff00000c6540900)
[   21.175473] 
[   21.175768] The buggy address belongs to the physical page:
[   21.176337] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106540
[   21.177396] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.178244] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.178982] page_type: f5(slab)
[   21.179667] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   21.180447] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   21.181224] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   21.182037] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   21.182863] head: 0bfffe0000000001 ffffc1ffc3195001 ffffffffffffffff 0000000000000000
[   21.183781] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   21.184420] page dumped because: kasan: bad access detected
[   21.185738] 
[   21.186006] Memory state around the buggy address:
[   21.186396]  fff00000c6540700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.186916]  fff00000c6540780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.188651] >fff00000c6540800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.189376]                    ^
[   21.189761]  fff00000c6540880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.190549]  fff00000c6540900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.191814] ==================================================================
[   21.098403] ==================================================================
[   21.099485] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x18c/0x510
[   21.100509] Read of size 1 at addr fff00000c6540800 by task kunit_try_catch/152
[   21.101935] 
[   21.102284] CPU: 1 UID: 0 PID: 152 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   21.102491] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.102568] Hardware name: linux,dummy-virt (DT)
[   21.102655] Call trace:
[   21.102722]  dump_backtrace+0x9c/0x128
[   21.102797]  show_stack+0x20/0x38
[   21.102841]  dump_stack_lvl+0x8c/0xd0
[   21.102888]  print_report+0x118/0x5f0
[   21.102935]  kasan_report+0xdc/0x128
[   21.103008]  __kasan_check_byte+0x54/0x70
[   21.103057]  krealloc_noprof+0x48/0x1a0
[   21.103104]  krealloc_uaf+0x18c/0x510
[   21.103150]  kunit_try_run_case+0x170/0x3f0
[   21.103196]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.103247]  kthread+0x24c/0x2d0
[   21.103292]  ret_from_fork+0x10/0x20
[   21.103339] 
[   21.110372] Allocated by task 152:
[   21.110753]  kasan_save_stack+0x3c/0x68
[   21.112160]  kasan_save_track+0x20/0x40
[   21.113042]  kasan_save_alloc_info+0x40/0x58
[   21.113664]  __kasan_kmalloc+0xd4/0xd8
[   21.114194]  __kmalloc_cache_noprof+0x154/0x320
[   21.114771]  krealloc_uaf+0xc8/0x510
[   21.115256]  kunit_try_run_case+0x170/0x3f0
[   21.115752]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.116515]  kthread+0x24c/0x2d0
[   21.117032]  ret_from_fork+0x10/0x20
[   21.117548] 
[   21.117891] Freed by task 152:
[   21.118315]  kasan_save_stack+0x3c/0x68
[   21.118877]  kasan_save_track+0x20/0x40
[   21.119422]  kasan_save_free_info+0x4c/0x78
[   21.120394]  __kasan_slab_free+0x6c/0x98
[   21.120992]  kfree+0x110/0x3b8
[   21.121489]  krealloc_uaf+0x130/0x510
[   21.121981]  kunit_try_run_case+0x170/0x3f0
[   21.122523]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.123235]  kthread+0x24c/0x2d0
[   21.123682]  ret_from_fork+0x10/0x20
[   21.124709] 
[   21.125089] The buggy address belongs to the object at fff00000c6540800
[   21.125089]  which belongs to the cache kmalloc-256 of size 256
[   21.126005] The buggy address is located 0 bytes inside of
[   21.126005]  freed 256-byte region [fff00000c6540800, fff00000c6540900)
[   21.127151] 
[   21.127547] The buggy address belongs to the physical page:
[   21.128312] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106540
[   21.129357] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.130179] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.130955] page_type: f5(slab)
[   21.131339] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   21.132581] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   21.133416] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   21.134261] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   21.135068] head: 0bfffe0000000001 ffffc1ffc3195001 ffffffffffffffff 0000000000000000
[   21.135950] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   21.137067] page dumped because: kasan: bad access detected
[   21.137814] 
[   21.138343] Memory state around the buggy address:
[   21.139026]  fff00000c6540700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.140152]  fff00000c6540780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.140921] >fff00000c6540800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.141713]                    ^
[   21.142173]  fff00000c6540880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.142888]  fff00000c6540900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.143677] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   20.778241] ==================================================================
[   20.779091] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa98/0xbc8
[   20.780100] Write of size 1 at addr fff00000c1e2d8ea by task kunit_try_catch/146
[   20.780874] 
[   20.781198] CPU: 1 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   20.781391] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.781455] Hardware name: linux,dummy-virt (DT)
[   20.781523] Call trace:
[   20.781573]  dump_backtrace+0x9c/0x128
[   20.781667]  show_stack+0x20/0x38
[   20.781762]  dump_stack_lvl+0x8c/0xd0
[   20.781922]  print_report+0x118/0x5f0
[   20.782057]  kasan_report+0xdc/0x128
[   20.782167]  __asan_report_store1_noabort+0x20/0x30
[   20.782289]  krealloc_less_oob_helper+0xa98/0xbc8
[   20.782412]  krealloc_less_oob+0x20/0x38
[   20.782577]  kunit_try_run_case+0x170/0x3f0
[   20.782691]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.782814]  kthread+0x24c/0x2d0
[   20.782886]  ret_from_fork+0x10/0x20
[   20.782936] 
[   20.793440] Allocated by task 146:
[   20.794181]  kasan_save_stack+0x3c/0x68
[   20.794846]  kasan_save_track+0x20/0x40
[   20.795416]  kasan_save_alloc_info+0x40/0x58
[   20.795950]  __kasan_krealloc+0x118/0x178
[   20.797258]  krealloc_noprof+0x10c/0x1a0
[   20.797804]  krealloc_less_oob_helper+0x170/0xbc8
[   20.798434]  krealloc_less_oob+0x20/0x38
[   20.798981]  kunit_try_run_case+0x170/0x3f0
[   20.799544]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.800213]  kthread+0x24c/0x2d0
[   20.800759]  ret_from_fork+0x10/0x20
[   20.801568] 
[   20.801864] The buggy address belongs to the object at fff00000c1e2d800
[   20.801864]  which belongs to the cache kmalloc-256 of size 256
[   20.803214] The buggy address is located 33 bytes to the right of
[   20.803214]  allocated 201-byte region [fff00000c1e2d800, fff00000c1e2d8c9)
[   20.805039] 
[   20.805358] The buggy address belongs to the physical page:
[   20.805877] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e2c
[   20.806731] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.807701] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.808632] page_type: f5(slab)
[   20.809166] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   20.809899] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   20.810742] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   20.811695] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   20.812598] head: 0bfffe0000000001 ffffc1ffc3078b01 ffffffffffffffff 0000000000000000
[   20.813398] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   20.814141] page dumped because: kasan: bad access detected
[   20.814725] 
[   20.815122] Memory state around the buggy address:
[   20.815607]  fff00000c1e2d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.816560]  fff00000c1e2d800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.817414] >fff00000c1e2d880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   20.818098]                                                           ^
[   20.818885]  fff00000c1e2d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.819707]  fff00000c1e2d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.820540] ==================================================================
[   20.972637] ==================================================================
[   20.973796] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb20/0xbc8
[   20.974534] Write of size 1 at addr fff00000c69660d0 by task kunit_try_catch/150
[   20.975249] 
[   20.975651] CPU: 0 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   20.975858] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.975935] Hardware name: linux,dummy-virt (DT)
[   20.976041] Call trace:
[   20.976110]  dump_backtrace+0x9c/0x128
[   20.976229]  show_stack+0x20/0x38
[   20.976334]  dump_stack_lvl+0x8c/0xd0
[   20.976436]  print_report+0x118/0x5f0
[   20.976576]  kasan_report+0xdc/0x128
[   20.976679]  __asan_report_store1_noabort+0x20/0x30
[   20.976736]  krealloc_less_oob_helper+0xb20/0xbc8
[   20.976802]  krealloc_large_less_oob+0x20/0x38
[   20.976855]  kunit_try_run_case+0x170/0x3f0
[   20.976904]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.976956]  kthread+0x24c/0x2d0
[   20.977035]  ret_from_fork+0x10/0x20
[   20.977082] 
[   20.983508] The buggy address belongs to the physical page:
[   20.984090] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106964
[   20.985833] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.986627] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.988231] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.989052] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.989853] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.990622] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.991471] head: 0bfffe0000000002 ffffc1ffc31a5901 ffffffffffffffff 0000000000000000
[   20.992256] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   20.993053] page dumped because: kasan: bad access detected
[   20.993683] 
[   20.994048] Memory state around the buggy address:
[   20.994580]  fff00000c6965f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.995320]  fff00000c6966000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.996206] >fff00000c6966080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   20.996982]                                                  ^
[   20.997711]  fff00000c6966100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.998550]  fff00000c6966180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.999266] ==================================================================
[   20.644651] ==================================================================
[   20.645693] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa2c/0xbc8
[   20.646478] Write of size 1 at addr fff00000c1e2d8c9 by task kunit_try_catch/146
[   20.647377] 
[   20.647703] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   20.647899] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.647987] Hardware name: linux,dummy-virt (DT)
[   20.648067] Call trace:
[   20.648126]  dump_backtrace+0x9c/0x128
[   20.648231]  show_stack+0x20/0x38
[   20.648319]  dump_stack_lvl+0x8c/0xd0
[   20.648412]  print_report+0x118/0x5f0
[   20.648513]  kasan_report+0xdc/0x128
[   20.648662]  __asan_report_store1_noabort+0x20/0x30
[   20.648801]  krealloc_less_oob_helper+0xa2c/0xbc8
[   20.648920]  krealloc_less_oob+0x20/0x38
[   20.649056]  kunit_try_run_case+0x170/0x3f0
[   20.649213]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.649342]  kthread+0x24c/0x2d0
[   20.649407]  ret_from_fork+0x10/0x20
[   20.649457] 
[   20.656685] Allocated by task 146:
[   20.657081]  kasan_save_stack+0x3c/0x68
[   20.657486]  kasan_save_track+0x20/0x40
[   20.657855]  kasan_save_alloc_info+0x40/0x58
[   20.661074]  __kasan_krealloc+0x118/0x178
[   20.662281]  krealloc_noprof+0x10c/0x1a0
[   20.664439]  krealloc_less_oob_helper+0x170/0xbc8
[   20.665568]  krealloc_less_oob+0x20/0x38
[   20.666583]  kunit_try_run_case+0x170/0x3f0
[   20.668348]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.670049]  kthread+0x24c/0x2d0
[   20.670618]  ret_from_fork+0x10/0x20
[   20.671251] 
[   20.671743] The buggy address belongs to the object at fff00000c1e2d800
[   20.671743]  which belongs to the cache kmalloc-256 of size 256
[   20.673434] The buggy address is located 0 bytes to the right of
[   20.673434]  allocated 201-byte region [fff00000c1e2d800, fff00000c1e2d8c9)
[   20.674752] 
[   20.675148] The buggy address belongs to the physical page:
[   20.676240] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e2c
[   20.677189] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.678065] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.678734] page_type: f5(slab)
[   20.679421] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   20.680387] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   20.681490] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   20.682447] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   20.683449] head: 0bfffe0000000001 ffffc1ffc3078b01 ffffffffffffffff 0000000000000000
[   20.684860] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   20.685587] page dumped because: kasan: bad access detected
[   20.686131] 
[   20.686403] Memory state around the buggy address:
[   20.687072]  fff00000c1e2d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.688593]  fff00000c1e2d800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.689422] >fff00000c1e2d880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   20.690215]                                               ^
[   20.690878]  fff00000c1e2d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.691727]  fff00000c1e2d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.692496] ==================================================================
[   21.000798] ==================================================================
[   21.002185] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa54/0xbc8
[   21.002947] Write of size 1 at addr fff00000c69660da by task kunit_try_catch/150
[   21.004502] 
[   21.004806] CPU: 0 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   21.005160] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.005254] Hardware name: linux,dummy-virt (DT)
[   21.005340] Call trace:
[   21.005405]  dump_backtrace+0x9c/0x128
[   21.005474]  show_stack+0x20/0x38
[   21.005516]  dump_stack_lvl+0x8c/0xd0
[   21.005560]  print_report+0x118/0x5f0
[   21.005603]  kasan_report+0xdc/0x128
[   21.005644]  __asan_report_store1_noabort+0x20/0x30
[   21.005693]  krealloc_less_oob_helper+0xa54/0xbc8
[   21.005744]  krealloc_large_less_oob+0x20/0x38
[   21.005793]  kunit_try_run_case+0x170/0x3f0
[   21.005838]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.005890]  kthread+0x24c/0x2d0
[   21.005933]  ret_from_fork+0x10/0x20
[   21.006009] 
[   21.014081] The buggy address belongs to the physical page:
[   21.014702] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106964
[   21.016032] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.016928] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.017747] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.018582] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   21.019751] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.020458] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   21.021321] head: 0bfffe0000000002 ffffc1ffc31a5901 ffffffffffffffff 0000000000000000
[   21.022087] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   21.022820] page dumped because: kasan: bad access detected
[   21.023506] 
[   21.023782] Memory state around the buggy address:
[   21.024439]  fff00000c6965f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.025145]  fff00000c6966000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.025891] >fff00000c6966080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   21.026595]                                                     ^
[   21.027257]  fff00000c6966100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.027939]  fff00000c6966180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.029735] ==================================================================
[   21.061080] ==================================================================
[   21.061695] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa3c/0xbc8
[   21.062372] Write of size 1 at addr fff00000c69660eb by task kunit_try_catch/150
[   21.063045] 
[   21.063392] CPU: 0 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   21.063596] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.063672] Hardware name: linux,dummy-virt (DT)
[   21.063755] Call trace:
[   21.063819]  dump_backtrace+0x9c/0x128
[   21.063931]  show_stack+0x20/0x38
[   21.064056]  dump_stack_lvl+0x8c/0xd0
[   21.064163]  print_report+0x118/0x5f0
[   21.064267]  kasan_report+0xdc/0x128
[   21.064372]  __asan_report_store1_noabort+0x20/0x30
[   21.064489]  krealloc_less_oob_helper+0xa3c/0xbc8
[   21.064608]  krealloc_large_less_oob+0x20/0x38
[   21.064777]  kunit_try_run_case+0x170/0x3f0
[   21.064885]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.065016]  kthread+0x24c/0x2d0
[   21.065069]  ret_from_fork+0x10/0x20
[   21.065116] 
[   21.074138] The buggy address belongs to the physical page:
[   21.074837] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106964
[   21.075750] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.077294] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.078072] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.078914] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   21.079757] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.080590] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   21.081411] head: 0bfffe0000000002 ffffc1ffc31a5901 ffffffffffffffff 0000000000000000
[   21.082192] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   21.082922] page dumped because: kasan: bad access detected
[   21.083524] 
[   21.083839] Memory state around the buggy address:
[   21.084471]  fff00000c6965f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.085319]  fff00000c6966000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.086151] >fff00000c6966080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   21.086867]                                                           ^
[   21.087608]  fff00000c6966100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.088344]  fff00000c6966180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.089091] ==================================================================
[   20.694264] ==================================================================
[   20.695054] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb20/0xbc8
[   20.696039] Write of size 1 at addr fff00000c1e2d8d0 by task kunit_try_catch/146
[   20.697124] 
[   20.697522] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   20.697817] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.697892] Hardware name: linux,dummy-virt (DT)
[   20.697996] Call trace:
[   20.698054]  dump_backtrace+0x9c/0x128
[   20.698157]  show_stack+0x20/0x38
[   20.698246]  dump_stack_lvl+0x8c/0xd0
[   20.698332]  print_report+0x118/0x5f0
[   20.698415]  kasan_report+0xdc/0x128
[   20.698507]  __asan_report_store1_noabort+0x20/0x30
[   20.698618]  krealloc_less_oob_helper+0xb20/0xbc8
[   20.698740]  krealloc_less_oob+0x20/0x38
[   20.698938]  kunit_try_run_case+0x170/0x3f0
[   20.699066]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.699271]  kthread+0x24c/0x2d0
[   20.699405]  ret_from_fork+0x10/0x20
[   20.699628] 
[   20.707357] Allocated by task 146:
[   20.707941]  kasan_save_stack+0x3c/0x68
[   20.708562]  kasan_save_track+0x20/0x40
[   20.709080]  kasan_save_alloc_info+0x40/0x58
[   20.709808]  __kasan_krealloc+0x118/0x178
[   20.710477]  krealloc_noprof+0x10c/0x1a0
[   20.710908]  krealloc_less_oob_helper+0x170/0xbc8
[   20.711904]  krealloc_less_oob+0x20/0x38
[   20.712654]  kunit_try_run_case+0x170/0x3f0
[   20.713405]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.714149]  kthread+0x24c/0x2d0
[   20.714707]  ret_from_fork+0x10/0x20
[   20.715349] 
[   20.715609] The buggy address belongs to the object at fff00000c1e2d800
[   20.715609]  which belongs to the cache kmalloc-256 of size 256
[   20.717136] The buggy address is located 7 bytes to the right of
[   20.717136]  allocated 201-byte region [fff00000c1e2d800, fff00000c1e2d8c9)
[   20.718542] 
[   20.718917] The buggy address belongs to the physical page:
[   20.719518] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e2c
[   20.720200] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.721095] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.721842] page_type: f5(slab)
[   20.722422] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   20.723199] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   20.724038] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   20.724857] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   20.725669] head: 0bfffe0000000001 ffffc1ffc3078b01 ffffffffffffffff 0000000000000000
[   20.726529] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   20.727305] page dumped because: kasan: bad access detected
[   20.727935] 
[   20.728279] Memory state around the buggy address:
[   20.728901]  fff00000c1e2d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.729656]  fff00000c1e2d800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.730450] >fff00000c1e2d880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   20.731194]                                                  ^
[   20.731852]  fff00000c1e2d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.732630]  fff00000c1e2d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.733407] ==================================================================
[   20.942075] ==================================================================
[   20.943130] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa2c/0xbc8
[   20.944909] Write of size 1 at addr fff00000c69660c9 by task kunit_try_catch/150
[   20.945640] 
[   20.945979] CPU: 0 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   20.946167] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.946231] Hardware name: linux,dummy-virt (DT)
[   20.946319] Call trace:
[   20.946387]  dump_backtrace+0x9c/0x128
[   20.946504]  show_stack+0x20/0x38
[   20.946611]  dump_stack_lvl+0x8c/0xd0
[   20.946773]  print_report+0x118/0x5f0
[   20.946887]  kasan_report+0xdc/0x128
[   20.947012]  __asan_report_store1_noabort+0x20/0x30
[   20.947132]  krealloc_less_oob_helper+0xa2c/0xbc8
[   20.947205]  krealloc_large_less_oob+0x20/0x38
[   20.947256]  kunit_try_run_case+0x170/0x3f0
[   20.947302]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.947354]  kthread+0x24c/0x2d0
[   20.947453]  ret_from_fork+0x10/0x20
[   20.947560] 
[   20.955224] The buggy address belongs to the physical page:
[   20.956270] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106964
[   20.957511] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.958225] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.959035] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.959993] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.960907] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.961726] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.962565] head: 0bfffe0000000002 ffffc1ffc31a5901 ffffffffffffffff 0000000000000000
[   20.963431] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   20.964250] page dumped because: kasan: bad access detected
[   20.964705] 
[   20.964951] Memory state around the buggy address:
[   20.965482]  fff00000c6965f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.966343]  fff00000c6966000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.967056] >fff00000c6966080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   20.968077]                                               ^
[   20.968951]  fff00000c6966100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.969804]  fff00000c6966180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.970926] ==================================================================
[   20.736205] ==================================================================
[   20.736871] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa54/0xbc8
[   20.737733] Write of size 1 at addr fff00000c1e2d8da by task kunit_try_catch/146
[   20.738473] 
[   20.738808] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   20.739059] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.739154] Hardware name: linux,dummy-virt (DT)
[   20.739270] Call trace:
[   20.739325]  dump_backtrace+0x9c/0x128
[   20.739468]  show_stack+0x20/0x38
[   20.739578]  dump_stack_lvl+0x8c/0xd0
[   20.739682]  print_report+0x118/0x5f0
[   20.739782]  kasan_report+0xdc/0x128
[   20.739889]  __asan_report_store1_noabort+0x20/0x30
[   20.740063]  krealloc_less_oob_helper+0xa54/0xbc8
[   20.740187]  krealloc_less_oob+0x20/0x38
[   20.740324]  kunit_try_run_case+0x170/0x3f0
[   20.740465]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.740541]  kthread+0x24c/0x2d0
[   20.740589]  ret_from_fork+0x10/0x20
[   20.740637] 
[   20.748185] Allocated by task 146:
[   20.748687]  kasan_save_stack+0x3c/0x68
[   20.749296]  kasan_save_track+0x20/0x40
[   20.749843]  kasan_save_alloc_info+0x40/0x58
[   20.750472]  __kasan_krealloc+0x118/0x178
[   20.751072]  krealloc_noprof+0x10c/0x1a0
[   20.751901]  krealloc_less_oob_helper+0x170/0xbc8
[   20.752613]  krealloc_less_oob+0x20/0x38
[   20.753233]  kunit_try_run_case+0x170/0x3f0
[   20.753785]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.754494]  kthread+0x24c/0x2d0
[   20.755077]  ret_from_fork+0x10/0x20
[   20.755991] 
[   20.756364] The buggy address belongs to the object at fff00000c1e2d800
[   20.756364]  which belongs to the cache kmalloc-256 of size 256
[   20.758465] The buggy address is located 17 bytes to the right of
[   20.758465]  allocated 201-byte region [fff00000c1e2d800, fff00000c1e2d8c9)
[   20.760048] 
[   20.760389] The buggy address belongs to the physical page:
[   20.761058] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e2c
[   20.761925] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.762815] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.763581] page_type: f5(slab)
[   20.764081] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   20.764932] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   20.765778] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   20.766633] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   20.767473] head: 0bfffe0000000001 ffffc1ffc3078b01 ffffffffffffffff 0000000000000000
[   20.768319] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   20.769123] page dumped because: kasan: bad access detected
[   20.769743] 
[   20.770107] Memory state around the buggy address:
[   20.770729]  fff00000c1e2d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.771488]  fff00000c1e2d800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.772290] >fff00000c1e2d880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   20.773073]                                                     ^
[   20.773749]  fff00000c1e2d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.774523]  fff00000c1e2d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.775337] ==================================================================
[   20.822259] ==================================================================
[   20.823015] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa3c/0xbc8
[   20.824281] Write of size 1 at addr fff00000c1e2d8eb by task kunit_try_catch/146
[   20.825088] 
[   20.825430] CPU: 1 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   20.825637] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.825714] Hardware name: linux,dummy-virt (DT)
[   20.825799] Call trace:
[   20.825849]  dump_backtrace+0x9c/0x128
[   20.825902]  show_stack+0x20/0x38
[   20.825944]  dump_stack_lvl+0x8c/0xd0
[   20.826063]  print_report+0x118/0x5f0
[   20.826172]  kasan_report+0xdc/0x128
[   20.826284]  __asan_report_store1_noabort+0x20/0x30
[   20.826411]  krealloc_less_oob_helper+0xa3c/0xbc8
[   20.826534]  krealloc_less_oob+0x20/0x38
[   20.826653]  kunit_try_run_case+0x170/0x3f0
[   20.826769]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.826833]  kthread+0x24c/0x2d0
[   20.826876]  ret_from_fork+0x10/0x20
[   20.826923] 
[   20.834765] Allocated by task 146:
[   20.835273]  kasan_save_stack+0x3c/0x68
[   20.835709]  kasan_save_track+0x20/0x40
[   20.836403]  kasan_save_alloc_info+0x40/0x58
[   20.836990]  __kasan_krealloc+0x118/0x178
[   20.837528]  krealloc_noprof+0x10c/0x1a0
[   20.838626]  krealloc_less_oob_helper+0x170/0xbc8
[   20.839392]  krealloc_less_oob+0x20/0x38
[   20.840304]  kunit_try_run_case+0x170/0x3f0
[   20.840717]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.841460]  kthread+0x24c/0x2d0
[   20.841941]  ret_from_fork+0x10/0x20
[   20.842480] 
[   20.842787] The buggy address belongs to the object at fff00000c1e2d800
[   20.842787]  which belongs to the cache kmalloc-256 of size 256
[   20.844212] The buggy address is located 34 bytes to the right of
[   20.844212]  allocated 201-byte region [fff00000c1e2d800, fff00000c1e2d8c9)
[   20.845851] 
[   20.846186] The buggy address belongs to the physical page:
[   20.846739] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e2c
[   20.847905] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.848672] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.849387] page_type: f5(slab)
[   20.849868] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   20.850723] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   20.851566] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   20.852547] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   20.853366] head: 0bfffe0000000001 ffffc1ffc3078b01 ffffffffffffffff 0000000000000000
[   20.854147] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   20.854850] page dumped because: kasan: bad access detected
[   20.855489] 
[   20.855793] Memory state around the buggy address:
[   20.856427]  fff00000c1e2d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.857800]  fff00000c1e2d800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.858694] >fff00000c1e2d880: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   20.859340]                                                           ^
[   20.860107]  fff00000c1e2d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.860912]  fff00000c1e2d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.861783] ==================================================================
[   21.030657] ==================================================================
[   21.031742] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa98/0xbc8
[   21.032907] Write of size 1 at addr fff00000c69660ea by task kunit_try_catch/150
[   21.033682] 
[   21.034012] CPU: 0 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   21.034178] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.034214] Hardware name: linux,dummy-virt (DT)
[   21.034251] Call trace:
[   21.034291]  dump_backtrace+0x9c/0x128
[   21.034453]  show_stack+0x20/0x38
[   21.034562]  dump_stack_lvl+0x8c/0xd0
[   21.034670]  print_report+0x118/0x5f0
[   21.034776]  kasan_report+0xdc/0x128
[   21.034881]  __asan_report_store1_noabort+0x20/0x30
[   21.035016]  krealloc_less_oob_helper+0xa98/0xbc8
[   21.035076]  krealloc_large_less_oob+0x20/0x38
[   21.035129]  kunit_try_run_case+0x170/0x3f0
[   21.035176]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.035228]  kthread+0x24c/0x2d0
[   21.035275]  ret_from_fork+0x10/0x20
[   21.035322] 
[   21.043067] The buggy address belongs to the physical page:
[   21.043592] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106964
[   21.044754] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.046245] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   21.047714] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.048760] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   21.049625] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   21.050317] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   21.051084] head: 0bfffe0000000002 ffffc1ffc31a5901 ffffffffffffffff 0000000000000000
[   21.052048] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   21.053198] page dumped because: kasan: bad access detected
[   21.053741] 
[   21.053950] Memory state around the buggy address:
[   21.054647]  fff00000c6965f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.055467]  fff00000c6966000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.056271] >fff00000c6966080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   21.057486]                                                           ^
[   21.058325]  fff00000c6966100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.059176]  fff00000c6966180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.060103] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   20.551104] ==================================================================
[   20.552143] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x628/0x690
[   20.552792] Write of size 1 at addr fff00000c1e2d6eb by task kunit_try_catch/144
[   20.554151] 
[   20.554619] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   20.554870] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.554949] Hardware name: linux,dummy-virt (DT)
[   20.555036] Call trace:
[   20.555067]  dump_backtrace+0x9c/0x128
[   20.555123]  show_stack+0x20/0x38
[   20.555167]  dump_stack_lvl+0x8c/0xd0
[   20.555212]  print_report+0x118/0x5f0
[   20.555254]  kasan_report+0xdc/0x128
[   20.555296]  __asan_report_store1_noabort+0x20/0x30
[   20.555345]  krealloc_more_oob_helper+0x628/0x690
[   20.555450]  krealloc_more_oob+0x20/0x38
[   20.555558]  kunit_try_run_case+0x170/0x3f0
[   20.555663]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.555746]  kthread+0x24c/0x2d0
[   20.555795]  ret_from_fork+0x10/0x20
[   20.555842] 
[   20.563622] Allocated by task 144:
[   20.564044]  kasan_save_stack+0x3c/0x68
[   20.564745]  kasan_save_track+0x20/0x40
[   20.565403]  kasan_save_alloc_info+0x40/0x58
[   20.566013]  __kasan_krealloc+0x118/0x178
[   20.566856]  krealloc_noprof+0x10c/0x1a0
[   20.567737]  krealloc_more_oob_helper+0x170/0x690
[   20.569041]  krealloc_more_oob+0x20/0x38
[   20.569776]  kunit_try_run_case+0x170/0x3f0
[   20.570333]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.571055]  kthread+0x24c/0x2d0
[   20.571553]  ret_from_fork+0x10/0x20
[   20.572021] 
[   20.572372] The buggy address belongs to the object at fff00000c1e2d600
[   20.572372]  which belongs to the cache kmalloc-256 of size 256
[   20.573583] The buggy address is located 0 bytes to the right of
[   20.573583]  allocated 235-byte region [fff00000c1e2d600, fff00000c1e2d6eb)
[   20.574809] 
[   20.575183] The buggy address belongs to the physical page:
[   20.575887] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e2c
[   20.577301] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.578278] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.579054] page_type: f5(slab)
[   20.579468] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   20.580633] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   20.581538] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   20.582461] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   20.583407] head: 0bfffe0000000001 ffffc1ffc3078b01 ffffffffffffffff 0000000000000000
[   20.584422] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   20.585375] page dumped because: kasan: bad access detected
[   20.586009] 
[   20.586296] Memory state around the buggy address:
[   20.586837]  fff00000c1e2d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.587872]  fff00000c1e2d600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.588875] >fff00000c1e2d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   20.589927]                                                           ^
[   20.590576]  fff00000c1e2d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.591511]  fff00000c1e2d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.592340] ==================================================================
[   20.901491] ==================================================================
[   20.902849] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5dc/0x690
[   20.904635] Write of size 1 at addr fff00000c68ee0f0 by task kunit_try_catch/148
[   20.905777] 
[   20.906127] CPU: 1 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   20.906331] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.906405] Hardware name: linux,dummy-virt (DT)
[   20.906496] Call trace:
[   20.906560]  dump_backtrace+0x9c/0x128
[   20.906671]  show_stack+0x20/0x38
[   20.906774]  dump_stack_lvl+0x8c/0xd0
[   20.906865]  print_report+0x118/0x5f0
[   20.906911]  kasan_report+0xdc/0x128
[   20.906954]  __asan_report_store1_noabort+0x20/0x30
[   20.907039]  krealloc_more_oob_helper+0x5dc/0x690
[   20.907094]  krealloc_large_more_oob+0x20/0x38
[   20.907146]  kunit_try_run_case+0x170/0x3f0
[   20.907194]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.907248]  kthread+0x24c/0x2d0
[   20.907291]  ret_from_fork+0x10/0x20
[   20.907339] 
[   20.914275] The buggy address belongs to the physical page:
[   20.915050] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068ec
[   20.915890] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.916685] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.917506] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.918328] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.919091] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.919889] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.920726] head: 0bfffe0000000002 ffffc1ffc31a3b01 ffffffffffffffff 0000000000000000
[   20.921553] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   20.922393] page dumped because: kasan: bad access detected
[   20.922819] 
[   20.924362] Memory state around the buggy address:
[   20.925597]  fff00000c68edf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.927655]  fff00000c68ee000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.928956] >fff00000c68ee080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   20.931039]                                                              ^
[   20.932215]  fff00000c68ee100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.932736]  fff00000c68ee180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.934313] ==================================================================
[   20.594176] ==================================================================
[   20.595436] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5dc/0x690
[   20.596526] Write of size 1 at addr fff00000c1e2d6f0 by task kunit_try_catch/144
[   20.597091] 
[   20.597365] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   20.597465] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.597497] Hardware name: linux,dummy-virt (DT)
[   20.597534] Call trace:
[   20.597560]  dump_backtrace+0x9c/0x128
[   20.597614]  show_stack+0x20/0x38
[   20.597656]  dump_stack_lvl+0x8c/0xd0
[   20.597702]  print_report+0x118/0x5f0
[   20.597747]  kasan_report+0xdc/0x128
[   20.597794]  __asan_report_store1_noabort+0x20/0x30
[   20.597847]  krealloc_more_oob_helper+0x5dc/0x690
[   20.597901]  krealloc_more_oob+0x20/0x38
[   20.597951]  kunit_try_run_case+0x170/0x3f0
[   20.598098]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.598310]  kthread+0x24c/0x2d0
[   20.598477]  ret_from_fork+0x10/0x20
[   20.598626] 
[   20.606235] Allocated by task 144:
[   20.606730]  kasan_save_stack+0x3c/0x68
[   20.608270]  kasan_save_track+0x20/0x40
[   20.608827]  kasan_save_alloc_info+0x40/0x58
[   20.609453]  __kasan_krealloc+0x118/0x178
[   20.610075]  krealloc_noprof+0x10c/0x1a0
[   20.610719]  krealloc_more_oob_helper+0x170/0x690
[   20.611348]  krealloc_more_oob+0x20/0x38
[   20.612289]  kunit_try_run_case+0x170/0x3f0
[   20.612877]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.613542]  kthread+0x24c/0x2d0
[   20.614038]  ret_from_fork+0x10/0x20
[   20.614546] 
[   20.614876] The buggy address belongs to the object at fff00000c1e2d600
[   20.614876]  which belongs to the cache kmalloc-256 of size 256
[   20.616265] The buggy address is located 5 bytes to the right of
[   20.616265]  allocated 235-byte region [fff00000c1e2d600, fff00000c1e2d6eb)
[   20.617461] 
[   20.617746] The buggy address belongs to the physical page:
[   20.619344] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101e2c
[   20.620453] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.621265] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.622030] page_type: f5(slab)
[   20.622512] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   20.623306] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   20.624739] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   20.625654] head: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   20.626483] head: 0bfffe0000000001 ffffc1ffc3078b01 ffffffffffffffff 0000000000000000
[   20.627285] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   20.628335] page dumped because: kasan: bad access detected
[   20.628945] 
[   20.629467] Memory state around the buggy address:
[   20.629914]  fff00000c1e2d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.630772]  fff00000c1e2d600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.632227] >fff00000c1e2d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   20.633055]                                                              ^
[   20.634001]  fff00000c1e2d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.634751]  fff00000c1e2d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.635809] ==================================================================
[   20.870281] ==================================================================
[   20.871299] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x628/0x690
[   20.872501] Write of size 1 at addr fff00000c68ee0eb by task kunit_try_catch/148
[   20.873915] 
[   20.874387] CPU: 1 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   20.874600] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.874694] Hardware name: linux,dummy-virt (DT)
[   20.874809] Call trace:
[   20.874878]  dump_backtrace+0x9c/0x128
[   20.875008]  show_stack+0x20/0x38
[   20.875070]  dump_stack_lvl+0x8c/0xd0
[   20.875123]  print_report+0x118/0x5f0
[   20.875166]  kasan_report+0xdc/0x128
[   20.875209]  __asan_report_store1_noabort+0x20/0x30
[   20.875259]  krealloc_more_oob_helper+0x628/0x690
[   20.875310]  krealloc_large_more_oob+0x20/0x38
[   20.875365]  kunit_try_run_case+0x170/0x3f0
[   20.875499]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.875617]  kthread+0x24c/0x2d0
[   20.875711]  ret_from_fork+0x10/0x20
[   20.875768] 
[   20.884459] The buggy address belongs to the physical page:
[   20.885371] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068ec
[   20.886168] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.886921] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.887926] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.889084] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.889886] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.890638] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.891443] head: 0bfffe0000000002 ffffc1ffc31a3b01 ffffffffffffffff 0000000000000000
[   20.892376] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   20.893121] page dumped because: kasan: bad access detected
[   20.893674] 
[   20.893991] Memory state around the buggy address:
[   20.894525]  fff00000c68edf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.895306]  fff00000c68ee000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.896662] >fff00000c68ee080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   20.897617]                                                           ^
[   20.898160]  fff00000c68ee100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.898921]  fff00000c68ee180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.900217] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[   20.519082] ==================================================================
[   20.520738] BUG: KASAN: use-after-free in page_alloc_uaf+0x33c/0x368
[   20.521271] Read of size 1 at addr fff00000c69d0000 by task kunit_try_catch/142
[   20.522033] 
[   20.522415] CPU: 0 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   20.522634] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.522712] Hardware name: linux,dummy-virt (DT)
[   20.522800] Call trace:
[   20.522869]  dump_backtrace+0x9c/0x128
[   20.523010]  show_stack+0x20/0x38
[   20.523119]  dump_stack_lvl+0x8c/0xd0
[   20.523209]  print_report+0x118/0x5f0
[   20.523319]  kasan_report+0xdc/0x128
[   20.523425]  __asan_report_load1_noabort+0x20/0x30
[   20.523770]  page_alloc_uaf+0x33c/0x368
[   20.523899]  kunit_try_run_case+0x170/0x3f0
[   20.524033]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.524117]  kthread+0x24c/0x2d0
[   20.524167]  ret_from_fork+0x10/0x20
[   20.524216] 
[   20.530953] The buggy address belongs to the physical page:
[   20.532430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069d0
[   20.533299] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.534069] page_type: f0(buddy)
[   20.534738] raw: 0bfffe0000000000 fff00000ff6162e0 fff00000ff6162e0 0000000000000000
[   20.535874] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000
[   20.536652] page dumped because: kasan: bad access detected
[   20.537254] 
[   20.537560] Memory state around the buggy address:
[   20.538117]  fff00000c69cff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.538874]  fff00000c69cff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.539632] >fff00000c69d0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.540829]                    ^
[   20.541162]  fff00000c69d0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.541939]  fff00000c69d0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.542946] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[   20.473916] ==================================================================
[   20.475046] BUG: KASAN: invalid-free in kfree+0x260/0x3b8
[   20.476056] Free of addr fff00000c695c001 by task kunit_try_catch/138
[   20.476560] 
[   20.476915] CPU: 0 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   20.477145] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.477218] Hardware name: linux,dummy-virt (DT)
[   20.477303] Call trace:
[   20.477367]  dump_backtrace+0x9c/0x128
[   20.477483]  show_stack+0x20/0x38
[   20.477585]  dump_stack_lvl+0x8c/0xd0
[   20.477692]  print_report+0x118/0x5f0
[   20.477799]  kasan_report_invalid_free+0xc0/0xe8
[   20.477917]  __kasan_kfree_large+0x5c/0xa8
[   20.478044]  free_large_kmalloc+0x58/0x140
[   20.478164]  kfree+0x260/0x3b8
[   20.478269]  kmalloc_large_invalid_free+0x114/0x290
[   20.478386]  kunit_try_run_case+0x170/0x3f0
[   20.478440]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.478494]  kthread+0x24c/0x2d0
[   20.478541]  ret_from_fork+0x10/0x20
[   20.478589] 
[   20.488463] The buggy address belongs to the physical page:
[   20.489614] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10695c
[   20.490515] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.491502] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.492711] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.493851] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.494785] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.495823] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.496750] head: 0bfffe0000000002 ffffc1ffc31a5701 ffffffffffffffff 0000000000000000
[   20.497470] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   20.498177] page dumped because: kasan: bad access detected
[   20.498794] 
[   20.499120] Memory state around the buggy address:
[   20.499793]  fff00000c695bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.500616]  fff00000c695bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.502020] >fff00000c695c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.502845]                    ^
[   20.503269]  fff00000c695c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.504364]  fff00000c695c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.505324] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[   20.443927] ==================================================================
[   20.445112] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2d8/0x300
[   20.445750] Read of size 1 at addr fff00000c68e8000 by task kunit_try_catch/136
[   20.446440] 
[   20.446805] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   20.447034] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.447111] Hardware name: linux,dummy-virt (DT)
[   20.447199] Call trace:
[   20.447264]  dump_backtrace+0x9c/0x128
[   20.447545]  show_stack+0x20/0x38
[   20.447654]  dump_stack_lvl+0x8c/0xd0
[   20.447769]  print_report+0x118/0x5f0
[   20.447863]  kasan_report+0xdc/0x128
[   20.447987]  __asan_report_load1_noabort+0x20/0x30
[   20.448108]  kmalloc_large_uaf+0x2d8/0x300
[   20.448205]  kunit_try_run_case+0x170/0x3f0
[   20.448255]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.448307]  kthread+0x24c/0x2d0
[   20.448351]  ret_from_fork+0x10/0x20
[   20.448400] 
[   20.454754] The buggy address belongs to the physical page:
[   20.455387] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1068e8
[   20.456199] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.457649] raw: 0bfffe0000000000 ffffc1ffc31a3b08 fff00000da522200 0000000000000000
[   20.458328] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   20.459095] page dumped because: kasan: bad access detected
[   20.459880] 
[   20.460182] Memory state around the buggy address:
[   20.460652]  fff00000c68e7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.461438]  fff00000c68e7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.462115] >fff00000c68e8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.462972]                    ^
[   20.463402]  fff00000c68e8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.464473]  fff00000c68e8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.465225] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   20.406623] ==================================================================
[   20.407711] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x28c/0x2d0
[   20.408475] Write of size 1 at addr fff00000c695e00a by task kunit_try_catch/134
[   20.410091] 
[   20.410449] CPU: 0 UID: 0 PID: 134 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   20.410654] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.410726] Hardware name: linux,dummy-virt (DT)
[   20.410809] Call trace:
[   20.410873]  dump_backtrace+0x9c/0x128
[   20.411011]  show_stack+0x20/0x38
[   20.411118]  dump_stack_lvl+0x8c/0xd0
[   20.411231]  print_report+0x118/0x5f0
[   20.411340]  kasan_report+0xdc/0x128
[   20.411678]  __asan_report_store1_noabort+0x20/0x30
[   20.411755]  kmalloc_large_oob_right+0x28c/0x2d0
[   20.411806]  kunit_try_run_case+0x170/0x3f0
[   20.411852]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.411904]  kthread+0x24c/0x2d0
[   20.411949]  ret_from_fork+0x10/0x20
[   20.412047] 
[   20.419229] The buggy address belongs to the physical page:
[   20.420295] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10695c
[   20.421093] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.421871] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.422693] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.424332] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.425089] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.425870] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.426752] head: 0bfffe0000000002 ffffc1ffc31a5701 ffffffffffffffff 0000000000000000
[   20.427517] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   20.428647] page dumped because: kasan: bad access detected
[   20.429367] 
[   20.429659] Memory state around the buggy address:
[   20.430190]  fff00000c695df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.430975]  fff00000c695df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.431631] >fff00000c695e000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.433179]                       ^
[   20.433699]  fff00000c695e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.434422]  fff00000c695e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   20.435119] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[   20.355429] ==================================================================
[   20.356605] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2b8/0x308
[   20.357297] Write of size 1 at addr fff00000c69a9f00 by task kunit_try_catch/132
[   20.357825] 
[   20.358212] CPU: 1 UID: 0 PID: 132 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   20.358415] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.358491] Hardware name: linux,dummy-virt (DT)
[   20.358578] Call trace:
[   20.358642]  dump_backtrace+0x9c/0x128
[   20.358758]  show_stack+0x20/0x38
[   20.358858]  dump_stack_lvl+0x8c/0xd0
[   20.358990]  print_report+0x118/0x5f0
[   20.359098]  kasan_report+0xdc/0x128
[   20.359179]  __asan_report_store1_noabort+0x20/0x30
[   20.359232]  kmalloc_big_oob_right+0x2b8/0x308
[   20.359280]  kunit_try_run_case+0x170/0x3f0
[   20.359326]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.359433]  kthread+0x24c/0x2d0
[   20.359539]  ret_from_fork+0x10/0x20
[   20.359632] 
[   20.366590] Allocated by task 132:
[   20.367114]  kasan_save_stack+0x3c/0x68
[   20.367573]  kasan_save_track+0x20/0x40
[   20.368152]  kasan_save_alloc_info+0x40/0x58
[   20.368747]  __kasan_kmalloc+0xd4/0xd8
[   20.369523]  __kmalloc_cache_noprof+0x154/0x320
[   20.370153]  kmalloc_big_oob_right+0xb8/0x308
[   20.370689]  kunit_try_run_case+0x170/0x3f0
[   20.371224]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.372749]  kthread+0x24c/0x2d0
[   20.373198]  ret_from_fork+0x10/0x20
[   20.373710] 
[   20.374028] The buggy address belongs to the object at fff00000c69a8000
[   20.374028]  which belongs to the cache kmalloc-8k of size 8192
[   20.375185] The buggy address is located 0 bytes to the right of
[   20.375185]  allocated 7936-byte region [fff00000c69a8000, fff00000c69a9f00)
[   20.376655] 
[   20.376983] The buggy address belongs to the physical page:
[   20.377569] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069a8
[   20.378510] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.379332] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.380347] page_type: f5(slab)
[   20.380791] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   20.381623] raw: 0000000000000000 0000000080020002 00000001f5000000 0000000000000000
[   20.382424] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   20.383205] head: 0000000000000000 0000000080020002 00000001f5000000 0000000000000000
[   20.384194] head: 0bfffe0000000003 ffffc1ffc31a6a01 ffffffffffffffff 0000000000000000
[   20.384994] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000
[   20.385742] page dumped because: kasan: bad access detected
[   20.386332] 
[   20.386645] Memory state around the buggy address:
[   20.387144]  fff00000c69a9e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.388223]  fff00000c69a9e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.388940] >fff00000c69a9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.389632]                    ^
[   20.390093]  fff00000c69a9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.390811]  fff00000c69aa000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.392240] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[   20.308490] ==================================================================
[   20.309652] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x310/0x348
[   20.310365] Read of size 1 at addr fff00000c6903000 by task kunit_try_catch/130
[   20.311225] 
[   20.311939] CPU: 0 UID: 0 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   20.312224] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.312291] Hardware name: linux,dummy-virt (DT)
[   20.312370] Call trace:
[   20.312428]  dump_backtrace+0x9c/0x128
[   20.312543]  show_stack+0x20/0x38
[   20.312649]  dump_stack_lvl+0x8c/0xd0
[   20.312756]  print_report+0x118/0x5f0
[   20.312872]  kasan_report+0xdc/0x128
[   20.312980]  __asan_report_load1_noabort+0x20/0x30
[   20.313050]  kmalloc_node_oob_right+0x310/0x348
[   20.313101]  kunit_try_run_case+0x170/0x3f0
[   20.313147]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.313199]  kthread+0x24c/0x2d0
[   20.313246]  ret_from_fork+0x10/0x20
[   20.313293] 
[   20.321113] Allocated by task 130:
[   20.321579]  kasan_save_stack+0x3c/0x68
[   20.322045]  kasan_save_track+0x20/0x40
[   20.322591]  kasan_save_alloc_info+0x40/0x58
[   20.323167]  __kasan_kmalloc+0xd4/0xd8
[   20.323704]  __kmalloc_cache_node_noprof+0x174/0x348
[   20.324362]  kmalloc_node_oob_right+0xbc/0x348
[   20.325356]  kunit_try_run_case+0x170/0x3f0
[   20.325883]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.326493]  kthread+0x24c/0x2d0
[   20.326991]  ret_from_fork+0x10/0x20
[   20.328000] 
[   20.328241] The buggy address belongs to the object at fff00000c6902000
[   20.328241]  which belongs to the cache kmalloc-4k of size 4096
[   20.329403] The buggy address is located 0 bytes to the right of
[   20.329403]  allocated 4096-byte region [fff00000c6902000, fff00000c6903000)
[   20.330532] 
[   20.330820] The buggy address belongs to the physical page:
[   20.331576] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106900
[   20.332634] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.333381] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.334234] page_type: f5(slab)
[   20.334745] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   20.335673] raw: 0000000000000000 0000000080040004 00000001f5000000 0000000000000000
[   20.336590] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   20.337332] head: 0000000000000000 0000000080040004 00000001f5000000 0000000000000000
[   20.338347] head: 0bfffe0000000003 ffffc1ffc31a4001 ffffffffffffffff 0000000000000000
[   20.339139] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000
[   20.340191] page dumped because: kasan: bad access detected
[   20.340795] 
[   20.341135] Memory state around the buggy address:
[   20.341669]  fff00000c6902f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.342468]  fff00000c6902f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.343279] >fff00000c6903000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.344525]                    ^
[   20.344997]  fff00000c6903080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.346027]  fff00000c6903100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.347265] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   20.260843] ==================================================================
[   20.261873] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x308/0x340
[   20.262693] Read of size 1 at addr fff00000c662acdf by task kunit_try_catch/128
[   20.263895] 
[   20.264329] CPU: 1 UID: 0 PID: 128 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   20.264584] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.264663] Hardware name: linux,dummy-virt (DT)
[   20.264759] Call trace:
[   20.264820]  dump_backtrace+0x9c/0x128
[   20.264878]  show_stack+0x20/0x38
[   20.264921]  dump_stack_lvl+0x8c/0xd0
[   20.264997]  print_report+0x118/0x5f0
[   20.265046]  kasan_report+0xdc/0x128
[   20.265088]  __asan_report_load1_noabort+0x20/0x30
[   20.265137]  kmalloc_oob_left+0x308/0x340
[   20.265184]  kunit_try_run_case+0x170/0x3f0
[   20.265234]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.265286]  kthread+0x24c/0x2d0
[   20.265332]  ret_from_fork+0x10/0x20
[   20.265381] 
[   20.272578] Allocated by task 1:
[   20.273075]  kasan_save_stack+0x3c/0x68
[   20.273720]  kasan_save_track+0x20/0x40
[   20.274240]  kasan_save_alloc_info+0x40/0x58
[   20.274835]  __kasan_kmalloc+0xd4/0xd8
[   20.275630]  __kmalloc_node_track_caller_noprof+0x194/0x438
[   20.276384]  kvasprintf+0xe0/0x180
[   20.276937]  __kthread_create_on_node+0x16c/0x348
[   20.277575]  kthread_create_on_node+0xe4/0x130
[   20.278162]  create_worker+0x380/0x6b8
[   20.278771]  alloc_unbound_pwq+0x62c/0x778
[   20.279348]  apply_wqattrs_prepare+0x1a0/0x6e0
[   20.280206]  apply_workqueue_attrs_locked+0x58/0xb8
[   20.280860]  alloc_workqueue+0x9ac/0x1440
[   20.281475]  latency_fsnotify_init+0x28/0x60
[   20.282146]  do_one_initcall+0xd0/0x608
[   20.282708]  kernel_init_freeable+0x3e0/0x8a0
[   20.283629]  kernel_init+0x2c/0x1f8
[   20.284107]  ret_from_fork+0x10/0x20
[   20.284542] 
[   20.284830] The buggy address belongs to the object at fff00000c662acc0
[   20.284830]  which belongs to the cache kmalloc-16 of size 16
[   20.285898] The buggy address is located 18 bytes to the right of
[   20.285898]  allocated 13-byte region [fff00000c662acc0, fff00000c662accd)
[   20.286999] 
[   20.287342] The buggy address belongs to the physical page:
[   20.287877] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10662a
[   20.288740] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.289513] page_type: f5(slab)
[   20.289975] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   20.290805] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000
[   20.292185] page dumped because: kasan: bad access detected
[   20.292728] 
[   20.293057] Memory state around the buggy address:
[   20.293623]  fff00000c662ab80: 00 02 fc fc 00 05 fc fc fa fb fc fc 00 02 fc fc
[   20.294843]  fff00000c662ac00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.296020] >fff00000c662ac80: fa fb fc fc 00 04 fc fc 00 05 fc fc 00 07 fc fc
[   20.296730]                                                     ^
[   20.297376]  fff00000c662ad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.298097]  fff00000c662ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.298829] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   20.216553] ==================================================================
[   20.217391] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x588/0x5f0
[   20.218275] Read of size 1 at addr fff00000c40eff80 by task kunit_try_catch/126
[   20.219052] 
[   20.219396] CPU: 0 UID: 0 PID: 126 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   20.219654] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.219733] Hardware name: linux,dummy-virt (DT)
[   20.219866] Call trace:
[   20.219936]  dump_backtrace+0x9c/0x128
[   20.220068]  show_stack+0x20/0x38
[   20.220164]  dump_stack_lvl+0x8c/0xd0
[   20.220264]  print_report+0x118/0x5f0
[   20.220363]  kasan_report+0xdc/0x128
[   20.220458]  __asan_report_load1_noabort+0x20/0x30
[   20.220551]  kmalloc_oob_right+0x588/0x5f0
[   20.220640]  kunit_try_run_case+0x170/0x3f0
[   20.220730]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.220849]  kthread+0x24c/0x2d0
[   20.220936]  ret_from_fork+0x10/0x20
[   20.221053] 
[   20.229938] Allocated by task 126:
[   20.230528]  kasan_save_stack+0x3c/0x68
[   20.231088]  kasan_save_track+0x20/0x40
[   20.231900]  kasan_save_alloc_info+0x40/0x58
[   20.232942]  __kasan_kmalloc+0xd4/0xd8
[   20.233800]  __kmalloc_cache_noprof+0x154/0x320
[   20.234426]  kmalloc_oob_right+0xb8/0x5f0
[   20.235050]  kunit_try_run_case+0x170/0x3f0
[   20.236157]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.236805]  kthread+0x24c/0x2d0
[   20.237248]  ret_from_fork+0x10/0x20
[   20.237691] 
[   20.238397] The buggy address belongs to the object at fff00000c40eff00
[   20.238397]  which belongs to the cache kmalloc-128 of size 128
[   20.239642] The buggy address is located 13 bytes to the right of
[   20.239642]  allocated 115-byte region [fff00000c40eff00, fff00000c40eff73)
[   20.241317] 
[   20.241644] The buggy address belongs to the physical page:
[   20.242487] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1040ef
[   20.243230] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.243894] page_type: f5(slab)
[   20.244355] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.245465] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   20.246358] page dumped because: kasan: bad access detected
[   20.246914] 
[   20.247253] Memory state around the buggy address:
[   20.247955]  fff00000c40efe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.248679]  fff00000c40eff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   20.249441] >fff00000c40eff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.250573]                    ^
[   20.251212]  fff00000c40f0000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.252299]  fff00000c40f0080: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   20.252866] ==================================================================
[   20.178821] ==================================================================
[   20.179418] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x528/0x5f0
[   20.180231] Write of size 1 at addr fff00000c40eff78 by task kunit_try_catch/126
[   20.181067] 
[   20.181400] CPU: 0 UID: 0 PID: 126 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   20.181615] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.181693] Hardware name: linux,dummy-virt (DT)
[   20.181782] Call trace:
[   20.181847]  dump_backtrace+0x9c/0x128
[   20.182139]  show_stack+0x20/0x38
[   20.182253]  dump_stack_lvl+0x8c/0xd0
[   20.182369]  print_report+0x118/0x5f0
[   20.182479]  kasan_report+0xdc/0x128
[   20.182585]  __asan_report_store1_noabort+0x20/0x30
[   20.182711]  kmalloc_oob_right+0x528/0x5f0
[   20.182826]  kunit_try_run_case+0x170/0x3f0
[   20.182885]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.182941]  kthread+0x24c/0x2d0
[   20.183017]  ret_from_fork+0x10/0x20
[   20.183068] 
[   20.193163] Allocated by task 126:
[   20.193678]  kasan_save_stack+0x3c/0x68
[   20.194242]  kasan_save_track+0x20/0x40
[   20.194869]  kasan_save_alloc_info+0x40/0x58
[   20.195637]  __kasan_kmalloc+0xd4/0xd8
[   20.196140]  __kmalloc_cache_noprof+0x154/0x320
[   20.196710]  kmalloc_oob_right+0xb8/0x5f0
[   20.197271]  kunit_try_run_case+0x170/0x3f0
[   20.197793]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.198453]  kthread+0x24c/0x2d0
[   20.198922]  ret_from_fork+0x10/0x20
[   20.200224] 
[   20.200483] The buggy address belongs to the object at fff00000c40eff00
[   20.200483]  which belongs to the cache kmalloc-128 of size 128
[   20.201545] The buggy address is located 5 bytes to the right of
[   20.201545]  allocated 115-byte region [fff00000c40eff00, fff00000c40eff73)
[   20.202845] 
[   20.203170] The buggy address belongs to the physical page:
[   20.204081] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1040ef
[   20.204914] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.205727] page_type: f5(slab)
[   20.206217] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.207011] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   20.208055] page dumped because: kasan: bad access detected
[   20.208712] 
[   20.209039] Memory state around the buggy address:
[   20.209499]  fff00000c40efe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   20.210741]  fff00000c40efe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.211576] >fff00000c40eff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   20.212393]                                                                 ^
[   20.212996]  fff00000c40eff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.213782]  fff00000c40f0000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.214488] ==================================================================
[   20.128681] ==================================================================
[   20.130740] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x56c/0x5f0
[   20.136356] Write of size 1 at addr fff00000c40eff73 by task kunit_try_catch/126
[   20.137937] 
[   20.140420] CPU: 0 UID: 0 PID: 126 Comm: kunit_try_catch Tainted: G                 N 6.12.33-rc1 #1
[   20.141341] Tainted: [N]=TEST
[   20.141393] Hardware name: linux,dummy-virt (DT)
[   20.141692] Call trace:
[   20.141742]  dump_backtrace+0x9c/0x128
[   20.141835]  show_stack+0x20/0x38
[   20.141883]  dump_stack_lvl+0x8c/0xd0
[   20.141938]  print_report+0x118/0x5f0
[   20.142019]  kasan_report+0xdc/0x128
[   20.142066]  __asan_report_store1_noabort+0x20/0x30
[   20.142117]  kmalloc_oob_right+0x56c/0x5f0
[   20.142165]  kunit_try_run_case+0x170/0x3f0
[   20.142216]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.142268]  kthread+0x24c/0x2d0
[   20.142315]  ret_from_fork+0x10/0x20
[   20.142462] 
[   20.150748] Allocated by task 126:
[   20.151629]  kasan_save_stack+0x3c/0x68
[   20.152224]  kasan_save_track+0x20/0x40
[   20.152671]  kasan_save_alloc_info+0x40/0x58
[   20.153257]  __kasan_kmalloc+0xd4/0xd8
[   20.153777]  __kmalloc_cache_noprof+0x154/0x320
[   20.154836]  kmalloc_oob_right+0xb8/0x5f0
[   20.155571]  kunit_try_run_case+0x170/0x3f0
[   20.156250]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.156870]  kthread+0x24c/0x2d0
[   20.157451]  ret_from_fork+0x10/0x20
[   20.158072] 
[   20.158394] The buggy address belongs to the object at fff00000c40eff00
[   20.158394]  which belongs to the cache kmalloc-128 of size 128
[   20.160303] The buggy address is located 0 bytes to the right of
[   20.160303]  allocated 115-byte region [fff00000c40eff00, fff00000c40eff73)
[   20.161447] 
[   20.161942] The buggy address belongs to the physical page:
[   20.162875] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1040ef
[   20.164284] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.165375] page_type: f5(slab)
[   20.166353] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.167075] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   20.168120] page dumped because: kasan: bad access detected
[   20.169011] 
[   20.169406] Memory state around the buggy address:
[   20.170212]  fff00000c40efe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   20.170933]  fff00000c40efe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.172023] >fff00000c40eff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   20.172691]                                                              ^
[   20.173322]  fff00000c40eff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.174096]  fff00000c40f0000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.174884] ==================================================================