Hay
Date
Dec. 3, 2024, 11:38 p.m.
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[   66.436915] ==================================================================
[   66.437766] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[   66.437766] 
[   66.438597] Use-after-free read at 0x00000000cb1fbd26 (in kfence-#224):
[   66.440127]  test_krealloc+0x51c/0x830
[   66.440919]  test_krealloc+0x458/0x830
[   66.441545]  kunit_try_run_case+0x14c/0x3d0
[   66.442304]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.443093]  kthread+0x24c/0x2d0
[   66.443573]  ret_from_fork+0x10/0x20
[   66.444085] 
[   66.444468] kfence-#224: 0x00000000cb1fbd26-0x0000000009cdc7f2, size=32, cache=kmalloc-32
[   66.444468] 
[   66.445569] allocated by task 326 on cpu 0 at 66.435820s (0.009740s ago):
[   66.446450]  test_alloc+0x298/0x620
[   66.447079]  test_krealloc+0xc0/0x830
[   66.447574]  kunit_try_run_case+0x14c/0x3d0
[   66.448315]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.448974]  kthread+0x24c/0x2d0
[   66.449656]  ret_from_fork+0x10/0x20
[   66.450260] 
[   66.450600] freed by task 326 on cpu 0 at 66.436253s (0.014337s ago):
[   66.451537]  krealloc_noprof+0x148/0x360
[   66.452137]  test_krealloc+0x1dc/0x830
[   66.452826]  kunit_try_run_case+0x14c/0x3d0
[   66.453344]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.454156]  kthread+0x24c/0x2d0
[   66.454687]  ret_from_fork+0x10/0x20
[   66.455235] 
[   66.455592] CPU: 0 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   66.456788] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.457403] Hardware name: linux,dummy-virt (DT)
[   66.458127] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[   66.271541] ==================================================================
[   66.272287] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[   66.272287] 
[   66.273350] Use-after-free read at 0x0000000043b0972c (in kfence-#222):
[   66.274198]  test_memcache_typesafe_by_rcu+0x280/0x560
[   66.274919]  test_memcache_typesafe_by_rcu+0x260/0x560
[   66.275824]  kunit_try_run_case+0x14c/0x3d0
[   66.276365]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.277212]  kthread+0x24c/0x2d0
[   66.277683]  ret_from_fork+0x10/0x20
[   66.278308] 
[   66.278793] kfence-#222: 0x0000000043b0972c-0x000000006908a899, size=32, cache=test
[   66.278793] 
[   66.279799] allocated by task 324 on cpu 1 at 66.227885s (0.051905s ago):
[   66.280808]  test_alloc+0x22c/0x620
[   66.281344]  test_memcache_typesafe_by_rcu+0x15c/0x560
[   66.281998]  kunit_try_run_case+0x14c/0x3d0
[   66.282613]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.283446]  kthread+0x24c/0x2d0
[   66.283902]  ret_from_fork+0x10/0x20
[   66.284584] 
[   66.284971] freed by task 324 on cpu 1 at 66.228059s (0.056901s ago):
[   66.285733]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[   66.286558]  kunit_try_run_case+0x14c/0x3d0
[   66.287141]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.287917]  kthread+0x24c/0x2d0
[   66.288555]  ret_from_fork+0x10/0x20
[   66.289168] 
[   66.289629] CPU: 1 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   66.290848] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.291413] Hardware name: linux,dummy-virt (DT)
[   66.292112] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[   46.912830] ==================================================================
[   46.914218] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   46.914218] 
[   46.916615] Invalid read at 0x0000000015208d49:
[   46.917408]  test_invalid_access+0xdc/0x1f0
[   46.918085]  kunit_try_run_case+0x14c/0x3d0
[   46.918847]  kunit_try_run_case+0x14c/0x3d0
[   46.919966]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.921131]  kthread+0x24c/0x2d0
[   46.921602]  ret_from_fork+0x10/0x20
[   46.922244] 
[   46.922646] CPU: 1 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   46.924990] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.926219] Hardware name: linux,dummy-virt (DT)
[   46.926790] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[   33.025459] ==================================================================
[   33.026641] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   33.027961] Free of addr fff00000c58ff200 by task kunit_try_catch/224
[   33.028984] 
[   33.029504] CPU: 1 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   33.030807] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.031835] Hardware name: linux,dummy-virt (DT)
[   33.032472] Call trace:
[   33.033155]  show_stack+0x20/0x38 (C)
[   33.033759]  dump_stack_lvl+0x8c/0xd0
[   33.034203]  print_report+0x118/0x5e0
[   33.034881]  kasan_report_invalid_free+0xb0/0xd8
[   33.035996]  check_slab_allocation+0xd4/0x108
[   33.036592]  __kasan_mempool_poison_object+0x78/0x150
[   33.036950]  mempool_free+0x28c/0x328
[   33.037238]  mempool_double_free_helper+0x150/0x2e0
[   33.038099]  mempool_kmalloc_double_free+0xb8/0x110
[   33.039369]  kunit_try_run_case+0x14c/0x3d0
[   33.040372]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.041553]  kthread+0x24c/0x2d0
[   33.042356]  ret_from_fork+0x10/0x20
[   33.042974] 
[   33.043278] Allocated by task 224:
[   33.044175]  kasan_save_stack+0x3c/0x68
[   33.045007]  kasan_save_track+0x20/0x40
[   33.045801]  kasan_save_alloc_info+0x40/0x58
[   33.046516]  __kasan_mempool_unpoison_object+0x11c/0x180
[   33.047362]  remove_element+0x130/0x1f8
[   33.048421]  mempool_alloc_preallocated+0x58/0xc0
[   33.049817]  mempool_double_free_helper+0x94/0x2e0
[   33.050212]  mempool_kmalloc_double_free+0xb8/0x110
[   33.051002]  kunit_try_run_case+0x14c/0x3d0
[   33.051985]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.052831]  kthread+0x24c/0x2d0
[   33.053548]  ret_from_fork+0x10/0x20
[   33.054115] 
[   33.054485] Freed by task 224:
[   33.054913]  kasan_save_stack+0x3c/0x68
[   33.055785]  kasan_save_track+0x20/0x40
[   33.056422]  kasan_save_free_info+0x4c/0x78
[   33.057062]  __kasan_mempool_poison_object+0xc0/0x150
[   33.058458]  mempool_free+0x28c/0x328
[   33.058973]  mempool_double_free_helper+0x100/0x2e0
[   33.059751]  mempool_kmalloc_double_free+0xb8/0x110
[   33.060579]  kunit_try_run_case+0x14c/0x3d0
[   33.061117]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.062235]  kthread+0x24c/0x2d0
[   33.062958]  ret_from_fork+0x10/0x20
[   33.063724] 
[   33.064084] The buggy address belongs to the object at fff00000c58ff200
[   33.064084]  which belongs to the cache kmalloc-128 of size 128
[   33.066022] The buggy address is located 0 bytes inside of
[   33.066022]  128-byte region [fff00000c58ff200, fff00000c58ff280)
[   33.068658] 
[   33.069048] The buggy address belongs to the physical page:
[   33.069907] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ff
[   33.071878] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.072617] page_type: f5(slab)
[   33.073187] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.074058] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.075476] page dumped because: kasan: bad access detected
[   33.076494] 
[   33.076867] Memory state around the buggy address:
[   33.077442]  fff00000c58ff100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.078390]  fff00000c58ff180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.079591] >fff00000c58ff200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.080865]                    ^
[   33.081529]  fff00000c58ff280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.082521]  fff00000c58ff300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.083563] ==================================================================
[   33.093656] ==================================================================
[   33.094909] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   33.096132] Free of addr fff00000c65e0000 by task kunit_try_catch/226
[   33.096850] 
[   33.097316] CPU: 0 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   33.098448] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.099006] Hardware name: linux,dummy-virt (DT)
[   33.099755] Call trace:
[   33.100100]  show_stack+0x20/0x38 (C)
[   33.101020]  dump_stack_lvl+0x8c/0xd0
[   33.101679]  print_report+0x118/0x5e0
[   33.102454]  kasan_report_invalid_free+0xb0/0xd8
[   33.103148]  __kasan_mempool_poison_object+0x14c/0x150
[   33.104017]  mempool_free+0x28c/0x328
[   33.104519]  mempool_double_free_helper+0x150/0x2e0
[   33.105271]  mempool_kmalloc_large_double_free+0xb8/0x110
[   33.106008]  kunit_try_run_case+0x14c/0x3d0
[   33.106778]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.108080]  kthread+0x24c/0x2d0
[   33.108663]  ret_from_fork+0x10/0x20
[   33.109264] 
[   33.109573] The buggy address belongs to the physical page:
[   33.110428] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065e0
[   33.111500] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.112447] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.113678] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.115283] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.116290] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.117226] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.118134] head: 0bfffe0000000002 ffffc1ffc3197801 ffffffffffffffff 0000000000000000
[   33.119311] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   33.120504] page dumped because: kasan: bad access detected
[   33.121263] 
[   33.121640] Memory state around the buggy address:
[   33.122380]  fff00000c65dff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.123548]  fff00000c65dff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.124312] >fff00000c65e0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.124895]                    ^
[   33.125234]  fff00000c65e0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.125908]  fff00000c65e0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.127389] ==================================================================
[   33.138743] ==================================================================
[   33.140514] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   33.141561] Free of addr fff00000c6620000 by task kunit_try_catch/228
[   33.142837] 
[   33.143468] CPU: 0 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   33.144756] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.145286] Hardware name: linux,dummy-virt (DT)
[   33.145945] Call trace:
[   33.146354]  show_stack+0x20/0x38 (C)
[   33.147060]  dump_stack_lvl+0x8c/0xd0
[   33.147644]  print_report+0x118/0x5e0
[   33.148307]  kasan_report_invalid_free+0xb0/0xd8
[   33.148905]  __kasan_mempool_poison_pages+0xe0/0xe8
[   33.150015]  mempool_free+0x24c/0x328
[   33.150701]  mempool_double_free_helper+0x150/0x2e0
[   33.151654]  mempool_page_alloc_double_free+0xb4/0x110
[   33.152385]  kunit_try_run_case+0x14c/0x3d0
[   33.152970]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.153754]  kthread+0x24c/0x2d0
[   33.154469]  ret_from_fork+0x10/0x20
[   33.155196] 
[   33.155598] The buggy address belongs to the physical page:
[   33.156364] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106620
[   33.157365] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.158231] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.159424] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.160873] page dumped because: kasan: bad access detected
[   33.161595] 
[   33.161928] Memory state around the buggy address:
[   33.162608]  fff00000c661ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.164110]  fff00000c661ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.165273] >fff00000c6620000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.166134]                    ^
[   33.166744]  fff00000c6620080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.167671]  fff00000c6620100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.168810] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[   46.672251] ==================================================================
[   46.673086] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   46.673086] 
[   46.674422] Corrupted memory at 0x000000003ba5c790 [ ! . . . . . . . . . . . . . . . ] (in kfence-#218):
[   46.676850]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   46.677777]  kunit_try_run_case+0x14c/0x3d0
[   46.678575]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.679498]  kthread+0x24c/0x2d0
[   46.680101]  ret_from_fork+0x10/0x20
[   46.680730] 
[   46.681096] kfence-#218: 0x00000000afb3715d-0x0000000078bf3cd3, size=73, cache=kmalloc-96
[   46.681096] 
[   46.682305] allocated by task 314 on cpu 1 at 46.671857s (0.010439s ago):
[   46.683371]  test_alloc+0x298/0x620
[   46.684024]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   46.684794]  kunit_try_run_case+0x14c/0x3d0
[   46.685477]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.686264]  kthread+0x24c/0x2d0
[   46.686864]  ret_from_fork+0x10/0x20
[   46.687467] 
[   46.687822] freed by task 314 on cpu 1 at 46.672076s (0.015736s ago):
[   46.688869]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   46.689739]  kunit_try_run_case+0x14c/0x3d0
[   46.690358]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.691097]  kthread+0x24c/0x2d0
[   46.691702]  ret_from_fork+0x10/0x20
[   46.692407] 
[   46.692877] CPU: 1 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   46.694158] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.694778] Hardware name: linux,dummy-virt (DT)
[   46.695497] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[   46.256530] ==================================================================
[   46.257379] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   46.257379] 
[   46.258673] Out-of-bounds read at 0x00000000c9c37757 (105B right of kfence-#214):
[   46.260017]  test_kmalloc_aligned_oob_read+0x238/0x468
[   46.260789]  test_kmalloc_aligned_oob_read+0x100/0x468
[   46.261435]  kunit_try_run_case+0x14c/0x3d0
[   46.262364]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.263278]  kthread+0x24c/0x2d0
[   46.264188]  ret_from_fork+0x10/0x20
[   46.264916] 
[   46.265738] kfence-#214: 0x000000000c26de26-0x000000009a5da260, size=73, cache=kmalloc-96
[   46.265738] 
[   46.267029] allocated by task 312 on cpu 1 at 46.256153s (0.010866s ago):
[   46.267952]  test_alloc+0x298/0x620
[   46.268606]  test_kmalloc_aligned_oob_read+0x100/0x468
[   46.269303]  kunit_try_run_case+0x14c/0x3d0
[   46.269893]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.270782]  kthread+0x24c/0x2d0
[   46.271233]  ret_from_fork+0x10/0x20
[   46.271829] 
[   46.272244] CPU: 1 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   46.273537] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.274149] Hardware name: linux,dummy-virt (DT)
[   46.274909] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[   40.848042] ==================================================================
[   40.848985] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   40.848985] 
[   40.849808] Corrupted memory at 0x00000000f43d9b27 [ ! ] (in kfence-#162):
[   40.851590]  test_corruption+0x1d8/0x378
[   40.852293]  kunit_try_run_case+0x14c/0x3d0
[   40.852881]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.853605]  kthread+0x24c/0x2d0
[   40.854081]  ret_from_fork+0x10/0x20
[   40.854735] 
[   40.855088] kfence-#162: 0x000000008dc80d51-0x000000000b5d420c, size=32, cache=test
[   40.855088] 
[   40.856153] allocated by task 302 on cpu 1 at 40.847797s (0.008346s ago):
[   40.857074]  test_alloc+0x22c/0x620
[   40.857633]  test_corruption+0x198/0x378
[   40.858272]  kunit_try_run_case+0x14c/0x3d0
[   40.858920]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.859678]  kthread+0x24c/0x2d0
[   40.860270]  ret_from_fork+0x10/0x20
[   40.861001] 
[   40.861361] freed by task 302 on cpu 1 at 40.847889s (0.013462s ago):
[   40.862176]  test_corruption+0x1d8/0x378
[   40.862872]  kunit_try_run_case+0x14c/0x3d0
[   40.863494]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.864251]  kthread+0x24c/0x2d0
[   40.864833]  ret_from_fork+0x10/0x20
[   40.865374] 
[   40.865734] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   40.867099] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.867796] Hardware name: linux,dummy-virt (DT)
[   40.868415] ==================================================================
[   40.640316] ==================================================================
[   40.641146] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   40.641146] 
[   40.641989] Corrupted memory at 0x00000000f8ac087e [ ! ] (in kfence-#160):
[   40.643828]  test_corruption+0x284/0x378
[   40.644602]  kunit_try_run_case+0x14c/0x3d0
[   40.645362]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.646134]  kthread+0x24c/0x2d0
[   40.646681]  ret_from_fork+0x10/0x20
[   40.647225] 
[   40.647574] kfence-#160: 0x00000000a4f8051d-0x000000006ccf8bb6, size=32, cache=kmalloc-32
[   40.647574] 
[   40.648690] allocated by task 300 on cpu 0 at 40.639841s (0.008839s ago):
[   40.649634]  test_alloc+0x298/0x620
[   40.650293]  test_corruption+0x198/0x378
[   40.650886]  kunit_try_run_case+0x14c/0x3d0
[   40.651587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.652235]  kthread+0x24c/0x2d0
[   40.652879]  ret_from_fork+0x10/0x20
[   40.653456] 
[   40.653803] freed by task 300 on cpu 0 at 40.640020s (0.013773s ago):
[   40.654686]  test_corruption+0x284/0x378
[   40.655232]  kunit_try_run_case+0x14c/0x3d0
[   40.655907]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.656625]  kthread+0x24c/0x2d0
[   40.657230]  ret_from_fork+0x10/0x20
[   40.657822] 
[   40.658287] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   40.659507] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.660078] Hardware name: linux,dummy-virt (DT)
[   40.660767] ==================================================================
[   40.744176] ==================================================================
[   40.745112] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   40.745112] 
[   40.745933] Corrupted memory at 0x00000000f7fb708c [ ! . . . . . . . . . . . . . . . ] (in kfence-#161):
[   40.748673]  test_corruption+0x120/0x378
[   40.749262]  kunit_try_run_case+0x14c/0x3d0
[   40.749999]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.750865]  kthread+0x24c/0x2d0
[   40.751480]  ret_from_fork+0x10/0x20
[   40.751989] 
[   40.752445] kfence-#161: 0x00000000ab3e9321-0x00000000648505f3, size=32, cache=test
[   40.752445] 
[   40.753509] allocated by task 302 on cpu 1 at 40.743920s (0.009579s ago):
[   40.754441]  test_alloc+0x22c/0x620
[   40.755054]  test_corruption+0xdc/0x378
[   40.755661]  kunit_try_run_case+0x14c/0x3d0
[   40.756318]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.757135]  kthread+0x24c/0x2d0
[   40.757724]  ret_from_fork+0x10/0x20
[   40.758191] 
[   40.758600] freed by task 302 on cpu 1 at 40.744021s (0.014570s ago):
[   40.759473]  test_corruption+0x120/0x378
[   40.760214]  kunit_try_run_case+0x14c/0x3d0
[   40.760835]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.761637]  kthread+0x24c/0x2d0
[   40.762247]  ret_from_fork+0x10/0x20
[   40.762765] 
[   40.763170] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   40.764368] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.765036] Hardware name: linux,dummy-virt (DT)
[   40.765699] ==================================================================
[   40.536082] ==================================================================
[   40.536988] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   40.536988] 
[   40.537816] Corrupted memory at 0x00000000efe49d57 [ ! . . . . . . . . . . . . . . . ] (in kfence-#159):
[   40.540349]  test_corruption+0x278/0x378
[   40.540986]  kunit_try_run_case+0x14c/0x3d0
[   40.541697]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.542489]  kthread+0x24c/0x2d0
[   40.543090]  ret_from_fork+0x10/0x20
[   40.543727] 
[   40.544130] kfence-#159: 0x000000006c714b99-0x0000000092e78bd8, size=32, cache=kmalloc-32
[   40.544130] 
[   40.545374] allocated by task 300 on cpu 0 at 40.535755s (0.009610s ago):
[   40.546411]  test_alloc+0x298/0x620
[   40.547059]  test_corruption+0xdc/0x378
[   40.547763]  kunit_try_run_case+0x14c/0x3d0
[   40.548461]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.549261]  kthread+0x24c/0x2d0
[   40.549890]  ret_from_fork+0x10/0x20
[   40.550521] 
[   40.550869] freed by task 300 on cpu 0 at 40.535921s (0.014939s ago):
[   40.551955]  test_corruption+0x278/0x378
[   40.552610]  kunit_try_run_case+0x14c/0x3d0
[   40.553287]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.554080]  kthread+0x24c/0x2d0
[   40.554689]  ret_from_fork+0x10/0x20
[   40.555287] 
[   40.555751] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   40.556949] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.557368] Hardware name: linux,dummy-virt (DT)
[   40.557798] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[   40.328041] ==================================================================
[   40.328886] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   40.328886] 
[   40.329650] Invalid free of 0x0000000042149234 (in kfence-#157):
[   40.330553]  test_invalid_addr_free+0x1ac/0x238
[   40.331173]  kunit_try_run_case+0x14c/0x3d0
[   40.331806]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.332518]  kthread+0x24c/0x2d0
[   40.332974]  ret_from_fork+0x10/0x20
[   40.333704] 
[   40.334093] kfence-#157: 0x000000009c249579-0x00000000dd24564c, size=32, cache=kmalloc-32
[   40.334093] 
[   40.335386] allocated by task 296 on cpu 0 at 40.327825s (0.007552s ago):
[   40.336351]  test_alloc+0x298/0x620
[   40.336919]  test_invalid_addr_free+0xd4/0x238
[   40.337594]  kunit_try_run_case+0x14c/0x3d0
[   40.338457]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.339295]  kthread+0x24c/0x2d0
[   40.339808]  ret_from_fork+0x10/0x20
[   40.340397] 
[   40.340845] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   40.342077] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.342846] Hardware name: linux,dummy-virt (DT)
[   40.343413] ==================================================================
[   40.432005] ==================================================================
[   40.433099] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   40.433099] 
[   40.433922] Invalid free of 0x00000000b254b500 (in kfence-#158):
[   40.434866]  test_invalid_addr_free+0xec/0x238
[   40.435906]  kunit_try_run_case+0x14c/0x3d0
[   40.436436]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.437292]  kthread+0x24c/0x2d0
[   40.437755]  ret_from_fork+0x10/0x20
[   40.438428] 
[   40.438767] kfence-#158: 0x00000000725c4297-0x0000000045d2c217, size=32, cache=test
[   40.438767] 
[   40.439864] allocated by task 298 on cpu 1 at 40.431797s (0.008058s ago):
[   40.440804]  test_alloc+0x22c/0x620
[   40.441283]  test_invalid_addr_free+0xd4/0x238
[   40.442052]  kunit_try_run_case+0x14c/0x3d0
[   40.442627]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.443455]  kthread+0x24c/0x2d0
[   40.444055]  ret_from_fork+0x10/0x20
[   40.444617] 
[   40.444972] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   40.446230] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.446895] Hardware name: linux,dummy-virt (DT)
[   40.447505] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[   40.224235] ==================================================================
[   40.224999] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   40.224999] 
[   40.225876] Invalid free of 0x00000000cc322a06 (in kfence-#156):
[   40.227443]  test_double_free+0x100/0x238
[   40.228185]  kunit_try_run_case+0x14c/0x3d0
[   40.228817]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.229746]  kthread+0x24c/0x2d0
[   40.230448]  ret_from_fork+0x10/0x20
[   40.230983] 
[   40.231345] kfence-#156: 0x00000000cc322a06-0x000000004f9cfd72, size=32, cache=test
[   40.231345] 
[   40.232837] allocated by task 294 on cpu 1 at 40.223835s (0.008990s ago):
[   40.233683]  test_alloc+0x22c/0x620
[   40.234214]  test_double_free+0xd4/0x238
[   40.234773]  kunit_try_run_case+0x14c/0x3d0
[   40.235697]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.236421]  kthread+0x24c/0x2d0
[   40.236916]  ret_from_fork+0x10/0x20
[   40.237463] 
[   40.237786] freed by task 294 on cpu 1 at 40.223937s (0.013838s ago):
[   40.238956]  test_double_free+0xf0/0x238
[   40.239589]  kunit_try_run_case+0x14c/0x3d0
[   40.240356]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.241175]  kthread+0x24c/0x2d0
[   40.241710]  ret_from_fork+0x10/0x20
[   40.242419] 
[   40.242706] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   40.244080] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.244712] Hardware name: linux,dummy-virt (DT)
[   40.245450] ==================================================================
[   40.120258] ==================================================================
[   40.121234] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   40.121234] 
[   40.122634] Invalid free of 0x000000007a7a8d17 (in kfence-#155):
[   40.123979]  test_double_free+0x1bc/0x238
[   40.124642]  kunit_try_run_case+0x14c/0x3d0
[   40.125258]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.126054]  kthread+0x24c/0x2d0
[   40.126617]  ret_from_fork+0x10/0x20
[   40.127196] 
[   40.127527] kfence-#155: 0x000000007a7a8d17-0x00000000d35f0b53, size=32, cache=kmalloc-32
[   40.127527] 
[   40.128686] allocated by task 292 on cpu 0 at 40.119804s (0.008873s ago):
[   40.129654]  test_alloc+0x298/0x620
[   40.130207]  test_double_free+0xd4/0x238
[   40.130854]  kunit_try_run_case+0x14c/0x3d0
[   40.131494]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.132127]  kthread+0x24c/0x2d0
[   40.132720]  ret_from_fork+0x10/0x20
[   40.133238] 
[   40.133646] freed by task 292 on cpu 0 at 40.119941s (0.013695s ago):
[   40.134562]  test_double_free+0x1ac/0x238
[   40.135133]  kunit_try_run_case+0x14c/0x3d0
[   40.135736]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.136565]  kthread+0x24c/0x2d0
[   40.137159]  ret_from_fork+0x10/0x20
[   40.137755] 
[   40.138091] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   40.139401] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.140088] Hardware name: linux,dummy-virt (DT)
[   40.140795] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[   39.704273] ==================================================================
[   39.705221] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   39.705221] 
[   39.706375] Use-after-free read at 0x00000000f6f42316 (in kfence-#151):
[   39.707065]  test_use_after_free_read+0x114/0x248
[   39.708029]  test_use_after_free_read+0x1c0/0x248
[   39.708706]  kunit_try_run_case+0x14c/0x3d0
[   39.709424]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.710135]  kthread+0x24c/0x2d0
[   39.710664]  ret_from_fork+0x10/0x20
[   39.711193] 
[   39.711566] kfence-#151: 0x00000000f6f42316-0x0000000070235cd7, size=32, cache=kmalloc-32
[   39.711566] 
[   39.712667] allocated by task 284 on cpu 0 at 39.703808s (0.008849s ago):
[   39.713655]  test_alloc+0x298/0x620
[   39.714288]  test_use_after_free_read+0xd0/0x248
[   39.714839]  kunit_try_run_case+0x14c/0x3d0
[   39.715581]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.716233]  kthread+0x24c/0x2d0
[   39.716848]  ret_from_fork+0x10/0x20
[   39.717428] 
[   39.717726] freed by task 284 on cpu 0 at 39.703927s (0.013789s ago):
[   39.718681]  test_use_after_free_read+0x1c0/0x248
[   39.719302]  kunit_try_run_case+0x14c/0x3d0
[   39.719950]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.720722]  kthread+0x24c/0x2d0
[   39.721240]  ret_from_fork+0x10/0x20
[   39.721812] 
[   39.722189] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   39.723404] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.724036] Hardware name: linux,dummy-virt (DT)
[   39.724758] ==================================================================
[   39.808255] ==================================================================
[   39.809137] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   39.809137] 
[   39.810034] Use-after-free read at 0x0000000020178f0f (in kfence-#152):
[   39.810994]  test_use_after_free_read+0x114/0x248
[   39.811583]  test_use_after_free_read+0xf0/0x248
[   39.812479]  kunit_try_run_case+0x14c/0x3d0
[   39.813175]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.813854]  kthread+0x24c/0x2d0
[   39.814538]  ret_from_fork+0x10/0x20
[   39.815004] 
[   39.815383] kfence-#152: 0x0000000020178f0f-0x000000009a3e87fb, size=32, cache=test
[   39.815383] 
[   39.816558] allocated by task 286 on cpu 1 at 39.807823s (0.008726s ago):
[   39.817472]  test_alloc+0x22c/0x620
[   39.818161]  test_use_after_free_read+0xd0/0x248
[   39.818703]  kunit_try_run_case+0x14c/0x3d0
[   39.819444]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.820188]  kthread+0x24c/0x2d0
[   39.820759]  ret_from_fork+0x10/0x20
[   39.821405] 
[   39.821765] freed by task 286 on cpu 1 at 39.807927s (0.013827s ago):
[   39.822689]  test_use_after_free_read+0xf0/0x248
[   39.823321]  kunit_try_run_case+0x14c/0x3d0
[   39.824038]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.824709]  kthread+0x24c/0x2d0
[   39.825257]  ret_from_fork+0x10/0x20
[   39.825869] 
[   39.826207] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   39.827479] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.828075] Hardware name: linux,dummy-virt (DT)
[   39.828687] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[   31.506916] ==================================================================
[   31.508284] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   31.509420] Read of size 8 at addr fff00000c58b0840 by task kunit_try_catch/189
[   31.510381] 
[   31.510858] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   31.512345] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.512837] Hardware name: linux,dummy-virt (DT)
[   31.514353] Call trace:
[   31.514881]  show_stack+0x20/0x38 (C)
[   31.515546]  dump_stack_lvl+0x8c/0xd0
[   31.516083]  print_report+0x118/0x5e0
[   31.516776]  kasan_report+0xc8/0x118
[   31.517283]  __asan_report_load8_noabort+0x20/0x30
[   31.518013]  workqueue_uaf+0x480/0x4a8
[   31.518668]  kunit_try_run_case+0x14c/0x3d0
[   31.519503]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.520217]  kthread+0x24c/0x2d0
[   31.520747]  ret_from_fork+0x10/0x20
[   31.521297] 
[   31.521601] Allocated by task 189:
[   31.522247]  kasan_save_stack+0x3c/0x68
[   31.522828]  kasan_save_track+0x20/0x40
[   31.523542]  kasan_save_alloc_info+0x40/0x58
[   31.524099]  __kasan_kmalloc+0xd4/0xd8
[   31.524712]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.525626]  workqueue_uaf+0x13c/0x4a8
[   31.526451]  kunit_try_run_case+0x14c/0x3d0
[   31.526934]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.527845]  kthread+0x24c/0x2d0
[   31.528603]  ret_from_fork+0x10/0x20
[   31.529221] 
[   31.529669] Freed by task 10:
[   31.530542]  kasan_save_stack+0x3c/0x68
[   31.531139]  kasan_save_track+0x20/0x40
[   31.531913]  kasan_save_free_info+0x4c/0x78
[   31.532628]  __kasan_slab_free+0x6c/0x98
[   31.533196]  kfree+0x114/0x3c8
[   31.533734]  workqueue_uaf_work+0x18/0x30
[   31.534228]  process_one_work+0x530/0xf98
[   31.535015]  worker_thread+0x614/0xf28
[   31.536103]  kthread+0x24c/0x2d0
[   31.536624]  ret_from_fork+0x10/0x20
[   31.537216] 
[   31.537527] Last potentially related work creation:
[   31.538162]  kasan_save_stack+0x3c/0x68
[   31.538881]  kasan_record_aux_stack+0xb4/0xc8
[   31.539682]  __queue_work+0x65c/0xfd8
[   31.540523]  queue_work_on+0xbc/0xf8
[   31.541030]  workqueue_uaf+0x210/0x4a8
[   31.541527]  kunit_try_run_case+0x14c/0x3d0
[   31.542226]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.542967]  kthread+0x24c/0x2d0
[   31.543441]  ret_from_fork+0x10/0x20
[   31.544001] 
[   31.544594] The buggy address belongs to the object at fff00000c58b0840
[   31.544594]  which belongs to the cache kmalloc-32 of size 32
[   31.546080] The buggy address is located 0 bytes inside of
[   31.546080]  freed 32-byte region [fff00000c58b0840, fff00000c58b0860)
[   31.548465] 
[   31.548832] The buggy address belongs to the physical page:
[   31.549527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058b0
[   31.550521] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.551438] page_type: f5(slab)
[   31.551946] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   31.552876] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   31.553981] page dumped because: kasan: bad access detected
[   31.554719] 
[   31.555040] Memory state around the buggy address:
[   31.555939]  fff00000c58b0700: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   31.556688]  fff00000c58b0780: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   31.557717] >fff00000c58b0800: 00 00 00 07 fc fc fc fc fa fb fb fb fc fc fc fc
[   31.558539]                                            ^
[   31.559206]  fff00000c58b0880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.560300]  fff00000c58b0900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.561172] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[   31.419576] ==================================================================
[   31.420642] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   31.421629] Read of size 4 at addr fff00000c58b0740 by task swapper/0/0
[   31.422737] 
[   31.423083] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   31.424899] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.425475] Hardware name: linux,dummy-virt (DT)
[   31.426175] Call trace:
[   31.426714]  show_stack+0x20/0x38 (C)
[   31.427493]  dump_stack_lvl+0x8c/0xd0
[   31.427800]  print_report+0x118/0x5e0
[   31.428092]  kasan_report+0xc8/0x118
[   31.428461]  __asan_report_load4_noabort+0x20/0x30
[   31.429578]  rcu_uaf_reclaim+0x64/0x70
[   31.430478]  rcu_core+0x9f4/0x1e20
[   31.431425]  rcu_core_si+0x18/0x30
[   31.432376]  handle_softirqs+0x374/0xb20
[   31.433237]  __do_softirq+0x1c/0x28
[   31.433772]  ____do_softirq+0x18/0x30
[   31.434313]  call_on_irq_stack+0x24/0x58
[   31.434941]  do_softirq_own_stack+0x24/0x38
[   31.435913]  __irq_exit_rcu+0x1fc/0x318
[   31.436788]  irq_exit_rcu+0x1c/0x80
[   31.437422]  el1_interrupt+0x38/0x58
[   31.438082]  el1h_64_irq_handler+0x18/0x28
[   31.438762]  el1h_64_irq+0x6c/0x70
[   31.439657]  arch_local_irq_enable+0x4/0x8 (P)
[   31.441147]  default_idle_call+0x6c/0x78 (L)
[   31.441849]  do_idle+0x384/0x4e8
[   31.442449]  cpu_startup_entry+0x64/0x80
[   31.443243]  rest_init+0x160/0x188
[   31.443833]  start_kernel+0x308/0x3d0
[   31.444143]  __primary_switched+0x8c/0xa0
[   31.444556] 
[   31.445001] Allocated by task 187:
[   31.445913]  kasan_save_stack+0x3c/0x68
[   31.446627]  kasan_save_track+0x20/0x40
[   31.447279]  kasan_save_alloc_info+0x40/0x58
[   31.448066]  __kasan_kmalloc+0xd4/0xd8
[   31.448620]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.449343]  rcu_uaf+0xb0/0x2d0
[   31.449849]  kunit_try_run_case+0x14c/0x3d0
[   31.450495]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.451475]  kthread+0x24c/0x2d0
[   31.451968]  ret_from_fork+0x10/0x20
[   31.452509] 
[   31.452827] Freed by task 0:
[   31.453278]  kasan_save_stack+0x3c/0x68
[   31.453983]  kasan_save_track+0x20/0x40
[   31.454626]  kasan_save_free_info+0x4c/0x78
[   31.455572]  __kasan_slab_free+0x6c/0x98
[   31.456205]  kfree+0x114/0x3c8
[   31.456704]  rcu_uaf_reclaim+0x28/0x70
[   31.457233]  rcu_core+0x9f4/0x1e20
[   31.457683]  rcu_core_si+0x18/0x30
[   31.458127]  handle_softirqs+0x374/0xb20
[   31.458841]  __do_softirq+0x1c/0x28
[   31.460548] 
[   31.460938] Last potentially related work creation:
[   31.461866]  kasan_save_stack+0x3c/0x68
[   31.462429]  kasan_record_aux_stack+0xb4/0xc8
[   31.463117]  __call_rcu_common.constprop.0+0x74/0xa10
[   31.463824]  call_rcu+0x18/0x30
[   31.464775]  rcu_uaf+0x14c/0x2d0
[   31.465320]  kunit_try_run_case+0x14c/0x3d0
[   31.465974]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.466762]  kthread+0x24c/0x2d0
[   31.467493]  ret_from_fork+0x10/0x20
[   31.468178] 
[   31.468565] The buggy address belongs to the object at fff00000c58b0740
[   31.468565]  which belongs to the cache kmalloc-32 of size 32
[   31.470017] The buggy address is located 0 bytes inside of
[   31.470017]  freed 32-byte region [fff00000c58b0740, fff00000c58b0760)
[   31.471721] 
[   31.472176] The buggy address belongs to the physical page:
[   31.472889] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058b0
[   31.473954] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.474933] page_type: f5(slab)
[   31.475798] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   31.476763] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   31.477682] page dumped because: kasan: bad access detected
[   31.478404] 
[   31.478715] Memory state around the buggy address:
[   31.480012]  fff00000c58b0600: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   31.481034]  fff00000c58b0680: 00 00 00 fc fc fc fc fc 00 00 05 fc fc fc fc fc
[   31.481934] >fff00000c58b0700: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   31.483063]                                            ^
[   31.484390]  fff00000c58b0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.485509]  fff00000c58b0800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.486379] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[   31.237461] ==================================================================
[   31.238723] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x600
[   31.239395] Read of size 1 at addr fff00000c58f4400 by task kunit_try_catch/185
[   31.240436] 
[   31.240931] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   31.242294] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.243595] Hardware name: linux,dummy-virt (DT)
[   31.244224] Call trace:
[   31.244733]  show_stack+0x20/0x38 (C)
[   31.245319]  dump_stack_lvl+0x8c/0xd0
[   31.245997]  print_report+0x118/0x5e0
[   31.246655]  kasan_report+0xc8/0x118
[   31.247479]  __kasan_check_byte+0x54/0x70
[   31.248093]  ksize+0x30/0x88
[   31.248700]  ksize_uaf+0x168/0x600
[   31.249187]  kunit_try_run_case+0x14c/0x3d0
[   31.249919]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.250727]  kthread+0x24c/0x2d0
[   31.251563]  ret_from_fork+0x10/0x20
[   31.252149] 
[   31.252464] Allocated by task 185:
[   31.252964]  kasan_save_stack+0x3c/0x68
[   31.253745]  kasan_save_track+0x20/0x40
[   31.254223]  kasan_save_alloc_info+0x40/0x58
[   31.255055]  __kasan_kmalloc+0xd4/0xd8
[   31.255572]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.256298]  ksize_uaf+0xb8/0x600
[   31.256798]  kunit_try_run_case+0x14c/0x3d0
[   31.257276]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.257942]  kthread+0x24c/0x2d0
[   31.258564]  ret_from_fork+0x10/0x20
[   31.259849] 
[   31.260267] Freed by task 185:
[   31.260677]  kasan_save_stack+0x3c/0x68
[   31.261366]  kasan_save_track+0x20/0x40
[   31.262036]  kasan_save_free_info+0x4c/0x78
[   31.262547]  __kasan_slab_free+0x6c/0x98
[   31.263545]  kfree+0x114/0x3c8
[   31.264085]  ksize_uaf+0x11c/0x600
[   31.264612]  kunit_try_run_case+0x14c/0x3d0
[   31.265109]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.265920]  kthread+0x24c/0x2d0
[   31.266383]  ret_from_fork+0x10/0x20
[   31.267253] 
[   31.267682] The buggy address belongs to the object at fff00000c58f4400
[   31.267682]  which belongs to the cache kmalloc-128 of size 128
[   31.269116] The buggy address is located 0 bytes inside of
[   31.269116]  freed 128-byte region [fff00000c58f4400, fff00000c58f4480)
[   31.270597] 
[   31.270906] The buggy address belongs to the physical page:
[   31.271953] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058f4
[   31.272936] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.273756] page_type: f5(slab)
[   31.274247] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.275371] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.276626] page dumped because: kasan: bad access detected
[   31.277320] 
[   31.277709] Memory state around the buggy address:
[   31.278257]  fff00000c58f4300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.279578]  fff00000c58f4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.280340] >fff00000c58f4400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.281360]                    ^
[   31.281814]  fff00000c58f4480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.282672]  fff00000c58f4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.283953] ==================================================================
[   31.336639] ==================================================================
[   31.337449] BUG: KASAN: slab-use-after-free in ksize_uaf+0x548/0x600
[   31.338179] Read of size 1 at addr fff00000c58f4478 by task kunit_try_catch/185
[   31.339062] 
[   31.339868] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   31.341402] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.342115] Hardware name: linux,dummy-virt (DT)
[   31.342855] Call trace:
[   31.343411]  show_stack+0x20/0x38 (C)
[   31.344000]  dump_stack_lvl+0x8c/0xd0
[   31.344618]  print_report+0x118/0x5e0
[   31.345112]  kasan_report+0xc8/0x118
[   31.346010]  __asan_report_load1_noabort+0x20/0x30
[   31.346700]  ksize_uaf+0x548/0x600
[   31.347591]  kunit_try_run_case+0x14c/0x3d0
[   31.348219]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.348973]  kthread+0x24c/0x2d0
[   31.349570]  ret_from_fork+0x10/0x20
[   31.350145] 
[   31.350456] Allocated by task 185:
[   31.351112]  kasan_save_stack+0x3c/0x68
[   31.351895]  kasan_save_track+0x20/0x40
[   31.352359]  kasan_save_alloc_info+0x40/0x58
[   31.353007]  __kasan_kmalloc+0xd4/0xd8
[   31.353757]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.354321]  ksize_uaf+0xb8/0x600
[   31.354901]  kunit_try_run_case+0x14c/0x3d0
[   31.356353]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.357129]  kthread+0x24c/0x2d0
[   31.357653]  ret_from_fork+0x10/0x20
[   31.358307] 
[   31.358603] Freed by task 185:
[   31.359579]  kasan_save_stack+0x3c/0x68
[   31.360041]  kasan_save_track+0x20/0x40
[   31.360640]  kasan_save_free_info+0x4c/0x78
[   31.361204]  __kasan_slab_free+0x6c/0x98
[   31.362396]  kfree+0x114/0x3c8
[   31.362908]  ksize_uaf+0x11c/0x600
[   31.363286]  kunit_try_run_case+0x14c/0x3d0
[   31.364647]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.365317]  kthread+0x24c/0x2d0
[   31.365873]  ret_from_fork+0x10/0x20
[   31.366354] 
[   31.366681] The buggy address belongs to the object at fff00000c58f4400
[   31.366681]  which belongs to the cache kmalloc-128 of size 128
[   31.369066] The buggy address is located 120 bytes inside of
[   31.369066]  freed 128-byte region [fff00000c58f4400, fff00000c58f4480)
[   31.370628] 
[   31.370996] The buggy address belongs to the physical page:
[   31.372142] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058f4
[   31.373264] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.374191] page_type: f5(slab)
[   31.374830] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.375799] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.376966] page dumped because: kasan: bad access detected
[   31.377754] 
[   31.378217] Memory state around the buggy address:
[   31.378960]  fff00000c58f4300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.380669]  fff00000c58f4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.381642] >fff00000c58f4400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.382574]                                                                 ^
[   31.383596]  fff00000c58f4480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.384722]  fff00000c58f4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.385580] ==================================================================
[   31.285915] ==================================================================
[   31.286706] BUG: KASAN: slab-use-after-free in ksize_uaf+0x59c/0x600
[   31.288454] Read of size 1 at addr fff00000c58f4400 by task kunit_try_catch/185
[   31.289284] 
[   31.290135] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   31.291493] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.291952] Hardware name: linux,dummy-virt (DT)
[   31.292554] Call trace:
[   31.293044]  show_stack+0x20/0x38 (C)
[   31.293968]  dump_stack_lvl+0x8c/0xd0
[   31.294765]  print_report+0x118/0x5e0
[   31.295546]  kasan_report+0xc8/0x118
[   31.296099]  __asan_report_load1_noabort+0x20/0x30
[   31.296858]  ksize_uaf+0x59c/0x600
[   31.297514]  kunit_try_run_case+0x14c/0x3d0
[   31.298158]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.299118]  kthread+0x24c/0x2d0
[   31.299620]  ret_from_fork+0x10/0x20
[   31.300182] 
[   31.300556] Allocated by task 185:
[   31.301069]  kasan_save_stack+0x3c/0x68
[   31.301859]  kasan_save_track+0x20/0x40
[   31.302419]  kasan_save_alloc_info+0x40/0x58
[   31.303199]  __kasan_kmalloc+0xd4/0xd8
[   31.303729]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.304424]  ksize_uaf+0xb8/0x600
[   31.304911]  kunit_try_run_case+0x14c/0x3d0
[   31.305960]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.306708]  kthread+0x24c/0x2d0
[   31.307284]  ret_from_fork+0x10/0x20
[   31.308663] 
[   31.308998] Freed by task 185:
[   31.309408]  kasan_save_stack+0x3c/0x68
[   31.310029]  kasan_save_track+0x20/0x40
[   31.310800]  kasan_save_free_info+0x4c/0x78
[   31.311767]  __kasan_slab_free+0x6c/0x98
[   31.312448]  kfree+0x114/0x3c8
[   31.313016]  ksize_uaf+0x11c/0x600
[   31.313508]  kunit_try_run_case+0x14c/0x3d0
[   31.314237]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.315232]  kthread+0x24c/0x2d0
[   31.315756]  ret_from_fork+0x10/0x20
[   31.316303] 
[   31.316655] The buggy address belongs to the object at fff00000c58f4400
[   31.316655]  which belongs to the cache kmalloc-128 of size 128
[   31.318129] The buggy address is located 0 bytes inside of
[   31.318129]  freed 128-byte region [fff00000c58f4400, fff00000c58f4480)
[   31.319824] 
[   31.320124] The buggy address belongs to the physical page:
[   31.320791] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058f4
[   31.321730] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.322746] page_type: f5(slab)
[   31.323487] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.324475] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.325494] page dumped because: kasan: bad access detected
[   31.326188] 
[   31.326540] Memory state around the buggy address:
[   31.327354]  fff00000c58f4300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.328241]  fff00000c58f4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.329120] >fff00000c58f4400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.330780]                    ^
[   31.331420]  fff00000c58f4480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.332464]  fff00000c58f4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.333289] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[   39.600000] ==================================================================
[   39.600982] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   39.600982] 
[   39.602025] Out-of-bounds write at 0x00000000b430893a (1B left of kfence-#150):
[   39.603636]  test_out_of_bounds_write+0x100/0x240
[   39.604409]  test_out_of_bounds_write+0xc8/0x240
[   39.605170]  kunit_try_run_case+0x14c/0x3d0
[   39.605922]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.606780]  kthread+0x24c/0x2d0
[   39.607448]  ret_from_fork+0x10/0x20
[   39.608041] 
[   39.608429] kfence-#150: 0x00000000675a814f-0x000000006c286311, size=32, cache=test
[   39.608429] 
[   39.609570] allocated by task 282 on cpu 1 at 39.599841s (0.009720s ago):
[   39.610574]  test_alloc+0x22c/0x620
[   39.611267]  test_out_of_bounds_write+0xc8/0x240
[   39.612038]  kunit_try_run_case+0x14c/0x3d0
[   39.612713]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.613550]  kthread+0x24c/0x2d0
[   39.614199]  ret_from_fork+0x10/0x20
[   39.614872] 
[   39.615356] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   39.616630] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.617170] Hardware name: linux,dummy-virt (DT)
[   39.617723] ==================================================================
[   39.184161] ==================================================================
[   39.185038] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   39.185038] 
[   39.186049] Out-of-bounds write at 0x00000000d6a0ff6f (1B left of kfence-#146):
[   39.187307]  test_out_of_bounds_write+0x100/0x240
[   39.188037]  test_out_of_bounds_write+0xc8/0x240
[   39.189227]  kunit_try_run_case+0x14c/0x3d0
[   39.189884]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.190585]  kthread+0x24c/0x2d0
[   39.191355]  ret_from_fork+0x10/0x20
[   39.192060] 
[   39.192320] kfence-#146: 0x00000000d79599e0-0x0000000024d31bc5, size=32, cache=kmalloc-32
[   39.192320] 
[   39.193281] allocated by task 280 on cpu 0 at 39.183912s (0.009363s ago):
[   39.194089]  test_alloc+0x298/0x620
[   39.194635]  test_out_of_bounds_write+0xc8/0x240
[   39.195738]  kunit_try_run_case+0x14c/0x3d0
[   39.196218]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.196928]  kthread+0x24c/0x2d0
[   39.197454]  ret_from_fork+0x10/0x20
[   39.198037] 
[   39.198403] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   39.200296] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.201517] Hardware name: linux,dummy-virt (DT)
[   39.202302] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[   39.080010] ==================================================================
[   39.081110] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   39.081110] 
[   39.082019] Out-of-bounds read at 0x00000000d50da0e4 (32B right of kfence-#145):
[   39.082982]  test_out_of_bounds_read+0x1c8/0x3e0
[   39.083640]  test_out_of_bounds_read+0x198/0x3e0
[   39.084498]  kunit_try_run_case+0x14c/0x3d0
[   39.085144]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.085747]  kthread+0x24c/0x2d0
[   39.086467]  ret_from_fork+0x10/0x20
[   39.087004] 
[   39.087296] kfence-#145: 0x000000008d5b0c57-0x0000000057a9faed, size=32, cache=test
[   39.087296] 
[   39.088585] allocated by task 278 on cpu 0 at 39.079856s (0.008718s ago):
[   39.089609]  test_alloc+0x22c/0x620
[   39.090155]  test_out_of_bounds_read+0x198/0x3e0
[   39.090977]  kunit_try_run_case+0x14c/0x3d0
[   39.091747]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.092449]  kthread+0x24c/0x2d0
[   39.092974]  ret_from_fork+0x10/0x20
[   39.093635] 
[   39.093978] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   39.095218] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.095725] Hardware name: linux,dummy-virt (DT)
[   39.096464] ==================================================================
[   38.560167] ==================================================================
[   38.560872] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   38.560872] 
[   38.561801] Out-of-bounds read at 0x0000000025ae99f5 (1B left of kfence-#140):
[   38.562745]  test_out_of_bounds_read+0x114/0x3e0
[   38.563664]  test_out_of_bounds_read+0xdc/0x3e0
[   38.564582]  kunit_try_run_case+0x14c/0x3d0
[   38.565372]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.566282]  kthread+0x24c/0x2d0
[   38.566898]  ret_from_fork+0x10/0x20
[   38.567541] 
[   38.567901] kfence-#140: 0x00000000618f9781-0x0000000011c9c302, size=32, cache=test
[   38.567901] 
[   38.569040] allocated by task 278 on cpu 0 at 38.559865s (0.009165s ago):
[   38.570259]  test_alloc+0x22c/0x620
[   38.570889]  test_out_of_bounds_read+0xdc/0x3e0
[   38.571614]  kunit_try_run_case+0x14c/0x3d0
[   38.572295]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.573081]  kthread+0x24c/0x2d0
[   38.573688]  ret_from_fork+0x10/0x20
[   38.574247] 
[   38.574771] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   38.576043] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.576715] Hardware name: linux,dummy-virt (DT)
[   38.577531] ==================================================================
[   38.040120] ==================================================================
[   38.041053] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   38.041053] 
[   38.042041] Out-of-bounds read at 0x000000000bb3ec74 (32B right of kfence-#135):
[   38.042864]  test_out_of_bounds_read+0x1c8/0x3e0
[   38.043697]  test_out_of_bounds_read+0x198/0x3e0
[   38.044384]  kunit_try_run_case+0x14c/0x3d0
[   38.045075]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.045942]  kthread+0x24c/0x2d0
[   38.046634]  ret_from_fork+0x10/0x20
[   38.047209] 
[   38.047596] kfence-#135: 0x00000000b0e51e4b-0x0000000070e1fb8b, size=32, cache=kmalloc-32
[   38.047596] 
[   38.048741] allocated by task 276 on cpu 1 at 38.039848s (0.008884s ago):
[   38.049705]  test_alloc+0x298/0x620
[   38.050274]  test_out_of_bounds_read+0x198/0x3e0
[   38.051102]  kunit_try_run_case+0x14c/0x3d0
[   38.051705]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.052537]  kthread+0x24c/0x2d0
[   38.053011]  ret_from_fork+0x10/0x20
[   38.053702] 
[   38.054158] CPU: 1 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   38.055277] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.055900] Hardware name: linux,dummy-virt (DT)
[   38.056598] ==================================================================
[   37.937021] ==================================================================
[   37.937878] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   37.937878] 
[   37.939072] Out-of-bounds read at 0x000000007aaac358 (1B left of kfence-#134):
[   37.940064]  test_out_of_bounds_read+0x114/0x3e0
[   37.940695]  test_out_of_bounds_read+0xdc/0x3e0
[   37.941491]  kunit_try_run_case+0x14c/0x3d0
[   37.942224]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.943020]  kthread+0x24c/0x2d0
[   37.943540]  ret_from_fork+0x10/0x20
[   37.944028] 
[   37.944507] kfence-#134: 0x00000000672bc3b4-0x0000000006402633, size=32, cache=kmalloc-32
[   37.944507] 
[   37.945711] allocated by task 276 on cpu 1 at 37.935774s (0.009928s ago):
[   37.946572]  test_alloc+0x298/0x620
[   37.947210]  test_out_of_bounds_read+0xdc/0x3e0
[   37.947854]  kunit_try_run_case+0x14c/0x3d0
[   37.948500]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.949290]  kthread+0x24c/0x2d0
[   37.949759]  ret_from_fork+0x10/0x20
[   37.950451] 
[   37.950854] CPU: 1 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   37.952006] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.952598] Hardware name: linux,dummy-virt (DT)
[   37.953243] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-kmalloc_track_caller_oob_right
[   29.262603] ==================================================================
[   29.266051] BUG: KFENCE: memory corruption in kmalloc_track_caller_oob_right+0x224/0x490
[   29.266051] 
[   29.267220] Corrupted memory at 0x00000000803ef9c5 [ ! . . . . . . . . . . . . . . . ] (in kfence-#89):
[   29.271636]  kmalloc_track_caller_oob_right+0x224/0x490
[   29.273211]  kunit_try_run_case+0x14c/0x3d0
[   29.273959]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.274829]  kthread+0x24c/0x2d0
[   29.275297]  ret_from_fork+0x10/0x20
[   29.276017] 
[   29.276857] kfence-#89: 0x00000000e7405ff1-0x00000000b962185a, size=120, cache=kmalloc-128
[   29.276857] 
[   29.278431] allocated by task 131 on cpu 0 at 29.260394s (0.017891s ago):
[   29.279540]  kmalloc_track_caller_oob_right+0x184/0x490
[   29.280378]  kunit_try_run_case+0x14c/0x3d0
[   29.281022]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.282638]  kthread+0x24c/0x2d0
[   29.283143]  ret_from_fork+0x10/0x20
[   29.284188] 
[   29.284814] freed by task 131 on cpu 0 at 29.261808s (0.022828s ago):
[   29.285720]  kmalloc_track_caller_oob_right+0x224/0x490
[   29.286487]  kunit_try_run_case+0x14c/0x3d0
[   29.287878]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.288568]  kthread+0x24c/0x2d0
[   29.289181]  ret_from_fork+0x10/0x20
[   29.289842] 
[   29.290215] CPU: 0 UID: 0 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   29.292038] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.292850] Hardware name: linux,dummy-virt (DT)
[   29.293503] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[   37.725115] ==================================================================
[   37.725996] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   37.727237] Write of size 121 at addr fff00000c594bf00 by task kunit_try_catch/274
[   37.729497] 
[   37.730164] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   37.731944] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.732234] Hardware name: linux,dummy-virt (DT)
[   37.733013] Call trace:
[   37.733511]  show_stack+0x20/0x38 (C)
[   37.734342]  dump_stack_lvl+0x8c/0xd0
[   37.735095]  print_report+0x118/0x5e0
[   37.735821]  kasan_report+0xc8/0x118
[   37.736237]  kasan_check_range+0x100/0x1a8
[   37.736993]  __kasan_check_write+0x20/0x30
[   37.737820]  strncpy_from_user+0x3c/0x2a0
[   37.738647]  copy_user_test_oob+0x5c0/0xec0
[   37.739175]  kunit_try_run_case+0x14c/0x3d0
[   37.739808]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.740610]  kthread+0x24c/0x2d0
[   37.741198]  ret_from_fork+0x10/0x20
[   37.741847] 
[   37.742234] Allocated by task 274:
[   37.742828]  kasan_save_stack+0x3c/0x68
[   37.743518]  kasan_save_track+0x20/0x40
[   37.744063]  kasan_save_alloc_info+0x40/0x58
[   37.744658]  __kasan_kmalloc+0xd4/0xd8
[   37.745340]  __kmalloc_noprof+0x188/0x4c8
[   37.745954]  kunit_kmalloc_array+0x34/0x88
[   37.746564]  copy_user_test_oob+0xac/0xec0
[   37.747177]  kunit_try_run_case+0x14c/0x3d0
[   37.747841]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.748600]  kthread+0x24c/0x2d0
[   37.749120]  ret_from_fork+0x10/0x20
[   37.749710] 
[   37.750133] The buggy address belongs to the object at fff00000c594bf00
[   37.750133]  which belongs to the cache kmalloc-128 of size 128
[   37.751571] The buggy address is located 0 bytes inside of
[   37.751571]  allocated 120-byte region [fff00000c594bf00, fff00000c594bf78)
[   37.752929] 
[   37.753365] The buggy address belongs to the physical page:
[   37.754106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594b
[   37.755056] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.755945] page_type: f5(slab)
[   37.756420] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.757316] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   37.758321] page dumped because: kasan: bad access detected
[   37.759170] 
[   37.759491] Memory state around the buggy address:
[   37.760139]  fff00000c594be00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.760981]  fff00000c594be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.761959] >fff00000c594bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.762818]                                                                 ^
[   37.763807]  fff00000c594bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.764704]  fff00000c594c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.765524] ==================================================================
[   37.767670] ==================================================================
[   37.768558] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   37.769469] Write of size 1 at addr fff00000c594bf78 by task kunit_try_catch/274
[   37.770280] 
[   37.770742] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   37.771982] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.772619] Hardware name: linux,dummy-virt (DT)
[   37.773314] Call trace:
[   37.773797]  show_stack+0x20/0x38 (C)
[   37.774301]  dump_stack_lvl+0x8c/0xd0
[   37.775019]  print_report+0x118/0x5e0
[   37.775607]  kasan_report+0xc8/0x118
[   37.776180]  __asan_report_store1_noabort+0x20/0x30
[   37.776958]  strncpy_from_user+0x270/0x2a0
[   37.777613]  copy_user_test_oob+0x5c0/0xec0
[   37.778256]  kunit_try_run_case+0x14c/0x3d0
[   37.778804]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.779680]  kthread+0x24c/0x2d0
[   37.780224]  ret_from_fork+0x10/0x20
[   37.780841] 
[   37.781169] Allocated by task 274:
[   37.781798]  kasan_save_stack+0x3c/0x68
[   37.782464]  kasan_save_track+0x20/0x40
[   37.783050]  kasan_save_alloc_info+0x40/0x58
[   37.783783]  __kasan_kmalloc+0xd4/0xd8
[   37.784377]  __kmalloc_noprof+0x188/0x4c8
[   37.784912]  kunit_kmalloc_array+0x34/0x88
[   37.785634]  copy_user_test_oob+0xac/0xec0
[   37.786250]  kunit_try_run_case+0x14c/0x3d0
[   37.786854]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.787500]  kthread+0x24c/0x2d0
[   37.788147]  ret_from_fork+0x10/0x20
[   37.788653] 
[   37.789059] The buggy address belongs to the object at fff00000c594bf00
[   37.789059]  which belongs to the cache kmalloc-128 of size 128
[   37.790481] The buggy address is located 0 bytes to the right of
[   37.790481]  allocated 120-byte region [fff00000c594bf00, fff00000c594bf78)
[   37.791904] 
[   37.792246] The buggy address belongs to the physical page:
[   37.792930] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594b
[   37.793961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.794933] page_type: f5(slab)
[   37.795413] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.796586] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   37.797434] page dumped because: kasan: bad access detected
[   37.798120] 
[   37.798617] Memory state around the buggy address:
[   37.799220]  fff00000c594be00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.800040]  fff00000c594be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.801049] >fff00000c594bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.801865]                                                                 ^
[   37.802875]  fff00000c594bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.803891]  fff00000c594c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.804794] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[   37.532586] ==================================================================
[   37.533493] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec0
[   37.534134] Write of size 121 at addr fff00000c594bf00 by task kunit_try_catch/274
[   37.535405] 
[   37.535729] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   37.537050] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.537603] Hardware name: linux,dummy-virt (DT)
[   37.538203] Call trace:
[   37.538785]  show_stack+0x20/0x38 (C)
[   37.539513]  dump_stack_lvl+0x8c/0xd0
[   37.540715]  print_report+0x118/0x5e0
[   37.541572]  kasan_report+0xc8/0x118
[   37.542151]  kasan_check_range+0x100/0x1a8
[   37.542836]  __kasan_check_write+0x20/0x30
[   37.543690]  copy_user_test_oob+0x35c/0xec0
[   37.544486]  kunit_try_run_case+0x14c/0x3d0
[   37.545174]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.545952]  kthread+0x24c/0x2d0
[   37.546519]  ret_from_fork+0x10/0x20
[   37.547278] 
[   37.548054] Allocated by task 274:
[   37.548470]  kasan_save_stack+0x3c/0x68
[   37.548968]  kasan_save_track+0x20/0x40
[   37.549665]  kasan_save_alloc_info+0x40/0x58
[   37.550309]  __kasan_kmalloc+0xd4/0xd8
[   37.550898]  __kmalloc_noprof+0x188/0x4c8
[   37.552074]  kunit_kmalloc_array+0x34/0x88
[   37.552738]  copy_user_test_oob+0xac/0xec0
[   37.553366]  kunit_try_run_case+0x14c/0x3d0
[   37.553986]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.554786]  kthread+0x24c/0x2d0
[   37.555254]  ret_from_fork+0x10/0x20
[   37.555934] 
[   37.556190] The buggy address belongs to the object at fff00000c594bf00
[   37.556190]  which belongs to the cache kmalloc-128 of size 128
[   37.557907] The buggy address is located 0 bytes inside of
[   37.557907]  allocated 120-byte region [fff00000c594bf00, fff00000c594bf78)
[   37.560917] 
[   37.561231] The buggy address belongs to the physical page:
[   37.562053] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594b
[   37.562925] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.564042] page_type: f5(slab)
[   37.564809] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.566030] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   37.566684] page dumped because: kasan: bad access detected
[   37.567824] 
[   37.568452] Memory state around the buggy address:
[   37.569245]  fff00000c594be00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.570219]  fff00000c594be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.571446] >fff00000c594bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.572081]                                                                 ^
[   37.572959]  fff00000c594bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.573955]  fff00000c594c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.574921] ==================================================================
[   37.576677] ==================================================================
[   37.577397] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec0
[   37.578539] Read of size 121 at addr fff00000c594bf00 by task kunit_try_catch/274
[   37.579606] 
[   37.580014] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   37.581690] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.582426] Hardware name: linux,dummy-virt (DT)
[   37.583571] Call trace:
[   37.584120]  show_stack+0x20/0x38 (C)
[   37.584944]  dump_stack_lvl+0x8c/0xd0
[   37.585658]  print_report+0x118/0x5e0
[   37.586314]  kasan_report+0xc8/0x118
[   37.587016]  kasan_check_range+0x100/0x1a8
[   37.588240]  __kasan_check_read+0x20/0x30
[   37.588899]  copy_user_test_oob+0x3c8/0xec0
[   37.589701]  kunit_try_run_case+0x14c/0x3d0
[   37.590388]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.591486]  kthread+0x24c/0x2d0
[   37.591797]  ret_from_fork+0x10/0x20
[   37.592094] 
[   37.592262] Allocated by task 274:
[   37.592557]  kasan_save_stack+0x3c/0x68
[   37.592851]  kasan_save_track+0x20/0x40
[   37.593135]  kasan_save_alloc_info+0x40/0x58
[   37.594285]  __kasan_kmalloc+0xd4/0xd8
[   37.595232]  __kmalloc_noprof+0x188/0x4c8
[   37.597113]  kunit_kmalloc_array+0x34/0x88
[   37.598011]  copy_user_test_oob+0xac/0xec0
[   37.598875]  kunit_try_run_case+0x14c/0x3d0
[   37.599793]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.600689]  kthread+0x24c/0x2d0
[   37.601178]  ret_from_fork+0x10/0x20
[   37.601779] 
[   37.602116] The buggy address belongs to the object at fff00000c594bf00
[   37.602116]  which belongs to the cache kmalloc-128 of size 128
[   37.603492] The buggy address is located 0 bytes inside of
[   37.603492]  allocated 120-byte region [fff00000c594bf00, fff00000c594bf78)
[   37.604918] 
[   37.605220] The buggy address belongs to the physical page:
[   37.606112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594b
[   37.607037] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.607873] page_type: f5(slab)
[   37.608538] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.609734] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   37.611407] page dumped because: kasan: bad access detected
[   37.613469] 
[   37.613824] Memory state around the buggy address:
[   37.614756]  fff00000c594be00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.616383]  fff00000c594be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.617295] >fff00000c594bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.618450]                                                                 ^
[   37.620508]  fff00000c594bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.621632]  fff00000c594c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.622653] ==================================================================
[   37.625306] ==================================================================
[   37.626142] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec0
[   37.626863] Write of size 121 at addr fff00000c594bf00 by task kunit_try_catch/274
[   37.629771] 
[   37.630579] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   37.631604] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.632486] Hardware name: linux,dummy-virt (DT)
[   37.633277] Call trace:
[   37.633760]  show_stack+0x20/0x38 (C)
[   37.634304]  dump_stack_lvl+0x8c/0xd0
[   37.635223]  print_report+0x118/0x5e0
[   37.636322]  kasan_report+0xc8/0x118
[   37.636779]  kasan_check_range+0x100/0x1a8
[   37.637268]  __kasan_check_write+0x20/0x30
[   37.638144]  copy_user_test_oob+0x434/0xec0
[   37.638840]  kunit_try_run_case+0x14c/0x3d0
[   37.639635]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.640473]  kthread+0x24c/0x2d0
[   37.641261]  ret_from_fork+0x10/0x20
[   37.642352] 
[   37.642731] Allocated by task 274:
[   37.643364]  kasan_save_stack+0x3c/0x68
[   37.644056]  kasan_save_track+0x20/0x40
[   37.644706]  kasan_save_alloc_info+0x40/0x58
[   37.645351]  __kasan_kmalloc+0xd4/0xd8
[   37.646110]  __kmalloc_noprof+0x188/0x4c8
[   37.646605]  kunit_kmalloc_array+0x34/0x88
[   37.647219]  copy_user_test_oob+0xac/0xec0
[   37.648677]  kunit_try_run_case+0x14c/0x3d0
[   37.649403]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.650178]  kthread+0x24c/0x2d0
[   37.650668]  ret_from_fork+0x10/0x20
[   37.651839] 
[   37.652177] The buggy address belongs to the object at fff00000c594bf00
[   37.652177]  which belongs to the cache kmalloc-128 of size 128
[   37.654138] The buggy address is located 0 bytes inside of
[   37.654138]  allocated 120-byte region [fff00000c594bf00, fff00000c594bf78)
[   37.656254] 
[   37.656636] The buggy address belongs to the physical page:
[   37.657572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594b
[   37.658527] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.659736] page_type: f5(slab)
[   37.660253] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.661244] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   37.662801] page dumped because: kasan: bad access detected
[   37.663539] 
[   37.664390] Memory state around the buggy address:
[   37.665063]  fff00000c594be00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.666111]  fff00000c594be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.667073] >fff00000c594bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.668260]                                                                 ^
[   37.669647]  fff00000c594bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.671643]  fff00000c594c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.672634] ==================================================================
[   37.482800] ==================================================================
[   37.483692] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec0
[   37.484578] Read of size 121 at addr fff00000c594bf00 by task kunit_try_catch/274
[   37.485604] 
[   37.485951] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   37.487205] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.487722] Hardware name: linux,dummy-virt (DT)
[   37.488262] Call trace:
[   37.488879]  show_stack+0x20/0x38 (C)
[   37.489569]  dump_stack_lvl+0x8c/0xd0
[   37.490230]  print_report+0x118/0x5e0
[   37.490933]  kasan_report+0xc8/0x118
[   37.491481]  kasan_check_range+0x100/0x1a8
[   37.492293]  __kasan_check_read+0x20/0x30
[   37.492921]  copy_user_test_oob+0x728/0xec0
[   37.493583]  kunit_try_run_case+0x14c/0x3d0
[   37.494431]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.495166]  kthread+0x24c/0x2d0
[   37.495813]  ret_from_fork+0x10/0x20
[   37.496541] 
[   37.496877] Allocated by task 274:
[   37.497347]  kasan_save_stack+0x3c/0x68
[   37.498068]  kasan_save_track+0x20/0x40
[   37.498758]  kasan_save_alloc_info+0x40/0x58
[   37.499093]  __kasan_kmalloc+0xd4/0xd8
[   37.499487]  __kmalloc_noprof+0x188/0x4c8
[   37.500321]  kunit_kmalloc_array+0x34/0x88
[   37.500967]  copy_user_test_oob+0xac/0xec0
[   37.501589]  kunit_try_run_case+0x14c/0x3d0
[   37.502280]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.503073]  kthread+0x24c/0x2d0
[   37.503567]  ret_from_fork+0x10/0x20
[   37.504167] 
[   37.504570] The buggy address belongs to the object at fff00000c594bf00
[   37.504570]  which belongs to the cache kmalloc-128 of size 128
[   37.505966] The buggy address is located 0 bytes inside of
[   37.505966]  allocated 120-byte region [fff00000c594bf00, fff00000c594bf78)
[   37.507312] 
[   37.507616] The buggy address belongs to the physical page:
[   37.508436] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594b
[   37.509399] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.510201] page_type: f5(slab)
[   37.510733] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.511684] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   37.512683] page dumped because: kasan: bad access detected
[   37.513470] 
[   37.513824] Memory state around the buggy address:
[   37.514496]  fff00000c594be00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.515319]  fff00000c594be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.516233] >fff00000c594bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.517169]                                                                 ^
[   37.518018]  fff00000c594bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.518944]  fff00000c594c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.519915] ==================================================================
[   37.435893] ==================================================================
[   37.437361] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec0
[   37.438088] Write of size 121 at addr fff00000c594bf00 by task kunit_try_catch/274
[   37.439196] 
[   37.439912] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   37.441272] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.441862] Hardware name: linux,dummy-virt (DT)
[   37.442510] Call trace:
[   37.442901]  show_stack+0x20/0x38 (C)
[   37.443523]  dump_stack_lvl+0x8c/0xd0
[   37.444124]  print_report+0x118/0x5e0
[   37.444731]  kasan_report+0xc8/0x118
[   37.445245]  kasan_check_range+0x100/0x1a8
[   37.445969]  __kasan_check_write+0x20/0x30
[   37.446515]  copy_user_test_oob+0x234/0xec0
[   37.447356]  kunit_try_run_case+0x14c/0x3d0
[   37.448102]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.448976]  kthread+0x24c/0x2d0
[   37.449540]  ret_from_fork+0x10/0x20
[   37.450125] 
[   37.450518] Allocated by task 274:
[   37.450977]  kasan_save_stack+0x3c/0x68
[   37.451688]  kasan_save_track+0x20/0x40
[   37.452276]  kasan_save_alloc_info+0x40/0x58
[   37.452911]  __kasan_kmalloc+0xd4/0xd8
[   37.453496]  __kmalloc_noprof+0x188/0x4c8
[   37.454055]  kunit_kmalloc_array+0x34/0x88
[   37.454738]  copy_user_test_oob+0xac/0xec0
[   37.455315]  kunit_try_run_case+0x14c/0x3d0
[   37.455987]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.456751]  kthread+0x24c/0x2d0
[   37.457248]  ret_from_fork+0x10/0x20
[   37.457802] 
[   37.458279] The buggy address belongs to the object at fff00000c594bf00
[   37.458279]  which belongs to the cache kmalloc-128 of size 128
[   37.459659] The buggy address is located 0 bytes inside of
[   37.459659]  allocated 120-byte region [fff00000c594bf00, fff00000c594bf78)
[   37.461037] 
[   37.461409] The buggy address belongs to the physical page:
[   37.462188] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594b
[   37.463060] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.463955] page_type: f5(slab)
[   37.464465] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.465594] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   37.466571] page dumped because: kasan: bad access detected
[   37.467191] 
[   37.467638] Memory state around the buggy address:
[   37.468404]  fff00000c594be00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.469384]  fff00000c594be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.470298] >fff00000c594bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.471120]                                                                 ^
[   37.472073]  fff00000c594bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.472963]  fff00000c594c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.473862] ==================================================================
[   37.674320] ==================================================================
[   37.676292] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec0
[   37.677262] Read of size 121 at addr fff00000c594bf00 by task kunit_try_catch/274
[   37.678046] 
[   37.678605] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   37.680672] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.681662] Hardware name: linux,dummy-virt (DT)
[   37.682670] Call trace:
[   37.683491]  show_stack+0x20/0x38 (C)
[   37.684854]  dump_stack_lvl+0x8c/0xd0
[   37.685913]  print_report+0x118/0x5e0
[   37.686730]  kasan_report+0xc8/0x118
[   37.687448]  kasan_check_range+0x100/0x1a8
[   37.688169]  __kasan_check_read+0x20/0x30
[   37.689397]  copy_user_test_oob+0x4a0/0xec0
[   37.690084]  kunit_try_run_case+0x14c/0x3d0
[   37.690509]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.691688]  kthread+0x24c/0x2d0
[   37.692164]  ret_from_fork+0x10/0x20
[   37.692966] 
[   37.693571] Allocated by task 274:
[   37.694233]  kasan_save_stack+0x3c/0x68
[   37.695415]  kasan_save_track+0x20/0x40
[   37.696047]  kasan_save_alloc_info+0x40/0x58
[   37.696669]  __kasan_kmalloc+0xd4/0xd8
[   37.697204]  __kmalloc_noprof+0x188/0x4c8
[   37.698303]  kunit_kmalloc_array+0x34/0x88
[   37.698895]  copy_user_test_oob+0xac/0xec0
[   37.699651]  kunit_try_run_case+0x14c/0x3d0
[   37.700252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.701090]  kthread+0x24c/0x2d0
[   37.701543]  ret_from_fork+0x10/0x20
[   37.701972] 
[   37.702235] The buggy address belongs to the object at fff00000c594bf00
[   37.702235]  which belongs to the cache kmalloc-128 of size 128
[   37.704871] The buggy address is located 0 bytes inside of
[   37.704871]  allocated 120-byte region [fff00000c594bf00, fff00000c594bf78)
[   37.706460] 
[   37.706858] The buggy address belongs to the physical page:
[   37.708253] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594b
[   37.709481] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.710316] page_type: f5(slab)
[   37.710826] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.712847] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   37.714011] page dumped because: kasan: bad access detected
[   37.714782] 
[   37.715277] Memory state around the buggy address:
[   37.716079]  fff00000c594be00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.717038]  fff00000c594be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.718095] >fff00000c594bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.719547]                                                                 ^
[   37.720898]  fff00000c594bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.722173]  fff00000c594c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   37.723177] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[   37.359989] ==================================================================
[   37.361063] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   37.361968] Write of size 8 at addr fff00000c594be78 by task kunit_try_catch/270
[   37.362861] 
[   37.364272] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   37.365722] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.366276] Hardware name: linux,dummy-virt (DT)
[   37.367242] Call trace:
[   37.367692]  show_stack+0x20/0x38 (C)
[   37.368391]  dump_stack_lvl+0x8c/0xd0
[   37.368933]  print_report+0x118/0x5e0
[   37.369546]  kasan_report+0xc8/0x118
[   37.370122]  kasan_check_range+0x100/0x1a8
[   37.370772]  __kasan_check_write+0x20/0x30
[   37.371739]  copy_to_kernel_nofault+0x8c/0x250
[   37.372401]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   37.373110]  kunit_try_run_case+0x14c/0x3d0
[   37.373785]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.374651]  kthread+0x24c/0x2d0
[   37.375445]  ret_from_fork+0x10/0x20
[   37.376018] 
[   37.376428] Allocated by task 270:
[   37.376924]  kasan_save_stack+0x3c/0x68
[   37.377543]  kasan_save_track+0x20/0x40
[   37.378217]  kasan_save_alloc_info+0x40/0x58
[   37.378876]  __kasan_kmalloc+0xd4/0xd8
[   37.380430]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.381113]  copy_to_kernel_nofault_oob+0xc8/0x418
[   37.381878]  kunit_try_run_case+0x14c/0x3d0
[   37.382519]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.383374]  kthread+0x24c/0x2d0
[   37.384167]  ret_from_fork+0x10/0x20
[   37.384918] 
[   37.385253] The buggy address belongs to the object at fff00000c594be00
[   37.385253]  which belongs to the cache kmalloc-128 of size 128
[   37.386729] The buggy address is located 0 bytes to the right of
[   37.386729]  allocated 120-byte region [fff00000c594be00, fff00000c594be78)
[   37.388799] 
[   37.389145] The buggy address belongs to the physical page:
[   37.389944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594b
[   37.390934] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.391936] page_type: f5(slab)
[   37.392614] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.393551] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   37.394515] page dumped because: kasan: bad access detected
[   37.395189] 
[   37.395845] Memory state around the buggy address:
[   37.396790]  fff00000c594bd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   37.397785]  fff00000c594bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.398719] >fff00000c594be00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.399911]                                                                 ^
[   37.400984]  fff00000c594be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.402148]  fff00000c594bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.402823] ==================================================================
[   37.314807] ==================================================================
[   37.316901] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   37.317766] Read of size 8 at addr fff00000c594be78 by task kunit_try_catch/270
[   37.318636] 
[   37.319077] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   37.320633] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.321204] Hardware name: linux,dummy-virt (DT)
[   37.321848] Call trace:
[   37.322284]  show_stack+0x20/0x38 (C)
[   37.322915]  dump_stack_lvl+0x8c/0xd0
[   37.323593]  print_report+0x118/0x5e0
[   37.324294]  kasan_report+0xc8/0x118
[   37.324832]  __asan_report_load8_noabort+0x20/0x30
[   37.325627]  copy_to_kernel_nofault+0x204/0x250
[   37.326355]  copy_to_kernel_nofault_oob+0x158/0x418
[   37.327159]  kunit_try_run_case+0x14c/0x3d0
[   37.327842]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.328920]  kthread+0x24c/0x2d0
[   37.329429]  ret_from_fork+0x10/0x20
[   37.330029] 
[   37.330399] Allocated by task 270:
[   37.330862]  kasan_save_stack+0x3c/0x68
[   37.331632]  kasan_save_track+0x20/0x40
[   37.332732]  kasan_save_alloc_info+0x40/0x58
[   37.333529]  __kasan_kmalloc+0xd4/0xd8
[   37.334293]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.335058]  copy_to_kernel_nofault_oob+0xc8/0x418
[   37.335980]  kunit_try_run_case+0x14c/0x3d0
[   37.336708]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.337647]  kthread+0x24c/0x2d0
[   37.338399]  ret_from_fork+0x10/0x20
[   37.338893] 
[   37.339073] The buggy address belongs to the object at fff00000c594be00
[   37.339073]  which belongs to the cache kmalloc-128 of size 128
[   37.340943] The buggy address is located 0 bytes to the right of
[   37.340943]  allocated 120-byte region [fff00000c594be00, fff00000c594be78)
[   37.342593] 
[   37.343056] The buggy address belongs to the physical page:
[   37.344164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594b
[   37.345054] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.345860] page_type: f5(slab)
[   37.346478] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   37.347533] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   37.348762] page dumped because: kasan: bad access detected
[   37.349622] 
[   37.349941] Memory state around the buggy address:
[   37.350576]  fff00000c594bd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   37.351630]  fff00000c594bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.353243] >fff00000c594be00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   37.354659]                                                                 ^
[   37.356107]  fff00000c594be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.357014]  fff00000c594bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.358530] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[   37.231063] ==================================================================
[   37.232264] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   37.233141] Read of size 1 at addr ffff80008010b7f8 by task kunit_try_catch/258
[   37.234196] 
[   37.234505] CPU: 1 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   37.235816] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.236493] Hardware name: linux,dummy-virt (DT)
[   37.237222] Call trace:
[   37.238007]  show_stack+0x20/0x38 (C)
[   37.238693]  dump_stack_lvl+0x8c/0xd0
[   37.239721]  print_report+0x2fc/0x5e0
[   37.240562]  kasan_report+0xc8/0x118
[   37.241239]  __asan_report_load1_noabort+0x20/0x30
[   37.242005]  vmalloc_oob+0x51c/0x5d0
[   37.242678]  kunit_try_run_case+0x14c/0x3d0
[   37.243425]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.244181]  kthread+0x24c/0x2d0
[   37.245137]  ret_from_fork+0x10/0x20
[   37.245770] 
[   37.246094] The buggy address belongs to the virtual mapping at
[   37.246094]  [ffff80008010b000, ffff80008010d000) created by:
[   37.246094]  vmalloc_oob+0x98/0x5d0
[   37.247906] 
[   37.248243] The buggy address belongs to the physical page:
[   37.248983] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106321
[   37.250288] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.251217] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   37.252628] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   37.253950] page dumped because: kasan: bad access detected
[   37.254728] 
[   37.255066] Memory state around the buggy address:
[   37.255662]  ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.256908]  ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.257815] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   37.258845]                                                                 ^
[   37.259951]  ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   37.260860]  ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   37.261755] ==================================================================
[   37.197745] ==================================================================
[   37.199185] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   37.200432] Read of size 1 at addr ffff80008010b7f3 by task kunit_try_catch/258
[   37.201053] 
[   37.201436] CPU: 1 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   37.202781] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.203976] Hardware name: linux,dummy-virt (DT)
[   37.204653] Call trace:
[   37.205119]  show_stack+0x20/0x38 (C)
[   37.205781]  dump_stack_lvl+0x8c/0xd0
[   37.206418]  print_report+0x2fc/0x5e0
[   37.206990]  kasan_report+0xc8/0x118
[   37.207814]  __asan_report_load1_noabort+0x20/0x30
[   37.209029]  vmalloc_oob+0x578/0x5d0
[   37.209651]  kunit_try_run_case+0x14c/0x3d0
[   37.210408]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.211368]  kthread+0x24c/0x2d0
[   37.212236]  ret_from_fork+0x10/0x20
[   37.212934] 
[   37.213244] The buggy address belongs to the virtual mapping at
[   37.213244]  [ffff80008010b000, ffff80008010d000) created by:
[   37.213244]  vmalloc_oob+0x98/0x5d0
[   37.214948] 
[   37.215342] The buggy address belongs to the physical page:
[   37.216063] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106321
[   37.217808] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.218516] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   37.219434] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   37.220631] page dumped because: kasan: bad access detected
[   37.221211] 
[   37.221534] Memory state around the buggy address:
[   37.222170]  ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.223139]  ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.224464] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   37.225692]                                                              ^
[   37.226709]  ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   37.227944]  ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   37.228857] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   35.024037] ==================================================================
[   35.025024] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   35.026081] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   35.027718] 
[   35.028124] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   35.029251] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.029771] Hardware name: linux,dummy-virt (DT)
[   35.030402] Call trace:
[   35.030870]  show_stack+0x20/0x38 (C)
[   35.031456]  dump_stack_lvl+0x8c/0xd0
[   35.032121]  print_report+0x118/0x5e0
[   35.032714]  kasan_report+0xc8/0x118
[   35.033184]  kasan_check_range+0x100/0x1a8
[   35.033937]  __kasan_check_write+0x20/0x30
[   35.034531]  kasan_atomics_helper+0x4e4/0x4858
[   35.035185]  kasan_atomics+0x198/0x2e8
[   35.035819]  kunit_try_run_case+0x14c/0x3d0
[   35.036503]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.037272]  kthread+0x24c/0x2d0
[   35.037900]  ret_from_fork+0x10/0x20
[   35.038513] 
[   35.038833] Allocated by task 254:
[   35.039302]  kasan_save_stack+0x3c/0x68
[   35.039866]  kasan_save_track+0x20/0x40
[   35.040530]  kasan_save_alloc_info+0x40/0x58
[   35.041103]  __kasan_kmalloc+0xd4/0xd8
[   35.041808]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.042490]  kasan_atomics+0xb8/0x2e8
[   35.043027]  kunit_try_run_case+0x14c/0x3d0
[   35.043670]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.044400]  kthread+0x24c/0x2d0
[   35.044859]  ret_from_fork+0x10/0x20
[   35.045461] 
[   35.045852] The buggy address belongs to the object at fff00000c594f180
[   35.045852]  which belongs to the cache kmalloc-64 of size 64
[   35.047378] The buggy address is located 0 bytes to the right of
[   35.047378]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   35.048819] 
[   35.049167] The buggy address belongs to the physical page:
[   35.049916] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   35.050856] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.051687] page_type: f5(slab)
[   35.052246] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.053175] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.054132] page dumped because: kasan: bad access detected
[   35.054812] 
[   35.055135] Memory state around the buggy address:
[   35.055807]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.056707]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.057563] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.058463]                                      ^
[   35.059192]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.060084]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.060964] ==================================================================
[   36.482177] ==================================================================
[   36.483515] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   36.484102] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   36.485318] 
[   36.485893] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   36.487246] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.488042] Hardware name: linux,dummy-virt (DT)
[   36.488735] Call trace:
[   36.489186]  show_stack+0x20/0x38 (C)
[   36.489900]  dump_stack_lvl+0x8c/0xd0
[   36.490507]  print_report+0x118/0x5e0
[   36.491087]  kasan_report+0xc8/0x118
[   36.491735]  kasan_check_range+0x100/0x1a8
[   36.492431]  __kasan_check_write+0x20/0x30
[   36.493199]  kasan_atomics_helper+0x126c/0x4858
[   36.493952]  kasan_atomics+0x198/0x2e8
[   36.494586]  kunit_try_run_case+0x14c/0x3d0
[   36.495373]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.496155]  kthread+0x24c/0x2d0
[   36.496732]  ret_from_fork+0x10/0x20
[   36.497400] 
[   36.497742] Allocated by task 254:
[   36.498412]  kasan_save_stack+0x3c/0x68
[   36.499056]  kasan_save_track+0x20/0x40
[   36.499758]  kasan_save_alloc_info+0x40/0x58
[   36.500440]  __kasan_kmalloc+0xd4/0xd8
[   36.501074]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.501813]  kasan_atomics+0xb8/0x2e8
[   36.502437]  kunit_try_run_case+0x14c/0x3d0
[   36.503125]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.503893]  kthread+0x24c/0x2d0
[   36.504467]  ret_from_fork+0x10/0x20
[   36.505169] 
[   36.505573] The buggy address belongs to the object at fff00000c594f180
[   36.505573]  which belongs to the cache kmalloc-64 of size 64
[   36.507053] The buggy address is located 0 bytes to the right of
[   36.507053]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   36.509004] 
[   36.509400] The buggy address belongs to the physical page:
[   36.510081] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   36.511411] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.512430] page_type: f5(slab)
[   36.513135] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.514275] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.515380] page dumped because: kasan: bad access detected
[   36.516281] 
[   36.516816] Memory state around the buggy address:
[   36.517611]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.518228]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.518819] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.519758]                                      ^
[   36.521228]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.522022]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.523145] ==================================================================
[   37.059861] ==================================================================
[   37.060792] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   37.062737] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   37.063849] 
[   37.064388] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   37.065756] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.066489] Hardware name: linux,dummy-virt (DT)
[   37.067087] Call trace:
[   37.067759]  show_stack+0x20/0x38 (C)
[   37.068470]  dump_stack_lvl+0x8c/0xd0
[   37.069243]  print_report+0x118/0x5e0
[   37.070031]  kasan_report+0xc8/0x118
[   37.070688]  kasan_check_range+0x100/0x1a8
[   37.071457]  __kasan_check_write+0x20/0x30
[   37.072180]  kasan_atomics_helper+0x175c/0x4858
[   37.073092]  kasan_atomics+0x198/0x2e8
[   37.073876]  kunit_try_run_case+0x14c/0x3d0
[   37.074657]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.075530]  kthread+0x24c/0x2d0
[   37.076031]  ret_from_fork+0x10/0x20
[   37.076619] 
[   37.076944] Allocated by task 254:
[   37.077869]  kasan_save_stack+0x3c/0x68
[   37.078471]  kasan_save_track+0x20/0x40
[   37.079200]  kasan_save_alloc_info+0x40/0x58
[   37.079779]  __kasan_kmalloc+0xd4/0xd8
[   37.080071]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.080451]  kasan_atomics+0xb8/0x2e8
[   37.081127]  kunit_try_run_case+0x14c/0x3d0
[   37.081876]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.082797]  kthread+0x24c/0x2d0
[   37.083438]  ret_from_fork+0x10/0x20
[   37.084110] 
[   37.084680] The buggy address belongs to the object at fff00000c594f180
[   37.084680]  which belongs to the cache kmalloc-64 of size 64
[   37.086239] The buggy address is located 0 bytes to the right of
[   37.086239]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   37.087836] 
[   37.088207] The buggy address belongs to the physical page:
[   37.088985] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   37.090125] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.091017] page_type: f5(slab)
[   37.091604] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.092612] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.093580] page dumped because: kasan: bad access detected
[   37.094384] 
[   37.094720] Memory state around the buggy address:
[   37.095447]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.096506]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.097448] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.098432]                                      ^
[   37.099162]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.100047]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.100963] ==================================================================
[   35.255634] ==================================================================
[   35.256414] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[   35.257370] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   35.259180] 
[   35.259541] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   35.260725] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.261267] Hardware name: linux,dummy-virt (DT)
[   35.261924] Call trace:
[   35.262360]  show_stack+0x20/0x38 (C)
[   35.262952]  dump_stack_lvl+0x8c/0xd0
[   35.263539]  print_report+0x118/0x5e0
[   35.264127]  kasan_report+0xc8/0x118
[   35.264755]  kasan_check_range+0x100/0x1a8
[   35.265439]  __kasan_check_write+0x20/0x30
[   35.266183]  kasan_atomics_helper+0x760/0x4858
[   35.266868]  kasan_atomics+0x198/0x2e8
[   35.267427]  kunit_try_run_case+0x14c/0x3d0
[   35.268063]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.268794]  kthread+0x24c/0x2d0
[   35.269404]  ret_from_fork+0x10/0x20
[   35.270001] 
[   35.270423] Allocated by task 254:
[   35.270867]  kasan_save_stack+0x3c/0x68
[   35.271597]  kasan_save_track+0x20/0x40
[   35.272136]  kasan_save_alloc_info+0x40/0x58
[   35.272805]  __kasan_kmalloc+0xd4/0xd8
[   35.273384]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.274043]  kasan_atomics+0xb8/0x2e8
[   35.274667]  kunit_try_run_case+0x14c/0x3d0
[   35.275243]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.276130]  kthread+0x24c/0x2d0
[   35.276633]  ret_from_fork+0x10/0x20
[   35.277214] 
[   35.277574] The buggy address belongs to the object at fff00000c594f180
[   35.277574]  which belongs to the cache kmalloc-64 of size 64
[   35.278920] The buggy address is located 0 bytes to the right of
[   35.278920]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   35.280371] 
[   35.280689] The buggy address belongs to the physical page:
[   35.281498] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   35.282392] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.283262] page_type: f5(slab)
[   35.283842] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.284847] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.285773] page dumped because: kasan: bad access detected
[   35.286470] 
[   35.286789] Memory state around the buggy address:
[   35.287445]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.288320]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.289292] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.290143]                                      ^
[   35.290859]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.291752]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.292612] ==================================================================
[   34.783678] ==================================================================
[   34.784533] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   34.785348] Read of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   34.786262] 
[   34.786580] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   34.788078] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.788931] Hardware name: linux,dummy-virt (DT)
[   34.789756] Call trace:
[   34.790291]  show_stack+0x20/0x38 (C)
[   34.790860]  dump_stack_lvl+0x8c/0xd0
[   34.791443]  print_report+0x118/0x5e0
[   34.792013]  kasan_report+0xc8/0x118
[   34.792650]  __asan_report_load4_noabort+0x20/0x30
[   34.793387]  kasan_atomics_helper+0x40fc/0x4858
[   34.794171]  kasan_atomics+0x198/0x2e8
[   34.794719]  kunit_try_run_case+0x14c/0x3d0
[   34.795308]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.796077]  kthread+0x24c/0x2d0
[   34.796761]  ret_from_fork+0x10/0x20
[   34.797258] 
[   34.797639] Allocated by task 254:
[   34.798128]  kasan_save_stack+0x3c/0x68
[   34.798979]  kasan_save_track+0x20/0x40
[   34.799565]  kasan_save_alloc_info+0x40/0x58
[   34.800150]  __kasan_kmalloc+0xd4/0xd8
[   34.800700]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.801356]  kasan_atomics+0xb8/0x2e8
[   34.802095]  kunit_try_run_case+0x14c/0x3d0
[   34.802673]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.803364]  kthread+0x24c/0x2d0
[   34.803838]  ret_from_fork+0x10/0x20
[   34.804381] 
[   34.804686] The buggy address belongs to the object at fff00000c594f180
[   34.804686]  which belongs to the cache kmalloc-64 of size 64
[   34.806148] The buggy address is located 0 bytes to the right of
[   34.806148]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   34.807540] 
[   34.807881] The buggy address belongs to the physical page:
[   34.808511] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   34.809536] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.810388] page_type: f5(slab)
[   34.810883] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.811788] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.812693] page dumped because: kasan: bad access detected
[   34.813414] 
[   34.813734] Memory state around the buggy address:
[   34.814493]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.815357]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.816251] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.817108]                                      ^
[   34.817737]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.818632]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.819454] ==================================================================
[   35.138676] ==================================================================
[   35.139839] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   35.141046] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   35.142126] 
[   35.142506] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   35.143786] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.144465] Hardware name: linux,dummy-virt (DT)
[   35.144984] Call trace:
[   35.145490]  show_stack+0x20/0x38 (C)
[   35.146078]  dump_stack_lvl+0x8c/0xd0
[   35.146739]  print_report+0x118/0x5e0
[   35.147407]  kasan_report+0xc8/0x118
[   35.148011]  kasan_check_range+0x100/0x1a8
[   35.148611]  __kasan_check_write+0x20/0x30
[   35.149252]  kasan_atomics_helper+0x61c/0x4858
[   35.149919]  kasan_atomics+0x198/0x2e8
[   35.150690]  kunit_try_run_case+0x14c/0x3d0
[   35.151309]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.152109]  kthread+0x24c/0x2d0
[   35.152633]  ret_from_fork+0x10/0x20
[   35.153225] 
[   35.153601] Allocated by task 254:
[   35.154102]  kasan_save_stack+0x3c/0x68
[   35.154639]  kasan_save_track+0x20/0x40
[   35.155301]  kasan_save_alloc_info+0x40/0x58
[   35.155920]  __kasan_kmalloc+0xd4/0xd8
[   35.156570]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.157192]  kasan_atomics+0xb8/0x2e8
[   35.157799]  kunit_try_run_case+0x14c/0x3d0
[   35.158449]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.159073]  kthread+0x24c/0x2d0
[   35.159684]  ret_from_fork+0x10/0x20
[   35.160214] 
[   35.160564] The buggy address belongs to the object at fff00000c594f180
[   35.160564]  which belongs to the cache kmalloc-64 of size 64
[   35.161976] The buggy address is located 0 bytes to the right of
[   35.161976]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   35.163376] 
[   35.163696] The buggy address belongs to the physical page:
[   35.164568] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   35.165457] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.166449] page_type: f5(slab)
[   35.166926] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.167883] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.168794] page dumped because: kasan: bad access detected
[   35.169493] 
[   35.169808] Memory state around the buggy address:
[   35.170438]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.171296]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.172208] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.173152]                                      ^
[   35.173850]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.174757]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.175623] ==================================================================
[   35.887924] ==================================================================
[   35.888666] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   35.889577] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   35.890655] 
[   35.891015] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   35.892477] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.893085] Hardware name: linux,dummy-virt (DT)
[   35.893819] Call trace:
[   35.894356]  show_stack+0x20/0x38 (C)
[   35.894952]  dump_stack_lvl+0x8c/0xd0
[   35.895506]  print_report+0x118/0x5e0
[   35.896122]  kasan_report+0xc8/0x118
[   35.896689]  kasan_check_range+0x100/0x1a8
[   35.897265]  __kasan_check_write+0x20/0x30
[   35.897910]  kasan_atomics_helper+0xd3c/0x4858
[   35.898459]  kasan_atomics+0x198/0x2e8
[   35.899208]  kunit_try_run_case+0x14c/0x3d0
[   35.899916]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.900829]  kthread+0x24c/0x2d0
[   35.901383]  ret_from_fork+0x10/0x20
[   35.901955] 
[   35.902305] Allocated by task 254:
[   35.902730]  kasan_save_stack+0x3c/0x68
[   35.903436]  kasan_save_track+0x20/0x40
[   35.904095]  kasan_save_alloc_info+0x40/0x58
[   35.904772]  __kasan_kmalloc+0xd4/0xd8
[   35.905363]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.906027]  kasan_atomics+0xb8/0x2e8
[   35.906560]  kunit_try_run_case+0x14c/0x3d0
[   35.907279]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.908030]  kthread+0x24c/0x2d0
[   35.908546]  ret_from_fork+0x10/0x20
[   35.909074] 
[   35.909429] The buggy address belongs to the object at fff00000c594f180
[   35.909429]  which belongs to the cache kmalloc-64 of size 64
[   35.910865] The buggy address is located 0 bytes to the right of
[   35.910865]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   35.912289] 
[   35.912605] The buggy address belongs to the physical page:
[   35.913431] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   35.914390] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.915248] page_type: f5(slab)
[   35.915843] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.916786] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.917724] page dumped because: kasan: bad access detected
[   35.918435] 
[   35.918749] Memory state around the buggy address:
[   35.919390]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.920215]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.921101] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.921979]                                      ^
[   35.922636]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.923519]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.924303] ==================================================================
[   36.119499] ==================================================================
[   36.120352] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   36.121308] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   36.122728] 
[   36.123095] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   36.124173] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.124945] Hardware name: linux,dummy-virt (DT)
[   36.125600] Call trace:
[   36.126053]  show_stack+0x20/0x38 (C)
[   36.126671]  dump_stack_lvl+0x8c/0xd0
[   36.127171]  print_report+0x118/0x5e0
[   36.127959]  kasan_report+0xc8/0x118
[   36.128655]  kasan_check_range+0x100/0x1a8
[   36.129248]  __kasan_check_write+0x20/0x30
[   36.129901]  kasan_atomics_helper+0xeb8/0x4858
[   36.130600]  kasan_atomics+0x198/0x2e8
[   36.131173]  kunit_try_run_case+0x14c/0x3d0
[   36.131861]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.132671]  kthread+0x24c/0x2d0
[   36.133174]  ret_from_fork+0x10/0x20
[   36.133816] 
[   36.134132] Allocated by task 254:
[   36.134670]  kasan_save_stack+0x3c/0x68
[   36.135263]  kasan_save_track+0x20/0x40
[   36.135938]  kasan_save_alloc_info+0x40/0x58
[   36.136544]  __kasan_kmalloc+0xd4/0xd8
[   36.137186]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.137703]  kasan_atomics+0xb8/0x2e8
[   36.138376]  kunit_try_run_case+0x14c/0x3d0
[   36.139026]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.140015]  kthread+0x24c/0x2d0
[   36.140762]  ret_from_fork+0x10/0x20
[   36.141384] 
[   36.141845] The buggy address belongs to the object at fff00000c594f180
[   36.141845]  which belongs to the cache kmalloc-64 of size 64
[   36.143369] The buggy address is located 0 bytes to the right of
[   36.143369]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   36.144713] 
[   36.145011] The buggy address belongs to the physical page:
[   36.145878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   36.146891] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.147750] page_type: f5(slab)
[   36.148654] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.149600] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.150576] page dumped because: kasan: bad access detected
[   36.151364] 
[   36.151822] Memory state around the buggy address:
[   36.152496]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.153431]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.154443] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.155359]                                      ^
[   36.156086]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.157066]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.157930] ==================================================================
[   37.142408] ==================================================================
[   37.143406] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   37.144231] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   37.145118] 
[   37.145477] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   37.146842] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.147381] Hardware name: linux,dummy-virt (DT)
[   37.148046] Call trace:
[   37.148469]  show_stack+0x20/0x38 (C)
[   37.149133]  dump_stack_lvl+0x8c/0xd0
[   37.149666]  print_report+0x118/0x5e0
[   37.150347]  kasan_report+0xc8/0x118
[   37.150916]  kasan_check_range+0x100/0x1a8
[   37.151551]  __kasan_check_write+0x20/0x30
[   37.152155]  kasan_atomics_helper+0x17ec/0x4858
[   37.152912]  kasan_atomics+0x198/0x2e8
[   37.153552]  kunit_try_run_case+0x14c/0x3d0
[   37.154163]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.154976]  kthread+0x24c/0x2d0
[   37.155465]  ret_from_fork+0x10/0x20
[   37.156108] 
[   37.156496] Allocated by task 254:
[   37.156981]  kasan_save_stack+0x3c/0x68
[   37.157680]  kasan_save_track+0x20/0x40
[   37.158255]  kasan_save_alloc_info+0x40/0x58
[   37.158883]  __kasan_kmalloc+0xd4/0xd8
[   37.159452]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.160065]  kasan_atomics+0xb8/0x2e8
[   37.160618]  kunit_try_run_case+0x14c/0x3d0
[   37.161295]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.162013]  kthread+0x24c/0x2d0
[   37.162478]  ret_from_fork+0x10/0x20
[   37.163180] 
[   37.163548] The buggy address belongs to the object at fff00000c594f180
[   37.163548]  which belongs to the cache kmalloc-64 of size 64
[   37.164945] The buggy address is located 0 bytes to the right of
[   37.164945]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   37.166377] 
[   37.166801] The buggy address belongs to the physical page:
[   37.167515] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   37.168430] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.169416] page_type: f5(slab)
[   37.169904] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.170780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.171809] page dumped because: kasan: bad access detected
[   37.172504] 
[   37.172856] Memory state around the buggy address:
[   37.173559]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.174421]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.175347] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.176227]                                      ^
[   37.176964]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.177778]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.178713] ==================================================================
[   34.904169] ==================================================================
[   34.905002] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[   34.906473] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   34.908209] 
[   34.909131] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   34.910312] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.910843] Hardware name: linux,dummy-virt (DT)
[   34.911513] Call trace:
[   34.911961]  show_stack+0x20/0x38 (C)
[   34.912566]  dump_stack_lvl+0x8c/0xd0
[   34.913175]  print_report+0x118/0x5e0
[   34.913897]  kasan_report+0xc8/0x118
[   34.914457]  kasan_check_range+0x100/0x1a8
[   34.915130]  __kasan_check_write+0x20/0x30
[   34.915719]  kasan_atomics_helper+0x3ac/0x4858
[   34.916464]  kasan_atomics+0x198/0x2e8
[   34.917109]  kunit_try_run_case+0x14c/0x3d0
[   34.917779]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.918598]  kthread+0x24c/0x2d0
[   34.919140]  ret_from_fork+0x10/0x20
[   34.919754] 
[   34.920103] Allocated by task 254:
[   34.920722]  kasan_save_stack+0x3c/0x68
[   34.921236]  kasan_save_track+0x20/0x40
[   34.921933]  kasan_save_alloc_info+0x40/0x58
[   34.922596]  __kasan_kmalloc+0xd4/0xd8
[   34.923258]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.923875]  kasan_atomics+0xb8/0x2e8
[   34.924496]  kunit_try_run_case+0x14c/0x3d0
[   34.925203]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.925948]  kthread+0x24c/0x2d0
[   34.926567]  ret_from_fork+0x10/0x20
[   34.927153] 
[   34.927572] The buggy address belongs to the object at fff00000c594f180
[   34.927572]  which belongs to the cache kmalloc-64 of size 64
[   34.928923] The buggy address is located 0 bytes to the right of
[   34.928923]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   34.930384] 
[   34.930694] The buggy address belongs to the physical page:
[   34.931377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   34.932284] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.933213] page_type: f5(slab)
[   34.933751] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.934719] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.935588] page dumped because: kasan: bad access detected
[   34.936197] 
[   34.936574] Memory state around the buggy address:
[   34.937120]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.937997]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.938914] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.939829]                                      ^
[   34.940541]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.941357]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.942236] ==================================================================
[   36.322192] ==================================================================
[   36.323532] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   36.324620] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   36.326291] 
[   36.326831] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   36.328120] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.328988] Hardware name: linux,dummy-virt (DT)
[   36.329638] Call trace:
[   36.330086]  show_stack+0x20/0x38 (C)
[   36.330887]  dump_stack_lvl+0x8c/0xd0
[   36.331609]  print_report+0x118/0x5e0
[   36.332314]  kasan_report+0xc8/0x118
[   36.333023]  kasan_check_range+0x100/0x1a8
[   36.333764]  __kasan_check_write+0x20/0x30
[   36.334546]  kasan_atomics_helper+0x10c0/0x4858
[   36.335310]  kasan_atomics+0x198/0x2e8
[   36.336015]  kunit_try_run_case+0x14c/0x3d0
[   36.336801]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.337639]  kthread+0x24c/0x2d0
[   36.338426]  ret_from_fork+0x10/0x20
[   36.339160] 
[   36.339587] Allocated by task 254:
[   36.340112]  kasan_save_stack+0x3c/0x68
[   36.340840]  kasan_save_track+0x20/0x40
[   36.341497]  kasan_save_alloc_info+0x40/0x58
[   36.342155]  __kasan_kmalloc+0xd4/0xd8
[   36.342773]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.343515]  kasan_atomics+0xb8/0x2e8
[   36.344140]  kunit_try_run_case+0x14c/0x3d0
[   36.344875]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.345532]  kthread+0x24c/0x2d0
[   36.346017]  ret_from_fork+0x10/0x20
[   36.346525] 
[   36.346865] The buggy address belongs to the object at fff00000c594f180
[   36.346865]  which belongs to the cache kmalloc-64 of size 64
[   36.348125] The buggy address is located 0 bytes to the right of
[   36.348125]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   36.349575] 
[   36.349930] The buggy address belongs to the physical page:
[   36.350762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   36.351691] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.352524] page_type: f5(slab)
[   36.353064] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.354115] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.355024] page dumped because: kasan: bad access detected
[   36.355834] 
[   36.356153] Memory state around the buggy address:
[   36.356792]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.357666]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.358584] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.359421]                                      ^
[   36.360016]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.361140]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.362134] ==================================================================
[   36.850258] ==================================================================
[   36.851073] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   36.852345] Read of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   36.853206] 
[   36.853620] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   36.855344] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.856045] Hardware name: linux,dummy-virt (DT)
[   36.856740] Call trace:
[   36.857288]  show_stack+0x20/0x38 (C)
[   36.858080]  dump_stack_lvl+0x8c/0xd0
[   36.858766]  print_report+0x118/0x5e0
[   36.859497]  kasan_report+0xc8/0x118
[   36.860070]  __asan_report_load8_noabort+0x20/0x30
[   36.861016]  kasan_atomics_helper+0x3db0/0x4858
[   36.861688]  kasan_atomics+0x198/0x2e8
[   36.862413]  kunit_try_run_case+0x14c/0x3d0
[   36.863068]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.863972]  kthread+0x24c/0x2d0
[   36.864649]  ret_from_fork+0x10/0x20
[   36.865344] 
[   36.865776] Allocated by task 254:
[   36.866443]  kasan_save_stack+0x3c/0x68
[   36.867073]  kasan_save_track+0x20/0x40
[   36.867724]  kasan_save_alloc_info+0x40/0x58
[   36.868419]  __kasan_kmalloc+0xd4/0xd8
[   36.868962]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.869792]  kasan_atomics+0xb8/0x2e8
[   36.870459]  kunit_try_run_case+0x14c/0x3d0
[   36.871122]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.872008]  kthread+0x24c/0x2d0
[   36.872732]  ret_from_fork+0x10/0x20
[   36.873359] 
[   36.873845] The buggy address belongs to the object at fff00000c594f180
[   36.873845]  which belongs to the cache kmalloc-64 of size 64
[   36.875319] The buggy address is located 0 bytes to the right of
[   36.875319]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   36.876742] 
[   36.877023] The buggy address belongs to the physical page:
[   36.877727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   36.879016] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.879914] page_type: f5(slab)
[   36.880472] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.881407] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.882473] page dumped because: kasan: bad access detected
[   36.883282] 
[   36.883683] Memory state around the buggy address:
[   36.884438]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.885406]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.886431] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.887357]                                      ^
[   36.888018]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.889002]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.889909] ==================================================================
[   34.705810] ==================================================================
[   34.706633] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   34.707467] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   34.708321] 
[   34.708763] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   34.710077] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.710720] Hardware name: linux,dummy-virt (DT)
[   34.711264] Call trace:
[   34.711821]  show_stack+0x20/0x38 (C)
[   34.712439]  dump_stack_lvl+0x8c/0xd0
[   34.712948]  print_report+0x118/0x5e0
[   34.713636]  kasan_report+0xc8/0x118
[   34.714283]  kasan_check_range+0x100/0x1a8
[   34.714947]  __kasan_check_write+0x20/0x30
[   34.715583]  kasan_atomics_helper+0x24c/0x4858
[   34.716321]  kasan_atomics+0x198/0x2e8
[   34.716893]  kunit_try_run_case+0x14c/0x3d0
[   34.717560]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.718392]  kthread+0x24c/0x2d0
[   34.718900]  ret_from_fork+0x10/0x20
[   34.719503] 
[   34.719856] Allocated by task 254:
[   34.720415]  kasan_save_stack+0x3c/0x68
[   34.721018]  kasan_save_track+0x20/0x40
[   34.721596]  kasan_save_alloc_info+0x40/0x58
[   34.722234]  __kasan_kmalloc+0xd4/0xd8
[   34.722818]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.723383]  kasan_atomics+0xb8/0x2e8
[   34.724016]  kunit_try_run_case+0x14c/0x3d0
[   34.724684]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.725516]  kthread+0x24c/0x2d0
[   34.726036]  ret_from_fork+0x10/0x20
[   34.726636] 
[   34.726956] The buggy address belongs to the object at fff00000c594f180
[   34.726956]  which belongs to the cache kmalloc-64 of size 64
[   34.728378] The buggy address is located 0 bytes to the right of
[   34.728378]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   34.729748] 
[   34.730045] The buggy address belongs to the physical page:
[   34.730801] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   34.731742] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.732656] page_type: f5(slab)
[   34.733242] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.734213] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.735126] page dumped because: kasan: bad access detected
[   34.735826] 
[   34.736149] Memory state around the buggy address:
[   34.736802]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.737615]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.738494] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.739376]                                      ^
[   34.740016]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.740906]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.741824] ==================================================================
[   34.623642] ==================================================================
[   34.625094] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   34.626117] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   34.627433] 
[   34.627760] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   34.628926] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.629672] Hardware name: linux,dummy-virt (DT)
[   34.630160] Call trace:
[   34.630532]  show_stack+0x20/0x38 (C)
[   34.631192]  dump_stack_lvl+0x8c/0xd0
[   34.631920]  print_report+0x118/0x5e0
[   34.632707]  kasan_report+0xc8/0x118
[   34.633317]  __asan_report_store4_noabort+0x20/0x30
[   34.634091]  kasan_atomics_helper+0x3f7c/0x4858
[   34.634823]  kasan_atomics+0x198/0x2e8
[   34.635457]  kunit_try_run_case+0x14c/0x3d0
[   34.636178]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.637126]  kthread+0x24c/0x2d0
[   34.637650]  ret_from_fork+0x10/0x20
[   34.638278] 
[   34.638873] Allocated by task 254:
[   34.639544]  kasan_save_stack+0x3c/0x68
[   34.640206]  kasan_save_track+0x20/0x40
[   34.640984]  kasan_save_alloc_info+0x40/0x58
[   34.641724]  __kasan_kmalloc+0xd4/0xd8
[   34.642556]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.643130]  kasan_atomics+0xb8/0x2e8
[   34.643723]  kunit_try_run_case+0x14c/0x3d0
[   34.644351]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.645174]  kthread+0x24c/0x2d0
[   34.645740]  ret_from_fork+0x10/0x20
[   34.646389] 
[   34.646672] The buggy address belongs to the object at fff00000c594f180
[   34.646672]  which belongs to the cache kmalloc-64 of size 64
[   34.648095] The buggy address is located 0 bytes to the right of
[   34.648095]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   34.649525] 
[   34.649810] The buggy address belongs to the physical page:
[   34.650633] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   34.651502] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.652422] page_type: f5(slab)
[   34.652929] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.653862] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.654888] page dumped because: kasan: bad access detected
[   34.655516] 
[   34.655873] Memory state around the buggy address:
[   34.656543]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.657438]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.658346] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.659182]                                      ^
[   34.659848]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.660781]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.661753] ==================================================================
[   35.573235] ==================================================================
[   35.574142] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   35.575194] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   35.576193] 
[   35.576742] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   35.578210] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.578814] Hardware name: linux,dummy-virt (DT)
[   35.579506] Call trace:
[   35.580075]  show_stack+0x20/0x38 (C)
[   35.580742]  dump_stack_lvl+0x8c/0xd0
[   35.581389]  print_report+0x118/0x5e0
[   35.582046]  kasan_report+0xc8/0x118
[   35.582708]  kasan_check_range+0x100/0x1a8
[   35.583408]  __kasan_check_write+0x20/0x30
[   35.584061]  kasan_atomics_helper+0xad4/0x4858
[   35.584797]  kasan_atomics+0x198/0x2e8
[   35.585448]  kunit_try_run_case+0x14c/0x3d0
[   35.586150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.586944]  kthread+0x24c/0x2d0
[   35.587555]  ret_from_fork+0x10/0x20
[   35.588131] 
[   35.588495] Allocated by task 254:
[   35.589145]  kasan_save_stack+0x3c/0x68
[   35.589914]  kasan_save_track+0x20/0x40
[   35.590528]  kasan_save_alloc_info+0x40/0x58
[   35.591260]  __kasan_kmalloc+0xd4/0xd8
[   35.591993]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.592751]  kasan_atomics+0xb8/0x2e8
[   35.593380]  kunit_try_run_case+0x14c/0x3d0
[   35.594058]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.594865]  kthread+0x24c/0x2d0
[   35.595634]  ret_from_fork+0x10/0x20
[   35.596256] 
[   35.596607] The buggy address belongs to the object at fff00000c594f180
[   35.596607]  which belongs to the cache kmalloc-64 of size 64
[   35.598183] The buggy address is located 0 bytes to the right of
[   35.598183]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   35.599766] 
[   35.600224] The buggy address belongs to the physical page:
[   35.601026] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   35.602061] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.603000] page_type: f5(slab)
[   35.603605] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.604634] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.605495] page dumped because: kasan: bad access detected
[   35.606213] 
[   35.606513] Memory state around the buggy address:
[   35.607149]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.608032]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.608823] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.609759]                                      ^
[   35.610413]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.611297]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.612166] ==================================================================
[   35.413019] ==================================================================
[   35.413856] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   35.415376] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   35.416249] 
[   35.416624] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   35.417856] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.418422] Hardware name: linux,dummy-virt (DT)
[   35.418995] Call trace:
[   35.419477]  show_stack+0x20/0x38 (C)
[   35.420089]  dump_stack_lvl+0x8c/0xd0
[   35.420674]  print_report+0x118/0x5e0
[   35.421279]  kasan_report+0xc8/0x118
[   35.421976]  kasan_check_range+0x100/0x1a8
[   35.422703]  __kasan_check_write+0x20/0x30
[   35.423314]  kasan_atomics_helper+0x934/0x4858
[   35.424069]  kasan_atomics+0x198/0x2e8
[   35.424595]  kunit_try_run_case+0x14c/0x3d0
[   35.425316]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.426038]  kthread+0x24c/0x2d0
[   35.426682]  ret_from_fork+0x10/0x20
[   35.427235] 
[   35.427592] Allocated by task 254:
[   35.428091]  kasan_save_stack+0x3c/0x68
[   35.428635]  kasan_save_track+0x20/0x40
[   35.429244]  kasan_save_alloc_info+0x40/0x58
[   35.429952]  __kasan_kmalloc+0xd4/0xd8
[   35.430549]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.431202]  kasan_atomics+0xb8/0x2e8
[   35.431732]  kunit_try_run_case+0x14c/0x3d0
[   35.432382]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.433093]  kthread+0x24c/0x2d0
[   35.433580]  ret_from_fork+0x10/0x20
[   35.434198] 
[   35.434655] The buggy address belongs to the object at fff00000c594f180
[   35.434655]  which belongs to the cache kmalloc-64 of size 64
[   35.436152] The buggy address is located 0 bytes to the right of
[   35.436152]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   35.437713] 
[   35.438011] The buggy address belongs to the physical page:
[   35.438603] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   35.439643] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.440521] page_type: f5(slab)
[   35.441094] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.442076] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.443047] page dumped because: kasan: bad access detected
[   35.443780] 
[   35.444149] Memory state around the buggy address:
[   35.444791]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.445632]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.446463] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.447411]                                      ^
[   35.448032]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.448959]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.449803] ==================================================================
[   36.934447] ==================================================================
[   36.935919] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   36.936882] Read of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   36.938501] 
[   36.939015] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   36.940083] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.940951] Hardware name: linux,dummy-virt (DT)
[   36.941628] Call trace:
[   36.942294]  show_stack+0x20/0x38 (C)
[   36.943182]  dump_stack_lvl+0x8c/0xd0
[   36.943633]  print_report+0x118/0x5e0
[   36.944386]  kasan_report+0xc8/0x118
[   36.944988]  __asan_report_load8_noabort+0x20/0x30
[   36.945754]  kasan_atomics_helper+0x3df4/0x4858
[   36.946513]  kasan_atomics+0x198/0x2e8
[   36.947235]  kunit_try_run_case+0x14c/0x3d0
[   36.947963]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.948719]  kthread+0x24c/0x2d0
[   36.949370]  ret_from_fork+0x10/0x20
[   36.950060] 
[   36.950426] Allocated by task 254:
[   36.951104]  kasan_save_stack+0x3c/0x68
[   36.951824]  kasan_save_track+0x20/0x40
[   36.952484]  kasan_save_alloc_info+0x40/0x58
[   36.953153]  __kasan_kmalloc+0xd4/0xd8
[   36.953868]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.954608]  kasan_atomics+0xb8/0x2e8
[   36.955247]  kunit_try_run_case+0x14c/0x3d0
[   36.955909]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.956688]  kthread+0x24c/0x2d0
[   36.957268]  ret_from_fork+0x10/0x20
[   36.957905] 
[   36.958264] The buggy address belongs to the object at fff00000c594f180
[   36.958264]  which belongs to the cache kmalloc-64 of size 64
[   36.959812] The buggy address is located 0 bytes to the right of
[   36.959812]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   36.961310] 
[   36.961750] The buggy address belongs to the physical page:
[   36.962569] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   36.963579] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.964485] page_type: f5(slab)
[   36.965065] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.966098] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.967078] page dumped because: kasan: bad access detected
[   36.967856] 
[   36.968234] Memory state around the buggy address:
[   36.968977]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.969947]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.970908] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.971891]                                      ^
[   36.972676]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.973591]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.974547] ==================================================================
[   37.102775] ==================================================================
[   37.103819] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   37.104783] Read of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   37.105749] 
[   37.106139] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   37.107429] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.108181] Hardware name: linux,dummy-virt (DT)
[   37.108940] Call trace:
[   37.109533]  show_stack+0x20/0x38 (C)
[   37.110190]  dump_stack_lvl+0x8c/0xd0
[   37.110865]  print_report+0x118/0x5e0
[   37.111654]  kasan_report+0xc8/0x118
[   37.112433]  __asan_report_load8_noabort+0x20/0x30
[   37.113293]  kasan_atomics_helper+0x3e20/0x4858
[   37.114178]  kasan_atomics+0x198/0x2e8
[   37.114820]  kunit_try_run_case+0x14c/0x3d0
[   37.115617]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.116421]  kthread+0x24c/0x2d0
[   37.116913]  ret_from_fork+0x10/0x20
[   37.117590] 
[   37.117900] Allocated by task 254:
[   37.118486]  kasan_save_stack+0x3c/0x68
[   37.119148]  kasan_save_track+0x20/0x40
[   37.119741]  kasan_save_alloc_info+0x40/0x58
[   37.120376]  __kasan_kmalloc+0xd4/0xd8
[   37.120943]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.121507]  kasan_atomics+0xb8/0x2e8
[   37.122168]  kunit_try_run_case+0x14c/0x3d0
[   37.122969]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.123743]  kthread+0x24c/0x2d0
[   37.124227]  ret_from_fork+0x10/0x20
[   37.124814] 
[   37.125115] The buggy address belongs to the object at fff00000c594f180
[   37.125115]  which belongs to the cache kmalloc-64 of size 64
[   37.126461] The buggy address is located 0 bytes to the right of
[   37.126461]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   37.127949] 
[   37.128259] The buggy address belongs to the physical page:
[   37.129161] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   37.130151] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.131088] page_type: f5(slab)
[   37.131786] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.132846] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.133811] page dumped because: kasan: bad access detected
[   37.134513] 
[   37.134814] Memory state around the buggy address:
[   37.135477]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.136279]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.137414] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.138243]                                      ^
[   37.138791]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.139593]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.140315] ==================================================================
[   36.651369] ==================================================================
[   36.652242] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   36.653290] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   36.654143] 
[   36.654521] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   36.655800] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.656379] Hardware name: linux,dummy-virt (DT)
[   36.656936] Call trace:
[   36.657447]  show_stack+0x20/0x38 (C)
[   36.658128]  dump_stack_lvl+0x8c/0xd0
[   36.658803]  print_report+0x118/0x5e0
[   36.659313]  kasan_report+0xc8/0x118
[   36.659976]  kasan_check_range+0x100/0x1a8
[   36.660767]  __kasan_check_write+0x20/0x30
[   36.661400]  kasan_atomics_helper+0x1414/0x4858
[   36.662138]  kasan_atomics+0x198/0x2e8
[   36.662682]  kunit_try_run_case+0x14c/0x3d0
[   36.663401]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.664095]  kthread+0x24c/0x2d0
[   36.664715]  ret_from_fork+0x10/0x20
[   36.665280] 
[   36.665617] Allocated by task 254:
[   36.666092]  kasan_save_stack+0x3c/0x68
[   36.666739]  kasan_save_track+0x20/0x40
[   36.667254]  kasan_save_alloc_info+0x40/0x58
[   36.667968]  __kasan_kmalloc+0xd4/0xd8
[   36.668476]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.669206]  kasan_atomics+0xb8/0x2e8
[   36.669782]  kunit_try_run_case+0x14c/0x3d0
[   36.670482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.671225]  kthread+0x24c/0x2d0
[   36.671802]  ret_from_fork+0x10/0x20
[   36.672359] 
[   36.672668] The buggy address belongs to the object at fff00000c594f180
[   36.672668]  which belongs to the cache kmalloc-64 of size 64
[   36.674098] The buggy address is located 0 bytes to the right of
[   36.674098]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   36.675513] 
[   36.675834] The buggy address belongs to the physical page:
[   36.676612] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   36.677614] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.678388] page_type: f5(slab)
[   36.678999] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.679960] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.680820] page dumped because: kasan: bad access detected
[   36.681500] 
[   36.681856] Memory state around the buggy address:
[   36.682512]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.683378]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.684358] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.685200]                                      ^
[   36.685842]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.686841]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.687696] ==================================================================
[   36.893034] ==================================================================
[   36.894499] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   36.895664] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   36.897048] 
[   36.897433] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   36.898857] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.899634] Hardware name: linux,dummy-virt (DT)
[   36.900360] Call trace:
[   36.900965]  show_stack+0x20/0x38 (C)
[   36.901776]  dump_stack_lvl+0x8c/0xd0
[   36.902602]  print_report+0x118/0x5e0
[   36.903401]  kasan_report+0xc8/0x118
[   36.903999]  kasan_check_range+0x100/0x1a8
[   36.904641]  __kasan_check_write+0x20/0x30
[   36.905165]  kasan_atomics_helper+0x1644/0x4858
[   36.905914]  kasan_atomics+0x198/0x2e8
[   36.906705]  kunit_try_run_case+0x14c/0x3d0
[   36.907529]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.908363]  kthread+0x24c/0x2d0
[   36.908999]  ret_from_fork+0x10/0x20
[   36.909619] 
[   36.909896] Allocated by task 254:
[   36.910426]  kasan_save_stack+0x3c/0x68
[   36.911068]  kasan_save_track+0x20/0x40
[   36.911650]  kasan_save_alloc_info+0x40/0x58
[   36.912383]  __kasan_kmalloc+0xd4/0xd8
[   36.912971]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.913625]  kasan_atomics+0xb8/0x2e8
[   36.914188]  kunit_try_run_case+0x14c/0x3d0
[   36.914870]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.915578]  kthread+0x24c/0x2d0
[   36.916101]  ret_from_fork+0x10/0x20
[   36.916669] 
[   36.917015] The buggy address belongs to the object at fff00000c594f180
[   36.917015]  which belongs to the cache kmalloc-64 of size 64
[   36.918522] The buggy address is located 0 bytes to the right of
[   36.918522]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   36.919930] 
[   36.920237] The buggy address belongs to the physical page:
[   36.921075] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   36.921994] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.922896] page_type: f5(slab)
[   36.923459] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.924520] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.925523] page dumped because: kasan: bad access detected
[   36.926217] 
[   36.926561] Memory state around the buggy address:
[   36.927160]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.928048]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.929084] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.929973]                                      ^
[   36.930814]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.931727]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.932651] ==================================================================
[   36.238513] ==================================================================
[   36.239525] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   36.240359] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   36.241429] 
[   36.241953] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   36.243267] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.244011] Hardware name: linux,dummy-virt (DT)
[   36.244849] Call trace:
[   36.245419]  show_stack+0x20/0x38 (C)
[   36.246142]  dump_stack_lvl+0x8c/0xd0
[   36.246773]  print_report+0x118/0x5e0
[   36.247433]  kasan_report+0xc8/0x118
[   36.248080]  kasan_check_range+0x100/0x1a8
[   36.248775]  __kasan_check_write+0x20/0x30
[   36.249566]  kasan_atomics_helper+0xff0/0x4858
[   36.250278]  kasan_atomics+0x198/0x2e8
[   36.250939]  kunit_try_run_case+0x14c/0x3d0
[   36.251649]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.252478]  kthread+0x24c/0x2d0
[   36.253101]  ret_from_fork+0x10/0x20
[   36.253753] 
[   36.254093] Allocated by task 254:
[   36.254679]  kasan_save_stack+0x3c/0x68
[   36.255343]  kasan_save_track+0x20/0x40
[   36.256013]  kasan_save_alloc_info+0x40/0x58
[   36.256736]  __kasan_kmalloc+0xd4/0xd8
[   36.257466]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.258122]  kasan_atomics+0xb8/0x2e8
[   36.258752]  kunit_try_run_case+0x14c/0x3d0
[   36.259476]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.260267]  kthread+0x24c/0x2d0
[   36.260930]  ret_from_fork+0x10/0x20
[   36.261656] 
[   36.262053] The buggy address belongs to the object at fff00000c594f180
[   36.262053]  which belongs to the cache kmalloc-64 of size 64
[   36.263601] The buggy address is located 0 bytes to the right of
[   36.263601]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   36.265099] 
[   36.265568] The buggy address belongs to the physical page:
[   36.266383] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   36.267433] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.268297] page_type: f5(slab)
[   36.268902] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.269927] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.270881] page dumped because: kasan: bad access detected
[   36.271649] 
[   36.272000] Memory state around the buggy address:
[   36.272684]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.273725]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.274641] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.275655]                                      ^
[   36.276394]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.277320]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.278238] ==================================================================
[   34.744000] ==================================================================
[   34.745480] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   34.746861] Read of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   34.747831] 
[   34.748147] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   34.749492] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.750013] Hardware name: linux,dummy-virt (DT)
[   34.750667] Call trace:
[   34.751140]  show_stack+0x20/0x38 (C)
[   34.751761]  dump_stack_lvl+0x8c/0xd0
[   34.752365]  print_report+0x118/0x5e0
[   34.753004]  kasan_report+0xc8/0x118
[   34.753579]  kasan_check_range+0x100/0x1a8
[   34.754233]  __kasan_check_read+0x20/0x30
[   34.754885]  kasan_atomics_helper+0x2b0/0x4858
[   34.755519]  kasan_atomics+0x198/0x2e8
[   34.756145]  kunit_try_run_case+0x14c/0x3d0
[   34.756819]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.757605]  kthread+0x24c/0x2d0
[   34.758169]  ret_from_fork+0x10/0x20
[   34.758797] 
[   34.759076] Allocated by task 254:
[   34.759689]  kasan_save_stack+0x3c/0x68
[   34.760319]  kasan_save_track+0x20/0x40
[   34.760879]  kasan_save_alloc_info+0x40/0x58
[   34.761543]  __kasan_kmalloc+0xd4/0xd8
[   34.762223]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.762792]  kasan_atomics+0xb8/0x2e8
[   34.763451]  kunit_try_run_case+0x14c/0x3d0
[   34.764016]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.764755]  kthread+0x24c/0x2d0
[   34.765317]  ret_from_fork+0x10/0x20
[   34.765922] 
[   34.766283] The buggy address belongs to the object at fff00000c594f180
[   34.766283]  which belongs to the cache kmalloc-64 of size 64
[   34.767660] The buggy address is located 0 bytes to the right of
[   34.767660]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   34.769047] 
[   34.769426] The buggy address belongs to the physical page:
[   34.770099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   34.771044] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.771818] page_type: f5(slab)
[   34.772367] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.773293] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.774255] page dumped because: kasan: bad access detected
[   34.774975] 
[   34.775283] Memory state around the buggy address:
[   34.775894]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.776743]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.777606] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.778496]                                      ^
[   34.779152]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.780061]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.780903] ==================================================================
[   35.374665] ==================================================================
[   35.375272] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   35.376908] Read of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   35.378045] 
[   35.378529] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   35.379946] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.380472] Hardware name: linux,dummy-virt (DT)
[   35.381085] Call trace:
[   35.381664]  show_stack+0x20/0x38 (C)
[   35.382193]  dump_stack_lvl+0x8c/0xd0
[   35.382878]  print_report+0x118/0x5e0
[   35.383538]  kasan_report+0xc8/0x118
[   35.384094]  __asan_report_load4_noabort+0x20/0x30
[   35.384783]  kasan_atomics_helper+0x42d8/0x4858
[   35.385449]  kasan_atomics+0x198/0x2e8
[   35.386086]  kunit_try_run_case+0x14c/0x3d0
[   35.386721]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.387518]  kthread+0x24c/0x2d0
[   35.388113]  ret_from_fork+0x10/0x20
[   35.388807] 
[   35.389145] Allocated by task 254:
[   35.389773]  kasan_save_stack+0x3c/0x68
[   35.390415]  kasan_save_track+0x20/0x40
[   35.390968]  kasan_save_alloc_info+0x40/0x58
[   35.391705]  __kasan_kmalloc+0xd4/0xd8
[   35.392319]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.393091]  kasan_atomics+0xb8/0x2e8
[   35.393614]  kunit_try_run_case+0x14c/0x3d0
[   35.394316]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.395089]  kthread+0x24c/0x2d0
[   35.395690]  ret_from_fork+0x10/0x20
[   35.396247] 
[   35.396575] The buggy address belongs to the object at fff00000c594f180
[   35.396575]  which belongs to the cache kmalloc-64 of size 64
[   35.398007] The buggy address is located 0 bytes to the right of
[   35.398007]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   35.399440] 
[   35.399752] The buggy address belongs to the physical page:
[   35.400437] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   35.401523] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.402362] page_type: f5(slab)
[   35.402868] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.403804] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.404751] page dumped because: kasan: bad access detected
[   35.405470] 
[   35.405762] Memory state around the buggy address:
[   35.406433]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.407275]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.408132] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.409088]                                      ^
[   35.409744]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.410658]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.411538] ==================================================================
[   36.566133] ==================================================================
[   36.567413] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   36.568424] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   36.569386] 
[   36.569762] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   36.571085] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.571812] Hardware name: linux,dummy-virt (DT)
[   36.572566] Call trace:
[   36.573133]  show_stack+0x20/0x38 (C)
[   36.573913]  dump_stack_lvl+0x8c/0xd0
[   36.574646]  print_report+0x118/0x5e0
[   36.575284]  kasan_report+0xc8/0x118
[   36.575947]  kasan_check_range+0x100/0x1a8
[   36.576653]  __kasan_check_write+0x20/0x30
[   36.577359]  kasan_atomics_helper+0x1384/0x4858
[   36.578092]  kasan_atomics+0x198/0x2e8
[   36.578756]  kunit_try_run_case+0x14c/0x3d0
[   36.579457]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.580179]  kthread+0x24c/0x2d0
[   36.580897]  ret_from_fork+0x10/0x20
[   36.581564] 
[   36.581938] Allocated by task 254:
[   36.582565]  kasan_save_stack+0x3c/0x68
[   36.583361]  kasan_save_track+0x20/0x40
[   36.583959]  kasan_save_alloc_info+0x40/0x58
[   36.584706]  __kasan_kmalloc+0xd4/0xd8
[   36.585367]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.586063]  kasan_atomics+0xb8/0x2e8
[   36.586746]  kunit_try_run_case+0x14c/0x3d0
[   36.587415]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.588217]  kthread+0x24c/0x2d0
[   36.588860]  ret_from_fork+0x10/0x20
[   36.589516] 
[   36.589875] The buggy address belongs to the object at fff00000c594f180
[   36.589875]  which belongs to the cache kmalloc-64 of size 64
[   36.591534] The buggy address is located 0 bytes to the right of
[   36.591534]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   36.592991] 
[   36.593306] The buggy address belongs to the physical page:
[   36.594049] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   36.595212] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.596094] page_type: f5(slab)
[   36.596700] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.597700] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.598654] page dumped because: kasan: bad access detected
[   36.599424] 
[   36.599757] Memory state around the buggy address:
[   36.600603]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.601611]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.602537] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.603425]                                      ^
[   36.604134]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.605074]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.606011] ==================================================================
[   35.062939] ==================================================================
[   35.063706] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   35.064561] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   35.065434] 
[   35.065820] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   35.066907] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.067575] Hardware name: linux,dummy-virt (DT)
[   35.068069] Call trace:
[   35.068554]  show_stack+0x20/0x38 (C)
[   35.069201]  dump_stack_lvl+0x8c/0xd0
[   35.069850]  print_report+0x118/0x5e0
[   35.070435]  kasan_report+0xc8/0x118
[   35.071018]  kasan_check_range+0x100/0x1a8
[   35.071634]  __kasan_check_write+0x20/0x30
[   35.072300]  kasan_atomics_helper+0x54c/0x4858
[   35.073073]  kasan_atomics+0x198/0x2e8
[   35.073636]  kunit_try_run_case+0x14c/0x3d0
[   35.074304]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.075094]  kthread+0x24c/0x2d0
[   35.075702]  ret_from_fork+0x10/0x20
[   35.076274] 
[   35.076639] Allocated by task 254:
[   35.077057]  kasan_save_stack+0x3c/0x68
[   35.077823]  kasan_save_track+0x20/0x40
[   35.078356]  kasan_save_alloc_info+0x40/0x58
[   35.079047]  __kasan_kmalloc+0xd4/0xd8
[   35.079565]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.080227]  kasan_atomics+0xb8/0x2e8
[   35.080807]  kunit_try_run_case+0x14c/0x3d0
[   35.081308]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.082220]  kthread+0x24c/0x2d0
[   35.082691]  ret_from_fork+0x10/0x20
[   35.083251] 
[   35.083643] The buggy address belongs to the object at fff00000c594f180
[   35.083643]  which belongs to the cache kmalloc-64 of size 64
[   35.084959] The buggy address is located 0 bytes to the right of
[   35.084959]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   35.086399] 
[   35.086733] The buggy address belongs to the physical page:
[   35.087493] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   35.088452] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.089351] page_type: f5(slab)
[   35.089882] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.090820] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.091835] page dumped because: kasan: bad access detected
[   35.092508] 
[   35.092827] Memory state around the buggy address:
[   35.093537]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.094397]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.095201] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.096120]                                      ^
[   35.096742]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.097660]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.098527] ==================================================================
[   35.216860] ==================================================================
[   35.217617] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   35.218694] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   35.219708] 
[   35.220065] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   35.221361] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.221997] Hardware name: linux,dummy-virt (DT)
[   35.222684] Call trace:
[   35.223113]  show_stack+0x20/0x38 (C)
[   35.223722]  dump_stack_lvl+0x8c/0xd0
[   35.224312]  print_report+0x118/0x5e0
[   35.224904]  kasan_report+0xc8/0x118
[   35.225596]  kasan_check_range+0x100/0x1a8
[   35.226270]  __kasan_check_write+0x20/0x30
[   35.227085]  kasan_atomics_helper+0x6ec/0x4858
[   35.227777]  kasan_atomics+0x198/0x2e8
[   35.228477]  kunit_try_run_case+0x14c/0x3d0
[   35.229002]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.229901]  kthread+0x24c/0x2d0
[   35.230520]  ret_from_fork+0x10/0x20
[   35.231097] 
[   35.231433] Allocated by task 254:
[   35.231983]  kasan_save_stack+0x3c/0x68
[   35.232608]  kasan_save_track+0x20/0x40
[   35.233067]  kasan_save_alloc_info+0x40/0x58
[   35.233805]  __kasan_kmalloc+0xd4/0xd8
[   35.234322]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.235129]  kasan_atomics+0xb8/0x2e8
[   35.235699]  kunit_try_run_case+0x14c/0x3d0
[   35.236427]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.237078]  kthread+0x24c/0x2d0
[   35.237700]  ret_from_fork+0x10/0x20
[   35.238277] 
[   35.238754] The buggy address belongs to the object at fff00000c594f180
[   35.238754]  which belongs to the cache kmalloc-64 of size 64
[   35.240106] The buggy address is located 0 bytes to the right of
[   35.240106]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   35.241527] 
[   35.241861] The buggy address belongs to the physical page:
[   35.242609] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   35.243534] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.244391] page_type: f5(slab)
[   35.244966] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.245964] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.246854] page dumped because: kasan: bad access detected
[   35.247583] 
[   35.247939] Memory state around the buggy address:
[   35.248610]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.249464]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.250284] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.251212]                                      ^
[   35.251850]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.252777]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.253654] ==================================================================
[   35.533108] ==================================================================
[   35.533796] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   35.535573] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   35.536598] 
[   35.536973] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   35.538188] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.538759] Hardware name: linux,dummy-virt (DT)
[   35.539349] Call trace:
[   35.539824]  show_stack+0x20/0x38 (C)
[   35.540431]  dump_stack_lvl+0x8c/0xd0
[   35.541021]  print_report+0x118/0x5e0
[   35.541601]  kasan_report+0xc8/0x118
[   35.542237]  kasan_check_range+0x100/0x1a8
[   35.542805]  __kasan_check_write+0x20/0x30
[   35.543482]  kasan_atomics_helper+0xa6c/0x4858
[   35.544221]  kasan_atomics+0x198/0x2e8
[   35.544803]  kunit_try_run_case+0x14c/0x3d0
[   35.545459]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.546218]  kthread+0x24c/0x2d0
[   35.546734]  ret_from_fork+0x10/0x20
[   35.547318] 
[   35.547697] Allocated by task 254:
[   35.548227]  kasan_save_stack+0x3c/0x68
[   35.548817]  kasan_save_track+0x20/0x40
[   35.549402]  kasan_save_alloc_info+0x40/0x58
[   35.550048]  __kasan_kmalloc+0xd4/0xd8
[   35.550617]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.551234]  kasan_atomics+0xb8/0x2e8
[   35.551894]  kunit_try_run_case+0x14c/0x3d0
[   35.552467]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.553286]  kthread+0x24c/0x2d0
[   35.554006]  ret_from_fork+0x10/0x20
[   35.554626] 
[   35.555003] The buggy address belongs to the object at fff00000c594f180
[   35.555003]  which belongs to the cache kmalloc-64 of size 64
[   35.556461] The buggy address is located 0 bytes to the right of
[   35.556461]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   35.558014] 
[   35.558432] The buggy address belongs to the physical page:
[   35.559190] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   35.560238] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.561104] page_type: f5(slab)
[   35.561647] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.562710] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.563673] page dumped because: kasan: bad access detected
[   35.564447] 
[   35.564798] Memory state around the buggy address:
[   35.565548]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.566586]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.567518] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.568457]                                      ^
[   35.569151]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.570129]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.571012] ==================================================================
[   36.081268] ==================================================================
[   36.081928] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   36.082976] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   36.084047] 
[   36.084458] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   36.086288] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.087034] Hardware name: linux,dummy-virt (DT)
[   36.087748] Call trace:
[   36.088276]  show_stack+0x20/0x38 (C)
[   36.088931]  dump_stack_lvl+0x8c/0xd0
[   36.089523]  print_report+0x118/0x5e0
[   36.090174]  kasan_report+0xc8/0x118
[   36.090751]  __asan_report_store8_noabort+0x20/0x30
[   36.091428]  kasan_atomics_helper+0x3e5c/0x4858
[   36.092052]  kasan_atomics+0x198/0x2e8
[   36.092700]  kunit_try_run_case+0x14c/0x3d0
[   36.093370]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.094120]  kthread+0x24c/0x2d0
[   36.094733]  ret_from_fork+0x10/0x20
[   36.095341] 
[   36.095716] Allocated by task 254:
[   36.096237]  kasan_save_stack+0x3c/0x68
[   36.096887]  kasan_save_track+0x20/0x40
[   36.097497]  kasan_save_alloc_info+0x40/0x58
[   36.098040]  __kasan_kmalloc+0xd4/0xd8
[   36.098684]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.099234]  kasan_atomics+0xb8/0x2e8
[   36.099943]  kunit_try_run_case+0x14c/0x3d0
[   36.100636]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.101456]  kthread+0x24c/0x2d0
[   36.101978]  ret_from_fork+0x10/0x20
[   36.102455] 
[   36.102817] The buggy address belongs to the object at fff00000c594f180
[   36.102817]  which belongs to the cache kmalloc-64 of size 64
[   36.104297] The buggy address is located 0 bytes to the right of
[   36.104297]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   36.105724] 
[   36.106071] The buggy address belongs to the physical page:
[   36.106739] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   36.107945] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.108671] page_type: f5(slab)
[   36.109225] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.110088] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.110997] page dumped because: kasan: bad access detected
[   36.111817] 
[   36.112116] Memory state around the buggy address:
[   36.112718]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.113660]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.114479] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.115399]                                      ^
[   36.115982]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.116970]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.117890] ==================================================================
[   36.443584] ==================================================================
[   36.444439] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   36.445248] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   36.446536] 
[   36.446925] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   36.448311] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.448863] Hardware name: linux,dummy-virt (DT)
[   36.449429] Call trace:
[   36.449922]  show_stack+0x20/0x38 (C)
[   36.450607]  dump_stack_lvl+0x8c/0xd0
[   36.451194]  print_report+0x118/0x5e0
[   36.451850]  kasan_report+0xc8/0x118
[   36.452448]  kasan_check_range+0x100/0x1a8
[   36.453028]  __kasan_check_write+0x20/0x30
[   36.453693]  kasan_atomics_helper+0x11f8/0x4858
[   36.454303]  kasan_atomics+0x198/0x2e8
[   36.454932]  kunit_try_run_case+0x14c/0x3d0
[   36.455663]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.456520]  kthread+0x24c/0x2d0
[   36.457025]  ret_from_fork+0x10/0x20
[   36.457596] 
[   36.457973] Allocated by task 254:
[   36.458508]  kasan_save_stack+0x3c/0x68
[   36.458987]  kasan_save_track+0x20/0x40
[   36.459665]  kasan_save_alloc_info+0x40/0x58
[   36.460356]  __kasan_kmalloc+0xd4/0xd8
[   36.461006]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.461620]  kasan_atomics+0xb8/0x2e8
[   36.462282]  kunit_try_run_case+0x14c/0x3d0
[   36.462967]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.463758]  kthread+0x24c/0x2d0
[   36.464253]  ret_from_fork+0x10/0x20
[   36.464893] 
[   36.465189] The buggy address belongs to the object at fff00000c594f180
[   36.465189]  which belongs to the cache kmalloc-64 of size 64
[   36.466625] The buggy address is located 0 bytes to the right of
[   36.466625]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   36.468032] 
[   36.468433] The buggy address belongs to the physical page:
[   36.469153] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   36.470093] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.471127] page_type: f5(slab)
[   36.471674] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.472655] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.473555] page dumped because: kasan: bad access detected
[   36.474272] 
[   36.474666] Memory state around the buggy address:
[   36.475535]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.476450]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.477314] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.478160]                                      ^
[   36.478836]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.479702]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.480533] ==================================================================
[   36.769172] ==================================================================
[   36.770616] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   36.771938] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   36.773016] 
[   36.773495] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   36.774750] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.775319] Hardware name: linux,dummy-virt (DT)
[   36.776002] Call trace:
[   36.776532]  show_stack+0x20/0x38 (C)
[   36.777074]  dump_stack_lvl+0x8c/0xd0
[   36.777731]  print_report+0x118/0x5e0
[   36.778304]  kasan_report+0xc8/0x118
[   36.778880]  kasan_check_range+0x100/0x1a8
[   36.779512]  __kasan_check_write+0x20/0x30
[   36.780216]  kasan_atomics_helper+0x154c/0x4858
[   36.780931]  kasan_atomics+0x198/0x2e8
[   36.781518]  kunit_try_run_case+0x14c/0x3d0
[   36.782204]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.782995]  kthread+0x24c/0x2d0
[   36.783594]  ret_from_fork+0x10/0x20
[   36.784200] 
[   36.784615] Allocated by task 254:
[   36.785053]  kasan_save_stack+0x3c/0x68
[   36.785743]  kasan_save_track+0x20/0x40
[   36.786374]  kasan_save_alloc_info+0x40/0x58
[   36.787084]  __kasan_kmalloc+0xd4/0xd8
[   36.787602]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.788344]  kasan_atomics+0xb8/0x2e8
[   36.788812]  kunit_try_run_case+0x14c/0x3d0
[   36.789609]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.790351]  kthread+0x24c/0x2d0
[   36.790866]  ret_from_fork+0x10/0x20
[   36.791476] 
[   36.791776] The buggy address belongs to the object at fff00000c594f180
[   36.791776]  which belongs to the cache kmalloc-64 of size 64
[   36.793163] The buggy address is located 0 bytes to the right of
[   36.793163]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   36.794645] 
[   36.794961] The buggy address belongs to the physical page:
[   36.795709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   36.796669] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.797501] page_type: f5(slab)
[   36.797971] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.799013] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.799910] page dumped because: kasan: bad access detected
[   36.800575] 
[   36.800907] Memory state around the buggy address:
[   36.801579]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.802363]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.803257] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.804122]                                      ^
[   36.804801]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.805715]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.806714] ==================================================================
[   37.018270] ==================================================================
[   37.018973] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   37.020626] Read of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   37.021752] 
[   37.022287] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   37.023636] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.024248] Hardware name: linux,dummy-virt (DT)
[   37.024954] Call trace:
[   37.025554]  show_stack+0x20/0x38 (C)
[   37.026209]  dump_stack_lvl+0x8c/0xd0
[   37.026900]  print_report+0x118/0x5e0
[   37.027537]  kasan_report+0xc8/0x118
[   37.028162]  __asan_report_load8_noabort+0x20/0x30
[   37.028892]  kasan_atomics_helper+0x3e10/0x4858
[   37.029631]  kasan_atomics+0x198/0x2e8
[   37.030260]  kunit_try_run_case+0x14c/0x3d0
[   37.031006]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.031823]  kthread+0x24c/0x2d0
[   37.032435]  ret_from_fork+0x10/0x20
[   37.033061] 
[   37.033448] Allocated by task 254:
[   37.034080]  kasan_save_stack+0x3c/0x68
[   37.034806]  kasan_save_track+0x20/0x40
[   37.035588]  kasan_save_alloc_info+0x40/0x58
[   37.036263]  __kasan_kmalloc+0xd4/0xd8
[   37.036946]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.037671]  kasan_atomics+0xb8/0x2e8
[   37.038292]  kunit_try_run_case+0x14c/0x3d0
[   37.038974]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.039765]  kthread+0x24c/0x2d0
[   37.040500]  ret_from_fork+0x10/0x20
[   37.041104] 
[   37.041457] The buggy address belongs to the object at fff00000c594f180
[   37.041457]  which belongs to the cache kmalloc-64 of size 64
[   37.042997] The buggy address is located 0 bytes to the right of
[   37.042997]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   37.044492] 
[   37.044902] The buggy address belongs to the physical page:
[   37.045678] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   37.046796] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.047695] page_type: f5(slab)
[   37.048265] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.049297] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.050260] page dumped because: kasan: bad access detected
[   37.051044] 
[   37.051560] Memory state around the buggy address:
[   37.052209]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.053177]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.054085] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.054999]                                      ^
[   37.055733]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.056667]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.057697] ==================================================================
[   34.862156] ==================================================================
[   34.863009] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   34.863975] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   34.865573] 
[   34.865988] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   34.867452] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.867985] Hardware name: linux,dummy-virt (DT)
[   34.868748] Call trace:
[   34.869185]  show_stack+0x20/0x38 (C)
[   34.869870]  dump_stack_lvl+0x8c/0xd0
[   34.870590]  print_report+0x118/0x5e0
[   34.871359]  kasan_report+0xc8/0x118
[   34.871971]  __asan_report_store4_noabort+0x20/0x30
[   34.872729]  kasan_atomics_helper+0x3f94/0x4858
[   34.873441]  kasan_atomics+0x198/0x2e8
[   34.874161]  kunit_try_run_case+0x14c/0x3d0
[   34.874807]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.875568]  kthread+0x24c/0x2d0
[   34.876106]  ret_from_fork+0x10/0x20
[   34.876781] 
[   34.877119] Allocated by task 254:
[   34.877735]  kasan_save_stack+0x3c/0x68
[   34.878531]  kasan_save_track+0x20/0x40
[   34.879264]  kasan_save_alloc_info+0x40/0x58
[   34.879963]  __kasan_kmalloc+0xd4/0xd8
[   34.880623]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.881309]  kasan_atomics+0xb8/0x2e8
[   34.882019]  kunit_try_run_case+0x14c/0x3d0
[   34.882724]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.883597]  kthread+0x24c/0x2d0
[   34.884165]  ret_from_fork+0x10/0x20
[   34.884809] 
[   34.885341] The buggy address belongs to the object at fff00000c594f180
[   34.885341]  which belongs to the cache kmalloc-64 of size 64
[   34.886840] The buggy address is located 0 bytes to the right of
[   34.886840]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   34.888271] 
[   34.888696] The buggy address belongs to the physical page:
[   34.889571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   34.890710] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.891605] page_type: f5(slab)
[   34.892209] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.893234] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.894218] page dumped because: kasan: bad access detected
[   34.895022] 
[   34.895562] Memory state around the buggy address:
[   34.896301]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.897228]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.898180] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.899163]                                      ^
[   34.899855]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.901083]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.902044] ==================================================================
[   34.982941] ==================================================================
[   34.983861] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   34.985746] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   34.987188] 
[   34.987623] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   34.989178] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.989746] Hardware name: linux,dummy-virt (DT)
[   34.990348] Call trace:
[   34.990867]  show_stack+0x20/0x38 (C)
[   34.991570]  dump_stack_lvl+0x8c/0xd0
[   34.992354]  print_report+0x118/0x5e0
[   34.993115]  kasan_report+0xc8/0x118
[   34.993690]  kasan_check_range+0x100/0x1a8
[   34.994297]  __kasan_check_write+0x20/0x30
[   34.995243]  kasan_atomics_helper+0x47c/0x4858
[   34.995946]  kasan_atomics+0x198/0x2e8
[   34.996525]  kunit_try_run_case+0x14c/0x3d0
[   34.996998]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.997816]  kthread+0x24c/0x2d0
[   34.998470]  ret_from_fork+0x10/0x20
[   34.998940] 
[   34.999218] Allocated by task 254:
[   34.999818]  kasan_save_stack+0x3c/0x68
[   35.000450]  kasan_save_track+0x20/0x40
[   35.001042]  kasan_save_alloc_info+0x40/0x58
[   35.001670]  __kasan_kmalloc+0xd4/0xd8
[   35.002279]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.002957]  kasan_atomics+0xb8/0x2e8
[   35.003543]  kunit_try_run_case+0x14c/0x3d0
[   35.004162]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.004837]  kthread+0x24c/0x2d0
[   35.005450]  ret_from_fork+0x10/0x20
[   35.005973] 
[   35.006374] The buggy address belongs to the object at fff00000c594f180
[   35.006374]  which belongs to the cache kmalloc-64 of size 64
[   35.007839] The buggy address is located 0 bytes to the right of
[   35.007839]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   35.009274] 
[   35.009633] The buggy address belongs to the physical page:
[   35.010310] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   35.011418] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.012302] page_type: f5(slab)
[   35.012816] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.013820] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.014748] page dumped because: kasan: bad access detected
[   35.015437] 
[   35.015667] Memory state around the buggy address:
[   35.016429]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.017267]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.018084] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.019035]                                      ^
[   35.019678]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.020634]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.021603] ==================================================================
[   35.844979] ==================================================================
[   35.845814] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   35.847556] Read of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   35.848779] 
[   35.849574] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   35.850996] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.851580] Hardware name: linux,dummy-virt (DT)
[   35.852398] Call trace:
[   35.852759]  show_stack+0x20/0x38 (C)
[   35.853366]  dump_stack_lvl+0x8c/0xd0
[   35.854219]  print_report+0x118/0x5e0
[   35.854832]  kasan_report+0xc8/0x118
[   35.855530]  __asan_report_load4_noabort+0x20/0x30
[   35.856249]  kasan_atomics_helper+0x3dd8/0x4858
[   35.856941]  kasan_atomics+0x198/0x2e8
[   35.857552]  kunit_try_run_case+0x14c/0x3d0
[   35.858269]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.859121]  kthread+0x24c/0x2d0
[   35.859713]  ret_from_fork+0x10/0x20
[   35.860355] 
[   35.860763] Allocated by task 254:
[   35.861385]  kasan_save_stack+0x3c/0x68
[   35.862033]  kasan_save_track+0x20/0x40
[   35.863180]  kasan_save_alloc_info+0x40/0x58
[   35.863852]  __kasan_kmalloc+0xd4/0xd8
[   35.864803]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.865679]  kasan_atomics+0xb8/0x2e8
[   35.866266]  kunit_try_run_case+0x14c/0x3d0
[   35.867175]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.868062]  kthread+0x24c/0x2d0
[   35.868671]  ret_from_fork+0x10/0x20
[   35.869264] 
[   35.869736] The buggy address belongs to the object at fff00000c594f180
[   35.869736]  which belongs to the cache kmalloc-64 of size 64
[   35.871254] The buggy address is located 0 bytes to the right of
[   35.871254]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   35.872772] 
[   35.873133] The buggy address belongs to the physical page:
[   35.874072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   35.875153] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.876067] page_type: f5(slab)
[   35.876652] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.877717] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.878669] page dumped because: kasan: bad access detected
[   35.879455] 
[   35.879834] Memory state around the buggy address:
[   35.880526]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.881458]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.882398] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.883279]                                      ^
[   35.883994]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.885038]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.885959] ==================================================================
[   36.043366] ==================================================================
[   36.044539] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   36.045172] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   36.045931] 
[   36.046280] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   36.047396] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.047977] Hardware name: linux,dummy-virt (DT)
[   36.048732] Call trace:
[   36.049154]  show_stack+0x20/0x38 (C)
[   36.049938]  dump_stack_lvl+0x8c/0xd0
[   36.050645]  print_report+0x118/0x5e0
[   36.051201]  kasan_report+0xc8/0x118
[   36.051804]  kasan_check_range+0x100/0x1a8
[   36.052460]  __kasan_check_write+0x20/0x30
[   36.053036]  kasan_atomics_helper+0xe44/0x4858
[   36.053775]  kasan_atomics+0x198/0x2e8
[   36.054407]  kunit_try_run_case+0x14c/0x3d0
[   36.055027]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.055797]  kthread+0x24c/0x2d0
[   36.056428]  ret_from_fork+0x10/0x20
[   36.057090] 
[   36.057444] Allocated by task 254:
[   36.057888]  kasan_save_stack+0x3c/0x68
[   36.058534]  kasan_save_track+0x20/0x40
[   36.059102]  kasan_save_alloc_info+0x40/0x58
[   36.059820]  __kasan_kmalloc+0xd4/0xd8
[   36.060395]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.060962]  kasan_atomics+0xb8/0x2e8
[   36.061676]  kunit_try_run_case+0x14c/0x3d0
[   36.062307]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.063061]  kthread+0x24c/0x2d0
[   36.063561]  ret_from_fork+0x10/0x20
[   36.064115] 
[   36.064519] The buggy address belongs to the object at fff00000c594f180
[   36.064519]  which belongs to the cache kmalloc-64 of size 64
[   36.065921] The buggy address is located 0 bytes to the right of
[   36.065921]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   36.067310] 
[   36.067613] The buggy address belongs to the physical page:
[   36.068344] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   36.069248] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.070168] page_type: f5(slab)
[   36.070705] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.071641] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.072589] page dumped because: kasan: bad access detected
[   36.073353] 
[   36.073677] Memory state around the buggy address:
[   36.074355]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.075238]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.076026] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.076960]                                      ^
[   36.077589]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.078493]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.079370] ==================================================================
[   34.583862] ==================================================================
[   34.585662] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   34.586757] Read of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   34.587396] 
[   34.587715] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   34.588949] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.589532] Hardware name: linux,dummy-virt (DT)
[   34.590246] Call trace:
[   34.590680]  show_stack+0x20/0x38 (C)
[   34.591389]  dump_stack_lvl+0x8c/0xd0
[   34.592024]  print_report+0x118/0x5e0
[   34.592714]  kasan_report+0xc8/0x118
[   34.593281]  __asan_report_load4_noabort+0x20/0x30
[   34.594191]  kasan_atomics_helper+0x40a8/0x4858
[   34.594877]  kasan_atomics+0x198/0x2e8
[   34.595424]  kunit_try_run_case+0x14c/0x3d0
[   34.596210]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.597002]  kthread+0x24c/0x2d0
[   34.597654]  ret_from_fork+0x10/0x20
[   34.598362] 
[   34.598763] Allocated by task 254:
[   34.599241]  kasan_save_stack+0x3c/0x68
[   34.599819]  kasan_save_track+0x20/0x40
[   34.600414]  kasan_save_alloc_info+0x40/0x58
[   34.601008]  __kasan_kmalloc+0xd4/0xd8
[   34.601668]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.602365]  kasan_atomics+0xb8/0x2e8
[   34.602991]  kunit_try_run_case+0x14c/0x3d0
[   34.603628]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.604366]  kthread+0x24c/0x2d0
[   34.604809]  ret_from_fork+0x10/0x20
[   34.605481] 
[   34.605852] The buggy address belongs to the object at fff00000c594f180
[   34.605852]  which belongs to the cache kmalloc-64 of size 64
[   34.607185] The buggy address is located 0 bytes to the right of
[   34.607185]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   34.608622] 
[   34.608927] The buggy address belongs to the physical page:
[   34.609789] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   34.610784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.611503] page_type: f5(slab)
[   34.612096] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.613086] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.614060] page dumped because: kasan: bad access detected
[   34.615011] 
[   34.615535] Memory state around the buggy address:
[   34.616300]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.617262]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.618141] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.619063]                                      ^
[   34.619781]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.620730]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.621655] ==================================================================
[   35.725812] ==================================================================
[   35.726540] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   35.727475] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   35.728405] 
[   35.728715] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   35.729957] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.730766] Hardware name: linux,dummy-virt (DT)
[   35.731499] Call trace:
[   35.731905]  show_stack+0x20/0x38 (C)
[   35.732671]  dump_stack_lvl+0x8c/0xd0
[   35.733284]  print_report+0x118/0x5e0
[   35.734220]  kasan_report+0xc8/0x118
[   35.734901]  kasan_check_range+0x100/0x1a8
[   35.735792]  __kasan_check_write+0x20/0x30
[   35.736608]  kasan_atomics_helper+0xc08/0x4858
[   35.737427]  kasan_atomics+0x198/0x2e8
[   35.738210]  kunit_try_run_case+0x14c/0x3d0
[   35.738859]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.739822]  kthread+0x24c/0x2d0
[   35.740527]  ret_from_fork+0x10/0x20
[   35.741109] 
[   35.741432] Allocated by task 254:
[   35.741940]  kasan_save_stack+0x3c/0x68
[   35.742551]  kasan_save_track+0x20/0x40
[   35.743138]  kasan_save_alloc_info+0x40/0x58
[   35.743752]  __kasan_kmalloc+0xd4/0xd8
[   35.744408]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.745035]  kasan_atomics+0xb8/0x2e8
[   35.745582]  kunit_try_run_case+0x14c/0x3d0
[   35.746248]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.747035]  kthread+0x24c/0x2d0
[   35.747541]  ret_from_fork+0x10/0x20
[   35.748047] 
[   35.748514] The buggy address belongs to the object at fff00000c594f180
[   35.748514]  which belongs to the cache kmalloc-64 of size 64
[   35.749968] The buggy address is located 0 bytes to the right of
[   35.749968]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   35.751383] 
[   35.751670] The buggy address belongs to the physical page:
[   35.752319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   35.753344] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.754176] page_type: f5(slab)
[   35.754727] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.755673] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.756590] page dumped because: kasan: bad access detected
[   35.757310] 
[   35.757640] Memory state around the buggy address:
[   35.758319]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.759217]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.760089] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.760964]                                      ^
[   35.761631]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.762580]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.763471] ==================================================================
[   35.806844] ==================================================================
[   35.807704] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   35.808596] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   35.809456] 
[   35.809969] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   35.811155] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.811780] Hardware name: linux,dummy-virt (DT)
[   35.812557] Call trace:
[   35.812953]  show_stack+0x20/0x38 (C)
[   35.813595]  dump_stack_lvl+0x8c/0xd0
[   35.814153]  print_report+0x118/0x5e0
[   35.814830]  kasan_report+0xc8/0x118
[   35.815521]  kasan_check_range+0x100/0x1a8
[   35.816079]  __kasan_check_write+0x20/0x30
[   35.816700]  kasan_atomics_helper+0xca0/0x4858
[   35.817293]  kasan_atomics+0x198/0x2e8
[   35.817749]  kunit_try_run_case+0x14c/0x3d0
[   35.818241]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.818824]  kthread+0x24c/0x2d0
[   35.819401]  ret_from_fork+0x10/0x20
[   35.820122] 
[   35.820534] Allocated by task 254:
[   35.821194]  kasan_save_stack+0x3c/0x68
[   35.821791]  kasan_save_track+0x20/0x40
[   35.822423]  kasan_save_alloc_info+0x40/0x58
[   35.822967]  __kasan_kmalloc+0xd4/0xd8
[   35.823713]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.824470]  kasan_atomics+0xb8/0x2e8
[   35.824928]  kunit_try_run_case+0x14c/0x3d0
[   35.825723]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.826530]  kthread+0x24c/0x2d0
[   35.827077]  ret_from_fork+0x10/0x20
[   35.827630] 
[   35.827988] The buggy address belongs to the object at fff00000c594f180
[   35.827988]  which belongs to the cache kmalloc-64 of size 64
[   35.829434] The buggy address is located 0 bytes to the right of
[   35.829434]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   35.830866] 
[   35.831194] The buggy address belongs to the physical page:
[   35.832151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   35.833040] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.833669] page_type: f5(slab)
[   35.834095] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.834853] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.836310] page dumped because: kasan: bad access detected
[   35.836985] 
[   35.837372] Memory state around the buggy address:
[   35.837987]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.838900]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.839808] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.840643]                                      ^
[   35.841275]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.842196]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.843050] ==================================================================
[   36.403890] ==================================================================
[   36.404670] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   36.405956] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   36.406738] 
[   36.407217] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   36.408514] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.409086] Hardware name: linux,dummy-virt (DT)
[   36.409821] Call trace:
[   36.410314]  show_stack+0x20/0x38 (C)
[   36.410912]  dump_stack_lvl+0x8c/0xd0
[   36.411497]  print_report+0x118/0x5e0
[   36.412080]  kasan_report+0xc8/0x118
[   36.412770]  kasan_check_range+0x100/0x1a8
[   36.413344]  __kasan_check_write+0x20/0x30
[   36.414120]  kasan_atomics_helper+0x1190/0x4858
[   36.414868]  kasan_atomics+0x198/0x2e8
[   36.415528]  kunit_try_run_case+0x14c/0x3d0
[   36.416221]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.416988]  kthread+0x24c/0x2d0
[   36.417627]  ret_from_fork+0x10/0x20
[   36.418236] 
[   36.418610] Allocated by task 254:
[   36.419175]  kasan_save_stack+0x3c/0x68
[   36.419750]  kasan_save_track+0x20/0x40
[   36.420359]  kasan_save_alloc_info+0x40/0x58
[   36.420980]  __kasan_kmalloc+0xd4/0xd8
[   36.421543]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.422293]  kasan_atomics+0xb8/0x2e8
[   36.422811]  kunit_try_run_case+0x14c/0x3d0
[   36.423523]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.424227]  kthread+0x24c/0x2d0
[   36.424779]  ret_from_fork+0x10/0x20
[   36.425371] 
[   36.425672] The buggy address belongs to the object at fff00000c594f180
[   36.425672]  which belongs to the cache kmalloc-64 of size 64
[   36.427050] The buggy address is located 0 bytes to the right of
[   36.427050]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   36.428468] 
[   36.428823] The buggy address belongs to the physical page:
[   36.429565] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   36.430559] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.431352] page_type: f5(slab)
[   36.431952] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.432834] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.433877] page dumped because: kasan: bad access detected
[   36.434567] 
[   36.434939] Memory state around the buggy address:
[   36.435615]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.436462]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.437411] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.438392]                                      ^
[   36.438977]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.439906]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.440756] ==================================================================
[   34.663860] ==================================================================
[   34.664704] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   34.665513] Read of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   34.666247] 
[   34.666704] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   34.668861] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.669456] Hardware name: linux,dummy-virt (DT)
[   34.670057] Call trace:
[   34.670768]  show_stack+0x20/0x38 (C)
[   34.671589]  dump_stack_lvl+0x8c/0xd0
[   34.672135]  print_report+0x118/0x5e0
[   34.672691]  kasan_report+0xc8/0x118
[   34.673227]  kasan_check_range+0x100/0x1a8
[   34.673869]  __kasan_check_read+0x20/0x30
[   34.674483]  kasan_atomics_helper+0x1ec/0x4858
[   34.675243]  kasan_atomics+0x198/0x2e8
[   34.675848]  kunit_try_run_case+0x14c/0x3d0
[   34.676447]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.677298]  kthread+0x24c/0x2d0
[   34.677876]  ret_from_fork+0x10/0x20
[   34.678389] 
[   34.678740] Allocated by task 254:
[   34.679358]  kasan_save_stack+0x3c/0x68
[   34.679946]  kasan_save_track+0x20/0x40
[   34.680501]  kasan_save_alloc_info+0x40/0x58
[   34.681098]  __kasan_kmalloc+0xd4/0xd8
[   34.681795]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.682462]  kasan_atomics+0xb8/0x2e8
[   34.683077]  kunit_try_run_case+0x14c/0x3d0
[   34.683631]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.684442]  kthread+0x24c/0x2d0
[   34.684945]  ret_from_fork+0x10/0x20
[   34.685459] 
[   34.685917] The buggy address belongs to the object at fff00000c594f180
[   34.685917]  which belongs to the cache kmalloc-64 of size 64
[   34.687339] The buggy address is located 0 bytes to the right of
[   34.687339]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   34.688766] 
[   34.689117] The buggy address belongs to the physical page:
[   34.689865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   34.690878] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.691681] page_type: f5(slab)
[   34.692139] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.693162] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.694088] page dumped because: kasan: bad access detected
[   34.694827] 
[   34.695148] Memory state around the buggy address:
[   34.695749]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.696666]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.697552] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.698477]                                      ^
[   34.699063]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.699945]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.700809] ==================================================================
[   35.177764] ==================================================================
[   35.178792] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   35.179752] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   35.180547] 
[   35.180962] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   35.182238] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.182721] Hardware name: linux,dummy-virt (DT)
[   35.183512] Call trace:
[   35.183894]  show_stack+0x20/0x38 (C)
[   35.184685]  dump_stack_lvl+0x8c/0xd0
[   35.185493]  print_report+0x118/0x5e0
[   35.186139]  kasan_report+0xc8/0x118
[   35.186751]  kasan_check_range+0x100/0x1a8
[   35.187410]  __kasan_check_write+0x20/0x30
[   35.188082]  kasan_atomics_helper+0x684/0x4858
[   35.188751]  kasan_atomics+0x198/0x2e8
[   35.189366]  kunit_try_run_case+0x14c/0x3d0
[   35.190035]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.190804]  kthread+0x24c/0x2d0
[   35.191490]  ret_from_fork+0x10/0x20
[   35.192046] 
[   35.192420] Allocated by task 254:
[   35.192927]  kasan_save_stack+0x3c/0x68
[   35.193436]  kasan_save_track+0x20/0x40
[   35.194065]  kasan_save_alloc_info+0x40/0x58
[   35.194694]  __kasan_kmalloc+0xd4/0xd8
[   35.195227]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.195920]  kasan_atomics+0xb8/0x2e8
[   35.196516]  kunit_try_run_case+0x14c/0x3d0
[   35.197035]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.197891]  kthread+0x24c/0x2d0
[   35.198419]  ret_from_fork+0x10/0x20
[   35.198928] 
[   35.199354] The buggy address belongs to the object at fff00000c594f180
[   35.199354]  which belongs to the cache kmalloc-64 of size 64
[   35.200775] The buggy address is located 0 bytes to the right of
[   35.200775]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   35.202121] 
[   35.202474] The buggy address belongs to the physical page:
[   35.203117] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   35.204143] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.204875] page_type: f5(slab)
[   35.205423] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.206346] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.207288] page dumped because: kasan: bad access detected
[   35.208085] 
[   35.208456] Memory state around the buggy address:
[   35.209148]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.210160]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.211106] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.212048]                                      ^
[   35.212895]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.213806]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.214810] ==================================================================
[   35.614004] ==================================================================
[   35.615896] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   35.616914] Read of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   35.617855] 
[   35.618241] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   35.619538] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.620204] Hardware name: linux,dummy-virt (DT)
[   35.620810] Call trace:
[   35.621225]  show_stack+0x20/0x38 (C)
[   35.621856]  dump_stack_lvl+0x8c/0xd0
[   35.622443]  print_report+0x118/0x5e0
[   35.622952]  kasan_report+0xc8/0x118
[   35.623661]  __asan_report_load4_noabort+0x20/0x30
[   35.624353]  kasan_atomics_helper+0x3dcc/0x4858
[   35.625105]  kasan_atomics+0x198/0x2e8
[   35.625757]  kunit_try_run_case+0x14c/0x3d0
[   35.626476]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.627285]  kthread+0x24c/0x2d0
[   35.627865]  ret_from_fork+0x10/0x20
[   35.628423] 
[   35.628808] Allocated by task 254:
[   35.629282]  kasan_save_stack+0x3c/0x68
[   35.630017]  kasan_save_track+0x20/0x40
[   35.630528]  kasan_save_alloc_info+0x40/0x58
[   35.631217]  __kasan_kmalloc+0xd4/0xd8
[   35.631772]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.632423]  kasan_atomics+0xb8/0x2e8
[   35.632964]  kunit_try_run_case+0x14c/0x3d0
[   35.633605]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.634210]  kthread+0x24c/0x2d0
[   35.634812]  ret_from_fork+0x10/0x20
[   35.635421] 
[   35.635768] The buggy address belongs to the object at fff00000c594f180
[   35.635768]  which belongs to the cache kmalloc-64 of size 64
[   35.637250] The buggy address is located 0 bytes to the right of
[   35.637250]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   35.638618] 
[   35.639081] The buggy address belongs to the physical page:
[   35.639792] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   35.640886] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.641699] page_type: f5(slab)
[   35.642284] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.643164] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.644126] page dumped because: kasan: bad access detected
[   35.644796] 
[   35.645102] Memory state around the buggy address:
[   35.645718]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.646526]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.646948] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.647381]                                      ^
[   35.647702]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.648118]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.648678] ==================================================================
[   36.279955] ==================================================================
[   36.280735] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   36.282257] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   36.283251] 
[   36.283660] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   36.285068] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.285784] Hardware name: linux,dummy-virt (DT)
[   36.286634] Call trace:
[   36.287138]  show_stack+0x20/0x38 (C)
[   36.287904]  dump_stack_lvl+0x8c/0xd0
[   36.288596]  print_report+0x118/0x5e0
[   36.289222]  kasan_report+0xc8/0x118
[   36.289879]  kasan_check_range+0x100/0x1a8
[   36.290572]  __kasan_check_write+0x20/0x30
[   36.291253]  kasan_atomics_helper+0x1058/0x4858
[   36.292048]  kasan_atomics+0x198/0x2e8
[   36.292704]  kunit_try_run_case+0x14c/0x3d0
[   36.293441]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.294183]  kthread+0x24c/0x2d0
[   36.294853]  ret_from_fork+0x10/0x20
[   36.295490] 
[   36.295968] Allocated by task 254:
[   36.296509]  kasan_save_stack+0x3c/0x68
[   36.297197]  kasan_save_track+0x20/0x40
[   36.297885]  kasan_save_alloc_info+0x40/0x58
[   36.298589]  __kasan_kmalloc+0xd4/0xd8
[   36.299213]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.299950]  kasan_atomics+0xb8/0x2e8
[   36.300533]  kunit_try_run_case+0x14c/0x3d0
[   36.301160]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.301988]  kthread+0x24c/0x2d0
[   36.302604]  ret_from_fork+0x10/0x20
[   36.303265] 
[   36.303653] The buggy address belongs to the object at fff00000c594f180
[   36.303653]  which belongs to the cache kmalloc-64 of size 64
[   36.305099] The buggy address is located 0 bytes to the right of
[   36.305099]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   36.306699] 
[   36.307205] The buggy address belongs to the physical page:
[   36.308029] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   36.309043] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.309936] page_type: f5(slab)
[   36.310546] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.311545] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.312518] page dumped because: kasan: bad access detected
[   36.313316] 
[   36.313795] Memory state around the buggy address:
[   36.314494]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.315581]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.316491] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.317396]                                      ^
[   36.318188]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.319084]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.320105] ==================================================================
[   35.689147] ==================================================================
[   35.689879] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   35.690655] Read of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   35.691679] 
[   35.692003] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   35.693241] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.693791] Hardware name: linux,dummy-virt (DT)
[   35.694396] Call trace:
[   35.694891]  show_stack+0x20/0x38 (C)
[   35.695408]  dump_stack_lvl+0x8c/0xd0
[   35.696087]  print_report+0x118/0x5e0
[   35.696668]  kasan_report+0xc8/0x118
[   35.697199]  __asan_report_load4_noabort+0x20/0x30
[   35.697917]  kasan_atomics_helper+0x3dbc/0x4858
[   35.698557]  kasan_atomics+0x198/0x2e8
[   35.699132]  kunit_try_run_case+0x14c/0x3d0
[   35.699803]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.700476]  kthread+0x24c/0x2d0
[   35.701095]  ret_from_fork+0x10/0x20
[   35.701713] 
[   35.702089] Allocated by task 254:
[   35.702612]  kasan_save_stack+0x3c/0x68
[   35.703201]  kasan_save_track+0x20/0x40
[   35.703798]  kasan_save_alloc_info+0x40/0x58
[   35.704346]  __kasan_kmalloc+0xd4/0xd8
[   35.704940]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.705624]  kasan_atomics+0xb8/0x2e8
[   35.706178]  kunit_try_run_case+0x14c/0x3d0
[   35.706725]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.707540]  kthread+0x24c/0x2d0
[   35.708013]  ret_from_fork+0x10/0x20
[   35.708693] 
[   35.709057] The buggy address belongs to the object at fff00000c594f180
[   35.709057]  which belongs to the cache kmalloc-64 of size 64
[   35.710498] The buggy address is located 0 bytes to the right of
[   35.710498]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   35.711953] 
[   35.712257] The buggy address belongs to the physical page:
[   35.712997] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   35.713977] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.714804] page_type: f5(slab)
[   35.715373] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.716369] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.717305] page dumped because: kasan: bad access detected
[   35.718010] 
[   35.718317] Memory state around the buggy address:
[   35.718882]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.719827]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.720703] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.721592]                                      ^
[   35.722144]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.723066]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.723941] ==================================================================
[   35.765266] ==================================================================
[   35.766357] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   35.767865] Read of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   35.768943] 
[   35.769344] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   35.770626] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.771498] Hardware name: linux,dummy-virt (DT)
[   35.772254] Call trace:
[   35.772877]  show_stack+0x20/0x38 (C)
[   35.773661]  dump_stack_lvl+0x8c/0xd0
[   35.774222]  print_report+0x118/0x5e0
[   35.774870]  kasan_report+0xc8/0x118
[   35.775447]  __asan_report_load4_noabort+0x20/0x30
[   35.776346]  kasan_atomics_helper+0x3de4/0x4858
[   35.777139]  kasan_atomics+0x198/0x2e8
[   35.777723]  kunit_try_run_case+0x14c/0x3d0
[   35.778484]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.779279]  kthread+0x24c/0x2d0
[   35.779881]  ret_from_fork+0x10/0x20
[   35.780544] 
[   35.780859] Allocated by task 254:
[   35.781518]  kasan_save_stack+0x3c/0x68
[   35.782142]  kasan_save_track+0x20/0x40
[   35.782906]  kasan_save_alloc_info+0x40/0x58
[   35.783597]  __kasan_kmalloc+0xd4/0xd8
[   35.784305]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.784986]  kasan_atomics+0xb8/0x2e8
[   35.785597]  kunit_try_run_case+0x14c/0x3d0
[   35.786299]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.787079]  kthread+0x24c/0x2d0
[   35.787693]  ret_from_fork+0x10/0x20
[   35.788315] 
[   35.788702] The buggy address belongs to the object at fff00000c594f180
[   35.788702]  which belongs to the cache kmalloc-64 of size 64
[   35.790375] The buggy address is located 0 bytes to the right of
[   35.790375]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   35.791965] 
[   35.792414] The buggy address belongs to the physical page:
[   35.793188] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   35.794204] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.795124] page_type: f5(slab)
[   35.795772] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.796772] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.797728] page dumped because: kasan: bad access detected
[   35.798569] 
[   35.798902] Memory state around the buggy address:
[   35.799766]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.800843]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.801899] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.802776]                                      ^
[   35.803355]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.804050]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.804823] ==================================================================
[   36.730681] ==================================================================
[   36.731392] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   36.732837] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   36.733808] 
[   36.734213] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   36.735462] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.736034] Hardware name: linux,dummy-virt (DT)
[   36.736702] Call trace:
[   36.737174]  show_stack+0x20/0x38 (C)
[   36.737788]  dump_stack_lvl+0x8c/0xd0
[   36.738409]  print_report+0x118/0x5e0
[   36.739000]  kasan_report+0xc8/0x118
[   36.739616]  kasan_check_range+0x100/0x1a8
[   36.740221]  __kasan_check_write+0x20/0x30
[   36.740877]  kasan_atomics_helper+0x14e4/0x4858
[   36.741463]  kasan_atomics+0x198/0x2e8
[   36.742117]  kunit_try_run_case+0x14c/0x3d0
[   36.742687]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.743568]  kthread+0x24c/0x2d0
[   36.744158]  ret_from_fork+0x10/0x20
[   36.744815] 
[   36.745092] Allocated by task 254:
[   36.745714]  kasan_save_stack+0x3c/0x68
[   36.746322]  kasan_save_track+0x20/0x40
[   36.746873]  kasan_save_alloc_info+0x40/0x58
[   36.747497]  __kasan_kmalloc+0xd4/0xd8
[   36.748060]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.748831]  kasan_atomics+0xb8/0x2e8
[   36.749361]  kunit_try_run_case+0x14c/0x3d0
[   36.750083]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.750846]  kthread+0x24c/0x2d0
[   36.751388]  ret_from_fork+0x10/0x20
[   36.751982] 
[   36.752279] The buggy address belongs to the object at fff00000c594f180
[   36.752279]  which belongs to the cache kmalloc-64 of size 64
[   36.753664] The buggy address is located 0 bytes to the right of
[   36.753664]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   36.755167] 
[   36.755534] The buggy address belongs to the physical page:
[   36.756155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   36.757217] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.758156] page_type: f5(slab)
[   36.758635] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.759643] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.760640] page dumped because: kasan: bad access detected
[   36.761408] 
[   36.761704] Memory state around the buggy address:
[   36.762270]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.763241]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.764097] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.764972]                                      ^
[   36.765619]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.766500]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.767415] ==================================================================
[   36.363842] ==================================================================
[   36.365703] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   36.366555] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   36.366981] 
[   36.367661] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   36.369298] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.369821] Hardware name: linux,dummy-virt (DT)
[   36.370594] Call trace:
[   36.371043]  show_stack+0x20/0x38 (C)
[   36.371662]  dump_stack_lvl+0x8c/0xd0
[   36.372175]  print_report+0x118/0x5e0
[   36.372878]  kasan_report+0xc8/0x118
[   36.373506]  kasan_check_range+0x100/0x1a8
[   36.374091]  __kasan_check_write+0x20/0x30
[   36.374847]  kasan_atomics_helper+0x1128/0x4858
[   36.375516]  kasan_atomics+0x198/0x2e8
[   36.376060]  kunit_try_run_case+0x14c/0x3d0
[   36.376725]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.377526]  kthread+0x24c/0x2d0
[   36.378091]  ret_from_fork+0x10/0x20
[   36.378688] 
[   36.379049] Allocated by task 254:
[   36.379625]  kasan_save_stack+0x3c/0x68
[   36.380147]  kasan_save_track+0x20/0x40
[   36.380763]  kasan_save_alloc_info+0x40/0x58
[   36.381401]  __kasan_kmalloc+0xd4/0xd8
[   36.381908]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.382597]  kasan_atomics+0xb8/0x2e8
[   36.383239]  kunit_try_run_case+0x14c/0x3d0
[   36.383947]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.384955]  kthread+0x24c/0x2d0
[   36.385622]  ret_from_fork+0x10/0x20
[   36.386151] 
[   36.386532] The buggy address belongs to the object at fff00000c594f180
[   36.386532]  which belongs to the cache kmalloc-64 of size 64
[   36.388130] The buggy address is located 0 bytes to the right of
[   36.388130]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   36.389599] 
[   36.389930] The buggy address belongs to the physical page:
[   36.390756] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   36.391677] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.392598] page_type: f5(slab)
[   36.393034] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.394101] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.394995] page dumped because: kasan: bad access detected
[   36.395857] 
[   36.396295] Memory state around the buggy address:
[   36.396874]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.397782]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.398674] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.399591]                                      ^
[   36.400344]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.401196]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.402205] ==================================================================
[   36.808987] ==================================================================
[   36.809691] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   36.811250] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   36.812681] 
[   36.813291] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   36.815188] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.815908] Hardware name: linux,dummy-virt (DT)
[   36.816489] Call trace:
[   36.816925]  show_stack+0x20/0x38 (C)
[   36.817614]  dump_stack_lvl+0x8c/0xd0
[   36.818492]  print_report+0x118/0x5e0
[   36.819233]  kasan_report+0xc8/0x118
[   36.819776]  kasan_check_range+0x100/0x1a8
[   36.820405]  __kasan_check_write+0x20/0x30
[   36.821064]  kasan_atomics_helper+0x15b4/0x4858
[   36.821890]  kasan_atomics+0x198/0x2e8
[   36.822491]  kunit_try_run_case+0x14c/0x3d0
[   36.823081]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.824003]  kthread+0x24c/0x2d0
[   36.824644]  ret_from_fork+0x10/0x20
[   36.825157] 
[   36.825545] Allocated by task 254:
[   36.826123]  kasan_save_stack+0x3c/0x68
[   36.826720]  kasan_save_track+0x20/0x40
[   36.827279]  kasan_save_alloc_info+0x40/0x58
[   36.827949]  __kasan_kmalloc+0xd4/0xd8
[   36.828614]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.829234]  kasan_atomics+0xb8/0x2e8
[   36.829786]  kunit_try_run_case+0x14c/0x3d0
[   36.830437]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.831131]  kthread+0x24c/0x2d0
[   36.831594]  ret_from_fork+0x10/0x20
[   36.832188] 
[   36.832559] The buggy address belongs to the object at fff00000c594f180
[   36.832559]  which belongs to the cache kmalloc-64 of size 64
[   36.833890] The buggy address is located 0 bytes to the right of
[   36.833890]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   36.835394] 
[   36.835676] The buggy address belongs to the physical page:
[   36.836492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   36.837665] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.839148] page_type: f5(slab)
[   36.839615] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.840644] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.841824] page dumped because: kasan: bad access detected
[   36.842689] 
[   36.843244] Memory state around the buggy address:
[   36.843882]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.844795]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.845690] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.846464]                                      ^
[   36.847077]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.848100]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.848991] ==================================================================
[   35.451717] ==================================================================
[   35.452492] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   35.453366] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   35.454355] 
[   35.454707] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   35.456255] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.457320] Hardware name: linux,dummy-virt (DT)
[   35.457970] Call trace:
[   35.458408]  show_stack+0x20/0x38 (C)
[   35.458944]  dump_stack_lvl+0x8c/0xd0
[   35.459576]  print_report+0x118/0x5e0
[   35.460475]  kasan_report+0xc8/0x118
[   35.461169]  kasan_check_range+0x100/0x1a8
[   35.461952]  __kasan_check_write+0x20/0x30
[   35.462585]  kasan_atomics_helper+0x99c/0x4858
[   35.462922]  kasan_atomics+0x198/0x2e8
[   35.463215]  kunit_try_run_case+0x14c/0x3d0
[   35.464278]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.465135]  kthread+0x24c/0x2d0
[   35.465849]  ret_from_fork+0x10/0x20
[   35.466676] 
[   35.467079] Allocated by task 254:
[   35.467730]  kasan_save_stack+0x3c/0x68
[   35.468410]  kasan_save_track+0x20/0x40
[   35.469096]  kasan_save_alloc_info+0x40/0x58
[   35.469899]  __kasan_kmalloc+0xd4/0xd8
[   35.470482]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.471149]  kasan_atomics+0xb8/0x2e8
[   35.471762]  kunit_try_run_case+0x14c/0x3d0
[   35.472430]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.473208]  kthread+0x24c/0x2d0
[   35.473784]  ret_from_fork+0x10/0x20
[   35.474431] 
[   35.474798] The buggy address belongs to the object at fff00000c594f180
[   35.474798]  which belongs to the cache kmalloc-64 of size 64
[   35.476376] The buggy address is located 0 bytes to the right of
[   35.476376]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   35.477969] 
[   35.478260] The buggy address belongs to the physical page:
[   35.479165] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   35.480251] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.481166] page_type: f5(slab)
[   35.481741] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.482854] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.483906] page dumped because: kasan: bad access detected
[   35.484712] 
[   35.485234] Memory state around the buggy address:
[   35.485810]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.486876]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.487747] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.488642]                                      ^
[   35.489263]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.490159]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.491213] ==================================================================
[   34.821604] ==================================================================
[   34.822348] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   34.823931] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   34.825863] 
[   34.826510] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   34.827736] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.828279] Hardware name: linux,dummy-virt (DT)
[   34.829176] Call trace:
[   34.829779]  show_stack+0x20/0x38 (C)
[   34.830530]  dump_stack_lvl+0x8c/0xd0
[   34.831088]  print_report+0x118/0x5e0
[   34.831870]  kasan_report+0xc8/0x118
[   34.832411]  kasan_check_range+0x100/0x1a8
[   34.833093]  __kasan_check_write+0x20/0x30
[   34.833736]  kasan_atomics_helper+0x32c/0x4858
[   34.834489]  kasan_atomics+0x198/0x2e8
[   34.834985]  kunit_try_run_case+0x14c/0x3d0
[   34.835762]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.836605]  kthread+0x24c/0x2d0
[   34.837129]  ret_from_fork+0x10/0x20
[   34.837718] 
[   34.838073] Allocated by task 254:
[   34.838570]  kasan_save_stack+0x3c/0x68
[   34.839213]  kasan_save_track+0x20/0x40
[   34.839746]  kasan_save_alloc_info+0x40/0x58
[   34.840472]  __kasan_kmalloc+0xd4/0xd8
[   34.840947]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.841675]  kasan_atomics+0xb8/0x2e8
[   34.842261]  kunit_try_run_case+0x14c/0x3d0
[   34.842877]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.843575]  kthread+0x24c/0x2d0
[   34.844182]  ret_from_fork+0x10/0x20
[   34.844781] 
[   34.845077] The buggy address belongs to the object at fff00000c594f180
[   34.845077]  which belongs to the cache kmalloc-64 of size 64
[   34.846606] The buggy address is located 0 bytes to the right of
[   34.846606]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   34.847999] 
[   34.848345] The buggy address belongs to the physical page:
[   34.849039] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   34.849988] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.850834] page_type: f5(slab)
[   34.851298] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.852547] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.853421] page dumped because: kasan: bad access detected
[   34.854088] 
[   34.854441] Memory state around the buggy address:
[   34.855093]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.855958]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.856863] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.857700]                                      ^
[   34.858295]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.859235]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.860062] ==================================================================
[   35.100157] ==================================================================
[   35.100813] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   35.101968] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   35.102821] 
[   35.103348] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   35.104571] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.105279] Hardware name: linux,dummy-virt (DT)
[   35.106061] Call trace:
[   35.106476]  show_stack+0x20/0x38 (C)
[   35.107048]  dump_stack_lvl+0x8c/0xd0
[   35.107626]  print_report+0x118/0x5e0
[   35.108227]  kasan_report+0xc8/0x118
[   35.109097]  kasan_check_range+0x100/0x1a8
[   35.109703]  __kasan_check_write+0x20/0x30
[   35.110410]  kasan_atomics_helper+0x5b4/0x4858
[   35.111013]  kasan_atomics+0x198/0x2e8
[   35.111705]  kunit_try_run_case+0x14c/0x3d0
[   35.112368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.113042]  kthread+0x24c/0x2d0
[   35.113700]  ret_from_fork+0x10/0x20
[   35.114288] 
[   35.114712] Allocated by task 254:
[   35.115259]  kasan_save_stack+0x3c/0x68
[   35.115843]  kasan_save_track+0x20/0x40
[   35.116387]  kasan_save_alloc_info+0x40/0x58
[   35.117018]  __kasan_kmalloc+0xd4/0xd8
[   35.117621]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.118177]  kasan_atomics+0xb8/0x2e8
[   35.118826]  kunit_try_run_case+0x14c/0x3d0
[   35.119462]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.120196]  kthread+0x24c/0x2d0
[   35.120805]  ret_from_fork+0x10/0x20
[   35.121367] 
[   35.121656] The buggy address belongs to the object at fff00000c594f180
[   35.121656]  which belongs to the cache kmalloc-64 of size 64
[   35.123135] The buggy address is located 0 bytes to the right of
[   35.123135]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   35.124486] 
[   35.124791] The buggy address belongs to the physical page:
[   35.125628] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   35.126540] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.127485] page_type: f5(slab)
[   35.127956] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.128995] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.129912] page dumped because: kasan: bad access detected
[   35.130668] 
[   35.131007] Memory state around the buggy address:
[   35.131635]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.132462]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.133369] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.134211]                                      ^
[   35.134899]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.135803]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.136733] ==================================================================
[   36.607937] ==================================================================
[   36.608849] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   36.609780] Read of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   36.610776] 
[   36.611178] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   36.612103] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.612515] Hardware name: linux,dummy-virt (DT)
[   36.612940] Call trace:
[   36.613233]  show_stack+0x20/0x38 (C)
[   36.613689]  dump_stack_lvl+0x8c/0xd0
[   36.614620]  print_report+0x118/0x5e0
[   36.615494]  kasan_report+0xc8/0x118
[   36.616154]  __asan_report_load8_noabort+0x20/0x30
[   36.616920]  kasan_atomics_helper+0x3f04/0x4858
[   36.617397]  kasan_atomics+0x198/0x2e8
[   36.617798]  kunit_try_run_case+0x14c/0x3d0
[   36.619395]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.620568]  kthread+0x24c/0x2d0
[   36.620974]  ret_from_fork+0x10/0x20
[   36.621940] 
[   36.622966] Allocated by task 254:
[   36.623971]  kasan_save_stack+0x3c/0x68
[   36.624560]  kasan_save_track+0x20/0x40
[   36.625030]  kasan_save_alloc_info+0x40/0x58
[   36.625970]  __kasan_kmalloc+0xd4/0xd8
[   36.626611]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.627070]  kasan_atomics+0xb8/0x2e8
[   36.628165]  kunit_try_run_case+0x14c/0x3d0
[   36.629306]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.630030]  kthread+0x24c/0x2d0
[   36.630485]  ret_from_fork+0x10/0x20
[   36.630973] 
[   36.631377] The buggy address belongs to the object at fff00000c594f180
[   36.631377]  which belongs to the cache kmalloc-64 of size 64
[   36.632980] The buggy address is located 0 bytes to the right of
[   36.632980]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   36.634105] 
[   36.634722] The buggy address belongs to the physical page:
[   36.635213] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   36.637076] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.639172] page_type: f5(slab)
[   36.640017] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.641506] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.642395] page dumped because: kasan: bad access detected
[   36.643033] 
[   36.643442] Memory state around the buggy address:
[   36.644152]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.644955]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.645905] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.646789]                                      ^
[   36.647563]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.648381]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.649367] ==================================================================
[   35.650612] ==================================================================
[   35.651520] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   35.652438] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   35.653298] 
[   35.653715] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   35.655140] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.655652] Hardware name: linux,dummy-virt (DT)
[   35.656502] Call trace:
[   35.656940]  show_stack+0x20/0x38 (C)
[   35.657640]  dump_stack_lvl+0x8c/0xd0
[   35.658226]  print_report+0x118/0x5e0
[   35.658919]  kasan_report+0xc8/0x118
[   35.659536]  kasan_check_range+0x100/0x1a8
[   35.660187]  __kasan_check_write+0x20/0x30
[   35.660817]  kasan_atomics_helper+0xb70/0x4858
[   35.661374]  kasan_atomics+0x198/0x2e8
[   35.662037]  kunit_try_run_case+0x14c/0x3d0
[   35.662649]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.663517]  kthread+0x24c/0x2d0
[   35.664083]  ret_from_fork+0x10/0x20
[   35.664616] 
[   35.664993] Allocated by task 254:
[   35.665571]  kasan_save_stack+0x3c/0x68
[   35.666061]  kasan_save_track+0x20/0x40
[   35.666833]  kasan_save_alloc_info+0x40/0x58
[   35.667342]  __kasan_kmalloc+0xd4/0xd8
[   35.668079]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.668704]  kasan_atomics+0xb8/0x2e8
[   35.669220]  kunit_try_run_case+0x14c/0x3d0
[   35.670013]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.670630]  kthread+0x24c/0x2d0
[   35.671253]  ret_from_fork+0x10/0x20
[   35.671858] 
[   35.672238] The buggy address belongs to the object at fff00000c594f180
[   35.672238]  which belongs to the cache kmalloc-64 of size 64
[   35.673685] The buggy address is located 0 bytes to the right of
[   35.673685]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   35.675087] 
[   35.675449] The buggy address belongs to the physical page:
[   35.676084] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   35.677097] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.677965] page_type: f5(slab)
[   35.678464] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.679465] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.680377] page dumped because: kasan: bad access detected
[   35.681042] 
[   35.681379] Memory state around the buggy address:
[   35.682004]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.682904]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.683778] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.684707]                                      ^
[   35.685353]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.686237]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.687128] ==================================================================
[   35.964775] ==================================================================
[   35.965677] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   35.966267] Read of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   35.967196] 
[   35.967525] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   35.968997] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.969659] Hardware name: linux,dummy-virt (DT)
[   35.970267] Call trace:
[   35.970700]  show_stack+0x20/0x38 (C)
[   35.971316]  dump_stack_lvl+0x8c/0xd0
[   35.971837]  print_report+0x118/0x5e0
[   35.972508]  kasan_report+0xc8/0x118
[   35.973115]  kasan_check_range+0x100/0x1a8
[   35.973738]  __kasan_check_read+0x20/0x30
[   35.974297]  kasan_atomics_helper+0xdd4/0x4858
[   35.975020]  kasan_atomics+0x198/0x2e8
[   35.975594]  kunit_try_run_case+0x14c/0x3d0
[   35.976218]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.976982]  kthread+0x24c/0x2d0
[   35.977649]  ret_from_fork+0x10/0x20
[   35.978232] 
[   35.978615] Allocated by task 254:
[   35.979152]  kasan_save_stack+0x3c/0x68
[   35.979898]  kasan_save_track+0x20/0x40
[   35.980494]  kasan_save_alloc_info+0x40/0x58
[   35.981237]  __kasan_kmalloc+0xd4/0xd8
[   35.981822]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.982565]  kasan_atomics+0xb8/0x2e8
[   35.983069]  kunit_try_run_case+0x14c/0x3d0
[   35.983779]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.984492]  kthread+0x24c/0x2d0
[   35.985110]  ret_from_fork+0x10/0x20
[   35.985629] 
[   35.986097] The buggy address belongs to the object at fff00000c594f180
[   35.986097]  which belongs to the cache kmalloc-64 of size 64
[   35.987566] The buggy address is located 0 bytes to the right of
[   35.987566]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   35.988952] 
[   35.989238] The buggy address belongs to the physical page:
[   35.990073] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   35.990991] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.991839] page_type: f5(slab)
[   35.992410] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.993376] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.994289] page dumped because: kasan: bad access detected
[   35.995000] 
[   35.995312] Memory state around the buggy address:
[   35.996006]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.996836]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.997774] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.998647]                                      ^
[   35.999278]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.000236]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.001188] ==================================================================
[   36.159798] ==================================================================
[   36.160553] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   36.161467] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   36.162253] 
[   36.162702] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   36.163966] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.164686] Hardware name: linux,dummy-virt (DT)
[   36.165353] Call trace:
[   36.165736]  show_stack+0x20/0x38 (C)
[   36.166473]  dump_stack_lvl+0x8c/0xd0
[   36.167147]  print_report+0x118/0x5e0
[   36.167832]  kasan_report+0xc8/0x118
[   36.168469]  kasan_check_range+0x100/0x1a8
[   36.169006]  __kasan_check_write+0x20/0x30
[   36.169745]  kasan_atomics_helper+0xf20/0x4858
[   36.170490]  kasan_atomics+0x198/0x2e8
[   36.170972]  kunit_try_run_case+0x14c/0x3d0
[   36.171713]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.172410]  kthread+0x24c/0x2d0
[   36.173119]  ret_from_fork+0x10/0x20
[   36.173675] 
[   36.174039] Allocated by task 254:
[   36.174556]  kasan_save_stack+0x3c/0x68
[   36.175187]  kasan_save_track+0x20/0x40
[   36.175772]  kasan_save_alloc_info+0x40/0x58
[   36.176417]  __kasan_kmalloc+0xd4/0xd8
[   36.176967]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.177632]  kasan_atomics+0xb8/0x2e8
[   36.178184]  kunit_try_run_case+0x14c/0x3d0
[   36.178813]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.179661]  kthread+0x24c/0x2d0
[   36.180154]  ret_from_fork+0x10/0x20
[   36.180742] 
[   36.181022] The buggy address belongs to the object at fff00000c594f180
[   36.181022]  which belongs to the cache kmalloc-64 of size 64
[   36.182509] The buggy address is located 0 bytes to the right of
[   36.182509]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   36.183866] 
[   36.184209] The buggy address belongs to the physical page:
[   36.185033] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   36.185985] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.186907] page_type: f5(slab)
[   36.187418] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.188304] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.189393] page dumped because: kasan: bad access detected
[   36.190117] 
[   36.190620] Memory state around the buggy address:
[   36.191286]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.192158]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.193075] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.193913]                                      ^
[   36.194614]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.195451]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.196407] ==================================================================
[   36.524707] ==================================================================
[   36.526394] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   36.527528] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   36.528894] 
[   36.529385] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   36.530702] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.531271] Hardware name: linux,dummy-virt (DT)
[   36.531937] Call trace:
[   36.532433]  show_stack+0x20/0x38 (C)
[   36.532995]  dump_stack_lvl+0x8c/0xd0
[   36.533757]  print_report+0x118/0x5e0
[   36.534454]  kasan_report+0xc8/0x118
[   36.535067]  kasan_check_range+0x100/0x1a8
[   36.535836]  __kasan_check_write+0x20/0x30
[   36.536443]  kasan_atomics_helper+0x12d8/0x4858
[   36.537262]  kasan_atomics+0x198/0x2e8
[   36.537968]  kunit_try_run_case+0x14c/0x3d0
[   36.538725]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.539590]  kthread+0x24c/0x2d0
[   36.540238]  ret_from_fork+0x10/0x20
[   36.541018] 
[   36.541362] Allocated by task 254:
[   36.541975]  kasan_save_stack+0x3c/0x68
[   36.542507]  kasan_save_track+0x20/0x40
[   36.543046]  kasan_save_alloc_info+0x40/0x58
[   36.543681]  __kasan_kmalloc+0xd4/0xd8
[   36.544143]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.544866]  kasan_atomics+0xb8/0x2e8
[   36.545433]  kunit_try_run_case+0x14c/0x3d0
[   36.546203]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.547219]  kthread+0x24c/0x2d0
[   36.547944]  ret_from_fork+0x10/0x20
[   36.548358] 
[   36.548761] The buggy address belongs to the object at fff00000c594f180
[   36.548761]  which belongs to the cache kmalloc-64 of size 64
[   36.550204] The buggy address is located 0 bytes to the right of
[   36.550204]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   36.551677] 
[   36.551968] The buggy address belongs to the physical page:
[   36.552764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   36.553688] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.554472] page_type: f5(slab)
[   36.555032] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.556015] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.556980] page dumped because: kasan: bad access detected
[   36.557659] 
[   36.558107] Memory state around the buggy address:
[   36.558848]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.559962]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.560982] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.561700]                                      ^
[   36.562035]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.562601]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.563696] ==================================================================
[   36.976557] ==================================================================
[   36.977433] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   36.978273] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   36.979567] 
[   36.980143] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   36.981594] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.982257] Hardware name: linux,dummy-virt (DT)
[   36.983062] Call trace:
[   36.983637]  show_stack+0x20/0x38 (C)
[   36.984405]  dump_stack_lvl+0x8c/0xd0
[   36.985171]  print_report+0x118/0x5e0
[   36.985774]  kasan_report+0xc8/0x118
[   36.986525]  kasan_check_range+0x100/0x1a8
[   36.987207]  __kasan_check_write+0x20/0x30
[   36.987915]  kasan_atomics_helper+0x16d0/0x4858
[   36.988654]  kasan_atomics+0x198/0x2e8
[   36.989320]  kunit_try_run_case+0x14c/0x3d0
[   36.990047]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.990859]  kthread+0x24c/0x2d0
[   36.991489]  ret_from_fork+0x10/0x20
[   36.992122] 
[   36.992460] Allocated by task 254:
[   36.993117]  kasan_save_stack+0x3c/0x68
[   36.993791]  kasan_save_track+0x20/0x40
[   36.994496]  kasan_save_alloc_info+0x40/0x58
[   36.995116]  __kasan_kmalloc+0xd4/0xd8
[   36.995900]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.996647]  kasan_atomics+0xb8/0x2e8
[   36.997247]  kunit_try_run_case+0x14c/0x3d0
[   36.997944]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.998759]  kthread+0x24c/0x2d0
[   36.999372]  ret_from_fork+0x10/0x20
[   37.000029] 
[   37.000385] The buggy address belongs to the object at fff00000c594f180
[   37.000385]  which belongs to the cache kmalloc-64 of size 64
[   37.001920] The buggy address is located 0 bytes to the right of
[   37.001920]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   37.003402] 
[   37.003932] The buggy address belongs to the physical page:
[   37.004713] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   37.005763] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.006679] page_type: f5(slab)
[   37.007256] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.008273] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.009264] page dumped because: kasan: bad access detected
[   37.010045] 
[   37.010560] Memory state around the buggy address:
[   37.011223]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.012192]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.013118] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.014052]                                      ^
[   37.014784]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.015753]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.016646] ==================================================================
[   35.294405] ==================================================================
[   35.295381] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   35.296419] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   35.297657] 
[   35.298135] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   35.299556] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.300213] Hardware name: linux,dummy-virt (DT)
[   35.300845] Call trace:
[   35.301269]  show_stack+0x20/0x38 (C)
[   35.301886]  dump_stack_lvl+0x8c/0xd0
[   35.302388]  print_report+0x118/0x5e0
[   35.303036]  kasan_report+0xc8/0x118
[   35.303553]  kasan_check_range+0x100/0x1a8
[   35.304266]  __kasan_check_write+0x20/0x30
[   35.304981]  kasan_atomics_helper+0x7cc/0x4858
[   35.305745]  kasan_atomics+0x198/0x2e8
[   35.306497]  kunit_try_run_case+0x14c/0x3d0
[   35.307109]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.307818]  kthread+0x24c/0x2d0
[   35.308563]  ret_from_fork+0x10/0x20
[   35.308977] 
[   35.309431] Allocated by task 254:
[   35.309988]  kasan_save_stack+0x3c/0x68
[   35.310565]  kasan_save_track+0x20/0x40
[   35.311184]  kasan_save_alloc_info+0x40/0x58
[   35.311883]  __kasan_kmalloc+0xd4/0xd8
[   35.312552]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.313227]  kasan_atomics+0xb8/0x2e8
[   35.313775]  kunit_try_run_case+0x14c/0x3d0
[   35.314431]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.315099]  kthread+0x24c/0x2d0
[   35.315633]  ret_from_fork+0x10/0x20
[   35.316176] 
[   35.316557] The buggy address belongs to the object at fff00000c594f180
[   35.316557]  which belongs to the cache kmalloc-64 of size 64
[   35.318006] The buggy address is located 0 bytes to the right of
[   35.318006]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   35.319438] 
[   35.319739] The buggy address belongs to the physical page:
[   35.320452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   35.321457] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.322349] page_type: f5(slab)
[   35.322928] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.323829] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.324830] page dumped because: kasan: bad access detected
[   35.325514] 
[   35.325846] Memory state around the buggy address:
[   35.326481]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.327360]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.328272] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.329142]                                      ^
[   35.329901]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.330773]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.331670] ==================================================================
[   36.199843] ==================================================================
[   36.200729] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   36.201483] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   36.202295] 
[   36.202796] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   36.204253] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.204810] Hardware name: linux,dummy-virt (DT)
[   36.205417] Call trace:
[   36.205849]  show_stack+0x20/0x38 (C)
[   36.207115]  dump_stack_lvl+0x8c/0xd0
[   36.207649]  print_report+0x118/0x5e0
[   36.208196]  kasan_report+0xc8/0x118
[   36.208713]  kasan_check_range+0x100/0x1a8
[   36.209397]  __kasan_check_write+0x20/0x30
[   36.210107]  kasan_atomics_helper+0xf88/0x4858
[   36.210839]  kasan_atomics+0x198/0x2e8
[   36.211439]  kunit_try_run_case+0x14c/0x3d0
[   36.212044]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.212814]  kthread+0x24c/0x2d0
[   36.213377]  ret_from_fork+0x10/0x20
[   36.213991] 
[   36.214322] Allocated by task 254:
[   36.214815]  kasan_save_stack+0x3c/0x68
[   36.215588]  kasan_save_track+0x20/0x40
[   36.216108]  kasan_save_alloc_info+0x40/0x58
[   36.216815]  __kasan_kmalloc+0xd4/0xd8
[   36.217390]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.218138]  kasan_atomics+0xb8/0x2e8
[   36.218729]  kunit_try_run_case+0x14c/0x3d0
[   36.219431]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.220127]  kthread+0x24c/0x2d0
[   36.220582]  ret_from_fork+0x10/0x20
[   36.221155] 
[   36.221474] The buggy address belongs to the object at fff00000c594f180
[   36.221474]  which belongs to the cache kmalloc-64 of size 64
[   36.222913] The buggy address is located 0 bytes to the right of
[   36.222913]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   36.224470] 
[   36.224801] The buggy address belongs to the physical page:
[   36.225505] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   36.226468] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.227273] page_type: f5(slab)
[   36.227887] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.228849] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.229851] page dumped because: kasan: bad access detected
[   36.230677] 
[   36.230984] Memory state around the buggy address:
[   36.231541]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.232209]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.233149] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.234261]                                      ^
[   36.234881]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.235836]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.236709] ==================================================================
[   36.002739] ==================================================================
[   36.004253] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   36.005413] Read of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   36.006356] 
[   36.006835] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   36.008204] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.008737] Hardware name: linux,dummy-virt (DT)
[   36.009520] Call trace:
[   36.010072]  show_stack+0x20/0x38 (C)
[   36.010819]  dump_stack_lvl+0x8c/0xd0
[   36.011428]  print_report+0x118/0x5e0
[   36.012064]  kasan_report+0xc8/0x118
[   36.012889]  __asan_report_load8_noabort+0x20/0x30
[   36.013705]  kasan_atomics_helper+0x3f58/0x4858
[   36.014358]  kasan_atomics+0x198/0x2e8
[   36.014919]  kunit_try_run_case+0x14c/0x3d0
[   36.015653]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.016502]  kthread+0x24c/0x2d0
[   36.017184]  ret_from_fork+0x10/0x20
[   36.017825] 
[   36.018200] Allocated by task 254:
[   36.018763]  kasan_save_stack+0x3c/0x68
[   36.019483]  kasan_save_track+0x20/0x40
[   36.020170]  kasan_save_alloc_info+0x40/0x58
[   36.020988]  __kasan_kmalloc+0xd4/0xd8
[   36.021552]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.022311]  kasan_atomics+0xb8/0x2e8
[   36.022889]  kunit_try_run_case+0x14c/0x3d0
[   36.023512]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.024189]  kthread+0x24c/0x2d0
[   36.024840]  ret_from_fork+0x10/0x20
[   36.025411] 
[   36.025800] The buggy address belongs to the object at fff00000c594f180
[   36.025800]  which belongs to the cache kmalloc-64 of size 64
[   36.027209] The buggy address is located 0 bytes to the right of
[   36.027209]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   36.028657] 
[   36.028998] The buggy address belongs to the physical page:
[   36.029719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   36.030804] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.031652] page_type: f5(slab)
[   36.032242] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.033196] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.034172] page dumped because: kasan: bad access detected
[   36.034859] 
[   36.035209] Memory state around the buggy address:
[   36.035949]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.036757]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.037783] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.038783]                                      ^
[   36.039448]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.040321]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.041290] ==================================================================
[   36.689530] ==================================================================
[   36.690263] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   36.692243] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   36.693194] 
[   36.693948] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   36.695143] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.695725] Hardware name: linux,dummy-virt (DT)
[   36.696298] Call trace:
[   36.696794]  show_stack+0x20/0x38 (C)
[   36.697396]  dump_stack_lvl+0x8c/0xd0
[   36.698107]  print_report+0x118/0x5e0
[   36.698618]  kasan_report+0xc8/0x118
[   36.699294]  kasan_check_range+0x100/0x1a8
[   36.699933]  __kasan_check_write+0x20/0x30
[   36.700576]  kasan_atomics_helper+0x147c/0x4858
[   36.701228]  kasan_atomics+0x198/0x2e8
[   36.701943]  kunit_try_run_case+0x14c/0x3d0
[   36.702558]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.703359]  kthread+0x24c/0x2d0
[   36.703943]  ret_from_fork+0x10/0x20
[   36.704527] 
[   36.704897] Allocated by task 254:
[   36.705432]  kasan_save_stack+0x3c/0x68
[   36.706055]  kasan_save_track+0x20/0x40
[   36.706646]  kasan_save_alloc_info+0x40/0x58
[   36.707254]  __kasan_kmalloc+0xd4/0xd8
[   36.707946]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.708499]  kasan_atomics+0xb8/0x2e8
[   36.709124]  kunit_try_run_case+0x14c/0x3d0
[   36.709707]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.710555]  kthread+0x24c/0x2d0
[   36.711071]  ret_from_fork+0x10/0x20
[   36.711669] 
[   36.712011] The buggy address belongs to the object at fff00000c594f180
[   36.712011]  which belongs to the cache kmalloc-64 of size 64
[   36.713923] The buggy address is located 0 bytes to the right of
[   36.713923]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   36.715344] 
[   36.715877] The buggy address belongs to the physical page:
[   36.716727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   36.717870] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.718858] page_type: f5(slab)
[   36.719551] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.720679] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.721764] page dumped because: kasan: bad access detected
[   36.722629] 
[   36.723101] Memory state around the buggy address:
[   36.723709]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.724778]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.725912] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.726726]                                      ^
[   36.727309]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.727987]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.729022] ==================================================================
[   35.926459] ==================================================================
[   35.927286] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   35.928179] Read of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   35.929027] 
[   35.929412] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   35.930595] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.931125] Hardware name: linux,dummy-virt (DT)
[   35.931711] Call trace:
[   35.932215]  show_stack+0x20/0x38 (C)
[   35.932872]  dump_stack_lvl+0x8c/0xd0
[   35.933456]  print_report+0x118/0x5e0
[   35.934037]  kasan_report+0xc8/0x118
[   35.934637]  __asan_report_load4_noabort+0x20/0x30
[   35.935360]  kasan_atomics_helper+0x3e04/0x4858
[   35.935954]  kasan_atomics+0x198/0x2e8
[   35.936630]  kunit_try_run_case+0x14c/0x3d0
[   35.937343]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.938050]  kthread+0x24c/0x2d0
[   35.938701]  ret_from_fork+0x10/0x20
[   35.939224] 
[   35.939603] Allocated by task 254:
[   35.940085]  kasan_save_stack+0x3c/0x68
[   35.940768]  kasan_save_track+0x20/0x40
[   35.941318]  kasan_save_alloc_info+0x40/0x58
[   35.942130]  __kasan_kmalloc+0xd4/0xd8
[   35.942694]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.943374]  kasan_atomics+0xb8/0x2e8
[   35.943906]  kunit_try_run_case+0x14c/0x3d0
[   35.944489]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.945340]  kthread+0x24c/0x2d0
[   35.945858]  ret_from_fork+0x10/0x20
[   35.946511] 
[   35.946920] The buggy address belongs to the object at fff00000c594f180
[   35.946920]  which belongs to the cache kmalloc-64 of size 64
[   35.948245] The buggy address is located 0 bytes to the right of
[   35.948245]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   35.949664] 
[   35.950045] The buggy address belongs to the physical page:
[   35.950778] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   35.951772] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.952599] page_type: f5(slab)
[   35.953212] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.954185] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.955101] page dumped because: kasan: bad access detected
[   35.955743] 
[   35.956055] Memory state around the buggy address:
[   35.956691]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.957614]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.958479] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.959310]                                      ^
[   35.959958]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.960864]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.961734] ==================================================================
[   34.945024] ==================================================================
[   34.945962] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   34.946733] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   34.947706] 
[   34.948166] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   34.949275] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.950070] Hardware name: linux,dummy-virt (DT)
[   34.950691] Call trace:
[   34.951027]  show_stack+0x20/0x38 (C)
[   34.951708]  dump_stack_lvl+0x8c/0xd0
[   34.952393]  print_report+0x118/0x5e0
[   34.952951]  kasan_report+0xc8/0x118
[   34.953553]  kasan_check_range+0x100/0x1a8
[   34.954187]  __kasan_check_write+0x20/0x30
[   34.954912]  kasan_atomics_helper+0x414/0x4858
[   34.955458]  kasan_atomics+0x198/0x2e8
[   34.956154]  kunit_try_run_case+0x14c/0x3d0
[   34.956746]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.957528]  kthread+0x24c/0x2d0
[   34.958136]  ret_from_fork+0x10/0x20
[   34.958710] 
[   34.959049] Allocated by task 254:
[   34.959519]  kasan_save_stack+0x3c/0x68
[   34.960131]  kasan_save_track+0x20/0x40
[   34.960805]  kasan_save_alloc_info+0x40/0x58
[   34.961407]  __kasan_kmalloc+0xd4/0xd8
[   34.962008]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.962635]  kasan_atomics+0xb8/0x2e8
[   34.963105]  kunit_try_run_case+0x14c/0x3d0
[   34.963809]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.964455]  kthread+0x24c/0x2d0
[   34.965085]  ret_from_fork+0x10/0x20
[   34.965680] 
[   34.965996] The buggy address belongs to the object at fff00000c594f180
[   34.965996]  which belongs to the cache kmalloc-64 of size 64
[   34.967458] The buggy address is located 0 bytes to the right of
[   34.967458]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   34.968861] 
[   34.969205] The buggy address belongs to the physical page:
[   34.970062] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   34.971009] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.971868] page_type: f5(slab)
[   34.972346] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   34.973197] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   34.974191] page dumped because: kasan: bad access detected
[   34.974808] 
[   34.975146] Memory state around the buggy address:
[   34.975850]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.976675]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.977504] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   34.978410]                                      ^
[   34.979029]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.979962]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.980789] ==================================================================
[   35.334052] ==================================================================
[   35.334765] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   35.336267] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   35.337808] 
[   35.338123] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   35.339856] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.340562] Hardware name: linux,dummy-virt (DT)
[   35.341317] Call trace:
[   35.341746]  show_stack+0x20/0x38 (C)
[   35.342485]  dump_stack_lvl+0x8c/0xd0
[   35.343099]  print_report+0x118/0x5e0
[   35.343581]  kasan_report+0xc8/0x118
[   35.344419]  kasan_check_range+0x100/0x1a8
[   35.345241]  __kasan_check_write+0x20/0x30
[   35.345872]  kasan_atomics_helper+0x894/0x4858
[   35.346505]  kasan_atomics+0x198/0x2e8
[   35.347097]  kunit_try_run_case+0x14c/0x3d0
[   35.347745]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.348441]  kthread+0x24c/0x2d0
[   35.349023]  ret_from_fork+0x10/0x20
[   35.349668] 
[   35.350056] Allocated by task 254:
[   35.350641]  kasan_save_stack+0x3c/0x68
[   35.351152]  kasan_save_track+0x20/0x40
[   35.351870]  kasan_save_alloc_info+0x40/0x58
[   35.352535]  __kasan_kmalloc+0xd4/0xd8
[   35.353276]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.353892]  kasan_atomics+0xb8/0x2e8
[   35.354620]  kunit_try_run_case+0x14c/0x3d0
[   35.355154]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.355995]  kthread+0x24c/0x2d0
[   35.356528]  ret_from_fork+0x10/0x20
[   35.357103] 
[   35.357496] The buggy address belongs to the object at fff00000c594f180
[   35.357496]  which belongs to the cache kmalloc-64 of size 64
[   35.358842] The buggy address is located 0 bytes to the right of
[   35.358842]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   35.360296] 
[   35.360719] The buggy address belongs to the physical page:
[   35.361462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   35.362480] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.363295] page_type: f5(slab)
[   35.363942] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.364959] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.365863] page dumped because: kasan: bad access detected
[   35.366599] 
[   35.366984] Memory state around the buggy address:
[   35.367744]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.368610]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.369480] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.370355]                                      ^
[   35.370938]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.371864]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.372794] ==================================================================
[   35.492815] ==================================================================
[   35.493821] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   35.494864] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254
[   35.497020] 
[   35.497553] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   35.498972] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.499646] Hardware name: linux,dummy-virt (DT)
[   35.500464] Call trace:
[   35.501065]  show_stack+0x20/0x38 (C)
[   35.501869]  dump_stack_lvl+0x8c/0xd0
[   35.502531]  print_report+0x118/0x5e0
[   35.503043]  kasan_report+0xc8/0x118
[   35.503689]  kasan_check_range+0x100/0x1a8
[   35.504192]  __kasan_check_write+0x20/0x30
[   35.504903]  kasan_atomics_helper+0xa04/0x4858
[   35.505648]  kasan_atomics+0x198/0x2e8
[   35.506259]  kunit_try_run_case+0x14c/0x3d0
[   35.506847]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.507698]  kthread+0x24c/0x2d0
[   35.508211]  ret_from_fork+0x10/0x20
[   35.508837] 
[   35.509167] Allocated by task 254:
[   35.509734]  kasan_save_stack+0x3c/0x68
[   35.510230]  kasan_save_track+0x20/0x40
[   35.510883]  kasan_save_alloc_info+0x40/0x58
[   35.511612]  __kasan_kmalloc+0xd4/0xd8
[   35.512136]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.512923]  kasan_atomics+0xb8/0x2e8
[   35.513496]  kunit_try_run_case+0x14c/0x3d0
[   35.514073]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.514867]  kthread+0x24c/0x2d0
[   35.515402]  ret_from_fork+0x10/0x20
[   35.515936] 
[   35.516405] The buggy address belongs to the object at fff00000c594f180
[   35.516405]  which belongs to the cache kmalloc-64 of size 64
[   35.517792] The buggy address is located 0 bytes to the right of
[   35.517792]  allocated 48-byte region [fff00000c594f180, fff00000c594f1b0)
[   35.519084] 
[   35.519572] The buggy address belongs to the physical page:
[   35.520164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f
[   35.521230] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.522152] page_type: f5(slab)
[   35.522650] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.523653] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.524598] page dumped because: kasan: bad access detected
[   35.525279] 
[   35.525622] Memory state around the buggy address:
[   35.526366]  fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.527129]  fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.528051] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.529000]                                      ^
[   35.529674]  fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.530528]  fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.531433] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   34.488423] ==================================================================
[   34.489444] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8
[   34.490629] Read of size 8 at addr fff00000c5732788 by task kunit_try_catch/250
[   34.491744] 
[   34.492491] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   34.493885] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.494482] Hardware name: linux,dummy-virt (DT)
[   34.495134] Call trace:
[   34.495575]  show_stack+0x20/0x38 (C)
[   34.496140]  dump_stack_lvl+0x8c/0xd0
[   34.496728]  print_report+0x118/0x5e0
[   34.497255]  kasan_report+0xc8/0x118
[   34.497786]  __asan_report_load8_noabort+0x20/0x30
[   34.498723]  kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8
[   34.499584]  kasan_bitops_generic+0x11c/0x1c8
[   34.500356]  kunit_try_run_case+0x14c/0x3d0
[   34.501169]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.501913]  kthread+0x24c/0x2d0
[   34.502448]  ret_from_fork+0x10/0x20
[   34.502969] 
[   34.503300] Allocated by task 250:
[   34.504088]  kasan_save_stack+0x3c/0x68
[   34.504738]  kasan_save_track+0x20/0x40
[   34.505394]  kasan_save_alloc_info+0x40/0x58
[   34.506037]  __kasan_kmalloc+0xd4/0xd8
[   34.506623]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.507297]  kasan_bitops_generic+0xa0/0x1c8
[   34.507888]  kunit_try_run_case+0x14c/0x3d0
[   34.508566]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.509223]  kthread+0x24c/0x2d0
[   34.509824]  ret_from_fork+0x10/0x20
[   34.510469] 
[   34.510816] The buggy address belongs to the object at fff00000c5732780
[   34.510816]  which belongs to the cache kmalloc-16 of size 16
[   34.512160] The buggy address is located 8 bytes inside of
[   34.512160]  allocated 9-byte region [fff00000c5732780, fff00000c5732789)
[   34.513506] 
[   34.513943] The buggy address belongs to the physical page:
[   34.514649] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732
[   34.515604] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.516464] page_type: f5(slab)
[   34.516944] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.517964] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.518836] page dumped because: kasan: bad access detected
[   34.519552] 
[   34.519868] Memory state around the buggy address:
[   34.520525]  fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.521371]  fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   34.522243] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.523171]                       ^
[   34.523720]  fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.524754]  fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.525754] ==================================================================
[   34.449859] ==================================================================
[   34.450733] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[   34.451855] Write of size 8 at addr fff00000c5732788 by task kunit_try_catch/250
[   34.452866] 
[   34.453197] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   34.454440] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.455073] Hardware name: linux,dummy-virt (DT)
[   34.455624] Call trace:
[   34.456085]  show_stack+0x20/0x38 (C)
[   34.456686]  dump_stack_lvl+0x8c/0xd0
[   34.457377]  print_report+0x118/0x5e0
[   34.457901]  kasan_report+0xc8/0x118
[   34.458605]  kasan_check_range+0x100/0x1a8
[   34.459226]  __kasan_check_write+0x20/0x30
[   34.459937]  kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[   34.460853]  kasan_bitops_generic+0x11c/0x1c8
[   34.461557]  kunit_try_run_case+0x14c/0x3d0
[   34.462234]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.463008]  kthread+0x24c/0x2d0
[   34.463642]  ret_from_fork+0x10/0x20
[   34.464238] 
[   34.464627] Allocated by task 250:
[   34.465121]  kasan_save_stack+0x3c/0x68
[   34.465655]  kasan_save_track+0x20/0x40
[   34.466288]  kasan_save_alloc_info+0x40/0x58
[   34.466998]  __kasan_kmalloc+0xd4/0xd8
[   34.467599]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.468271]  kasan_bitops_generic+0xa0/0x1c8
[   34.468878]  kunit_try_run_case+0x14c/0x3d0
[   34.469589]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.470294]  kthread+0x24c/0x2d0
[   34.470808]  ret_from_fork+0x10/0x20
[   34.471347] 
[   34.471808] The buggy address belongs to the object at fff00000c5732780
[   34.471808]  which belongs to the cache kmalloc-16 of size 16
[   34.473227] The buggy address is located 8 bytes inside of
[   34.473227]  allocated 9-byte region [fff00000c5732780, fff00000c5732789)
[   34.474573] 
[   34.474904] The buggy address belongs to the physical page:
[   34.475601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732
[   34.476569] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.477395] page_type: f5(slab)
[   34.477978] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.478877] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.479828] page dumped because: kasan: bad access detected
[   34.480597] 
[   34.480925] Memory state around the buggy address:
[   34.481527]  fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.482566]  fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   34.483442] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.484282]                       ^
[   34.484917]  fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.485875]  fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.486738] ==================================================================
[   34.527835] ==================================================================
[   34.529003] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8
[   34.530670] Read of size 8 at addr fff00000c5732788 by task kunit_try_catch/250
[   34.531572] 
[   34.531987] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   34.533968] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.534261] Hardware name: linux,dummy-virt (DT)
[   34.534769] Call trace:
[   34.535289]  show_stack+0x20/0x38 (C)
[   34.535914]  dump_stack_lvl+0x8c/0xd0
[   34.536631]  print_report+0x118/0x5e0
[   34.537410]  kasan_report+0xc8/0x118
[   34.538008]  __asan_report_load8_noabort+0x20/0x30
[   34.538820]  kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8
[   34.539702]  kasan_bitops_generic+0x11c/0x1c8
[   34.540463]  kunit_try_run_case+0x14c/0x3d0
[   34.541182]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.542221]  kthread+0x24c/0x2d0
[   34.542817]  ret_from_fork+0x10/0x20
[   34.543526] 
[   34.543829] Allocated by task 250:
[   34.544488]  kasan_save_stack+0x3c/0x68
[   34.544967]  kasan_save_track+0x20/0x40
[   34.545601]  kasan_save_alloc_info+0x40/0x58
[   34.546289]  __kasan_kmalloc+0xd4/0xd8
[   34.546767]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.547667]  kasan_bitops_generic+0xa0/0x1c8
[   34.548473]  kunit_try_run_case+0x14c/0x3d0
[   34.549076]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.549796]  kthread+0x24c/0x2d0
[   34.550417]  ret_from_fork+0x10/0x20
[   34.551033] 
[   34.551450] The buggy address belongs to the object at fff00000c5732780
[   34.551450]  which belongs to the cache kmalloc-16 of size 16
[   34.552778] The buggy address is located 8 bytes inside of
[   34.552778]  allocated 9-byte region [fff00000c5732780, fff00000c5732789)
[   34.554105] 
[   34.554491] The buggy address belongs to the physical page:
[   34.555303] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732
[   34.556279] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.557129] page_type: f5(slab)
[   34.557613] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.558578] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.559552] page dumped because: kasan: bad access detected
[   34.560243] 
[   34.560563] Memory state around the buggy address:
[   34.561173]  fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.562070]  fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   34.562977] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.563801]                       ^
[   34.564376]  fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.565144]  fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.566004] ==================================================================
[   34.253865] ==================================================================
[   34.254716] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8
[   34.256158] Read of size 8 at addr fff00000c5732788 by task kunit_try_catch/250
[   34.256974] 
[   34.257404] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   34.258662] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.259190] Hardware name: linux,dummy-virt (DT)
[   34.259958] Call trace:
[   34.260374]  show_stack+0x20/0x38 (C)
[   34.260908]  dump_stack_lvl+0x8c/0xd0
[   34.261531]  print_report+0x118/0x5e0
[   34.262212]  kasan_report+0xc8/0x118
[   34.262880]  __asan_report_load8_noabort+0x20/0x30
[   34.263616]  kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8
[   34.264354]  kasan_bitops_generic+0x11c/0x1c8
[   34.264975]  kunit_try_run_case+0x14c/0x3d0
[   34.265670]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.266515]  kthread+0x24c/0x2d0
[   34.267111]  ret_from_fork+0x10/0x20
[   34.267725] 
[   34.268101] Allocated by task 250:
[   34.268599]  kasan_save_stack+0x3c/0x68
[   34.269282]  kasan_save_track+0x20/0x40
[   34.269965]  kasan_save_alloc_info+0x40/0x58
[   34.270616]  __kasan_kmalloc+0xd4/0xd8
[   34.271251]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.271921]  kasan_bitops_generic+0xa0/0x1c8
[   34.272600]  kunit_try_run_case+0x14c/0x3d0
[   34.273232]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.274017]  kthread+0x24c/0x2d0
[   34.274564]  ret_from_fork+0x10/0x20
[   34.275059] 
[   34.275463] The buggy address belongs to the object at fff00000c5732780
[   34.275463]  which belongs to the cache kmalloc-16 of size 16
[   34.276832] The buggy address is located 8 bytes inside of
[   34.276832]  allocated 9-byte region [fff00000c5732780, fff00000c5732789)
[   34.278283] 
[   34.278629] The buggy address belongs to the physical page:
[   34.279437] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732
[   34.280350] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.281238] page_type: f5(slab)
[   34.281740] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.282769] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.283764] page dumped because: kasan: bad access detected
[   34.284593] 
[   34.284884] Memory state around the buggy address:
[   34.285529]  fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.286468]  fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   34.287357] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.288205]                       ^
[   34.288674]  fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.289593]  fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.290574] ==================================================================
[   34.293601] ==================================================================
[   34.294646] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[   34.296758] Write of size 8 at addr fff00000c5732788 by task kunit_try_catch/250
[   34.297320] 
[   34.298067] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   34.299455] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.299977] Hardware name: linux,dummy-virt (DT)
[   34.300727] Call trace:
[   34.301075]  show_stack+0x20/0x38 (C)
[   34.301847]  dump_stack_lvl+0x8c/0xd0
[   34.302433]  print_report+0x118/0x5e0
[   34.302998]  kasan_report+0xc8/0x118
[   34.303618]  kasan_check_range+0x100/0x1a8
[   34.304215]  __kasan_check_write+0x20/0x30
[   34.304868]  kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[   34.305721]  kasan_bitops_generic+0x11c/0x1c8
[   34.306308]  kunit_try_run_case+0x14c/0x3d0
[   34.306961]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.307927]  kthread+0x24c/0x2d0
[   34.308463]  ret_from_fork+0x10/0x20
[   34.309115] 
[   34.309571] Allocated by task 250:
[   34.310281]  kasan_save_stack+0x3c/0x68
[   34.310870]  kasan_save_track+0x20/0x40
[   34.311528]  kasan_save_alloc_info+0x40/0x58
[   34.312141]  __kasan_kmalloc+0xd4/0xd8
[   34.312700]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.313233]  kasan_bitops_generic+0xa0/0x1c8
[   34.313963]  kunit_try_run_case+0x14c/0x3d0
[   34.314549]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.315232]  kthread+0x24c/0x2d0
[   34.315747]  ret_from_fork+0x10/0x20
[   34.316301] 
[   34.316608] The buggy address belongs to the object at fff00000c5732780
[   34.316608]  which belongs to the cache kmalloc-16 of size 16
[   34.317996] The buggy address is located 8 bytes inside of
[   34.317996]  allocated 9-byte region [fff00000c5732780, fff00000c5732789)
[   34.319406] 
[   34.319735] The buggy address belongs to the physical page:
[   34.320510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732
[   34.321527] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.322418] page_type: f5(slab)
[   34.322973] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.324346] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.325226] page dumped because: kasan: bad access detected
[   34.325933] 
[   34.326243] Memory state around the buggy address:
[   34.326883]  fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.327827]  fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   34.328691] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.329669]                       ^
[   34.330187]  fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.331093]  fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.332011] ==================================================================
[   34.333586] ==================================================================
[   34.334273] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8
[   34.335514] Read of size 8 at addr fff00000c5732788 by task kunit_try_catch/250
[   34.336417] 
[   34.336777] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   34.338098] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.338698] Hardware name: linux,dummy-virt (DT)
[   34.339287] Call trace:
[   34.339851]  show_stack+0x20/0x38 (C)
[   34.340436]  dump_stack_lvl+0x8c/0xd0
[   34.341140]  print_report+0x118/0x5e0
[   34.341732]  kasan_report+0xc8/0x118
[   34.342365]  __asan_report_load8_noabort+0x20/0x30
[   34.343223]  kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8
[   34.344104]  kasan_bitops_generic+0x11c/0x1c8
[   34.344751]  kunit_try_run_case+0x14c/0x3d0
[   34.345394]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.346140]  kthread+0x24c/0x2d0
[   34.346669]  ret_from_fork+0x10/0x20
[   34.347207] 
[   34.347696] Allocated by task 250:
[   34.348238]  kasan_save_stack+0x3c/0x68
[   34.348764]  kasan_save_track+0x20/0x40
[   34.349522]  kasan_save_alloc_info+0x40/0x58
[   34.350229]  __kasan_kmalloc+0xd4/0xd8
[   34.350915]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.351536]  kasan_bitops_generic+0xa0/0x1c8
[   34.352216]  kunit_try_run_case+0x14c/0x3d0
[   34.352814]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.353609]  kthread+0x24c/0x2d0
[   34.354220]  ret_from_fork+0x10/0x20
[   34.354789] 
[   34.355076] The buggy address belongs to the object at fff00000c5732780
[   34.355076]  which belongs to the cache kmalloc-16 of size 16
[   34.356527] The buggy address is located 8 bytes inside of
[   34.356527]  allocated 9-byte region [fff00000c5732780, fff00000c5732789)
[   34.357926] 
[   34.358351] The buggy address belongs to the physical page:
[   34.359016] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732
[   34.360043] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.360863] page_type: f5(slab)
[   34.361344] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.362359] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.363259] page dumped because: kasan: bad access detected
[   34.364024] 
[   34.364396] Memory state around the buggy address:
[   34.365008]  fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.365996]  fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   34.366822] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.367675]                       ^
[   34.368205]  fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.369120]  fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.370003] ==================================================================
[   34.410450] ==================================================================
[   34.411270] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8
[   34.412225] Read of size 8 at addr fff00000c5732788 by task kunit_try_catch/250
[   34.414170] 
[   34.414513] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   34.416160] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.416734] Hardware name: linux,dummy-virt (DT)
[   34.417361] Call trace:
[   34.417813]  show_stack+0x20/0x38 (C)
[   34.418469]  dump_stack_lvl+0x8c/0xd0
[   34.418946]  print_report+0x118/0x5e0
[   34.419690]  kasan_report+0xc8/0x118
[   34.420378]  __asan_report_load8_noabort+0x20/0x30
[   34.421007]  kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8
[   34.421808]  kasan_bitops_generic+0x11c/0x1c8
[   34.422508]  kunit_try_run_case+0x14c/0x3d0
[   34.423123]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.423835]  kthread+0x24c/0x2d0
[   34.424526]  ret_from_fork+0x10/0x20
[   34.425168] 
[   34.425534] Allocated by task 250:
[   34.426156]  kasan_save_stack+0x3c/0x68
[   34.426684]  kasan_save_track+0x20/0x40
[   34.427308]  kasan_save_alloc_info+0x40/0x58
[   34.427948]  __kasan_kmalloc+0xd4/0xd8
[   34.428544]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.429206]  kasan_bitops_generic+0xa0/0x1c8
[   34.429730]  kunit_try_run_case+0x14c/0x3d0
[   34.430452]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.431057]  kthread+0x24c/0x2d0
[   34.431667]  ret_from_fork+0x10/0x20
[   34.432394] 
[   34.432707] The buggy address belongs to the object at fff00000c5732780
[   34.432707]  which belongs to the cache kmalloc-16 of size 16
[   34.434186] The buggy address is located 8 bytes inside of
[   34.434186]  allocated 9-byte region [fff00000c5732780, fff00000c5732789)
[   34.435615] 
[   34.435901] The buggy address belongs to the physical page:
[   34.436728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732
[   34.437633] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.438512] page_type: f5(slab)
[   34.439092] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.440030] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.441042] page dumped because: kasan: bad access detected
[   34.441805] 
[   34.442160] Memory state around the buggy address:
[   34.442829]  fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.443677]  fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   34.444604] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.445555]                       ^
[   34.446052]  fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.446944]  fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.447870] ==================================================================
[   34.215604] ==================================================================
[   34.216504] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[   34.217437] Write of size 8 at addr fff00000c5732788 by task kunit_try_catch/250
[   34.218834] 
[   34.219368] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   34.220565] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.221100] Hardware name: linux,dummy-virt (DT)
[   34.221689] Call trace:
[   34.222160]  show_stack+0x20/0x38 (C)
[   34.222736]  dump_stack_lvl+0x8c/0xd0
[   34.223285]  print_report+0x118/0x5e0
[   34.223938]  kasan_report+0xc8/0x118
[   34.224539]  kasan_check_range+0x100/0x1a8
[   34.225107]  __kasan_check_write+0x20/0x30
[   34.225805]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[   34.226597]  kasan_bitops_generic+0x11c/0x1c8
[   34.227220]  kunit_try_run_case+0x14c/0x3d0
[   34.227934]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.228770]  kthread+0x24c/0x2d0
[   34.229362]  ret_from_fork+0x10/0x20
[   34.229994] 
[   34.230379] Allocated by task 250:
[   34.230925]  kasan_save_stack+0x3c/0x68
[   34.231478]  kasan_save_track+0x20/0x40
[   34.232044]  kasan_save_alloc_info+0x40/0x58
[   34.232721]  __kasan_kmalloc+0xd4/0xd8
[   34.233285]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.233935]  kasan_bitops_generic+0xa0/0x1c8
[   34.234568]  kunit_try_run_case+0x14c/0x3d0
[   34.235154]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.235824]  kthread+0x24c/0x2d0
[   34.236399]  ret_from_fork+0x10/0x20
[   34.236949] 
[   34.237257] The buggy address belongs to the object at fff00000c5732780
[   34.237257]  which belongs to the cache kmalloc-16 of size 16
[   34.238816] The buggy address is located 8 bytes inside of
[   34.238816]  allocated 9-byte region [fff00000c5732780, fff00000c5732789)
[   34.240092] 
[   34.240414] The buggy address belongs to the physical page:
[   34.241175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732
[   34.242252] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.243028] page_type: f5(slab)
[   34.243661] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.244703] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.245703] page dumped because: kasan: bad access detected
[   34.246402] 
[   34.246727] Memory state around the buggy address:
[   34.247348]  fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.248168]  fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   34.249056] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.249987]                       ^
[   34.250466]  fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.251361]  fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.252231] ==================================================================
[   34.372222] ==================================================================
[   34.373049] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[   34.374051] Write of size 8 at addr fff00000c5732788 by task kunit_try_catch/250
[   34.374905] 
[   34.375269] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   34.376549] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.377101] Hardware name: linux,dummy-virt (DT)
[   34.377750] Call trace:
[   34.378239]  show_stack+0x20/0x38 (C)
[   34.378796]  dump_stack_lvl+0x8c/0xd0
[   34.379464]  print_report+0x118/0x5e0
[   34.380034]  kasan_report+0xc8/0x118
[   34.380627]  kasan_check_range+0x100/0x1a8
[   34.381258]  __kasan_check_write+0x20/0x30
[   34.382007]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[   34.382906]  kasan_bitops_generic+0x11c/0x1c8
[   34.383535]  kunit_try_run_case+0x14c/0x3d0
[   34.384121]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.384896]  kthread+0x24c/0x2d0
[   34.385438]  ret_from_fork+0x10/0x20
[   34.386113] 
[   34.386447] Allocated by task 250:
[   34.386969]  kasan_save_stack+0x3c/0x68
[   34.387695]  kasan_save_track+0x20/0x40
[   34.388119]  kasan_save_alloc_info+0x40/0x58
[   34.388867]  __kasan_kmalloc+0xd4/0xd8
[   34.389416]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.390164]  kasan_bitops_generic+0xa0/0x1c8
[   34.390720]  kunit_try_run_case+0x14c/0x3d0
[   34.391443]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.392104]  kthread+0x24c/0x2d0
[   34.392705]  ret_from_fork+0x10/0x20
[   34.393207] 
[   34.393567] The buggy address belongs to the object at fff00000c5732780
[   34.393567]  which belongs to the cache kmalloc-16 of size 16
[   34.394958] The buggy address is located 8 bytes inside of
[   34.394958]  allocated 9-byte region [fff00000c5732780, fff00000c5732789)
[   34.396230] 
[   34.396564] The buggy address belongs to the physical page:
[   34.397195] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732
[   34.398168] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.399099] page_type: f5(slab)
[   34.399588] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.400613] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.401494] page dumped because: kasan: bad access detected
[   34.402253] 
[   34.402588] Memory state around the buggy address:
[   34.403200]  fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.404096]  fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   34.405005] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.405843]                       ^
[   34.406359]  fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.407266]  fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.408131] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[   33.798524] ==================================================================
[   33.799213] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[   33.800656] Read of size 8 at addr fff00000c5732788 by task kunit_try_catch/250
[   33.802765] 
[   33.804074] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   33.805553] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.806058] Hardware name: linux,dummy-virt (DT)
[   33.806811] Call trace:
[   33.807695]  show_stack+0x20/0x38 (C)
[   33.808262]  dump_stack_lvl+0x8c/0xd0
[   33.808771]  print_report+0x118/0x5e0
[   33.810417]  kasan_report+0xc8/0x118
[   33.810908]  __asan_report_load8_noabort+0x20/0x30
[   33.811639]  kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[   33.812303]  kasan_bitops_generic+0x110/0x1c8
[   33.812929]  kunit_try_run_case+0x14c/0x3d0
[   33.813953]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.814743]  kthread+0x24c/0x2d0
[   33.816118]  ret_from_fork+0x10/0x20
[   33.816781] 
[   33.817157] Allocated by task 250:
[   33.817709]  kasan_save_stack+0x3c/0x68
[   33.818259]  kasan_save_track+0x20/0x40
[   33.819441]  kasan_save_alloc_info+0x40/0x58
[   33.820103]  __kasan_kmalloc+0xd4/0xd8
[   33.820649]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.821279]  kasan_bitops_generic+0xa0/0x1c8
[   33.821939]  kunit_try_run_case+0x14c/0x3d0
[   33.822587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.823848]  kthread+0x24c/0x2d0
[   33.824420]  ret_from_fork+0x10/0x20
[   33.824892] 
[   33.825244] The buggy address belongs to the object at fff00000c5732780
[   33.825244]  which belongs to the cache kmalloc-16 of size 16
[   33.827595] The buggy address is located 8 bytes inside of
[   33.827595]  allocated 9-byte region [fff00000c5732780, fff00000c5732789)
[   33.828908] 
[   33.829193] The buggy address belongs to the physical page:
[   33.830134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732
[   33.831118] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.832445] page_type: f5(slab)
[   33.833149] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.834221] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   33.835352] page dumped because: kasan: bad access detected
[   33.836283] 
[   33.836672] Memory state around the buggy address:
[   33.837290]  fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.838146]  fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   33.839572] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.840903]                       ^
[   33.841415]  fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.842244]  fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.843075] ==================================================================
[   34.124449] ==================================================================
[   34.125086] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[   34.125950] Write of size 8 at addr fff00000c5732788 by task kunit_try_catch/250
[   34.126895] 
[   34.127226] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   34.128481] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.129185] Hardware name: linux,dummy-virt (DT)
[   34.130371] Call trace:
[   34.130781]  show_stack+0x20/0x38 (C)
[   34.131318]  dump_stack_lvl+0x8c/0xd0
[   34.131987]  print_report+0x118/0x5e0
[   34.133243]  kasan_report+0xc8/0x118
[   34.133915]  kasan_check_range+0x100/0x1a8
[   34.134663]  __kasan_check_write+0x20/0x30
[   34.135759]  kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[   34.136536]  kasan_bitops_generic+0x110/0x1c8
[   34.137359]  kunit_try_run_case+0x14c/0x3d0
[   34.138080]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.138806]  kthread+0x24c/0x2d0
[   34.140160]  ret_from_fork+0x10/0x20
[   34.140759] 
[   34.141115] Allocated by task 250:
[   34.141701]  kasan_save_stack+0x3c/0x68
[   34.142174]  kasan_save_track+0x20/0x40
[   34.142894]  kasan_save_alloc_info+0x40/0x58
[   34.143608]  __kasan_kmalloc+0xd4/0xd8
[   34.144292]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.145744]  kasan_bitops_generic+0xa0/0x1c8
[   34.146366]  kunit_try_run_case+0x14c/0x3d0
[   34.146942]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.147742]  kthread+0x24c/0x2d0
[   34.148349]  ret_from_fork+0x10/0x20
[   34.148822] 
[   34.149203] The buggy address belongs to the object at fff00000c5732780
[   34.149203]  which belongs to the cache kmalloc-16 of size 16
[   34.150949] The buggy address is located 8 bytes inside of
[   34.150949]  allocated 9-byte region [fff00000c5732780, fff00000c5732789)
[   34.152299] 
[   34.154098] The buggy address belongs to the physical page:
[   34.155538] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732
[   34.156630] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.157681] page_type: f5(slab)
[   34.158208] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.159196] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.160072] page dumped because: kasan: bad access detected
[   34.162238] 
[   34.162582] Memory state around the buggy address:
[   34.163239]  fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.164936]  fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   34.165790] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.166828]                       ^
[   34.168093]  fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.168915]  fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.169878] ==================================================================
[   33.891382] ==================================================================
[   33.892192] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8
[   33.894398] Read of size 8 at addr fff00000c5732788 by task kunit_try_catch/250
[   33.895486] 
[   33.895849] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   33.897033] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.897804] Hardware name: linux,dummy-virt (DT)
[   33.898471] Call trace:
[   33.898879]  show_stack+0x20/0x38 (C)
[   33.899653]  dump_stack_lvl+0x8c/0xd0
[   33.900343]  print_report+0x118/0x5e0
[   33.900804]  kasan_report+0xc8/0x118
[   33.902170]  __asan_report_load8_noabort+0x20/0x30
[   33.902822]  kasan_bitops_modify.constprop.0+0xa88/0xbc8
[   33.903932]  kasan_bitops_generic+0x110/0x1c8
[   33.904598]  kunit_try_run_case+0x14c/0x3d0
[   33.905234]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.905947]  kthread+0x24c/0x2d0
[   33.906584]  ret_from_fork+0x10/0x20
[   33.908030] 
[   33.908484] Allocated by task 250:
[   33.908750]  kasan_save_stack+0x3c/0x68
[   33.909049]  kasan_save_track+0x20/0x40
[   33.909359]  kasan_save_alloc_info+0x40/0x58
[   33.910702]  __kasan_kmalloc+0xd4/0xd8
[   33.911813]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.912408]  kasan_bitops_generic+0xa0/0x1c8
[   33.912727]  kunit_try_run_case+0x14c/0x3d0
[   33.913033]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.913498]  kthread+0x24c/0x2d0
[   33.914118]  ret_from_fork+0x10/0x20
[   33.915473] 
[   33.915872] The buggy address belongs to the object at fff00000c5732780
[   33.915872]  which belongs to the cache kmalloc-16 of size 16
[   33.917522] The buggy address is located 8 bytes inside of
[   33.917522]  allocated 9-byte region [fff00000c5732780, fff00000c5732789)
[   33.919463] 
[   33.919871] The buggy address belongs to the physical page:
[   33.920761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732
[   33.922763] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.924172] page_type: f5(slab)
[   33.925593] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.926665] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   33.928002] page dumped because: kasan: bad access detected
[   33.928858] 
[   33.929224] Memory state around the buggy address:
[   33.929909]  fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.930863]  fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   33.931892] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.933109]                       ^
[   33.933625]  fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.935362]  fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.936557] ==================================================================
[   33.846763] ==================================================================
[   33.847815] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[   33.848757] Write of size 8 at addr fff00000c5732788 by task kunit_try_catch/250
[   33.850168] 
[   33.850717] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   33.851991] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.852648] Hardware name: linux,dummy-virt (DT)
[   33.853269] Call trace:
[   33.854094]  show_stack+0x20/0x38 (C)
[   33.854737]  dump_stack_lvl+0x8c/0xd0
[   33.855465]  print_report+0x118/0x5e0
[   33.856870]  kasan_report+0xc8/0x118
[   33.857388]  kasan_check_range+0x100/0x1a8
[   33.858059]  __kasan_check_write+0x20/0x30
[   33.858741]  kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[   33.860044]  kasan_bitops_generic+0x110/0x1c8
[   33.860711]  kunit_try_run_case+0x14c/0x3d0
[   33.861316]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.862167]  kthread+0x24c/0x2d0
[   33.862789]  ret_from_fork+0x10/0x20
[   33.863633] 
[   33.864003] Allocated by task 250:
[   33.864510]  kasan_save_stack+0x3c/0x68
[   33.865070]  kasan_save_track+0x20/0x40
[   33.866168]  kasan_save_alloc_info+0x40/0x58
[   33.866818]  __kasan_kmalloc+0xd4/0xd8
[   33.868078]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.868884]  kasan_bitops_generic+0xa0/0x1c8
[   33.869658]  kunit_try_run_case+0x14c/0x3d0
[   33.870244]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.871043]  kthread+0x24c/0x2d0
[   33.871778]  ret_from_fork+0x10/0x20
[   33.872415] 
[   33.872662] The buggy address belongs to the object at fff00000c5732780
[   33.872662]  which belongs to the cache kmalloc-16 of size 16
[   33.874297] The buggy address is located 8 bytes inside of
[   33.874297]  allocated 9-byte region [fff00000c5732780, fff00000c5732789)
[   33.876160] 
[   33.876625] The buggy address belongs to the physical page:
[   33.877354] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732
[   33.878538] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.879766] page_type: f5(slab)
[   33.880362] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.881392] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   33.882276] page dumped because: kasan: bad access detected
[   33.882959] 
[   33.884269] Memory state around the buggy address:
[   33.884803]  fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.885690]  fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   33.886627] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.887742]                       ^
[   33.888250]  fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.889213]  fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.890118] ==================================================================
[   34.075793] ==================================================================
[   34.076422] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc8
[   34.077754] Write of size 8 at addr fff00000c5732788 by task kunit_try_catch/250
[   34.079182] 
[   34.079928] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   34.081356] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.082001] Hardware name: linux,dummy-virt (DT)
[   34.082641] Call trace:
[   34.083021]  show_stack+0x20/0x38 (C)
[   34.084073]  dump_stack_lvl+0x8c/0xd0
[   34.085219]  print_report+0x118/0x5e0
[   34.085786]  kasan_report+0xc8/0x118
[   34.086301]  kasan_check_range+0x100/0x1a8
[   34.087007]  __kasan_check_write+0x20/0x30
[   34.087645]  kasan_bitops_modify.constprop.0+0x344/0xbc8
[   34.088684]  kasan_bitops_generic+0x110/0x1c8
[   34.089198]  kunit_try_run_case+0x14c/0x3d0
[   34.089936]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.090924]  kthread+0x24c/0x2d0
[   34.091945]  ret_from_fork+0x10/0x20
[   34.092600] 
[   34.092923] Allocated by task 250:
[   34.093986]  kasan_save_stack+0x3c/0x68
[   34.094527]  kasan_save_track+0x20/0x40
[   34.095043]  kasan_save_alloc_info+0x40/0x58
[   34.095764]  __kasan_kmalloc+0xd4/0xd8
[   34.096242]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.097017]  kasan_bitops_generic+0xa0/0x1c8
[   34.097817]  kunit_try_run_case+0x14c/0x3d0
[   34.098517]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.099268]  kthread+0x24c/0x2d0
[   34.099805]  ret_from_fork+0x10/0x20
[   34.100818] 
[   34.101315] The buggy address belongs to the object at fff00000c5732780
[   34.101315]  which belongs to the cache kmalloc-16 of size 16
[   34.102629] The buggy address is located 8 bytes inside of
[   34.102629]  allocated 9-byte region [fff00000c5732780, fff00000c5732789)
[   34.105096] 
[   34.106139] The buggy address belongs to the physical page:
[   34.108897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732
[   34.110650] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.111833] page_type: f5(slab)
[   34.112620] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.113566] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.114472] page dumped because: kasan: bad access detected
[   34.115125] 
[   34.115919] Memory state around the buggy address:
[   34.116477]  fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.117292]  fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   34.118684] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.119312]                       ^
[   34.119888]  fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.120775]  fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.121402] ==================================================================
[   33.754615] ==================================================================
[   33.756426] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8
[   33.757977] Write of size 8 at addr fff00000c5732788 by task kunit_try_catch/250
[   33.759366] 
[   33.759718] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   33.761068] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.761881] Hardware name: linux,dummy-virt (DT)
[   33.762468] Call trace:
[   33.762887]  show_stack+0x20/0x38 (C)
[   33.763905]  dump_stack_lvl+0x8c/0xd0
[   33.764499]  print_report+0x118/0x5e0
[   33.765177]  kasan_report+0xc8/0x118
[   33.765670]  kasan_check_range+0x100/0x1a8
[   33.766436]  __kasan_check_write+0x20/0x30
[   33.767734]  kasan_bitops_modify.constprop.0+0x100/0xbc8
[   33.768462]  kasan_bitops_generic+0x110/0x1c8
[   33.769127]  kunit_try_run_case+0x14c/0x3d0
[   33.769752]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.770543]  kthread+0x24c/0x2d0
[   33.771090]  ret_from_fork+0x10/0x20
[   33.772006] 
[   33.772365] Allocated by task 250:
[   33.773110]  kasan_save_stack+0x3c/0x68
[   33.773818]  kasan_save_track+0x20/0x40
[   33.774562]  kasan_save_alloc_info+0x40/0x58
[   33.775146]  __kasan_kmalloc+0xd4/0xd8
[   33.775741]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.776413]  kasan_bitops_generic+0xa0/0x1c8
[   33.777016]  kunit_try_run_case+0x14c/0x3d0
[   33.777677]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.778510]  kthread+0x24c/0x2d0
[   33.779062]  ret_from_fork+0x10/0x20
[   33.779573] 
[   33.780018] The buggy address belongs to the object at fff00000c5732780
[   33.780018]  which belongs to the cache kmalloc-16 of size 16
[   33.781426] The buggy address is located 8 bytes inside of
[   33.781426]  allocated 9-byte region [fff00000c5732780, fff00000c5732789)
[   33.782866] 
[   33.783583] The buggy address belongs to the physical page:
[   33.784271] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732
[   33.785258] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.786100] page_type: f5(slab)
[   33.786681] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.788448] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   33.789512] page dumped because: kasan: bad access detected
[   33.790158] 
[   33.790522] Memory state around the buggy address:
[   33.791213]  fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.792036]  fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   33.793371] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.794303]                       ^
[   33.794846]  fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.796049]  fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.796868] ==================================================================
[   34.032268] ==================================================================
[   34.032932] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[   34.034187] Read of size 8 at addr fff00000c5732788 by task kunit_try_catch/250
[   34.035347] 
[   34.036623] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   34.038291] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.039185] Hardware name: linux,dummy-virt (DT)
[   34.039981] Call trace:
[   34.040576]  show_stack+0x20/0x38 (C)
[   34.041229]  dump_stack_lvl+0x8c/0xd0
[   34.041876]  print_report+0x118/0x5e0
[   34.042437]  kasan_report+0xc8/0x118
[   34.043412]  __asan_report_load8_noabort+0x20/0x30
[   34.044159]  kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[   34.044892]  kasan_bitops_generic+0x110/0x1c8
[   34.045971]  kunit_try_run_case+0x14c/0x3d0
[   34.046623]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.048007]  kthread+0x24c/0x2d0
[   34.048516]  ret_from_fork+0x10/0x20
[   34.049107] 
[   34.049448] Allocated by task 250:
[   34.050118]  kasan_save_stack+0x3c/0x68
[   34.050696]  kasan_save_track+0x20/0x40
[   34.051458]  kasan_save_alloc_info+0x40/0x58
[   34.051886]  __kasan_kmalloc+0xd4/0xd8
[   34.053114]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.054165]  kasan_bitops_generic+0xa0/0x1c8
[   34.054809]  kunit_try_run_case+0x14c/0x3d0
[   34.055660]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.056587]  kthread+0x24c/0x2d0
[   34.056865]  ret_from_fork+0x10/0x20
[   34.057167] 
[   34.057379] The buggy address belongs to the object at fff00000c5732780
[   34.057379]  which belongs to the cache kmalloc-16 of size 16
[   34.058070] The buggy address is located 8 bytes inside of
[   34.058070]  allocated 9-byte region [fff00000c5732780, fff00000c5732789)
[   34.058748] 
[   34.058928] The buggy address belongs to the physical page:
[   34.060533] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732
[   34.061503] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.062147] page_type: f5(slab)
[   34.062820] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.064809] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.065678] page dumped because: kasan: bad access detected
[   34.066612] 
[   34.067290] Memory state around the buggy address:
[   34.068590]  fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.069785]  fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   34.070716] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.071858]                       ^
[   34.072559]  fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.073293]  fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.074172] ==================================================================
[   33.987497] ==================================================================
[   33.988440] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc8
[   33.989465] Write of size 8 at addr fff00000c5732788 by task kunit_try_catch/250
[   33.990460] 
[   33.990874] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   33.992713] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.993400] Hardware name: linux,dummy-virt (DT)
[   33.994246] Call trace:
[   33.994763]  show_stack+0x20/0x38 (C)
[   33.996080]  dump_stack_lvl+0x8c/0xd0
[   33.996640]  print_report+0x118/0x5e0
[   33.997358]  kasan_report+0xc8/0x118
[   33.997957]  kasan_check_range+0x100/0x1a8
[   33.998614]  __kasan_check_write+0x20/0x30
[   33.999317]  kasan_bitops_modify.constprop.0+0x320/0xbc8
[   34.000091]  kasan_bitops_generic+0x110/0x1c8
[   34.000745]  kunit_try_run_case+0x14c/0x3d0
[   34.001728]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.002531]  kthread+0x24c/0x2d0
[   34.003790]  ret_from_fork+0x10/0x20
[   34.004353] 
[   34.004651] Allocated by task 250:
[   34.005114]  kasan_save_stack+0x3c/0x68
[   34.005841]  kasan_save_track+0x20/0x40
[   34.006398]  kasan_save_alloc_info+0x40/0x58
[   34.007472]  __kasan_kmalloc+0xd4/0xd8
[   34.007987]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.008658]  kasan_bitops_generic+0xa0/0x1c8
[   34.009315]  kunit_try_run_case+0x14c/0x3d0
[   34.009946]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.010646]  kthread+0x24c/0x2d0
[   34.011798]  ret_from_fork+0x10/0x20
[   34.012440] 
[   34.012779] The buggy address belongs to the object at fff00000c5732780
[   34.012779]  which belongs to the cache kmalloc-16 of size 16
[   34.014376] The buggy address is located 8 bytes inside of
[   34.014376]  allocated 9-byte region [fff00000c5732780, fff00000c5732789)
[   34.015936] 
[   34.016306] The buggy address belongs to the physical page:
[   34.017078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732
[   34.018366] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.019291] page_type: f5(slab)
[   34.019800] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.021776] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.022935] page dumped because: kasan: bad access detected
[   34.023691] 
[   34.024021] Memory state around the buggy address:
[   34.025275]  fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.026238]  fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   34.027455] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.028358]                       ^
[   34.028831]  fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.029586]  fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.030538] ==================================================================
[   34.173887] ==================================================================
[   34.174734] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8
[   34.175936] Read of size 8 at addr fff00000c5732788 by task kunit_try_catch/250
[   34.176665] 
[   34.177023] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   34.179322] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.179901] Hardware name: linux,dummy-virt (DT)
[   34.180518] Call trace:
[   34.180994]  show_stack+0x20/0x38 (C)
[   34.181689]  dump_stack_lvl+0x8c/0xd0
[   34.182179]  print_report+0x118/0x5e0
[   34.182885]  kasan_report+0xc8/0x118
[   34.183478]  __asan_report_load8_noabort+0x20/0x30
[   34.184185]  kasan_bitops_modify.constprop.0+0xa28/0xbc8
[   34.184925]  kasan_bitops_generic+0x110/0x1c8
[   34.185558]  kunit_try_run_case+0x14c/0x3d0
[   34.186231]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.187138]  kthread+0x24c/0x2d0
[   34.187714]  ret_from_fork+0x10/0x20
[   34.188296] 
[   34.188602] Allocated by task 250:
[   34.189173]  kasan_save_stack+0x3c/0x68
[   34.189784]  kasan_save_track+0x20/0x40
[   34.190587]  kasan_save_alloc_info+0x40/0x58
[   34.191251]  __kasan_kmalloc+0xd4/0xd8
[   34.192021]  __kmalloc_cache_noprof+0x15c/0x3c0
[   34.192661]  kasan_bitops_generic+0xa0/0x1c8
[   34.193347]  kunit_try_run_case+0x14c/0x3d0
[   34.193870]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.194686]  kthread+0x24c/0x2d0
[   34.195250]  ret_from_fork+0x10/0x20
[   34.195820] 
[   34.196192] The buggy address belongs to the object at fff00000c5732780
[   34.196192]  which belongs to the cache kmalloc-16 of size 16
[   34.197599] The buggy address is located 8 bytes inside of
[   34.197599]  allocated 9-byte region [fff00000c5732780, fff00000c5732789)
[   34.199052] 
[   34.199353] The buggy address belongs to the physical page:
[   34.200007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732
[   34.201230] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.202210] page_type: f5(slab)
[   34.202878] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   34.203777] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   34.204885] page dumped because: kasan: bad access detected
[   34.205887] 
[   34.206420] Memory state around the buggy address:
[   34.207285]  fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   34.208526]  fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   34.209537] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.210441]                       ^
[   34.210931]  fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.211923]  fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.212789] ==================================================================
[   33.938160] ==================================================================
[   33.938911] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[   33.941175] Write of size 8 at addr fff00000c5732788 by task kunit_try_catch/250
[   33.942297] 
[   33.942749] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   33.944955] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.945590] Hardware name: linux,dummy-virt (DT)
[   33.945982] Call trace:
[   33.946201]  show_stack+0x20/0x38 (C)
[   33.946940]  dump_stack_lvl+0x8c/0xd0
[   33.947859]  print_report+0x118/0x5e0
[   33.948767]  kasan_report+0xc8/0x118
[   33.949561]  kasan_check_range+0x100/0x1a8
[   33.950429]  __kasan_check_write+0x20/0x30
[   33.951533]  kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[   33.952758]  kasan_bitops_generic+0x110/0x1c8
[   33.953363]  kunit_try_run_case+0x14c/0x3d0
[   33.954033]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.954873]  kthread+0x24c/0x2d0
[   33.955448]  ret_from_fork+0x10/0x20
[   33.956065] 
[   33.956449] Allocated by task 250:
[   33.956955]  kasan_save_stack+0x3c/0x68
[   33.958509]  kasan_save_track+0x20/0x40
[   33.959002]  kasan_save_alloc_info+0x40/0x58
[   33.960030]  __kasan_kmalloc+0xd4/0xd8
[   33.960656]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.961294]  kasan_bitops_generic+0xa0/0x1c8
[   33.961943]  kunit_try_run_case+0x14c/0x3d0
[   33.962572]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.963578]  kthread+0x24c/0x2d0
[   33.964074]  ret_from_fork+0x10/0x20
[   33.964601] 
[   33.965011] The buggy address belongs to the object at fff00000c5732780
[   33.965011]  which belongs to the cache kmalloc-16 of size 16
[   33.967211] The buggy address is located 8 bytes inside of
[   33.967211]  allocated 9-byte region [fff00000c5732780, fff00000c5732789)
[   33.968925] 
[   33.969258] The buggy address belongs to the physical page:
[   33.970128] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732
[   33.970765] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.972616] page_type: f5(slab)
[   33.973568] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   33.974803] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   33.975945] page dumped because: kasan: bad access detected
[   33.976868] 
[   33.977230] Memory state around the buggy address:
[   33.977961]  fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   33.979823]  fff00000c5732700: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc
[   33.980635] >fff00000c5732780: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.981590]                       ^
[   33.982056]  fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.982871]  fff00000c5732880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.984180] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   31.187825] ==================================================================
[   31.188664] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x6a0/0x750
[   31.189682] Read of size 1 at addr fff00000c58f437f by task kunit_try_catch/183
[   31.190558] 
[   31.190863] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   31.192374] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.192911] Hardware name: linux,dummy-virt (DT)
[   31.193643] Call trace:
[   31.194043]  show_stack+0x20/0x38 (C)
[   31.194692]  dump_stack_lvl+0x8c/0xd0
[   31.195476]  print_report+0x118/0x5e0
[   31.196184]  kasan_report+0xc8/0x118
[   31.196769]  __asan_report_load1_noabort+0x20/0x30
[   31.197438]  ksize_unpoisons_memory+0x6a0/0x750
[   31.198224]  kunit_try_run_case+0x14c/0x3d0
[   31.198859]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.199873]  kthread+0x24c/0x2d0
[   31.200396]  ret_from_fork+0x10/0x20
[   31.201008] 
[   31.201321] Allocated by task 183:
[   31.202048]  kasan_save_stack+0x3c/0x68
[   31.202662]  kasan_save_track+0x20/0x40
[   31.203548]  kasan_save_alloc_info+0x40/0x58
[   31.204135]  __kasan_kmalloc+0xd4/0xd8
[   31.204819]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.205551]  ksize_unpoisons_memory+0xc0/0x750
[   31.206274]  kunit_try_run_case+0x14c/0x3d0
[   31.207594]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.208256]  kthread+0x24c/0x2d0
[   31.208771]  ret_from_fork+0x10/0x20
[   31.209367] 
[   31.209763] The buggy address belongs to the object at fff00000c58f4300
[   31.209763]  which belongs to the cache kmalloc-128 of size 128
[   31.211459] The buggy address is located 12 bytes to the right of
[   31.211459]  allocated 115-byte region [fff00000c58f4300, fff00000c58f4373)
[   31.212426] 
[   31.212650] The buggy address belongs to the physical page:
[   31.213397] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058f4
[   31.214808] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.216003] page_type: f5(slab)
[   31.216455] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.217458] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.218342] page dumped because: kasan: bad access detected
[   31.218978] 
[   31.219479] Memory state around the buggy address:
[   31.220475]  fff00000c58f4200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.221430]  fff00000c58f4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.222305] >fff00000c58f4300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.223605]                                                                 ^
[   31.224468]  fff00000c58f4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.225306]  fff00000c58f4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.226668] ==================================================================
[   31.144874] ==================================================================
[   31.146043] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x750
[   31.146875] Read of size 1 at addr fff00000c58f4378 by task kunit_try_catch/183
[   31.147747] 
[   31.148248] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   31.150044] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.150587] Hardware name: linux,dummy-virt (DT)
[   31.151490] Call trace:
[   31.151859]  show_stack+0x20/0x38 (C)
[   31.152483]  dump_stack_lvl+0x8c/0xd0
[   31.153102]  print_report+0x118/0x5e0
[   31.153629]  kasan_report+0xc8/0x118
[   31.154245]  __asan_report_load1_noabort+0x20/0x30
[   31.154892]  ksize_unpoisons_memory+0x628/0x750
[   31.155913]  kunit_try_run_case+0x14c/0x3d0
[   31.156497]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.157220]  kthread+0x24c/0x2d0
[   31.157854]  ret_from_fork+0x10/0x20
[   31.158515] 
[   31.158817] Allocated by task 183:
[   31.159657]  kasan_save_stack+0x3c/0x68
[   31.160423]  kasan_save_track+0x20/0x40
[   31.160977]  kasan_save_alloc_info+0x40/0x58
[   31.161562]  __kasan_kmalloc+0xd4/0xd8
[   31.162158]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.162738]  ksize_unpoisons_memory+0xc0/0x750
[   31.163990]  kunit_try_run_case+0x14c/0x3d0
[   31.164549]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.165253]  kthread+0x24c/0x2d0
[   31.166429]  ret_from_fork+0x10/0x20
[   31.166952] 
[   31.167754] The buggy address belongs to the object at fff00000c58f4300
[   31.167754]  which belongs to the cache kmalloc-128 of size 128
[   31.169097] The buggy address is located 5 bytes to the right of
[   31.169097]  allocated 115-byte region [fff00000c58f4300, fff00000c58f4373)
[   31.170578] 
[   31.171259] The buggy address belongs to the physical page:
[   31.171969] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058f4
[   31.172862] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.173741] page_type: f5(slab)
[   31.174208] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.175295] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.176228] page dumped because: kasan: bad access detected
[   31.176935] 
[   31.177240] Memory state around the buggy address:
[   31.178109]  fff00000c58f4200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.179251]  fff00000c58f4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.180194] >fff00000c58f4300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.180894]                                                                 ^
[   31.181807]  fff00000c58f4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.182725]  fff00000c58f4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.184132] ==================================================================
[   31.100020] ==================================================================
[   31.101199] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x638/0x750
[   31.102177] Read of size 1 at addr fff00000c58f4373 by task kunit_try_catch/183
[   31.103160] 
[   31.103670] CPU: 0 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   31.105321] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.106009] Hardware name: linux,dummy-virt (DT)
[   31.106782] Call trace:
[   31.107603]  show_stack+0x20/0x38 (C)
[   31.108244]  dump_stack_lvl+0x8c/0xd0
[   31.109026]  print_report+0x118/0x5e0
[   31.109719]  kasan_report+0xc8/0x118
[   31.110418]  __asan_report_load1_noabort+0x20/0x30
[   31.111546]  ksize_unpoisons_memory+0x638/0x750
[   31.112343]  kunit_try_run_case+0x14c/0x3d0
[   31.113073]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.113941]  kthread+0x24c/0x2d0
[   31.114609]  ret_from_fork+0x10/0x20
[   31.115539] 
[   31.115841] Allocated by task 183:
[   31.116108]  kasan_save_stack+0x3c/0x68
[   31.116482]  kasan_save_track+0x20/0x40
[   31.117382]  kasan_save_alloc_info+0x40/0x58
[   31.118371]  __kasan_kmalloc+0xd4/0xd8
[   31.119415]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.119985]  ksize_unpoisons_memory+0xc0/0x750
[   31.120610]  kunit_try_run_case+0x14c/0x3d0
[   31.121305]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.122088]  kthread+0x24c/0x2d0
[   31.122399]  ret_from_fork+0x10/0x20
[   31.123691] 
[   31.123982] The buggy address belongs to the object at fff00000c58f4300
[   31.123982]  which belongs to the cache kmalloc-128 of size 128
[   31.125674] The buggy address is located 0 bytes to the right of
[   31.125674]  allocated 115-byte region [fff00000c58f4300, fff00000c58f4373)
[   31.127569] 
[   31.128229] The buggy address belongs to the physical page:
[   31.129052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058f4
[   31.130156] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.131206] page_type: f5(slab)
[   31.131652] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.132799] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.133716] page dumped because: kasan: bad access detected
[   31.134462] 
[   31.134890] Memory state around the buggy address:
[   31.135918]  fff00000c58f4200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.136915]  fff00000c58f4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.137883] >fff00000c58f4300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.138810]                                                              ^
[   31.139872]  fff00000c58f4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.140758]  fff00000c58f4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.142295] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen
[   33.695446] ==================================================================
[   33.696609] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88
[   33.697396] Read of size 1 at addr fff00000c5921b90 by task kunit_try_catch/248
[   33.698142] 
[   33.698666] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   33.700202] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.701105] Hardware name: linux,dummy-virt (DT)
[   33.701787] Call trace:
[   33.702276]  show_stack+0x20/0x38 (C)
[   33.703277]  dump_stack_lvl+0x8c/0xd0
[   33.703851]  print_report+0x118/0x5e0
[   33.704515]  kasan_report+0xc8/0x118
[   33.705130]  __asan_report_load1_noabort+0x20/0x30
[   33.705892]  strnlen+0x80/0x88
[   33.706496]  kasan_strings+0x364/0x8d8
[   33.707412]  kunit_try_run_case+0x14c/0x3d0
[   33.708126]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.708937]  kthread+0x24c/0x2d0
[   33.709555]  ret_from_fork+0x10/0x20
[   33.710198] 
[   33.710534] Allocated by task 248:
[   33.711191]  kasan_save_stack+0x3c/0x68
[   33.711958]  kasan_save_track+0x20/0x40
[   33.712518]  kasan_save_alloc_info+0x40/0x58
[   33.713318]  __kasan_kmalloc+0xd4/0xd8
[   33.713950]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.714671]  kasan_strings+0xb0/0x8d8
[   33.715478]  kunit_try_run_case+0x14c/0x3d0
[   33.716263]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.716949]  kthread+0x24c/0x2d0
[   33.717544]  ret_from_fork+0x10/0x20
[   33.718400] 
[   33.718923] Freed by task 248:
[   33.719423]  kasan_save_stack+0x3c/0x68
[   33.720272]  kasan_save_track+0x20/0x40
[   33.720707]  kasan_save_free_info+0x4c/0x78
[   33.721149]  __kasan_slab_free+0x6c/0x98
[   33.721624]  kfree+0x114/0x3c8
[   33.722296]  kasan_strings+0x124/0x8d8
[   33.723013]  kunit_try_run_case+0x14c/0x3d0
[   33.723994]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.724827]  kthread+0x24c/0x2d0
[   33.725300]  ret_from_fork+0x10/0x20
[   33.725817] 
[   33.726114] The buggy address belongs to the object at fff00000c5921b80
[   33.726114]  which belongs to the cache kmalloc-32 of size 32
[   33.727302] The buggy address is located 16 bytes inside of
[   33.727302]  freed 32-byte region [fff00000c5921b80, fff00000c5921ba0)
[   33.729353] 
[   33.729845] The buggy address belongs to the physical page:
[   33.730746] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105921
[   33.731861] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.732854] page_type: f5(slab)
[   33.733538] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   33.734664] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   33.735798] page dumped because: kasan: bad access detected
[   33.736624] 
[   33.737009] Memory state around the buggy address:
[   33.737739]  fff00000c5921a80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   33.738886]  fff00000c5921b00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   33.739874] >fff00000c5921b80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   33.740891]                          ^
[   33.741572]  fff00000c5921c00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   33.742636]  fff00000c5921c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   33.743592] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen
[   33.644802] ==================================================================
[   33.645582] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   33.646386] Read of size 1 at addr fff00000c5921b90 by task kunit_try_catch/248
[   33.647147] 
[   33.647751] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   33.649023] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.649642] Hardware name: linux,dummy-virt (DT)
[   33.650317] Call trace:
[   33.650959]  show_stack+0x20/0x38 (C)
[   33.651791]  dump_stack_lvl+0x8c/0xd0
[   33.652639]  print_report+0x118/0x5e0
[   33.653404]  kasan_report+0xc8/0x118
[   33.654185]  __asan_report_load1_noabort+0x20/0x30
[   33.654961]  strlen+0xa8/0xb0
[   33.655612]  kasan_strings+0x304/0x8d8
[   33.656319]  kunit_try_run_case+0x14c/0x3d0
[   33.657076]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.658021]  kthread+0x24c/0x2d0
[   33.658725]  ret_from_fork+0x10/0x20
[   33.659473] 
[   33.659900] Allocated by task 248:
[   33.660555]  kasan_save_stack+0x3c/0x68
[   33.661247]  kasan_save_track+0x20/0x40
[   33.661962]  kasan_save_alloc_info+0x40/0x58
[   33.662800]  __kasan_kmalloc+0xd4/0xd8
[   33.663590]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.664391]  kasan_strings+0xb0/0x8d8
[   33.665065]  kunit_try_run_case+0x14c/0x3d0
[   33.665841]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.666687]  kthread+0x24c/0x2d0
[   33.667344]  ret_from_fork+0x10/0x20
[   33.668054] 
[   33.668525] Freed by task 248:
[   33.669162]  kasan_save_stack+0x3c/0x68
[   33.669925]  kasan_save_track+0x20/0x40
[   33.670655]  kasan_save_free_info+0x4c/0x78
[   33.671230]  __kasan_slab_free+0x6c/0x98
[   33.671805]  kfree+0x114/0x3c8
[   33.672572]  kasan_strings+0x124/0x8d8
[   33.673189]  kunit_try_run_case+0x14c/0x3d0
[   33.673910]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.674780]  kthread+0x24c/0x2d0
[   33.675316]  ret_from_fork+0x10/0x20
[   33.675856] 
[   33.676221] The buggy address belongs to the object at fff00000c5921b80
[   33.676221]  which belongs to the cache kmalloc-32 of size 32
[   33.677683] The buggy address is located 16 bytes inside of
[   33.677683]  freed 32-byte region [fff00000c5921b80, fff00000c5921ba0)
[   33.679184] 
[   33.679657] The buggy address belongs to the physical page:
[   33.680475] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105921
[   33.681551] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.682468] page_type: f5(slab)
[   33.683044] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   33.684120] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   33.685068] page dumped because: kasan: bad access detected
[   33.685891] 
[   33.686230] Memory state around the buggy address:
[   33.686986]  fff00000c5921a80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   33.688090]  fff00000c5921b00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   33.688958] >fff00000c5921b80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   33.689941]                          ^
[   33.690550]  fff00000c5921c00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   33.691528]  fff00000c5921c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   33.692447] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[   33.595533] ==================================================================
[   33.596288] BUG: KASAN: slab-use-after-free in kasan_strings+0x838/0x8d8
[   33.597216] Read of size 1 at addr fff00000c5921b90 by task kunit_try_catch/248
[   33.598026] 
[   33.598362] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   33.600408] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.601105] Hardware name: linux,dummy-virt (DT)
[   33.601608] Call trace:
[   33.601969]  show_stack+0x20/0x38 (C)
[   33.603438]  dump_stack_lvl+0x8c/0xd0
[   33.604098]  print_report+0x118/0x5e0
[   33.604755]  kasan_report+0xc8/0x118
[   33.605435]  __asan_report_load1_noabort+0x20/0x30
[   33.606171]  kasan_strings+0x838/0x8d8
[   33.606826]  kunit_try_run_case+0x14c/0x3d0
[   33.607565]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.608434]  kthread+0x24c/0x2d0
[   33.609049]  ret_from_fork+0x10/0x20
[   33.609742] 
[   33.610095] Allocated by task 248:
[   33.610715]  kasan_save_stack+0x3c/0x68
[   33.611417]  kasan_save_track+0x20/0x40
[   33.612119]  kasan_save_alloc_info+0x40/0x58
[   33.612811]  __kasan_kmalloc+0xd4/0xd8
[   33.613456]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.614187]  kasan_strings+0xb0/0x8d8
[   33.614758]  kunit_try_run_case+0x14c/0x3d0
[   33.615547]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.616320]  kthread+0x24c/0x2d0
[   33.616910]  ret_from_fork+0x10/0x20
[   33.617570] 
[   33.618049] Freed by task 248:
[   33.618586]  kasan_save_stack+0x3c/0x68
[   33.619304]  kasan_save_track+0x20/0x40
[   33.619986]  kasan_save_free_info+0x4c/0x78
[   33.620704]  __kasan_slab_free+0x6c/0x98
[   33.621373]  kfree+0x114/0x3c8
[   33.621934]  kasan_strings+0x124/0x8d8
[   33.622578]  kunit_try_run_case+0x14c/0x3d0
[   33.623280]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.624220]  kthread+0x24c/0x2d0
[   33.624826]  ret_from_fork+0x10/0x20
[   33.625514] 
[   33.625860] The buggy address belongs to the object at fff00000c5921b80
[   33.625860]  which belongs to the cache kmalloc-32 of size 32
[   33.627451] The buggy address is located 16 bytes inside of
[   33.627451]  freed 32-byte region [fff00000c5921b80, fff00000c5921ba0)
[   33.629047] 
[   33.629502] The buggy address belongs to the physical page:
[   33.630263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105921
[   33.631472] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.632362] page_type: f5(slab)
[   33.632961] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   33.633993] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   33.634944] page dumped because: kasan: bad access detected
[   33.635745] 
[   33.636234] Memory state around the buggy address:
[   33.636927]  fff00000c5921a80: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   33.637965]  fff00000c5921b00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   33.638890] >fff00000c5921b80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   33.639786]                          ^
[   33.640419]  fff00000c5921c00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   33.641370]  fff00000c5921c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   33.642308] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
[   33.541316] ==================================================================
[   33.543724] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   33.544992] Read of size 1 at addr fff00000c5921b90 by task kunit_try_catch/248
[   33.545867] 
[   33.546507] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   33.547844] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.548563] Hardware name: linux,dummy-virt (DT)
[   33.549245] Call trace:
[   33.549866]  show_stack+0x20/0x38 (C)
[   33.550573]  dump_stack_lvl+0x8c/0xd0
[   33.551791]  print_report+0x118/0x5e0
[   33.552571]  kasan_report+0xc8/0x118
[   33.553163]  __asan_report_load1_noabort+0x20/0x30
[   33.553897]  strcmp+0xc0/0xc8
[   33.554508]  kasan_strings+0x228/0x8d8
[   33.555186]  kunit_try_run_case+0x14c/0x3d0
[   33.556085]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.556933]  kthread+0x24c/0x2d0
[   33.557643]  ret_from_fork+0x10/0x20
[   33.558316] 
[   33.558684] Allocated by task 248:
[   33.559962]  kasan_save_stack+0x3c/0x68
[   33.561161]  kasan_save_track+0x20/0x40
[   33.561708]  kasan_save_alloc_info+0x40/0x58
[   33.562269]  __kasan_kmalloc+0xd4/0xd8
[   33.562883]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.563906]  kasan_strings+0xb0/0x8d8
[   33.564747]  kunit_try_run_case+0x14c/0x3d0
[   33.565361]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.566061]  kthread+0x24c/0x2d0
[   33.566552]  ret_from_fork+0x10/0x20
[   33.567046] 
[   33.567500] Freed by task 248:
[   33.568032]  kasan_save_stack+0x3c/0x68
[   33.568909]  kasan_save_track+0x20/0x40
[   33.569493]  kasan_save_free_info+0x4c/0x78
[   33.570170]  __kasan_slab_free+0x6c/0x98
[   33.570755]  kfree+0x114/0x3c8
[   33.571643]  kasan_strings+0x124/0x8d8
[   33.572160]  kunit_try_run_case+0x14c/0x3d0
[   33.572765]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.573584]  kthread+0x24c/0x2d0
[   33.574053]  ret_from_fork+0x10/0x20
[   33.574687] 
[   33.575298] The buggy address belongs to the object at fff00000c5921b80
[   33.575298]  which belongs to the cache kmalloc-32 of size 32
[   33.576699] The buggy address is located 16 bytes inside of
[   33.576699]  freed 32-byte region [fff00000c5921b80, fff00000c5921ba0)
[   33.578201] 
[   33.578525] The buggy address belongs to the physical page:
[   33.579974] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105921
[   33.580972] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.582360] page_type: f5(slab)
[   33.582885] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   33.584278] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   33.585271] page dumped because: kasan: bad access detected
[   33.585946] 
[   33.586286] Memory state around the buggy address:
[   33.586899]  fff00000c5921a80: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   33.588027]  fff00000c5921b00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   33.588928] >fff00000c5921b80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   33.589783]                          ^
[   33.590311]  fff00000c5921c00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   33.591852]  fff00000c5921c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   33.592855] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[   33.484047] ==================================================================
[   33.485219] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   33.486098] Read of size 1 at addr fff00000c5921ad8 by task kunit_try_catch/246
[   33.486997] 
[   33.487575] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   33.488444] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.489132] Hardware name: linux,dummy-virt (DT)
[   33.489706] Call trace:
[   33.490205]  show_stack+0x20/0x38 (C)
[   33.490876]  dump_stack_lvl+0x8c/0xd0
[   33.491907]  print_report+0x118/0x5e0
[   33.492393]  kasan_report+0xc8/0x118
[   33.493138]  __asan_report_load1_noabort+0x20/0x30
[   33.493893]  memcmp+0x198/0x1d8
[   33.494375]  kasan_memcmp+0x16c/0x300
[   33.495493]  kunit_try_run_case+0x14c/0x3d0
[   33.496587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.497440]  kthread+0x24c/0x2d0
[   33.498167]  ret_from_fork+0x10/0x20
[   33.498952] 
[   33.499825] Allocated by task 246:
[   33.500249]  kasan_save_stack+0x3c/0x68
[   33.500802]  kasan_save_track+0x20/0x40
[   33.501408]  kasan_save_alloc_info+0x40/0x58
[   33.502124]  __kasan_kmalloc+0xd4/0xd8
[   33.502771]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.503739]  kasan_memcmp+0xbc/0x300
[   33.504567]  kunit_try_run_case+0x14c/0x3d0
[   33.505374]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.506174]  kthread+0x24c/0x2d0
[   33.506837]  ret_from_fork+0x10/0x20
[   33.507717] 
[   33.508039] The buggy address belongs to the object at fff00000c5921ac0
[   33.508039]  which belongs to the cache kmalloc-32 of size 32
[   33.509528] The buggy address is located 0 bytes to the right of
[   33.509528]  allocated 24-byte region [fff00000c5921ac0, fff00000c5921ad8)
[   33.510953] 
[   33.511363] The buggy address belongs to the physical page:
[   33.512029] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105921
[   33.513352] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.514214] page_type: f5(slab)
[   33.514728] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   33.515915] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   33.516860] page dumped because: kasan: bad access detected
[   33.517497] 
[   33.517874] Memory state around the buggy address:
[   33.518574]  fff00000c5921980: fa fb fb fb fc fc fc fc 00 00 07 fc fc fc fc fc
[   33.519712]  fff00000c5921a00: 00 00 00 fc fc fc fc fc 00 00 00 04 fc fc fc fc
[   33.520750] >fff00000c5921a80: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   33.521777]                                                     ^
[   33.522573]  fff00000c5921b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.523611]  fff00000c5921b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.524632] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[   33.427807] ==================================================================
[   33.429104] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2e4/0x348
[   33.430088] Read of size 1 at addr ffff800080a97bea by task kunit_try_catch/242
[   33.431474] 
[   33.431955] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   33.433415] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.434400] Hardware name: linux,dummy-virt (DT)
[   33.435723] Call trace:
[   33.436104]  show_stack+0x20/0x38 (C)
[   33.436670]  dump_stack_lvl+0x8c/0xd0
[   33.437345]  print_report+0x2fc/0x5e0
[   33.437957]  kasan_report+0xc8/0x118
[   33.438588]  __asan_report_load1_noabort+0x20/0x30
[   33.439280]  kasan_alloca_oob_right+0x2e4/0x348
[   33.440310]  kunit_try_run_case+0x14c/0x3d0
[   33.440942]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.442027]  kthread+0x24c/0x2d0
[   33.442716]  ret_from_fork+0x10/0x20
[   33.443453] 
[   33.443849] The buggy address belongs to stack of task kunit_try_catch/242
[   33.445129] 
[   33.445512] The buggy address belongs to the virtual mapping at
[   33.445512]  [ffff800080a90000, ffff800080a99000) created by:
[   33.445512]  kernel_clone+0x140/0x788
[   33.447389] 
[   33.447751] The buggy address belongs to the physical page:
[   33.448450] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a
[   33.449455] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.450617] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.452059] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.453224] page dumped because: kasan: bad access detected
[   33.454027] 
[   33.454389] Memory state around the buggy address:
[   33.455973]  ffff800080a97a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.456787]  ffff800080a97b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.457613] >ffff800080a97b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   33.458596]                                                           ^
[   33.459823]  ffff800080a97c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2
[   33.461006]  ffff800080a97c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00
[   33.461874] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[   33.383761] ==================================================================
[   33.385051] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   33.385982] Read of size 1 at addr ffff800080a57bdf by task kunit_try_catch/240
[   33.387515] 
[   33.387807] CPU: 1 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   33.389297] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.389961] Hardware name: linux,dummy-virt (DT)
[   33.390753] Call trace:
[   33.391635]  show_stack+0x20/0x38 (C)
[   33.392111]  dump_stack_lvl+0x8c/0xd0
[   33.393009]  print_report+0x2fc/0x5e0
[   33.393998]  kasan_report+0xc8/0x118
[   33.394821]  __asan_report_load1_noabort+0x20/0x30
[   33.395933]  kasan_alloca_oob_left+0x2b8/0x310
[   33.396662]  kunit_try_run_case+0x14c/0x3d0
[   33.397374]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.398174]  kthread+0x24c/0x2d0
[   33.398759]  ret_from_fork+0x10/0x20
[   33.399492] 
[   33.399824] The buggy address belongs to stack of task kunit_try_catch/240
[   33.400791] 
[   33.401266] The buggy address belongs to the virtual mapping at
[   33.401266]  [ffff800080a50000, ffff800080a59000) created by:
[   33.401266]  kernel_clone+0x140/0x788
[   33.402927] 
[   33.403643] The buggy address belongs to the physical page:
[   33.404505] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105935
[   33.405574] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.406803] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.407909] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.408574] page dumped because: kasan: bad access detected
[   33.409538] 
[   33.410043] Memory state around the buggy address:
[   33.410824]  ffff800080a57a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.412105]  ffff800080a57b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.413005] >ffff800080a57b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   33.413819]                                                     ^
[   33.414582]  ffff800080a57c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2
[   33.416171]  ffff800080a57c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00
[   33.416996] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[   33.333663] ==================================================================
[   33.335240] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x230/0x268
[   33.337309] Read of size 1 at addr ffff800080a67cba by task kunit_try_catch/238
[   33.338190] 
[   33.338638] CPU: 0 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   33.340199] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.340799] Hardware name: linux,dummy-virt (DT)
[   33.341652] Call trace:
[   33.342289]  show_stack+0x20/0x38 (C)
[   33.343343]  dump_stack_lvl+0x8c/0xd0
[   33.343971]  print_report+0x2fc/0x5e0
[   33.344584]  kasan_report+0xc8/0x118
[   33.345142]  __asan_report_load1_noabort+0x20/0x30
[   33.345721]  kasan_stack_oob+0x230/0x268
[   33.346502]  kunit_try_run_case+0x14c/0x3d0
[   33.347158]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.348221]  kthread+0x24c/0x2d0
[   33.348979]  ret_from_fork+0x10/0x20
[   33.349616] 
[   33.350088] The buggy address belongs to stack of task kunit_try_catch/238
[   33.351353]  and is located at offset 138 in frame:
[   33.351990]  kasan_stack_oob+0x0/0x268
[   33.352853] 
[   33.353268] This frame has 4 objects:
[   33.353917]  [48, 49) '__assertion'
[   33.354063]  [64, 72) 'array'
[   33.354572]  [96, 112) '__assertion'
[   33.355075]  [128, 138) 'stack_array'
[   33.356789] 
[   33.357605] The buggy address belongs to the virtual mapping at
[   33.357605]  [ffff800080a60000, ffff800080a69000) created by:
[   33.357605]  kernel_clone+0x140/0x788
[   33.359354] 
[   33.359794] The buggy address belongs to the physical page:
[   33.360885] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105942
[   33.361992] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.362839] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.363992] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.364911] page dumped because: kasan: bad access detected
[   33.365620] 
[   33.365971] Memory state around the buggy address:
[   33.366593]  ffff800080a67b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.367862]  ffff800080a67c00: 00 00 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2
[   33.368923] >ffff800080a67c80: f2 f2 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00
[   33.369924]                                         ^
[   33.370596]  ffff800080a67d00: 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00
[   33.371759]  ffff800080a67d80: f2 f2 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00
[   33.372745] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   33.283750] ==================================================================
[   33.285358] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   33.286212] Read of size 1 at addr ffffa03e924b202d by task kunit_try_catch/234
[   33.287719] 
[   33.288202] CPU: 0 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   33.289520] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.290066] Hardware name: linux,dummy-virt (DT)
[   33.290960] Call trace:
[   33.291761]  show_stack+0x20/0x38 (C)
[   33.292513]  dump_stack_lvl+0x8c/0xd0
[   33.293194]  print_report+0x2fc/0x5e0
[   33.293950]  kasan_report+0xc8/0x118
[   33.294537]  __asan_report_load1_noabort+0x20/0x30
[   33.295533]  kasan_global_oob_right+0x230/0x270
[   33.296218]  kunit_try_run_case+0x14c/0x3d0
[   33.296894]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.297742]  kthread+0x24c/0x2d0
[   33.298339]  ret_from_fork+0x10/0x20
[   33.299055] 
[   33.299758] The buggy address belongs to the variable:
[   33.300369]  global_array+0xd/0x40
[   33.300959] 
[   33.301382] The buggy address belongs to the virtual mapping at
[   33.301382]  [ffffa03e90810000, ffffa03e92561000) created by:
[   33.301382]  paging_init+0x668/0x7c8
[   33.303204] 
[   33.304282] The buggy address belongs to the physical page:
[   33.304947] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x478b2
[   33.306107] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   33.307476] raw: 03fffe0000002000 ffffc1ffc01e2c88 ffffc1ffc01e2c88 0000000000000000
[   33.308897] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.309997] page dumped because: kasan: bad access detected
[   33.311023] 
[   33.311619] Memory state around the buggy address:
[   33.312434]  ffffa03e924b1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.312854]  ffffa03e924b1f80: 00 00 00 00 00 00 00 00 00 00 00 00 02 f9 f9 f9
[   33.313265] >ffffa03e924b2000: f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9
[   33.314084]                                   ^
[   33.314694]  ffffa03e924b2080: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9
[   33.315427]  ffffa03e924b2100: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 00 00 00
[   33.316430] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[   33.178739] ==================================================================
[   33.180512] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[   33.181184] Free of addr fff00000c58ffb01 by task kunit_try_catch/230
[   33.182348] 
[   33.183414] CPU: 1 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   33.185375] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.186008] Hardware name: linux,dummy-virt (DT)
[   33.186595] Call trace:
[   33.186991]  show_stack+0x20/0x38 (C)
[   33.187839]  dump_stack_lvl+0x8c/0xd0
[   33.188464]  print_report+0x118/0x5e0
[   33.189432]  kasan_report_invalid_free+0xb0/0xd8
[   33.190145]  check_slab_allocation+0xfc/0x108
[   33.191385]  __kasan_mempool_poison_object+0x78/0x150
[   33.192298]  mempool_free+0x28c/0x328
[   33.193029]  mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[   33.193941]  mempool_kmalloc_invalid_free+0xb8/0x110
[   33.194786]  kunit_try_run_case+0x14c/0x3d0
[   33.195762]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.196965]  kthread+0x24c/0x2d0
[   33.197495]  ret_from_fork+0x10/0x20
[   33.198024] 
[   33.198296] Allocated by task 230:
[   33.198729]  kasan_save_stack+0x3c/0x68
[   33.199892]  kasan_save_track+0x20/0x40
[   33.200714]  kasan_save_alloc_info+0x40/0x58
[   33.201365]  __kasan_mempool_unpoison_object+0x11c/0x180
[   33.202100]  remove_element+0x130/0x1f8
[   33.202794]  mempool_alloc_preallocated+0x58/0xc0
[   33.203970]  mempool_kmalloc_invalid_free_helper+0x94/0x2a0
[   33.205206]  mempool_kmalloc_invalid_free+0xb8/0x110
[   33.205875]  kunit_try_run_case+0x14c/0x3d0
[   33.206461]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.207509]  kthread+0x24c/0x2d0
[   33.207916]  ret_from_fork+0x10/0x20
[   33.208513] 
[   33.208851] The buggy address belongs to the object at fff00000c58ffb00
[   33.208851]  which belongs to the cache kmalloc-128 of size 128
[   33.210460] The buggy address is located 1 bytes inside of
[   33.210460]  128-byte region [fff00000c58ffb00, fff00000c58ffb80)
[   33.212424] 
[   33.212895] The buggy address belongs to the physical page:
[   33.213749] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ff
[   33.214847] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.215685] page_type: f5(slab)
[   33.216189] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.217778] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.218647] page dumped because: kasan: bad access detected
[   33.219259] 
[   33.219857] Memory state around the buggy address:
[   33.221304]  fff00000c58ffa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.222179]  fff00000c58ffa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.223375] >fff00000c58ffb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.224310]                    ^
[   33.225261]  fff00000c58ffb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.226412]  fff00000c58ffc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.227461] ==================================================================
[   33.238187] ==================================================================
[   33.239663] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[   33.241120] Free of addr fff00000c6620001 by task kunit_try_catch/232
[   33.242108] 
[   33.242499] CPU: 0 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   33.243987] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.244540] Hardware name: linux,dummy-virt (DT)
[   33.245126] Call trace:
[   33.245590]  show_stack+0x20/0x38 (C)
[   33.246219]  dump_stack_lvl+0x8c/0xd0
[   33.246797]  print_report+0x118/0x5e0
[   33.247500]  kasan_report_invalid_free+0xb0/0xd8
[   33.248169]  __kasan_mempool_poison_object+0xfc/0x150
[   33.249190]  mempool_free+0x28c/0x328
[   33.249762]  mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[   33.250605]  mempool_kmalloc_large_invalid_free+0xb8/0x110
[   33.251621]  kunit_try_run_case+0x14c/0x3d0
[   33.252202]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.253012]  kthread+0x24c/0x2d0
[   33.253507]  ret_from_fork+0x10/0x20
[   33.254106] 
[   33.254511] The buggy address belongs to the physical page:
[   33.255217] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106620
[   33.256535] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.257453] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.258392] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.259510] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.260437] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.261503] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.262476] head: 0bfffe0000000002 ffffc1ffc3198801 ffffffffffffffff 0000000000000000
[   33.263909] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   33.264853] page dumped because: kasan: bad access detected
[   33.265569] 
[   33.265902] Memory state around the buggy address:
[   33.266661]  fff00000c661ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.267822]  fff00000c661ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.268587] >fff00000c6620000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.269599]                    ^
[   33.270068]  fff00000c6620080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.270908]  fff00000c6620100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.271936] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[   32.986809] ==================================================================
[   32.988402] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   32.989160] Read of size 1 at addr fff00000c6564000 by task kunit_try_catch/222
[   32.989936] 
[   32.990349] CPU: 1 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   32.992613] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.993015] Hardware name: linux,dummy-virt (DT)
[   32.994069] Call trace:
[   32.994652]  show_stack+0x20/0x38 (C)
[   32.995605]  dump_stack_lvl+0x8c/0xd0
[   32.996086]  print_report+0x118/0x5e0
[   32.996539]  kasan_report+0xc8/0x118
[   32.996979]  __asan_report_load1_noabort+0x20/0x30
[   32.997401]  mempool_uaf_helper+0x314/0x340
[   32.998456]  mempool_page_alloc_uaf+0xb8/0x118
[   32.999457]  kunit_try_run_case+0x14c/0x3d0
[   33.000047]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.000748]  kthread+0x24c/0x2d0
[   33.001458]  ret_from_fork+0x10/0x20
[   33.002105] 
[   33.002467] The buggy address belongs to the physical page:
[   33.003349] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106564
[   33.004315] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.005192] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.006217] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.006750] page dumped because: kasan: bad access detected
[   33.007217] 
[   33.008132] Memory state around the buggy address:
[   33.008818]  fff00000c6563f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.009759]  fff00000c6563f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.010681] >fff00000c6564000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.011559]                    ^
[   33.012067]  fff00000c6564080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.012923]  fff00000c6564100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.014102] ==================================================================
[   32.857413] ==================================================================
[   32.858649] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   32.859552] Read of size 1 at addr fff00000c6564000 by task kunit_try_catch/218
[   32.860465] 
[   32.860956] CPU: 1 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   32.862165] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.863575] Hardware name: linux,dummy-virt (DT)
[   32.864242] Call trace:
[   32.864762]  show_stack+0x20/0x38 (C)
[   32.865775]  dump_stack_lvl+0x8c/0xd0
[   32.866365]  print_report+0x118/0x5e0
[   32.866986]  kasan_report+0xc8/0x118
[   32.868158]  __asan_report_load1_noabort+0x20/0x30
[   32.868855]  mempool_uaf_helper+0x314/0x340
[   32.869452]  mempool_kmalloc_large_uaf+0xbc/0x118
[   32.870156]  kunit_try_run_case+0x14c/0x3d0
[   32.870885]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.872175]  kthread+0x24c/0x2d0
[   32.872770]  ret_from_fork+0x10/0x20
[   32.873506] 
[   32.873875] The buggy address belongs to the physical page:
[   32.874647] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106564
[   32.876050] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.877390] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.878411] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.879567] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.880799] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.881885] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.882940] head: 0bfffe0000000002 ffffc1ffc3195901 ffffffffffffffff 0000000000000000
[   32.883900] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   32.884763] page dumped because: kasan: bad access detected
[   32.885269] 
[   32.885537] Memory state around the buggy address:
[   32.886471]  fff00000c6563f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.887579]  fff00000c6563f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.888429] >fff00000c6564000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.889280]                    ^
[   32.889968]  fff00000c6564080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.890816]  fff00000c6564100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.892421] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[   32.908120] ==================================================================
[   32.909748] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   32.910767] Read of size 1 at addr fff00000c5945240 by task kunit_try_catch/220
[   32.912358] 
[   32.912801] CPU: 1 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   32.914043] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.914717] Hardware name: linux,dummy-virt (DT)
[   32.915601] Call trace:
[   32.916607]  show_stack+0x20/0x38 (C)
[   32.917135]  dump_stack_lvl+0x8c/0xd0
[   32.917677]  print_report+0x118/0x5e0
[   32.918286]  kasan_report+0xc8/0x118
[   32.918804]  __asan_report_load1_noabort+0x20/0x30
[   32.919756]  mempool_uaf_helper+0x314/0x340
[   32.920782]  mempool_slab_uaf+0xb8/0x110
[   32.921493]  kunit_try_run_case+0x14c/0x3d0
[   32.922041]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.923074]  kthread+0x24c/0x2d0
[   32.924004]  ret_from_fork+0x10/0x20
[   32.924783] 
[   32.925060] Allocated by task 220:
[   32.925751]  kasan_save_stack+0x3c/0x68
[   32.926208]  kasan_save_track+0x20/0x40
[   32.927076]  kasan_save_alloc_info+0x40/0x58
[   32.927999]  __kasan_mempool_unpoison_object+0xbc/0x180
[   32.928890]  remove_element+0x16c/0x1f8
[   32.929970]  mempool_alloc_preallocated+0x58/0xc0
[   32.930855]  mempool_uaf_helper+0xa4/0x340
[   32.931783]  mempool_slab_uaf+0xb8/0x110
[   32.932922]  kunit_try_run_case+0x14c/0x3d0
[   32.933864]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.934646]  kthread+0x24c/0x2d0
[   32.935691]  ret_from_fork+0x10/0x20
[   32.936225] 
[   32.936586] Freed by task 220:
[   32.937107]  kasan_save_stack+0x3c/0x68
[   32.937996]  kasan_save_track+0x20/0x40
[   32.938642]  kasan_save_free_info+0x4c/0x78
[   32.939737]  __kasan_mempool_poison_object+0xc0/0x150
[   32.941050]  mempool_free+0x28c/0x328
[   32.941868]  mempool_uaf_helper+0x104/0x340
[   32.942674]  mempool_slab_uaf+0xb8/0x110
[   32.943713]  kunit_try_run_case+0x14c/0x3d0
[   32.944468]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.945271]  kthread+0x24c/0x2d0
[   32.945872]  ret_from_fork+0x10/0x20
[   32.946425] 
[   32.946787] The buggy address belongs to the object at fff00000c5945240
[   32.946787]  which belongs to the cache test_cache of size 123
[   32.949068] The buggy address is located 0 bytes inside of
[   32.949068]  freed 123-byte region [fff00000c5945240, fff00000c59452bb)
[   32.951263] 
[   32.951827] The buggy address belongs to the physical page:
[   32.952490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105945
[   32.953443] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.954271] page_type: f5(slab)
[   32.954854] raw: 0bfffe0000000000 fff00000c56f9a00 dead000000000122 0000000000000000
[   32.956497] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   32.957402] page dumped because: kasan: bad access detected
[   32.958060] 
[   32.958598] Memory state around the buggy address:
[   32.959486]  fff00000c5945100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.960428]  fff00000c5945180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.961257] >fff00000c5945200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   32.962138]                                            ^
[   32.962793]  fff00000c5945280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.963898]  fff00000c5945300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.964691] ==================================================================
[   32.794447] ==================================================================
[   32.795647] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   32.796575] Read of size 1 at addr fff00000c5912b00 by task kunit_try_catch/216
[   32.797421] 
[   32.797759] CPU: 1 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   32.799648] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.800621] Hardware name: linux,dummy-virt (DT)
[   32.801210] Call trace:
[   32.801652]  show_stack+0x20/0x38 (C)
[   32.802938]  dump_stack_lvl+0x8c/0xd0
[   32.803482]  print_report+0x118/0x5e0
[   32.803929]  kasan_report+0xc8/0x118
[   32.804622]  __asan_report_load1_noabort+0x20/0x30
[   32.806225]  mempool_uaf_helper+0x314/0x340
[   32.807523]  mempool_kmalloc_uaf+0xbc/0x118
[   32.808108]  kunit_try_run_case+0x14c/0x3d0
[   32.808735]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.809592]  kthread+0x24c/0x2d0
[   32.810175]  ret_from_fork+0x10/0x20
[   32.810811] 
[   32.811173] Allocated by task 216:
[   32.811645]  kasan_save_stack+0x3c/0x68
[   32.812394]  kasan_save_track+0x20/0x40
[   32.813083]  kasan_save_alloc_info+0x40/0x58
[   32.814252]  __kasan_mempool_unpoison_object+0x11c/0x180
[   32.815430]  remove_element+0x130/0x1f8
[   32.815991]  mempool_alloc_preallocated+0x58/0xc0
[   32.816646]  mempool_uaf_helper+0xa4/0x340
[   32.817224]  mempool_kmalloc_uaf+0xbc/0x118
[   32.817818]  kunit_try_run_case+0x14c/0x3d0
[   32.818474]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.819660]  kthread+0x24c/0x2d0
[   32.820136]  ret_from_fork+0x10/0x20
[   32.820777] 
[   32.821064] Freed by task 216:
[   32.821554]  kasan_save_stack+0x3c/0x68
[   32.822157]  kasan_save_track+0x20/0x40
[   32.822799]  kasan_save_free_info+0x4c/0x78
[   32.823735]  __kasan_mempool_poison_object+0xc0/0x150
[   32.824407]  mempool_free+0x28c/0x328
[   32.825015]  mempool_uaf_helper+0x104/0x340
[   32.825860]  mempool_kmalloc_uaf+0xbc/0x118
[   32.826296]  kunit_try_run_case+0x14c/0x3d0
[   32.827228]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.828115]  kthread+0x24c/0x2d0
[   32.828799]  ret_from_fork+0x10/0x20
[   32.829525] 
[   32.829841] The buggy address belongs to the object at fff00000c5912b00
[   32.829841]  which belongs to the cache kmalloc-128 of size 128
[   32.831934] The buggy address is located 0 bytes inside of
[   32.831934]  freed 128-byte region [fff00000c5912b00, fff00000c5912b80)
[   32.832764] 
[   32.832943] The buggy address belongs to the physical page:
[   32.833281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105912
[   32.834066] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.834748] page_type: f5(slab)
[   32.835841] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.836932] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.838125] page dumped because: kasan: bad access detected
[   32.839264] 
[   32.839710] Memory state around the buggy address:
[   32.840864]  fff00000c5912a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.841694]  fff00000c5912a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.842571] >fff00000c5912b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.843701]                    ^
[   32.844381]  fff00000c5912b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.845387]  fff00000c5912c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.846252] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[   32.681482] ==================================================================
[   32.682698] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   32.683931] Read of size 1 at addr fff00000c6566001 by task kunit_try_catch/212
[   32.685792] 
[   32.686305] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   32.687960] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.688451] Hardware name: linux,dummy-virt (DT)
[   32.689061] Call trace:
[   32.689473]  show_stack+0x20/0x38 (C)
[   32.690284]  dump_stack_lvl+0x8c/0xd0
[   32.691090]  print_report+0x118/0x5e0
[   32.691831]  kasan_report+0xc8/0x118
[   32.693102]  __asan_report_load1_noabort+0x20/0x30
[   32.693636]  mempool_oob_right_helper+0x2ac/0x2f0
[   32.693988]  mempool_kmalloc_large_oob_right+0xbc/0x118
[   32.694382]  kunit_try_run_case+0x14c/0x3d0
[   32.696475]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.697300]  kthread+0x24c/0x2d0
[   32.698048]  ret_from_fork+0x10/0x20
[   32.698720] 
[   32.699059] The buggy address belongs to the physical page:
[   32.700542] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106564
[   32.702021] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.702631] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.704131] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.705231] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.706238] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.707796] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.709502] head: 0bfffe0000000002 ffffc1ffc3195901 ffffffffffffffff 0000000000000000
[   32.710057] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   32.710598] page dumped because: kasan: bad access detected
[   32.712229] 
[   32.712789] Memory state around the buggy address:
[   32.713610]  fff00000c6565f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.714542]  fff00000c6565f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.716372] >fff00000c6566000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.717383]                    ^
[   32.717888]  fff00000c6566080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.719027]  fff00000c6566100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   32.720119] ==================================================================
[   32.625144] ==================================================================
[   32.626690] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   32.628156] Read of size 1 at addr fff00000c590f073 by task kunit_try_catch/210
[   32.629785] 
[   32.630098] CPU: 0 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   32.631983] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.633318] Hardware name: linux,dummy-virt (DT)
[   32.634255] Call trace:
[   32.634778]  show_stack+0x20/0x38 (C)
[   32.635634]  dump_stack_lvl+0x8c/0xd0
[   32.636559]  print_report+0x118/0x5e0
[   32.637102]  kasan_report+0xc8/0x118
[   32.637703]  __asan_report_load1_noabort+0x20/0x30
[   32.638424]  mempool_oob_right_helper+0x2ac/0x2f0
[   32.639484]  mempool_kmalloc_oob_right+0xbc/0x118
[   32.640150]  kunit_try_run_case+0x14c/0x3d0
[   32.640800]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.641518]  kthread+0x24c/0x2d0
[   32.642101]  ret_from_fork+0x10/0x20
[   32.642686] 
[   32.642958] Allocated by task 210:
[   32.644017]  kasan_save_stack+0x3c/0x68
[   32.644874]  kasan_save_track+0x20/0x40
[   32.645529]  kasan_save_alloc_info+0x40/0x58
[   32.646347]  __kasan_mempool_unpoison_object+0x11c/0x180
[   32.647190]  remove_element+0x130/0x1f8
[   32.648177]  mempool_alloc_preallocated+0x58/0xc0
[   32.648809]  mempool_oob_right_helper+0x98/0x2f0
[   32.649524]  mempool_kmalloc_oob_right+0xbc/0x118
[   32.650247]  kunit_try_run_case+0x14c/0x3d0
[   32.650956]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.651858]  kthread+0x24c/0x2d0
[   32.652666]  ret_from_fork+0x10/0x20
[   32.653269] 
[   32.653841] The buggy address belongs to the object at fff00000c590f000
[   32.653841]  which belongs to the cache kmalloc-128 of size 128
[   32.655950] The buggy address is located 0 bytes to the right of
[   32.655950]  allocated 115-byte region [fff00000c590f000, fff00000c590f073)
[   32.657252] 
[   32.657658] The buggy address belongs to the physical page:
[   32.658412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10590f
[   32.659439] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.660120] page_type: f5(slab)
[   32.660820] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.661990] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.663236] page dumped because: kasan: bad access detected
[   32.663940] 
[   32.664257] Memory state around the buggy address:
[   32.664968]  fff00000c590ef00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.665853]  fff00000c590ef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.666633] >fff00000c590f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.667661]                                                              ^
[   32.668485]  fff00000c590f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.669427]  fff00000c590f100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.670194] ==================================================================
[   32.734121] ==================================================================
[   32.735570] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   32.736843] Read of size 1 at addr fff00000c591e2bb by task kunit_try_catch/214
[   32.737969] 
[   32.738285] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   32.739499] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.740095] Hardware name: linux,dummy-virt (DT)
[   32.740615] Call trace:
[   32.741085]  show_stack+0x20/0x38 (C)
[   32.741927]  dump_stack_lvl+0x8c/0xd0
[   32.742534]  print_report+0x118/0x5e0
[   32.743499]  kasan_report+0xc8/0x118
[   32.744037]  __asan_report_load1_noabort+0x20/0x30
[   32.744798]  mempool_oob_right_helper+0x2ac/0x2f0
[   32.745488]  mempool_slab_oob_right+0xb8/0x110
[   32.746253]  kunit_try_run_case+0x14c/0x3d0
[   32.747247]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.747989]  kthread+0x24c/0x2d0
[   32.748528]  ret_from_fork+0x10/0x20
[   32.749182] 
[   32.749492] Allocated by task 214:
[   32.750122]  kasan_save_stack+0x3c/0x68
[   32.750701]  kasan_save_track+0x20/0x40
[   32.751675]  kasan_save_alloc_info+0x40/0x58
[   32.752292]  __kasan_mempool_unpoison_object+0xbc/0x180
[   32.753074]  remove_element+0x16c/0x1f8
[   32.753679]  mempool_alloc_preallocated+0x58/0xc0
[   32.754423]  mempool_oob_right_helper+0x98/0x2f0
[   32.755410]  mempool_slab_oob_right+0xb8/0x110
[   32.756030]  kunit_try_run_case+0x14c/0x3d0
[   32.756660]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.757898]  kthread+0x24c/0x2d0
[   32.758680]  ret_from_fork+0x10/0x20
[   32.759201] 
[   32.759551] The buggy address belongs to the object at fff00000c591e240
[   32.759551]  which belongs to the cache test_cache of size 123
[   32.761374] The buggy address is located 0 bytes to the right of
[   32.761374]  allocated 123-byte region [fff00000c591e240, fff00000c591e2bb)
[   32.762848] 
[   32.763427] The buggy address belongs to the physical page:
[   32.764189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591e
[   32.765208] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.766179] page_type: f5(slab)
[   32.766693] raw: 0bfffe0000000000 fff00000c59073c0 dead000000000122 0000000000000000
[   32.767913] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   32.768835] page dumped because: kasan: bad access detected
[   32.769688] 
[   32.770013] Memory state around the buggy address:
[   32.770847]  fff00000c591e180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.771981]  fff00000c591e200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   32.772845] >fff00000c591e280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   32.773735]                                         ^
[   32.774461]  fff00000c591e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.776064]  fff00000c591e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.777040] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[   32.003779] ==================================================================
[   32.005139] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x17c/0x2f8
[   32.006085] Read of size 1 at addr fff00000c5907140 by task kunit_try_catch/204
[   32.007092] 
[   32.007491] CPU: 0 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   32.008739] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.009424] Hardware name: linux,dummy-virt (DT)
[   32.010034] Call trace:
[   32.010504]  show_stack+0x20/0x38 (C)
[   32.011097]  dump_stack_lvl+0x8c/0xd0
[   32.011657]  print_report+0x118/0x5e0
[   32.012308]  kasan_report+0xc8/0x118
[   32.012863]  __kasan_check_byte+0x54/0x70
[   32.013492]  kmem_cache_destroy+0x34/0x218
[   32.014086]  kmem_cache_double_destroy+0x17c/0x2f8
[   32.014705]  kunit_try_run_case+0x14c/0x3d0
[   32.015342]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.016169]  kthread+0x24c/0x2d0
[   32.016774]  ret_from_fork+0x10/0x20
[   32.017368] 
[   32.017705] Allocated by task 204:
[   32.018249]  kasan_save_stack+0x3c/0x68
[   32.018842]  kasan_save_track+0x20/0x40
[   32.019414]  kasan_save_alloc_info+0x40/0x58
[   32.020018]  __kasan_slab_alloc+0xa8/0xb0
[   32.020665]  kmem_cache_alloc_noprof+0x108/0x398
[   32.021214]  __kmem_cache_create_args+0x18c/0x2b0
[   32.021981]  kmem_cache_double_destroy+0xc8/0x2f8
[   32.022628]  kunit_try_run_case+0x14c/0x3d0
[   32.023140]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.023990]  kthread+0x24c/0x2d0
[   32.024435]  ret_from_fork+0x10/0x20
[   32.024997] 
[   32.025351] Freed by task 204:
[   32.025855]  kasan_save_stack+0x3c/0x68
[   32.026484]  kasan_save_track+0x20/0x40
[   32.026998]  kasan_save_free_info+0x4c/0x78
[   32.027757]  __kasan_slab_free+0x6c/0x98
[   32.028356]  kmem_cache_free+0x118/0x470
[   32.028952]  slab_kmem_cache_release+0x38/0x50
[   32.029594]  kmem_cache_release+0x1c/0x30
[   32.030169]  kobject_put+0x17c/0x430
[   32.030876]  sysfs_slab_release+0x1c/0x30
[   32.031385]  kmem_cache_destroy+0x118/0x218
[   32.032026]  kmem_cache_double_destroy+0x130/0x2f8
[   32.032581]  kunit_try_run_case+0x14c/0x3d0
[   32.033251]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.033858]  kthread+0x24c/0x2d0
[   32.034460]  ret_from_fork+0x10/0x20
[   32.034986] 
[   32.035426] The buggy address belongs to the object at fff00000c5907140
[   32.035426]  which belongs to the cache kmem_cache of size 208
[   32.036832] The buggy address is located 0 bytes inside of
[   32.036832]  freed 208-byte region [fff00000c5907140, fff00000c5907210)
[   32.038152] 
[   32.038458] The buggy address belongs to the physical page:
[   32.039159] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105907
[   32.040114] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.040863] page_type: f5(slab)
[   32.041475] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000
[   32.042381] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   32.043267] page dumped because: kasan: bad access detected
[   32.043899] 
[   32.044244] Memory state around the buggy address:
[   32.044821]  fff00000c5907000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.045818]  fff00000c5907080: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   32.046843] >fff00000c5907100: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   32.047668]                                            ^
[   32.048367]  fff00000c5907180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.049247]  fff00000c5907200: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.050187] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[   31.872408] ==================================================================
[   31.873678] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x390/0x468
[   31.874807] Read of size 1 at addr fff00000c5917000 by task kunit_try_catch/202
[   31.875987] 
[   31.876591] CPU: 1 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   31.878053] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.878748] Hardware name: linux,dummy-virt (DT)
[   31.879439] Call trace:
[   31.879863]  show_stack+0x20/0x38 (C)
[   31.880839]  dump_stack_lvl+0x8c/0xd0
[   31.881473]  print_report+0x118/0x5e0
[   31.882200]  kasan_report+0xc8/0x118
[   31.882904]  __asan_report_load1_noabort+0x20/0x30
[   31.883992]  kmem_cache_rcu_uaf+0x390/0x468
[   31.884702]  kunit_try_run_case+0x14c/0x3d0
[   31.885515]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.886399]  kthread+0x24c/0x2d0
[   31.886953]  ret_from_fork+0x10/0x20
[   31.887832] 
[   31.888470] Allocated by task 202:
[   31.888986]  kasan_save_stack+0x3c/0x68
[   31.889559]  kasan_save_track+0x20/0x40
[   31.890159]  kasan_save_alloc_info+0x40/0x58
[   31.890768]  __kasan_slab_alloc+0xa8/0xb0
[   31.891887]  kmem_cache_alloc_noprof+0x108/0x398
[   31.892380]  kmem_cache_rcu_uaf+0x12c/0x468
[   31.893476]  kunit_try_run_case+0x14c/0x3d0
[   31.894269]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.895007]  kthread+0x24c/0x2d0
[   31.895641]  ret_from_fork+0x10/0x20
[   31.896622] 
[   31.897048] Freed by task 0:
[   31.897646]  kasan_save_stack+0x3c/0x68
[   31.898488]  kasan_save_track+0x20/0x40
[   31.899443]  kasan_save_free_info+0x4c/0x78
[   31.900094]  __kasan_slab_free+0x6c/0x98
[   31.900660]  slab_free_after_rcu_debug+0xd4/0x2f8
[   31.901279]  rcu_core+0x9f4/0x1e20
[   31.901944]  rcu_core_si+0x18/0x30
[   31.902748]  handle_softirqs+0x374/0xb20
[   31.903851]  __do_softirq+0x1c/0x28
[   31.904623] 
[   31.905072] Last potentially related work creation:
[   31.905894]  kasan_save_stack+0x3c/0x68
[   31.906637]  kasan_record_aux_stack+0xb4/0xc8
[   31.907475]  kmem_cache_free+0x28c/0x470
[   31.908364]  kmem_cache_rcu_uaf+0x16c/0x468
[   31.909172]  kunit_try_run_case+0x14c/0x3d0
[   31.909901]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.911356]  kthread+0x24c/0x2d0
[   31.911911]  ret_from_fork+0x10/0x20
[   31.912358] 
[   31.912742] The buggy address belongs to the object at fff00000c5917000
[   31.912742]  which belongs to the cache test_cache of size 200
[   31.914555] The buggy address is located 0 bytes inside of
[   31.914555]  freed 200-byte region [fff00000c5917000, fff00000c59170c8)
[   31.916440] 
[   31.917008] The buggy address belongs to the physical page:
[   31.917762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105917
[   31.918744] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.919895] page_type: f5(slab)
[   31.920395] raw: 0bfffe0000000000 fff00000c56f9780 dead000000000122 0000000000000000
[   31.921416] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   31.922436] page dumped because: kasan: bad access detected
[   31.923090] 
[   31.923442] Memory state around the buggy address:
[   31.924449]  fff00000c5916f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.925435]  fff00000c5916f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.926283] >fff00000c5917000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.927522]                    ^
[   31.928026]  fff00000c5917080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   31.929105]  fff00000c5917100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.930012] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   31.747822] ==================================================================
[   31.749175] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3b8
[   31.749905] Free of addr fff00000c5915001 by task kunit_try_catch/200
[   31.750716] 
[   31.751164] CPU: 1 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   31.752896] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.753505] Hardware name: linux,dummy-virt (DT)
[   31.754301] Call trace:
[   31.754762]  show_stack+0x20/0x38 (C)
[   31.755745]  dump_stack_lvl+0x8c/0xd0
[   31.756383]  print_report+0x118/0x5e0
[   31.756942]  kasan_report_invalid_free+0xb0/0xd8
[   31.757632]  check_slab_allocation+0xfc/0x108
[   31.758365]  __kasan_slab_pre_free+0x2c/0x48
[   31.759364]  kmem_cache_free+0xf0/0x470
[   31.759947]  kmem_cache_invalid_free+0x184/0x3b8
[   31.760655]  kunit_try_run_case+0x14c/0x3d0
[   31.761273]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.762099]  kthread+0x24c/0x2d0
[   31.762573]  ret_from_fork+0x10/0x20
[   31.763594] 
[   31.763887] Allocated by task 200:
[   31.764386]  kasan_save_stack+0x3c/0x68
[   31.764976]  kasan_save_track+0x20/0x40
[   31.765614]  kasan_save_alloc_info+0x40/0x58
[   31.766253]  __kasan_slab_alloc+0xa8/0xb0
[   31.766970]  kmem_cache_alloc_noprof+0x108/0x398
[   31.768044]  kmem_cache_invalid_free+0x12c/0x3b8
[   31.768630]  kunit_try_run_case+0x14c/0x3d0
[   31.769400]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.770133]  kthread+0x24c/0x2d0
[   31.770678]  ret_from_fork+0x10/0x20
[   31.771614] 
[   31.771945] The buggy address belongs to the object at fff00000c5915000
[   31.771945]  which belongs to the cache test_cache of size 200
[   31.773270] The buggy address is located 1 bytes inside of
[   31.773270]  200-byte region [fff00000c5915000, fff00000c59150c8)
[   31.774593] 
[   31.774886] The buggy address belongs to the physical page:
[   31.775572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105915
[   31.776592] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.777657] page_type: f5(slab)
[   31.778556] raw: 0bfffe0000000000 fff00000c56f9640 dead000000000122 0000000000000000
[   31.779576] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   31.780755] page dumped because: kasan: bad access detected
[   31.781302] 
[   31.781688] Memory state around the buggy address:
[   31.782424]  fff00000c5914f00: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc
[   31.783493]  fff00000c5914f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.784370] >fff00000c5915000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.785229]                    ^
[   31.785902]  fff00000c5915080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   31.786812]  fff00000c5915100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.787929] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   31.674275] ==================================================================
[   31.674984] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   31.676560] Free of addr fff00000c5905000 by task kunit_try_catch/198
[   31.677430] 
[   31.677799] CPU: 0 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   31.679592] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.680190] Hardware name: linux,dummy-virt (DT)
[   31.681321] Call trace:
[   31.681954]  show_stack+0x20/0x38 (C)
[   31.682642]  dump_stack_lvl+0x8c/0xd0
[   31.683432]  print_report+0x118/0x5e0
[   31.684159]  kasan_report_invalid_free+0xb0/0xd8
[   31.685011]  check_slab_allocation+0xd4/0x108
[   31.685371]  __kasan_slab_pre_free+0x2c/0x48
[   31.686049]  kmem_cache_free+0xf0/0x470
[   31.686862]  kmem_cache_double_free+0x190/0x3c8
[   31.687617]  kunit_try_run_case+0x14c/0x3d0
[   31.688180]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.689108]  kthread+0x24c/0x2d0
[   31.689661]  ret_from_fork+0x10/0x20
[   31.690225] 
[   31.690584] Allocated by task 198:
[   31.691005]  kasan_save_stack+0x3c/0x68
[   31.691590]  kasan_save_track+0x20/0x40
[   31.692162]  kasan_save_alloc_info+0x40/0x58
[   31.693201]  __kasan_slab_alloc+0xa8/0xb0
[   31.693769]  kmem_cache_alloc_noprof+0x108/0x398
[   31.694497]  kmem_cache_double_free+0x12c/0x3c8
[   31.695031]  kunit_try_run_case+0x14c/0x3d0
[   31.696146]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.697309]  kthread+0x24c/0x2d0
[   31.698219]  ret_from_fork+0x10/0x20
[   31.698887] 
[   31.699713] Freed by task 198:
[   31.700442]  kasan_save_stack+0x3c/0x68
[   31.701172]  kasan_save_track+0x20/0x40
[   31.701803]  kasan_save_free_info+0x4c/0x78
[   31.702496]  __kasan_slab_free+0x6c/0x98
[   31.703487]  kmem_cache_free+0x118/0x470
[   31.704425]  kmem_cache_double_free+0x140/0x3c8
[   31.705162]  kunit_try_run_case+0x14c/0x3d0
[   31.705913]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.706707]  kthread+0x24c/0x2d0
[   31.707289]  ret_from_fork+0x10/0x20
[   31.707905] 
[   31.708202] The buggy address belongs to the object at fff00000c5905000
[   31.708202]  which belongs to the cache test_cache of size 200
[   31.709980] The buggy address is located 0 bytes inside of
[   31.709980]  200-byte region [fff00000c5905000, fff00000c59050c8)
[   31.711838] 
[   31.712183] The buggy address belongs to the physical page:
[   31.713058] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105905
[   31.714114] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.715407] page_type: f5(slab)
[   31.716027] raw: 0bfffe0000000000 fff00000c5907000 dead000000000122 0000000000000000
[   31.717293] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   31.718645] page dumped because: kasan: bad access detected
[   31.719884] 
[   31.720286] Memory state around the buggy address:
[   31.721467]  fff00000c5904f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.722649]  fff00000c5904f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.723088] >fff00000c5905000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.724124]                    ^
[   31.724583]  fff00000c5905080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   31.725596]  fff00000c5905100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.726596] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   31.591556] ==================================================================
[   31.593348] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x33c/0x428
[   31.594184] Read of size 1 at addr fff00000c59070c8 by task kunit_try_catch/196
[   31.596253] 
[   31.596663] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   31.597785] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.598270] Hardware name: linux,dummy-virt (DT)
[   31.599151] Call trace:
[   31.599868]  show_stack+0x20/0x38 (C)
[   31.600438]  dump_stack_lvl+0x8c/0xd0
[   31.601010]  print_report+0x118/0x5e0
[   31.601551]  kasan_report+0xc8/0x118
[   31.602191]  __asan_report_load1_noabort+0x20/0x30
[   31.602890]  kmem_cache_oob+0x33c/0x428
[   31.603864]  kunit_try_run_case+0x14c/0x3d0
[   31.604520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.605421]  kthread+0x24c/0x2d0
[   31.605976]  ret_from_fork+0x10/0x20
[   31.606633] 
[   31.606917] Allocated by task 196:
[   31.607509]  kasan_save_stack+0x3c/0x68
[   31.608090]  kasan_save_track+0x20/0x40
[   31.608744]  kasan_save_alloc_info+0x40/0x58
[   31.609700]  __kasan_slab_alloc+0xa8/0xb0
[   31.610345]  kmem_cache_alloc_noprof+0x108/0x398
[   31.610879]  kmem_cache_oob+0x12c/0x428
[   31.611664]  kunit_try_run_case+0x14c/0x3d0
[   31.612797]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.613919]  kthread+0x24c/0x2d0
[   31.614446]  ret_from_fork+0x10/0x20
[   31.615092] 
[   31.615444] The buggy address belongs to the object at fff00000c5907000
[   31.615444]  which belongs to the cache test_cache of size 200
[   31.616703] The buggy address is located 0 bytes to the right of
[   31.616703]  allocated 200-byte region [fff00000c5907000, fff00000c59070c8)
[   31.618839] 
[   31.619592] The buggy address belongs to the physical page:
[   31.620381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105907
[   31.621653] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.622721] page_type: f5(slab)
[   31.623431] raw: 0bfffe0000000000 fff00000c0ffddc0 dead000000000122 0000000000000000
[   31.624321] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   31.625707] page dumped because: kasan: bad access detected
[   31.626500] 
[   31.627033] Memory state around the buggy address:
[   31.627977]  fff00000c5906f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.629031]  fff00000c5907000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.629972] >fff00000c5907080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   31.630782]                                               ^
[   31.632523]  fff00000c5907100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.633572]  fff00000c5907180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.634707] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
[   31.040265] ==================================================================
[   31.041188] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   31.042006] Free of addr fff00000c63183a0 by task kunit_try_catch/181
[   31.042809] 
[   31.043311] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   31.044864] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.045558] Hardware name: linux,dummy-virt (DT)
[   31.046569] Call trace:
[   31.047240]  show_stack+0x20/0x38 (C)
[   31.047791]  dump_stack_lvl+0x8c/0xd0
[   31.048318]  print_report+0x118/0x5e0
[   31.048979]  kasan_report_invalid_free+0xb0/0xd8
[   31.049753]  check_slab_allocation+0xd4/0x108
[   31.050416]  __kasan_slab_pre_free+0x2c/0x48
[   31.051370]  kfree+0xe8/0x3c8
[   31.051831]  kfree_sensitive+0x3c/0xb0
[   31.052493]  kmalloc_double_kzfree+0x168/0x308
[   31.053171]  kunit_try_run_case+0x14c/0x3d0
[   31.053838]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.054506]  kthread+0x24c/0x2d0
[   31.055572]  ret_from_fork+0x10/0x20
[   31.056205] 
[   31.056529] Allocated by task 181:
[   31.057131]  kasan_save_stack+0x3c/0x68
[   31.057739]  kasan_save_track+0x20/0x40
[   31.058430]  kasan_save_alloc_info+0x40/0x58
[   31.059414]  __kasan_kmalloc+0xd4/0xd8
[   31.060429]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.061150]  kmalloc_double_kzfree+0xb8/0x308
[   31.061743]  kunit_try_run_case+0x14c/0x3d0
[   31.062379]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.063484]  kthread+0x24c/0x2d0
[   31.064029]  ret_from_fork+0x10/0x20
[   31.064849] 
[   31.065133] Freed by task 181:
[   31.065846]  kasan_save_stack+0x3c/0x68
[   31.066651]  kasan_save_track+0x20/0x40
[   31.067604]  kasan_save_free_info+0x4c/0x78
[   31.068216]  __kasan_slab_free+0x6c/0x98
[   31.068692]  kfree+0x114/0x3c8
[   31.069471]  kfree_sensitive+0x80/0xb0
[   31.070089]  kmalloc_double_kzfree+0x11c/0x308
[   31.070792]  kunit_try_run_case+0x14c/0x3d0
[   31.071759]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.072444]  kthread+0x24c/0x2d0
[   31.073037]  ret_from_fork+0x10/0x20
[   31.073627] 
[   31.074018] The buggy address belongs to the object at fff00000c63183a0
[   31.074018]  which belongs to the cache kmalloc-16 of size 16
[   31.075841] The buggy address is located 0 bytes inside of
[   31.075841]  16-byte region [fff00000c63183a0, fff00000c63183b0)
[   31.077185] 
[   31.077562] The buggy address belongs to the physical page:
[   31.078371] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106318
[   31.079874] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.080742] page_type: f5(slab)
[   31.081195] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   31.082774] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   31.083678] page dumped because: kasan: bad access detected
[   31.084024] 
[   31.084190] Memory state around the buggy address:
[   31.084827]  fff00000c6318280: fa fb fc fc fa fb fc fc 00 02 fc fc 00 02 fc fc
[   31.085571]  fff00000c6318300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.086626] >fff00000c6318380: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   31.087682]                                ^
[   31.088388]  fff00000c6318400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.089262]  fff00000c6318480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.090482] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[   30.987439] ==================================================================
[   30.989166] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   30.990064] Read of size 1 at addr fff00000c63183a0 by task kunit_try_catch/181
[   30.992012] 
[   30.992303] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   30.993851] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.994625] Hardware name: linux,dummy-virt (DT)
[   30.995508] Call trace:
[   30.995885]  show_stack+0x20/0x38 (C)
[   30.996656]  dump_stack_lvl+0x8c/0xd0
[   30.997465]  print_report+0x118/0x5e0
[   30.998184]  kasan_report+0xc8/0x118
[   30.998821]  __kasan_check_byte+0x54/0x70
[   30.999728]  kfree_sensitive+0x30/0xb0
[   31.000364]  kmalloc_double_kzfree+0x168/0x308
[   31.001025]  kunit_try_run_case+0x14c/0x3d0
[   31.001760]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.002582]  kthread+0x24c/0x2d0
[   31.003462]  ret_from_fork+0x10/0x20
[   31.003957] 
[   31.004262] Allocated by task 181:
[   31.004756]  kasan_save_stack+0x3c/0x68
[   31.005425]  kasan_save_track+0x20/0x40
[   31.006002]  kasan_save_alloc_info+0x40/0x58
[   31.006590]  __kasan_kmalloc+0xd4/0xd8
[   31.007536]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.008167]  kmalloc_double_kzfree+0xb8/0x308
[   31.008849]  kunit_try_run_case+0x14c/0x3d0
[   31.009764]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.010517]  kthread+0x24c/0x2d0
[   31.011019]  ret_from_fork+0x10/0x20
[   31.012138] 
[   31.012435] Freed by task 181:
[   31.013107]  kasan_save_stack+0x3c/0x68
[   31.013959]  kasan_save_track+0x20/0x40
[   31.014534]  kasan_save_free_info+0x4c/0x78
[   31.015174]  __kasan_slab_free+0x6c/0x98
[   31.015807]  kfree+0x114/0x3c8
[   31.016657]  kfree_sensitive+0x80/0xb0
[   31.017296]  kmalloc_double_kzfree+0x11c/0x308
[   31.017912]  kunit_try_run_case+0x14c/0x3d0
[   31.018526]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.019447]  kthread+0x24c/0x2d0
[   31.020041]  ret_from_fork+0x10/0x20
[   31.020666] 
[   31.020968] The buggy address belongs to the object at fff00000c63183a0
[   31.020968]  which belongs to the cache kmalloc-16 of size 16
[   31.022647] The buggy address is located 0 bytes inside of
[   31.022647]  freed 16-byte region [fff00000c63183a0, fff00000c63183b0)
[   31.024295] 
[   31.024650] The buggy address belongs to the physical page:
[   31.025581] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106318
[   31.026604] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.027835] page_type: f5(slab)
[   31.028601] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   31.029536] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   31.030617] page dumped because: kasan: bad access detected
[   31.031300] 
[   31.031595] Memory state around the buggy address:
[   31.032272]  fff00000c6318280: fa fb fc fc fa fb fc fc 00 02 fc fc 00 02 fc fc
[   31.033601]  fff00000c6318300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   31.034481] >fff00000c6318380: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   31.035533]                                ^
[   31.036107]  fff00000c6318400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.037008]  fff00000c6318480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.037721] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[   30.848512] ==================================================================
[   30.849869] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   30.850914] Write of size 33 at addr fff00000c590c280 by task kunit_try_catch/175
[   30.853300] 
[   30.853626] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   30.855656] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.856672] Hardware name: linux,dummy-virt (DT)
[   30.857432] Call trace:
[   30.857856]  show_stack+0x20/0x38 (C)
[   30.858555]  dump_stack_lvl+0x8c/0xd0
[   30.859164]  print_report+0x118/0x5e0
[   30.859827]  kasan_report+0xc8/0x118
[   30.860499]  kasan_check_range+0x100/0x1a8
[   30.861183]  __asan_memset+0x34/0x78
[   30.862159]  kmalloc_uaf_memset+0x170/0x310
[   30.862713]  kunit_try_run_case+0x14c/0x3d0
[   30.863778]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.865210]  kthread+0x24c/0x2d0
[   30.865899]  ret_from_fork+0x10/0x20
[   30.866466] 
[   30.866785] Allocated by task 175:
[   30.868211]  kasan_save_stack+0x3c/0x68
[   30.869133]  kasan_save_track+0x20/0x40
[   30.869943]  kasan_save_alloc_info+0x40/0x58
[   30.870650]  __kasan_kmalloc+0xd4/0xd8
[   30.871578]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.872650]  kmalloc_uaf_memset+0xb8/0x310
[   30.873271]  kunit_try_run_case+0x14c/0x3d0
[   30.874226]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.875212]  kthread+0x24c/0x2d0
[   30.875714]  ret_from_fork+0x10/0x20
[   30.877000] 
[   30.877562] Freed by task 175:
[   30.878044]  kasan_save_stack+0x3c/0x68
[   30.878615]  kasan_save_track+0x20/0x40
[   30.879863]  kasan_save_free_info+0x4c/0x78
[   30.880413]  __kasan_slab_free+0x6c/0x98
[   30.881244]  kfree+0x114/0x3c8
[   30.881911]  kmalloc_uaf_memset+0x11c/0x310
[   30.882690]  kunit_try_run_case+0x14c/0x3d0
[   30.883558]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.884555]  kthread+0x24c/0x2d0
[   30.885233]  ret_from_fork+0x10/0x20
[   30.885673] 
[   30.885925] The buggy address belongs to the object at fff00000c590c280
[   30.885925]  which belongs to the cache kmalloc-64 of size 64
[   30.886836] The buggy address is located 0 bytes inside of
[   30.886836]  freed 64-byte region [fff00000c590c280, fff00000c590c2c0)
[   30.889298] 
[   30.889713] The buggy address belongs to the physical page:
[   30.890404] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10590c
[   30.891812] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.893198] page_type: f5(slab)
[   30.894257] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.894930] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.896771] page dumped because: kasan: bad access detected
[   30.897552] 
[   30.897921] Memory state around the buggy address:
[   30.898727]  fff00000c590c180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.899744]  fff00000c590c200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.901381] >fff00000c590c280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.902865]                    ^
[   30.903553]  fff00000c590c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.904297]  fff00000c590c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.905138] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   30.729667] ==================================================================
[   30.730901] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e8
[   30.731810] Read of size 64 at addr fff00000c590c104 by task kunit_try_catch/171
[   30.733177] 
[   30.734113] CPU: 1 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   30.735752] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.736364] Hardware name: linux,dummy-virt (DT)
[   30.736958] Call trace:
[   30.737299]  show_stack+0x20/0x38 (C)
[   30.738178]  dump_stack_lvl+0x8c/0xd0
[   30.738875]  print_report+0x118/0x5e0
[   30.740175]  kasan_report+0xc8/0x118
[   30.740754]  kasan_check_range+0x100/0x1a8
[   30.741353]  __asan_memmove+0x3c/0x98
[   30.742018]  kmalloc_memmove_invalid_size+0x154/0x2e8
[   30.743251]  kunit_try_run_case+0x14c/0x3d0
[   30.743895]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.744655]  kthread+0x24c/0x2d0
[   30.745153]  ret_from_fork+0x10/0x20
[   30.745838] 
[   30.746123] Allocated by task 171:
[   30.746656]  kasan_save_stack+0x3c/0x68
[   30.748030]  kasan_save_track+0x20/0x40
[   30.748718]  kasan_save_alloc_info+0x40/0x58
[   30.749362]  __kasan_kmalloc+0xd4/0xd8
[   30.749998]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.750859]  kmalloc_memmove_invalid_size+0xb0/0x2e8
[   30.751842]  kunit_try_run_case+0x14c/0x3d0
[   30.752417]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.753278]  kthread+0x24c/0x2d0
[   30.753809]  ret_from_fork+0x10/0x20
[   30.754461] 
[   30.754806] The buggy address belongs to the object at fff00000c590c100
[   30.754806]  which belongs to the cache kmalloc-64 of size 64
[   30.756803] The buggy address is located 4 bytes inside of
[   30.756803]  allocated 64-byte region [fff00000c590c100, fff00000c590c140)
[   30.758014] 
[   30.758392] The buggy address belongs to the physical page:
[   30.759070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10590c
[   30.760078] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.760890] page_type: f5(slab)
[   30.761772] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.762696] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.763795] page dumped because: kasan: bad access detected
[   30.764470] 
[   30.764763] Memory state around the buggy address:
[   30.765469]  fff00000c590c000: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[   30.767865]  fff00000c590c080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.768778] >fff00000c590c100: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   30.769738]                                            ^
[   30.770303]  fff00000c590c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.772316]  fff00000c590c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.773104] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   30.676982] ==================================================================
[   30.678278] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   30.679118] Read of size 18446744073709551614 at addr fff00000c634df84 by task kunit_try_catch/169
[   30.681159] 
[   30.681483] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   30.682596] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.683617] Hardware name: linux,dummy-virt (DT)
[   30.684530] Call trace:
[   30.684990]  show_stack+0x20/0x38 (C)
[   30.685671]  dump_stack_lvl+0x8c/0xd0
[   30.686314]  print_report+0x118/0x5e0
[   30.687454]  kasan_report+0xc8/0x118
[   30.688050]  kasan_check_range+0x100/0x1a8
[   30.688675]  __asan_memmove+0x3c/0x98
[   30.689274]  kmalloc_memmove_negative_size+0x154/0x2e0
[   30.690060]  kunit_try_run_case+0x14c/0x3d0
[   30.690675]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.691886]  kthread+0x24c/0x2d0
[   30.692429]  ret_from_fork+0x10/0x20
[   30.693048] 
[   30.693473] Allocated by task 169:
[   30.693979]  kasan_save_stack+0x3c/0x68
[   30.694596]  kasan_save_track+0x20/0x40
[   30.695244]  kasan_save_alloc_info+0x40/0x58
[   30.695879]  __kasan_kmalloc+0xd4/0xd8
[   30.696468]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.697176]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   30.698280]  kunit_try_run_case+0x14c/0x3d0
[   30.699358]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.700248]  kthread+0x24c/0x2d0
[   30.700753]  ret_from_fork+0x10/0x20
[   30.701286] 
[   30.701702] The buggy address belongs to the object at fff00000c634df80
[   30.701702]  which belongs to the cache kmalloc-64 of size 64
[   30.703580] The buggy address is located 4 bytes inside of
[   30.703580]  64-byte region [fff00000c634df80, fff00000c634dfc0)
[   30.704814] 
[   30.705135] The buggy address belongs to the physical page:
[   30.706049] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10634d
[   30.706950] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.708611] page_type: f5(slab)
[   30.709189] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.710210] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.711190] page dumped because: kasan: bad access detected
[   30.711821] 
[   30.712180] Memory state around the buggy address:
[   30.712839]  fff00000c634de80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   30.714361]  fff00000c634df00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   30.715254] >fff00000c634df80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   30.716113]                    ^
[   30.716627]  fff00000c634e000: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   30.718295]  fff00000c634e080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   30.719039] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset
[   30.464501] ==================================================================
[   30.465637] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   30.466495] Write of size 2 at addr fff00000c58d3877 by task kunit_try_catch/161
[   30.467226] 
[   30.467648] CPU: 0 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   30.468886] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.470153] Hardware name: linux,dummy-virt (DT)
[   30.471435] Call trace:
[   30.472193]  show_stack+0x20/0x38 (C)
[   30.473615]  dump_stack_lvl+0x8c/0xd0
[   30.474509]  print_report+0x118/0x5e0
[   30.475423]  kasan_report+0xc8/0x118
[   30.476416]  kasan_check_range+0x100/0x1a8
[   30.477343]  __asan_memset+0x34/0x78
[   30.477953]  kmalloc_oob_memset_2+0x150/0x2f8
[   30.478682]  kunit_try_run_case+0x14c/0x3d0
[   30.479813]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.480919]  kthread+0x24c/0x2d0
[   30.481355]  ret_from_fork+0x10/0x20
[   30.481797] 
[   30.482238] Allocated by task 161:
[   30.482781]  kasan_save_stack+0x3c/0x68
[   30.483295]  kasan_save_track+0x20/0x40
[   30.484096]  kasan_save_alloc_info+0x40/0x58
[   30.484836]  __kasan_kmalloc+0xd4/0xd8
[   30.485482]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.486423]  kmalloc_oob_memset_2+0xb0/0x2f8
[   30.487753]  kunit_try_run_case+0x14c/0x3d0
[   30.488977]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.489606]  kthread+0x24c/0x2d0
[   30.490495]  ret_from_fork+0x10/0x20
[   30.491156] 
[   30.491510] The buggy address belongs to the object at fff00000c58d3800
[   30.491510]  which belongs to the cache kmalloc-128 of size 128
[   30.493592] The buggy address is located 119 bytes inside of
[   30.493592]  allocated 120-byte region [fff00000c58d3800, fff00000c58d3878)
[   30.494898] 
[   30.495740] The buggy address belongs to the physical page:
[   30.496404] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d3
[   30.497904] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.498915] page_type: f5(slab)
[   30.499713] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.500902] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.501963] page dumped because: kasan: bad access detected
[   30.502774] 
[   30.503412] Memory state around the buggy address:
[   30.504191]  fff00000c58d3700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   30.505386]  fff00000c58d3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.506495] >fff00000c58d3800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.508099]                                                                 ^
[   30.509063]  fff00000c58d3880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.509797]  fff00000c58d3900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.511209] ==================================================================
[   30.521596] ==================================================================
[   30.522676] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   30.523608] Write of size 4 at addr fff00000c58d3975 by task kunit_try_catch/163
[   30.524698] 
[   30.525136] CPU: 0 UID: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   30.526789] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.527412] Hardware name: linux,dummy-virt (DT)
[   30.527991] Call trace:
[   30.528482]  show_stack+0x20/0x38 (C)
[   30.529105]  dump_stack_lvl+0x8c/0xd0
[   30.529862]  print_report+0x118/0x5e0
[   30.530397]  kasan_report+0xc8/0x118
[   30.531111]  kasan_check_range+0x100/0x1a8
[   30.531893]  __asan_memset+0x34/0x78
[   30.532622]  kmalloc_oob_memset_4+0x150/0x300
[   30.533247]  kunit_try_run_case+0x14c/0x3d0
[   30.534640]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.535417]  kthread+0x24c/0x2d0
[   30.535971]  ret_from_fork+0x10/0x20
[   30.536552] 
[   30.536975] Allocated by task 163:
[   30.537452]  kasan_save_stack+0x3c/0x68
[   30.538122]  kasan_save_track+0x20/0x40
[   30.538751]  kasan_save_alloc_info+0x40/0x58
[   30.540119]  __kasan_kmalloc+0xd4/0xd8
[   30.540704]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.541380]  kmalloc_oob_memset_4+0xb0/0x300
[   30.541930]  kunit_try_run_case+0x14c/0x3d0
[   30.542603]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.543633]  kthread+0x24c/0x2d0
[   30.544412]  ret_from_fork+0x10/0x20
[   30.544990] 
[   30.545311] The buggy address belongs to the object at fff00000c58d3900
[   30.545311]  which belongs to the cache kmalloc-128 of size 128
[   30.546756] The buggy address is located 117 bytes inside of
[   30.546756]  allocated 120-byte region [fff00000c58d3900, fff00000c58d3978)
[   30.549746] 
[   30.550176] The buggy address belongs to the physical page:
[   30.550882] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d3
[   30.552644] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.553498] page_type: f5(slab)
[   30.554160] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.555281] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.556228] page dumped because: kasan: bad access detected
[   30.557343] 
[   30.557745] Memory state around the buggy address:
[   30.558491]  fff00000c58d3800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.559639]  fff00000c58d3880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.560947] >fff00000c58d3900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.561738]                                                                 ^
[   30.562478]  fff00000c58d3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.563872]  fff00000c58d3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.564992] ==================================================================
[   30.574914] ==================================================================
[   30.576739] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   30.577761] Write of size 8 at addr fff00000c58d3a71 by task kunit_try_catch/165
[   30.578725] 
[   30.579503] CPU: 0 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   30.580721] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.581513] Hardware name: linux,dummy-virt (DT)
[   30.582234] Call trace:
[   30.582643]  show_stack+0x20/0x38 (C)
[   30.583294]  dump_stack_lvl+0x8c/0xd0
[   30.584145]  print_report+0x118/0x5e0
[   30.585094]  kasan_report+0xc8/0x118
[   30.585588]  kasan_check_range+0x100/0x1a8
[   30.586309]  __asan_memset+0x34/0x78
[   30.587039]  kmalloc_oob_memset_8+0x150/0x2f8
[   30.588118]  kunit_try_run_case+0x14c/0x3d0
[   30.588939]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.589764]  kthread+0x24c/0x2d0
[   30.590417]  ret_from_fork+0x10/0x20
[   30.591574] 
[   30.591848] Allocated by task 165:
[   30.592492]  kasan_save_stack+0x3c/0x68
[   30.593216]  kasan_save_track+0x20/0x40
[   30.593932]  kasan_save_alloc_info+0x40/0x58
[   30.594491]  __kasan_kmalloc+0xd4/0xd8
[   30.595724]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.596550]  kmalloc_oob_memset_8+0xb0/0x2f8
[   30.597198]  kunit_try_run_case+0x14c/0x3d0
[   30.597894]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.598556]  kthread+0x24c/0x2d0
[   30.599457]  ret_from_fork+0x10/0x20
[   30.599860] 
[   30.600198] The buggy address belongs to the object at fff00000c58d3a00
[   30.600198]  which belongs to the cache kmalloc-128 of size 128
[   30.602241] The buggy address is located 113 bytes inside of
[   30.602241]  allocated 120-byte region [fff00000c58d3a00, fff00000c58d3a78)
[   30.604285] 
[   30.604721] The buggy address belongs to the physical page:
[   30.605687] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d3
[   30.606864] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.607825] page_type: f5(slab)
[   30.608289] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.609451] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.610537] page dumped because: kasan: bad access detected
[   30.611343] 
[   30.611601] Memory state around the buggy address:
[   30.612289]  fff00000c58d3900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.613346]  fff00000c58d3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.614180] >fff00000c58d3a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.615504]                                                                 ^
[   30.616361]  fff00000c58d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.617435]  fff00000c58d3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.618303] ==================================================================
[   30.628503] ==================================================================
[   30.629696] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   30.630585] Write of size 16 at addr fff00000c58d3b69 by task kunit_try_catch/167
[   30.631362] 
[   30.631738] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   30.632813] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.633558] Hardware name: linux,dummy-virt (DT)
[   30.634440] Call trace:
[   30.634804]  show_stack+0x20/0x38 (C)
[   30.635502]  dump_stack_lvl+0x8c/0xd0
[   30.636171]  print_report+0x118/0x5e0
[   30.636893]  kasan_report+0xc8/0x118
[   30.637470]  kasan_check_range+0x100/0x1a8
[   30.638102]  __asan_memset+0x34/0x78
[   30.638790]  kmalloc_oob_memset_16+0x150/0x2f8
[   30.639440]  kunit_try_run_case+0x14c/0x3d0
[   30.640139]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.640927]  kthread+0x24c/0x2d0
[   30.641581]  ret_from_fork+0x10/0x20
[   30.642200] 
[   30.642508] Allocated by task 167:
[   30.643068]  kasan_save_stack+0x3c/0x68
[   30.643791]  kasan_save_track+0x20/0x40
[   30.644405]  kasan_save_alloc_info+0x40/0x58
[   30.644975]  __kasan_kmalloc+0xd4/0xd8
[   30.645517]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.646216]  kmalloc_oob_memset_16+0xb0/0x2f8
[   30.646840]  kunit_try_run_case+0x14c/0x3d0
[   30.647451]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.648176]  kthread+0x24c/0x2d0
[   30.648634]  ret_from_fork+0x10/0x20
[   30.649225] 
[   30.649588] The buggy address belongs to the object at fff00000c58d3b00
[   30.649588]  which belongs to the cache kmalloc-128 of size 128
[   30.651036] The buggy address is located 105 bytes inside of
[   30.651036]  allocated 120-byte region [fff00000c58d3b00, fff00000c58d3b78)
[   30.652431] 
[   30.652745] The buggy address belongs to the physical page:
[   30.653585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d3
[   30.654525] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.655366] page_type: f5(slab)
[   30.655985] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.656853] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.657926] page dumped because: kasan: bad access detected
[   30.658559] 
[   30.658889] Memory state around the buggy address:
[   30.659580]  fff00000c58d3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.660460]  fff00000c58d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.661264] >fff00000c58d3b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.662150]                                                                 ^
[   30.663023]  fff00000c58d3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.663968]  fff00000c58d3c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.664912] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   30.409160] ==================================================================
[   30.410312] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   30.411076] Write of size 128 at addr fff00000c58e8400 by task kunit_try_catch/159
[   30.411985] 
[   30.412317] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   30.414922] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.415986] Hardware name: linux,dummy-virt (DT)
[   30.416607] Call trace:
[   30.417032]  show_stack+0x20/0x38 (C)
[   30.417634]  dump_stack_lvl+0x8c/0xd0
[   30.418231]  print_report+0x118/0x5e0
[   30.419022]  kasan_report+0xc8/0x118
[   30.419967]  kasan_check_range+0x100/0x1a8
[   30.420596]  __asan_memset+0x34/0x78
[   30.421123]  kmalloc_oob_in_memset+0x144/0x2d0
[   30.421771]  kunit_try_run_case+0x14c/0x3d0
[   30.422697]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.424063]  kthread+0x24c/0x2d0
[   30.424632]  ret_from_fork+0x10/0x20
[   30.425181] 
[   30.425911] Allocated by task 159:
[   30.426444]  kasan_save_stack+0x3c/0x68
[   30.427026]  kasan_save_track+0x20/0x40
[   30.427628]  kasan_save_alloc_info+0x40/0x58
[   30.428257]  __kasan_kmalloc+0xd4/0xd8
[   30.428834]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.429486]  kmalloc_oob_in_memset+0xb0/0x2d0
[   30.430092]  kunit_try_run_case+0x14c/0x3d0
[   30.431181]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.432201]  kthread+0x24c/0x2d0
[   30.433439]  ret_from_fork+0x10/0x20
[   30.433961] 
[   30.434278] The buggy address belongs to the object at fff00000c58e8400
[   30.434278]  which belongs to the cache kmalloc-128 of size 128
[   30.435998] The buggy address is located 0 bytes inside of
[   30.435998]  allocated 120-byte region [fff00000c58e8400, fff00000c58e8478)
[   30.437860] 
[   30.438464] The buggy address belongs to the physical page:
[   30.439605] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058e8
[   30.440609] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.441409] page_type: f5(slab)
[   30.441859] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.442889] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.443812] page dumped because: kasan: bad access detected
[   30.444556] 
[   30.444912] Memory state around the buggy address:
[   30.445918]  fff00000c58e8300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.446785]  fff00000c58e8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.447986] >fff00000c58e8400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.448830]                                                                 ^
[   30.449705]  fff00000c58e8480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.450600]  fff00000c58e8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.452063] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[   30.351994] ==================================================================
[   30.353151] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   30.353958] Read of size 16 at addr fff00000c5732760 by task kunit_try_catch/157
[   30.354976] 
[   30.355494] CPU: 1 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   30.356974] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.357515] Hardware name: linux,dummy-virt (DT)
[   30.358135] Call trace:
[   30.358947]  show_stack+0x20/0x38 (C)
[   30.359700]  dump_stack_lvl+0x8c/0xd0
[   30.360283]  print_report+0x118/0x5e0
[   30.360938]  kasan_report+0xc8/0x118
[   30.361484]  __asan_report_load16_noabort+0x20/0x30
[   30.362093]  kmalloc_uaf_16+0x3bc/0x438
[   30.362760]  kunit_try_run_case+0x14c/0x3d0
[   30.363651]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.364388]  kthread+0x24c/0x2d0
[   30.364978]  ret_from_fork+0x10/0x20
[   30.365503] 
[   30.365873] Allocated by task 157:
[   30.366341]  kasan_save_stack+0x3c/0x68
[   30.367294]  kasan_save_track+0x20/0x40
[   30.367974]  kasan_save_alloc_info+0x40/0x58
[   30.368603]  __kasan_kmalloc+0xd4/0xd8
[   30.369127]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.369812]  kmalloc_uaf_16+0x140/0x438
[   30.370487]  kunit_try_run_case+0x14c/0x3d0
[   30.371247]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.371928]  kthread+0x24c/0x2d0
[   30.372493]  ret_from_fork+0x10/0x20
[   30.373143] 
[   30.373512] Freed by task 157:
[   30.373965]  kasan_save_stack+0x3c/0x68
[   30.374623]  kasan_save_track+0x20/0x40
[   30.376243]  kasan_save_free_info+0x4c/0x78
[   30.376811]  __kasan_slab_free+0x6c/0x98
[   30.377479]  kfree+0x114/0x3c8
[   30.377944]  kmalloc_uaf_16+0x190/0x438
[   30.378689]  kunit_try_run_case+0x14c/0x3d0
[   30.379446]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.380279]  kthread+0x24c/0x2d0
[   30.381163]  ret_from_fork+0x10/0x20
[   30.381667] 
[   30.382025] The buggy address belongs to the object at fff00000c5732760
[   30.382025]  which belongs to the cache kmalloc-16 of size 16
[   30.383679] The buggy address is located 0 bytes inside of
[   30.383679]  freed 16-byte region [fff00000c5732760, fff00000c5732770)
[   30.385057] 
[   30.385384] The buggy address belongs to the physical page:
[   30.386203] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105732
[   30.387434] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.388305] page_type: f5(slab)
[   30.388776] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   30.389787] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   30.390732] page dumped because: kasan: bad access detected
[   30.391686] 
[   30.391983] Memory state around the buggy address:
[   30.392736]  fff00000c5732600: 00 02 fc fc 00 05 fc fc fa fb fc fc 00 02 fc fc
[   30.393570]  fff00000c5732680: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.394455] >fff00000c5732700: fa fb fc fc 00 04 fc fc 00 00 fc fc fa fb fc fc
[   30.395686]                                                        ^
[   30.396554]  fff00000c5732780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.397625]  fff00000c5732800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.399361] ==================================================================
[   30.918257] ==================================================================
[   30.919968] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   30.920895] Read of size 1 at addr fff00000c642e3a8 by task kunit_try_catch/177
[   30.921978] 
[   30.922381] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   30.923787] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.924735] Hardware name: linux,dummy-virt (DT)
[   30.925552] Call trace:
[   30.926064]  show_stack+0x20/0x38 (C)
[   30.926822]  dump_stack_lvl+0x8c/0xd0
[   30.927649]  print_report+0x118/0x5e0
[   30.928545]  kasan_report+0xc8/0x118
[   30.929126]  __asan_report_load1_noabort+0x20/0x30
[   30.929983]  kmalloc_uaf2+0x3f4/0x468
[   30.930550]  kunit_try_run_case+0x14c/0x3d0
[   30.931665]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.932492]  kthread+0x24c/0x2d0
[   30.933053]  ret_from_fork+0x10/0x20
[   30.933755] 
[   30.934182] Allocated by task 177:
[   30.934773]  kasan_save_stack+0x3c/0x68
[   30.936104]  kasan_save_track+0x20/0x40
[   30.936694]  kasan_save_alloc_info+0x40/0x58
[   30.937273]  __kasan_kmalloc+0xd4/0xd8
[   30.937809]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.938892]  kmalloc_uaf2+0xc4/0x468
[   30.939316]  kunit_try_run_case+0x14c/0x3d0
[   30.940385]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.941599]  kthread+0x24c/0x2d0
[   30.942471]  ret_from_fork+0x10/0x20
[   30.942963] 
[   30.943502] Freed by task 177:
[   30.944237]  kasan_save_stack+0x3c/0x68
[   30.944959]  kasan_save_track+0x20/0x40
[   30.945600]  kasan_save_free_info+0x4c/0x78
[   30.946206]  __kasan_slab_free+0x6c/0x98
[   30.946910]  kfree+0x114/0x3c8
[   30.947448]  kmalloc_uaf2+0x134/0x468
[   30.948172]  kunit_try_run_case+0x14c/0x3d0
[   30.948850]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.949768]  kthread+0x24c/0x2d0
[   30.950408]  ret_from_fork+0x10/0x20
[   30.951115] 
[   30.951388] The buggy address belongs to the object at fff00000c642e380
[   30.951388]  which belongs to the cache kmalloc-64 of size 64
[   30.953134] The buggy address is located 40 bytes inside of
[   30.953134]  freed 64-byte region [fff00000c642e380, fff00000c642e3c0)
[   30.954638] 
[   30.955459] The buggy address belongs to the physical page:
[   30.955960] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10642e
[   30.957093] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.958053] page_type: f5(slab)
[   30.958693] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.959735] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.960690] page dumped because: kasan: bad access detected
[   30.961587] 
[   30.962129] Memory state around the buggy address:
[   30.962875]  fff00000c642e280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.963890]  fff00000c642e300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.964904] >fff00000c642e380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.965899]                                   ^
[   30.966712]  fff00000c642e400: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   30.967886]  fff00000c642e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.968870] ==================================================================
[   30.785979] ==================================================================
[   30.787445] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   30.789576] Read of size 1 at addr fff00000c6318388 by task kunit_try_catch/173
[   30.790487] 
[   30.790800] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   30.793208] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.793869] Hardware name: linux,dummy-virt (DT)
[   30.794434] Call trace:
[   30.794895]  show_stack+0x20/0x38 (C)
[   30.795945]  dump_stack_lvl+0x8c/0xd0
[   30.796618]  print_report+0x118/0x5e0
[   30.797351]  kasan_report+0xc8/0x118
[   30.798045]  __asan_report_load1_noabort+0x20/0x30
[   30.798927]  kmalloc_uaf+0x300/0x338
[   30.799841]  kunit_try_run_case+0x14c/0x3d0
[   30.800657]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.801413]  kthread+0x24c/0x2d0
[   30.801960]  ret_from_fork+0x10/0x20
[   30.803584] 
[   30.804520] Allocated by task 173:
[   30.805428]  kasan_save_stack+0x3c/0x68
[   30.805991]  kasan_save_track+0x20/0x40
[   30.806602]  kasan_save_alloc_info+0x40/0x58
[   30.807308]  __kasan_kmalloc+0xd4/0xd8
[   30.808424]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.808900]  kmalloc_uaf+0xb8/0x338
[   30.809298]  kunit_try_run_case+0x14c/0x3d0
[   30.810129]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.811433]  kthread+0x24c/0x2d0
[   30.812045]  ret_from_fork+0x10/0x20
[   30.812729] 
[   30.813071] Freed by task 173:
[   30.813591]  kasan_save_stack+0x3c/0x68
[   30.814201]  kasan_save_track+0x20/0x40
[   30.814978]  kasan_save_free_info+0x4c/0x78
[   30.815765]  __kasan_slab_free+0x6c/0x98
[   30.816198]  kfree+0x114/0x3c8
[   30.816949]  kmalloc_uaf+0x11c/0x338
[   30.817970]  kunit_try_run_case+0x14c/0x3d0
[   30.818597]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.819438]  kthread+0x24c/0x2d0
[   30.820208]  ret_from_fork+0x10/0x20
[   30.820833] 
[   30.821131] The buggy address belongs to the object at fff00000c6318380
[   30.821131]  which belongs to the cache kmalloc-16 of size 16
[   30.822688] The buggy address is located 8 bytes inside of
[   30.822688]  freed 16-byte region [fff00000c6318380, fff00000c6318390)
[   30.825072] 
[   30.825580] The buggy address belongs to the physical page:
[   30.826384] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106318
[   30.827178] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.828826] page_type: f5(slab)
[   30.829224] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   30.829760] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   30.830222] page dumped because: kasan: bad access detected
[   30.830797] 
[   30.831146] Memory state around the buggy address:
[   30.832545]  fff00000c6318280: fa fb fc fc fa fb fc fc 00 02 fc fc 00 02 fc fc
[   30.833236]  fff00000c6318300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.834281] >fff00000c6318380: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.835771]                       ^
[   30.836315]  fff00000c6318400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.837213]  fff00000c6318480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.838427] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob
[   30.298633] ==================================================================
[   30.299895] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   30.300511] Write of size 16 at addr fff00000c6318340 by task kunit_try_catch/155
[   30.302216] 
[   30.302773] CPU: 0 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   30.304437] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.305431] Hardware name: linux,dummy-virt (DT)
[   30.306245] Call trace:
[   30.306723]  show_stack+0x20/0x38 (C)
[   30.307687]  dump_stack_lvl+0x8c/0xd0
[   30.308198]  print_report+0x118/0x5e0
[   30.308779]  kasan_report+0xc8/0x118
[   30.309309]  __asan_report_store16_noabort+0x20/0x30
[   30.309980]  kmalloc_oob_16+0x3a0/0x3f8
[   30.310744]  kunit_try_run_case+0x14c/0x3d0
[   30.311626]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.312740]  kthread+0x24c/0x2d0
[   30.313388]  ret_from_fork+0x10/0x20
[   30.314041] 
[   30.314513] Allocated by task 155:
[   30.315140]  kasan_save_stack+0x3c/0x68
[   30.315780]  kasan_save_track+0x20/0x40
[   30.316804]  kasan_save_alloc_info+0x40/0x58
[   30.317516]  __kasan_kmalloc+0xd4/0xd8
[   30.318117]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.318846]  kmalloc_oob_16+0xb4/0x3f8
[   30.319559]  kunit_try_run_case+0x14c/0x3d0
[   30.320175]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.321422]  kthread+0x24c/0x2d0
[   30.321887]  ret_from_fork+0x10/0x20
[   30.322371] 
[   30.322696] The buggy address belongs to the object at fff00000c6318340
[   30.322696]  which belongs to the cache kmalloc-16 of size 16
[   30.324276] The buggy address is located 0 bytes inside of
[   30.324276]  allocated 13-byte region [fff00000c6318340, fff00000c631834d)
[   30.325997] 
[   30.326444] The buggy address belongs to the physical page:
[   30.327543] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106318
[   30.328611] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.329733] page_type: f5(slab)
[   30.330315] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   30.331650] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   30.332505] page dumped because: kasan: bad access detected
[   30.333418] 
[   30.333883] Memory state around the buggy address:
[   30.334522]  fff00000c6318200: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   30.336058]  fff00000c6318280: fa fb fc fc fa fb fc fc 00 02 fc fc 00 02 fc fc
[   30.336894] >fff00000c6318300: fa fb fc fc fa fb fc fc 00 05 fc fc 00 00 fc fc
[   30.337931]                                               ^
[   30.338726]  fff00000c6318380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.339882]  fff00000c6318400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.340904] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[   30.187707] ==================================================================
[   30.189169] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   30.189998] Read of size 1 at addr fff00000c1b68c00 by task kunit_try_catch/153
[   30.190754] 
[   30.191111] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   30.193546] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.194306] Hardware name: linux,dummy-virt (DT)
[   30.194861] Call trace:
[   30.195347]  show_stack+0x20/0x38 (C)
[   30.195955]  dump_stack_lvl+0x8c/0xd0
[   30.196615]  print_report+0x118/0x5e0
[   30.197195]  kasan_report+0xc8/0x118
[   30.197741]  __kasan_check_byte+0x54/0x70
[   30.198252]  krealloc_noprof+0x44/0x360
[   30.198944]  krealloc_uaf+0x180/0x520
[   30.199603]  kunit_try_run_case+0x14c/0x3d0
[   30.200301]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.201111]  kthread+0x24c/0x2d0
[   30.201638]  ret_from_fork+0x10/0x20
[   30.202265] 
[   30.202624] Allocated by task 153:
[   30.203096]  kasan_save_stack+0x3c/0x68
[   30.203762]  kasan_save_track+0x20/0x40
[   30.204297]  kasan_save_alloc_info+0x40/0x58
[   30.204998]  __kasan_kmalloc+0xd4/0xd8
[   30.205501]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.206221]  krealloc_uaf+0xc8/0x520
[   30.206694]  kunit_try_run_case+0x14c/0x3d0
[   30.207397]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.208048]  kthread+0x24c/0x2d0
[   30.208726]  ret_from_fork+0x10/0x20
[   30.209273] 
[   30.209580] Freed by task 153:
[   30.210057]  kasan_save_stack+0x3c/0x68
[   30.210704]  kasan_save_track+0x20/0x40
[   30.211398]  kasan_save_free_info+0x4c/0x78
[   30.212008]  __kasan_slab_free+0x6c/0x98
[   30.212620]  kfree+0x114/0x3c8
[   30.213051]  krealloc_uaf+0x12c/0x520
[   30.213690]  kunit_try_run_case+0x14c/0x3d0
[   30.214287]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.215041]  kthread+0x24c/0x2d0
[   30.215515]  ret_from_fork+0x10/0x20
[   30.216158] 
[   30.216530] The buggy address belongs to the object at fff00000c1b68c00
[   30.216530]  which belongs to the cache kmalloc-256 of size 256
[   30.218196] The buggy address is located 0 bytes inside of
[   30.218196]  freed 256-byte region [fff00000c1b68c00, fff00000c1b68d00)
[   30.219552] 
[   30.219830] The buggy address belongs to the physical page:
[   30.220602] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b68
[   30.221568] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.222560] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.223453] page_type: f5(slab)
[   30.223926] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.224803] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.225817] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.226852] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.227788] head: 0bfffe0000000001 ffffc1ffc306da01 ffffffffffffffff 0000000000000000
[   30.228771] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   30.229670] page dumped because: kasan: bad access detected
[   30.230310] 
[   30.230689] Memory state around the buggy address:
[   30.231413]  fff00000c1b68b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.232202]  fff00000c1b68b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.233037] >fff00000c1b68c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.234143]                    ^
[   30.234808]  fff00000c1b68c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.235853]  fff00000c1b68d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.236804] ==================================================================
[   30.239465] ==================================================================
[   30.240381] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   30.241802] Read of size 1 at addr fff00000c1b68c00 by task kunit_try_catch/153
[   30.242616] 
[   30.243577] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   30.245110] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.245669] Hardware name: linux,dummy-virt (DT)
[   30.246319] Call trace:
[   30.246723]  show_stack+0x20/0x38 (C)
[   30.247827]  dump_stack_lvl+0x8c/0xd0
[   30.248353]  print_report+0x118/0x5e0
[   30.248998]  kasan_report+0xc8/0x118
[   30.249568]  __asan_report_load1_noabort+0x20/0x30
[   30.250241]  krealloc_uaf+0x4c8/0x520
[   30.250889]  kunit_try_run_case+0x14c/0x3d0
[   30.251488]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.252369]  kthread+0x24c/0x2d0
[   30.252913]  ret_from_fork+0x10/0x20
[   30.253521] 
[   30.253835] Allocated by task 153:
[   30.254266]  kasan_save_stack+0x3c/0x68
[   30.254976]  kasan_save_track+0x20/0x40
[   30.255647]  kasan_save_alloc_info+0x40/0x58
[   30.256268]  __kasan_kmalloc+0xd4/0xd8
[   30.256833]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.257445]  krealloc_uaf+0xc8/0x520
[   30.257999]  kunit_try_run_case+0x14c/0x3d0
[   30.258759]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.260191]  kthread+0x24c/0x2d0
[   30.260605]  ret_from_fork+0x10/0x20
[   30.261020] 
[   30.261196] Freed by task 153:
[   30.261964]  kasan_save_stack+0x3c/0x68
[   30.262647]  kasan_save_track+0x20/0x40
[   30.263126]  kasan_save_free_info+0x4c/0x78
[   30.264078]  __kasan_slab_free+0x6c/0x98
[   30.264776]  kfree+0x114/0x3c8
[   30.265408]  krealloc_uaf+0x12c/0x520
[   30.266066]  kunit_try_run_case+0x14c/0x3d0
[   30.266831]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.267554]  kthread+0x24c/0x2d0
[   30.268050]  ret_from_fork+0x10/0x20
[   30.268649] 
[   30.268936] The buggy address belongs to the object at fff00000c1b68c00
[   30.268936]  which belongs to the cache kmalloc-256 of size 256
[   30.270496] The buggy address is located 0 bytes inside of
[   30.270496]  freed 256-byte region [fff00000c1b68c00, fff00000c1b68d00)
[   30.271856] 
[   30.272160] The buggy address belongs to the physical page:
[   30.272859] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b68
[   30.273754] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.274806] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.275602] page_type: f5(slab)
[   30.276283] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.277487] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.278403] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   30.279319] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.280245] head: 0bfffe0000000001 ffffc1ffc306da01 ffffffffffffffff 0000000000000000
[   30.281226] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   30.282273] page dumped because: kasan: bad access detected
[   30.283196] 
[   30.283672] Memory state around the buggy address:
[   30.284500]  fff00000c1b68b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.285345]  fff00000c1b68b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.286180] >fff00000c1b68c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.286817]                    ^
[   30.287204]  fff00000c1b68c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.287922]  fff00000c1b68d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.288781] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   30.102312] ==================================================================
[   30.103165] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   30.103999] Write of size 1 at addr fff00000c65520ea by task kunit_try_catch/151
[   30.104849] 
[   30.105378] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   30.106735] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.107763] Hardware name: linux,dummy-virt (DT)
[   30.109348] Call trace:
[   30.109739]  show_stack+0x20/0x38 (C)
[   30.110348]  dump_stack_lvl+0x8c/0xd0
[   30.111152]  print_report+0x118/0x5e0
[   30.111893]  kasan_report+0xc8/0x118
[   30.112547]  __asan_report_store1_noabort+0x20/0x30
[   30.113189]  krealloc_less_oob_helper+0xae4/0xc50
[   30.113916]  krealloc_large_less_oob+0x20/0x38
[   30.114673]  kunit_try_run_case+0x14c/0x3d0
[   30.115486]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.116446]  kthread+0x24c/0x2d0
[   30.117189]  ret_from_fork+0x10/0x20
[   30.118157] 
[   30.118679] The buggy address belongs to the physical page:
[   30.120104] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106550
[   30.121427] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.122594] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.123891] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.125034] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.126167] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.127425] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.128443] head: 0bfffe0000000002 ffffc1ffc3195401 ffffffffffffffff 0000000000000000
[   30.129410] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.130473] page dumped because: kasan: bad access detected
[   30.131315] 
[   30.131834] Memory state around the buggy address:
[   30.132306]  fff00000c6551f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.133816]  fff00000c6552000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.134252] >fff00000c6552080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.135657]                                                           ^
[   30.136713]  fff00000c6552100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.137667]  fff00000c6552180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.138705] ==================================================================
[   29.757363] ==================================================================
[   29.758213] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   29.759210] Write of size 1 at addr fff00000c09752da by task kunit_try_catch/147
[   29.760531] 
[   29.760822] CPU: 0 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   29.762011] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.762907] Hardware name: linux,dummy-virt (DT)
[   29.763745] Call trace:
[   29.764317]  show_stack+0x20/0x38 (C)
[   29.765129]  dump_stack_lvl+0x8c/0xd0
[   29.765935]  print_report+0x118/0x5e0
[   29.766714]  kasan_report+0xc8/0x118
[   29.767510]  __asan_report_store1_noabort+0x20/0x30
[   29.768406]  krealloc_less_oob_helper+0xa80/0xc50
[   29.769271]  krealloc_less_oob+0x20/0x38
[   29.770047]  kunit_try_run_case+0x14c/0x3d0
[   29.770891]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.771860]  kthread+0x24c/0x2d0
[   29.772384]  ret_from_fork+0x10/0x20
[   29.772936] 
[   29.773246] Allocated by task 147:
[   29.773765]  kasan_save_stack+0x3c/0x68
[   29.774393]  kasan_save_track+0x20/0x40
[   29.775406]  kasan_save_alloc_info+0x40/0x58
[   29.776051]  __kasan_krealloc+0x118/0x178
[   29.776944]  krealloc_noprof+0x128/0x360
[   29.777600]  krealloc_less_oob_helper+0x168/0xc50
[   29.778529]  krealloc_less_oob+0x20/0x38
[   29.779254]  kunit_try_run_case+0x14c/0x3d0
[   29.779902]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.780952]  kthread+0x24c/0x2d0
[   29.781704]  ret_from_fork+0x10/0x20
[   29.782404] 
[   29.782959] The buggy address belongs to the object at fff00000c0975200
[   29.782959]  which belongs to the cache kmalloc-256 of size 256
[   29.784612] The buggy address is located 17 bytes to the right of
[   29.784612]  allocated 201-byte region [fff00000c0975200, fff00000c09752c9)
[   29.786578] 
[   29.787068] The buggy address belongs to the physical page:
[   29.787972] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100974
[   29.789006] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.790106] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.791169] page_type: f5(slab)
[   29.791748] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.792851] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.793814] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.794836] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.795831] head: 0bfffe0000000001 ffffc1ffc3025d01 ffffffffffffffff 0000000000000000
[   29.796831] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   29.797814] page dumped because: kasan: bad access detected
[   29.798593] 
[   29.798927] Memory state around the buggy address:
[   29.799706]  fff00000c0975180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.800675]  fff00000c0975200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.801615] >fff00000c0975280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   29.802576]                                                     ^
[   29.803368]  fff00000c0975300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.804414]  fff00000c0975380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.805305] ==================================================================
[   29.702514] ==================================================================
[   29.703112] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   29.704165] Write of size 1 at addr fff00000c09752d0 by task kunit_try_catch/147
[   29.705174] 
[   29.705669] CPU: 0 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   29.707212] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.708392] Hardware name: linux,dummy-virt (DT)
[   29.709407] Call trace:
[   29.710432]  show_stack+0x20/0x38 (C)
[   29.711249]  dump_stack_lvl+0x8c/0xd0
[   29.712113]  print_report+0x118/0x5e0
[   29.712712]  kasan_report+0xc8/0x118
[   29.713221]  __asan_report_store1_noabort+0x20/0x30
[   29.713942]  krealloc_less_oob_helper+0xb9c/0xc50
[   29.714682]  krealloc_less_oob+0x20/0x38
[   29.715398]  kunit_try_run_case+0x14c/0x3d0
[   29.716815]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.717191]  kthread+0x24c/0x2d0
[   29.717841]  ret_from_fork+0x10/0x20
[   29.718378] 
[   29.718770] Allocated by task 147:
[   29.719859]  kasan_save_stack+0x3c/0x68
[   29.720431]  kasan_save_track+0x20/0x40
[   29.721072]  kasan_save_alloc_info+0x40/0x58
[   29.721774]  __kasan_krealloc+0x118/0x178
[   29.722375]  krealloc_noprof+0x128/0x360
[   29.722998]  krealloc_less_oob_helper+0x168/0xc50
[   29.724163]  krealloc_less_oob+0x20/0x38
[   29.724688]  kunit_try_run_case+0x14c/0x3d0
[   29.725585]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.726493]  kthread+0x24c/0x2d0
[   29.727145]  ret_from_fork+0x10/0x20
[   29.727994] 
[   29.728362] The buggy address belongs to the object at fff00000c0975200
[   29.728362]  which belongs to the cache kmalloc-256 of size 256
[   29.729821] The buggy address is located 7 bytes to the right of
[   29.729821]  allocated 201-byte region [fff00000c0975200, fff00000c09752c9)
[   29.731393] 
[   29.732068] The buggy address belongs to the physical page:
[   29.732922] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100974
[   29.733969] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.735238] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.736195] page_type: f5(slab)
[   29.736705] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.737811] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.738941] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.740372] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.741531] head: 0bfffe0000000001 ffffc1ffc3025d01 ffffffffffffffff 0000000000000000
[   29.742727] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   29.744098] page dumped because: kasan: bad access detected
[   29.745103] 
[   29.745437] Memory state around the buggy address:
[   29.745984]  fff00000c0975180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.746882]  fff00000c0975200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.748484] >fff00000c0975280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   29.749719]                                                  ^
[   29.750386]  fff00000c0975300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.752202]  fff00000c0975380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.753894] ==================================================================
[   29.646498] ==================================================================
[   29.647733] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   29.649605] Write of size 1 at addr fff00000c09752c9 by task kunit_try_catch/147
[   29.650548] 
[   29.650845] CPU: 0 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   29.652198] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.653109] Hardware name: linux,dummy-virt (DT)
[   29.653715] Call trace:
[   29.654160]  show_stack+0x20/0x38 (C)
[   29.654899]  dump_stack_lvl+0x8c/0xd0
[   29.655482]  print_report+0x118/0x5e0
[   29.656096]  kasan_report+0xc8/0x118
[   29.656655]  __asan_report_store1_noabort+0x20/0x30
[   29.657252]  krealloc_less_oob_helper+0xa48/0xc50
[   29.658909]  krealloc_less_oob+0x20/0x38
[   29.660183]  kunit_try_run_case+0x14c/0x3d0
[   29.661637]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.662807]  kthread+0x24c/0x2d0
[   29.663448]  ret_from_fork+0x10/0x20
[   29.664671] 
[   29.664927] Allocated by task 147:
[   29.665243]  kasan_save_stack+0x3c/0x68
[   29.665786]  kasan_save_track+0x20/0x40
[   29.666956]  kasan_save_alloc_info+0x40/0x58
[   29.667723]  __kasan_krealloc+0x118/0x178
[   29.668297]  krealloc_noprof+0x128/0x360
[   29.668775]  krealloc_less_oob_helper+0x168/0xc50
[   29.669568]  krealloc_less_oob+0x20/0x38
[   29.670052]  kunit_try_run_case+0x14c/0x3d0
[   29.670756]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.671806]  kthread+0x24c/0x2d0
[   29.672233]  ret_from_fork+0x10/0x20
[   29.673833] 
[   29.674092] The buggy address belongs to the object at fff00000c0975200
[   29.674092]  which belongs to the cache kmalloc-256 of size 256
[   29.675994] The buggy address is located 0 bytes to the right of
[   29.675994]  allocated 201-byte region [fff00000c0975200, fff00000c09752c9)
[   29.678178] 
[   29.678505] The buggy address belongs to the physical page:
[   29.679283] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100974
[   29.680399] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.681387] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.682223] page_type: f5(slab)
[   29.683104] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.684097] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.685472] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.686298] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.687355] head: 0bfffe0000000001 ffffc1ffc3025d01 ffffffffffffffff 0000000000000000
[   29.688346] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   29.689261] page dumped because: kasan: bad access detected
[   29.690195] 
[   29.690695] Memory state around the buggy address:
[   29.692157]  fff00000c0975180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.694029]  fff00000c0975200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.695959] >fff00000c0975280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   29.697700]                                               ^
[   29.698564]  fff00000c0975300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.699917]  fff00000c0975380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.700855] ==================================================================
[   30.066437] ==================================================================
[   30.067304] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   30.068523] Write of size 1 at addr fff00000c65520da by task kunit_try_catch/151
[   30.069353] 
[   30.069814] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   30.071072] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.072381] Hardware name: linux,dummy-virt (DT)
[   30.072997] Call trace:
[   30.073432]  show_stack+0x20/0x38 (C)
[   30.074138]  dump_stack_lvl+0x8c/0xd0
[   30.075708]  print_report+0x118/0x5e0
[   30.076784]  kasan_report+0xc8/0x118
[   30.077112]  __asan_report_store1_noabort+0x20/0x30
[   30.077575]  krealloc_less_oob_helper+0xa80/0xc50
[   30.078631]  krealloc_large_less_oob+0x20/0x38
[   30.079402]  kunit_try_run_case+0x14c/0x3d0
[   30.080234]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.081005]  kthread+0x24c/0x2d0
[   30.081939]  ret_from_fork+0x10/0x20
[   30.082421] 
[   30.082700] The buggy address belongs to the physical page:
[   30.084165] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106550
[   30.085104] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.085971] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.086915] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.087859] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.088806] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.090001] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.090875] head: 0bfffe0000000002 ffffc1ffc3195401 ffffffffffffffff 0000000000000000
[   30.092181] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.093392] page dumped because: kasan: bad access detected
[   30.093994] 
[   30.094363] Memory state around the buggy address:
[   30.094941]  fff00000c6551f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.095877]  fff00000c6552000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.096783] >fff00000c6552080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.098361]                                                     ^
[   30.099081]  fff00000c6552100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.099739]  fff00000c6552180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.100894] ==================================================================
[   29.989973] ==================================================================
[   29.991671] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   29.992869] Write of size 1 at addr fff00000c65520c9 by task kunit_try_catch/151
[   29.994232] 
[   29.994601] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   29.996017] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.996320] Hardware name: linux,dummy-virt (DT)
[   29.996937] Call trace:
[   29.997360]  show_stack+0x20/0x38 (C)
[   29.997888]  dump_stack_lvl+0x8c/0xd0
[   29.998631]  print_report+0x118/0x5e0
[   29.999717]  kasan_report+0xc8/0x118
[   30.000801]  __asan_report_store1_noabort+0x20/0x30
[   30.001514]  krealloc_less_oob_helper+0xa48/0xc50
[   30.002156]  krealloc_large_less_oob+0x20/0x38
[   30.002854]  kunit_try_run_case+0x14c/0x3d0
[   30.003629]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.004436]  kthread+0x24c/0x2d0
[   30.005171]  ret_from_fork+0x10/0x20
[   30.005972] 
[   30.006278] The buggy address belongs to the physical page:
[   30.007316] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106550
[   30.008955] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.009499] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.010726] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.012171] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.013204] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.014216] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.015207] head: 0bfffe0000000002 ffffc1ffc3195401 ffffffffffffffff 0000000000000000
[   30.016531] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.017468] page dumped because: kasan: bad access detected
[   30.018203] 
[   30.018559] Memory state around the buggy address:
[   30.019420]  fff00000c6551f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.020601]  fff00000c6552000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.021178] >fff00000c6552080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.022072]                                               ^
[   30.023021]  fff00000c6552100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.024202]  fff00000c6552180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.025137] ==================================================================
[   29.809682] ==================================================================
[   29.810530] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   29.811607] Write of size 1 at addr fff00000c09752ea by task kunit_try_catch/147
[   29.812708] 
[   29.813048] CPU: 0 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   29.814461] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.815136] Hardware name: linux,dummy-virt (DT)
[   29.815733] Call trace:
[   29.815958]  show_stack+0x20/0x38 (C)
[   29.816257]  dump_stack_lvl+0x8c/0xd0
[   29.816896]  print_report+0x118/0x5e0
[   29.817572]  kasan_report+0xc8/0x118
[   29.818374]  __asan_report_store1_noabort+0x20/0x30
[   29.819262]  krealloc_less_oob_helper+0xae4/0xc50
[   29.820185]  krealloc_less_oob+0x20/0x38
[   29.821213]  kunit_try_run_case+0x14c/0x3d0
[   29.821690]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.822259]  kthread+0x24c/0x2d0
[   29.822893]  ret_from_fork+0x10/0x20
[   29.823836] 
[   29.824243] Allocated by task 147:
[   29.824906]  kasan_save_stack+0x3c/0x68
[   29.825575]  kasan_save_track+0x20/0x40
[   29.826279]  kasan_save_alloc_info+0x40/0x58
[   29.827004]  __kasan_krealloc+0x118/0x178
[   29.827693]  krealloc_noprof+0x128/0x360
[   29.828481]  krealloc_less_oob_helper+0x168/0xc50
[   29.829105]  krealloc_less_oob+0x20/0x38
[   29.829682]  kunit_try_run_case+0x14c/0x3d0
[   29.830371]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.831085]  kthread+0x24c/0x2d0
[   29.831664]  ret_from_fork+0x10/0x20
[   29.832203] 
[   29.832585] The buggy address belongs to the object at fff00000c0975200
[   29.832585]  which belongs to the cache kmalloc-256 of size 256
[   29.834038] The buggy address is located 33 bytes to the right of
[   29.834038]  allocated 201-byte region [fff00000c0975200, fff00000c09752c9)
[   29.835642] 
[   29.836089] The buggy address belongs to the physical page:
[   29.836870] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100974
[   29.837974] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.838928] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.839816] page_type: f5(slab)
[   29.840429] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.841435] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.842484] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.843502] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.844283] head: 0bfffe0000000001 ffffc1ffc3025d01 ffffffffffffffff 0000000000000000
[   29.845272] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   29.846244] page dumped because: kasan: bad access detected
[   29.847004] 
[   29.847402] Memory state around the buggy address:
[   29.848129]  fff00000c0975180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.849096]  fff00000c0975200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.850027] >fff00000c0975280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   29.850959]                                                           ^
[   29.851819]  fff00000c0975300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.852783]  fff00000c0975380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.853691] ==================================================================
[   29.855723] ==================================================================
[   29.856607] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   29.857579] Write of size 1 at addr fff00000c09752eb by task kunit_try_catch/147
[   29.858643] 
[   29.859177] CPU: 0 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   29.861246] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.861895] Hardware name: linux,dummy-virt (DT)
[   29.862685] Call trace:
[   29.863101]  show_stack+0x20/0x38 (C)
[   29.863876]  dump_stack_lvl+0x8c/0xd0
[   29.864531]  print_report+0x118/0x5e0
[   29.865151]  kasan_report+0xc8/0x118
[   29.865752]  __asan_report_store1_noabort+0x20/0x30
[   29.866529]  krealloc_less_oob_helper+0xa58/0xc50
[   29.867389]  krealloc_less_oob+0x20/0x38
[   29.868040]  kunit_try_run_case+0x14c/0x3d0
[   29.868805]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.869604]  kthread+0x24c/0x2d0
[   29.870253]  ret_from_fork+0x10/0x20
[   29.870936] 
[   29.871210] Allocated by task 147:
[   29.871800]  kasan_save_stack+0x3c/0x68
[   29.872394]  kasan_save_track+0x20/0x40
[   29.872890]  kasan_save_alloc_info+0x40/0x58
[   29.873629]  __kasan_krealloc+0x118/0x178
[   29.874344]  krealloc_noprof+0x128/0x360
[   29.875017]  krealloc_less_oob_helper+0x168/0xc50
[   29.875746]  krealloc_less_oob+0x20/0x38
[   29.876385]  kunit_try_run_case+0x14c/0x3d0
[   29.877075]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.877931]  kthread+0x24c/0x2d0
[   29.878559]  ret_from_fork+0x10/0x20
[   29.879141] 
[   29.879489] The buggy address belongs to the object at fff00000c0975200
[   29.879489]  which belongs to the cache kmalloc-256 of size 256
[   29.880949] The buggy address is located 34 bytes to the right of
[   29.880949]  allocated 201-byte region [fff00000c0975200, fff00000c09752c9)
[   29.882524] 
[   29.883018] The buggy address belongs to the physical page:
[   29.883793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100974
[   29.884876] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.885849] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.886771] page_type: f5(slab)
[   29.887322] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.888387] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.889392] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.890392] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.891355] head: 0bfffe0000000001 ffffc1ffc3025d01 ffffffffffffffff 0000000000000000
[   29.892345] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   29.893292] page dumped because: kasan: bad access detected
[   29.894074] 
[   29.894429] Memory state around the buggy address:
[   29.895168]  fff00000c0975180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.896179]  fff00000c0975200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.897051] >fff00000c0975280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   29.897969]                                                           ^
[   29.898863]  fff00000c0975300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.899888]  fff00000c0975380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.900846] ==================================================================
[   30.140666] ==================================================================
[   30.141972] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   30.142829] Write of size 1 at addr fff00000c65520eb by task kunit_try_catch/151
[   30.144241] 
[   30.144664] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   30.145867] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.146572] Hardware name: linux,dummy-virt (DT)
[   30.147627] Call trace:
[   30.147989]  show_stack+0x20/0x38 (C)
[   30.149273]  dump_stack_lvl+0x8c/0xd0
[   30.149884]  print_report+0x118/0x5e0
[   30.150451]  kasan_report+0xc8/0x118
[   30.150974]  __asan_report_store1_noabort+0x20/0x30
[   30.152033]  krealloc_less_oob_helper+0xa58/0xc50
[   30.152716]  krealloc_large_less_oob+0x20/0x38
[   30.153424]  kunit_try_run_case+0x14c/0x3d0
[   30.154104]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.154823]  kthread+0x24c/0x2d0
[   30.156161]  ret_from_fork+0x10/0x20
[   30.156767] 
[   30.157089] The buggy address belongs to the physical page:
[   30.157877] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106550
[   30.158823] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.160197] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.161237] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.162263] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.163342] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.164733] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.165682] head: 0bfffe0000000002 ffffc1ffc3195401 ffffffffffffffff 0000000000000000
[   30.166674] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.168149] page dumped because: kasan: bad access detected
[   30.168767] 
[   30.169080] Memory state around the buggy address:
[   30.169616]  fff00000c6551f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.170655]  fff00000c6552000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.171948] >fff00000c6552080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.172986]                                                           ^
[   30.173794]  fff00000c6552100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.174860]  fff00000c6552180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.176281] ==================================================================
[   30.026775] ==================================================================
[   30.028311] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   30.030817] Write of size 1 at addr fff00000c65520d0 by task kunit_try_catch/151
[   30.032048] 
[   30.032470] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   30.034444] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.035783] Hardware name: linux,dummy-virt (DT)
[   30.036912] Call trace:
[   30.037227]  show_stack+0x20/0x38 (C)
[   30.038063]  dump_stack_lvl+0x8c/0xd0
[   30.038894]  print_report+0x118/0x5e0
[   30.039589]  kasan_report+0xc8/0x118
[   30.040307]  __asan_report_store1_noabort+0x20/0x30
[   30.041169]  krealloc_less_oob_helper+0xb9c/0xc50
[   30.041949]  krealloc_large_less_oob+0x20/0x38
[   30.042740]  kunit_try_run_case+0x14c/0x3d0
[   30.043491]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.044438]  kthread+0x24c/0x2d0
[   30.045129]  ret_from_fork+0x10/0x20
[   30.045589] 
[   30.045981] The buggy address belongs to the physical page:
[   30.046832] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106550
[   30.047855] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.049127] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.050094] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.051134] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.052149] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.053284] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.054349] head: 0bfffe0000000002 ffffc1ffc3195401 ffffffffffffffff 0000000000000000
[   30.055261] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.056730] page dumped because: kasan: bad access detected
[   30.057123] 
[   30.057289] Memory state around the buggy address:
[   30.058417]  fff00000c6551f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.059198]  fff00000c6552000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.060301] >fff00000c6552080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   30.061197]                                                  ^
[   30.061936]  fff00000c6552100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.062800]  fff00000c6552180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.064483] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   29.536187] ==================================================================
[   29.537229] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680
[   29.538044] Write of size 1 at addr fff00000c09750eb by task kunit_try_catch/145
[   29.539005] 
[   29.539544] CPU: 0 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   29.540881] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.541286] Hardware name: linux,dummy-virt (DT)
[   29.542112] Call trace:
[   29.542463]  show_stack+0x20/0x38 (C)
[   29.543982]  dump_stack_lvl+0x8c/0xd0
[   29.544687]  print_report+0x118/0x5e0
[   29.545318]  kasan_report+0xc8/0x118
[   29.545891]  __asan_report_store1_noabort+0x20/0x30
[   29.546637]  krealloc_more_oob_helper+0x614/0x680
[   29.547379]  krealloc_more_oob+0x20/0x38
[   29.548111]  kunit_try_run_case+0x14c/0x3d0
[   29.549548]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.550259]  kthread+0x24c/0x2d0
[   29.550826]  ret_from_fork+0x10/0x20
[   29.551586] 
[   29.551875] Allocated by task 145:
[   29.552469]  kasan_save_stack+0x3c/0x68
[   29.553176]  kasan_save_track+0x20/0x40
[   29.553913]  kasan_save_alloc_info+0x40/0x58
[   29.554491]  __kasan_krealloc+0x118/0x178
[   29.555138]  krealloc_noprof+0x128/0x360
[   29.555704]  krealloc_more_oob_helper+0x168/0x680
[   29.556890]  krealloc_more_oob+0x20/0x38
[   29.557594]  kunit_try_run_case+0x14c/0x3d0
[   29.558261]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.559494]  kthread+0x24c/0x2d0
[   29.559767]  ret_from_fork+0x10/0x20
[   29.560040] 
[   29.560208] The buggy address belongs to the object at fff00000c0975000
[   29.560208]  which belongs to the cache kmalloc-256 of size 256
[   29.562227] The buggy address is located 0 bytes to the right of
[   29.562227]  allocated 235-byte region [fff00000c0975000, fff00000c09750eb)
[   29.564485] 
[   29.565153] The buggy address belongs to the physical page:
[   29.565903] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100974
[   29.567006] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.568471] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.569594] page_type: f5(slab)
[   29.570066] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.570923] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.572441] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.573866] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.574893] head: 0bfffe0000000001 ffffc1ffc3025d01 ffffffffffffffff 0000000000000000
[   29.576479] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   29.577494] page dumped because: kasan: bad access detected
[   29.578318] 
[   29.578845] Memory state around the buggy address:
[   29.580310]  fff00000c0974f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.581440]  fff00000c0975000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.582637] >fff00000c0975080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   29.583661]                                                           ^
[   29.584464]  fff00000c0975100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.585302]  fff00000c0975180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.586793] ==================================================================
[   29.949089] ==================================================================
[   29.949695] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680
[   29.950900] Write of size 1 at addr fff00000c62c60f0 by task kunit_try_catch/149
[   29.951880] 
[   29.952219] CPU: 0 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   29.953469] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.953981] Hardware name: linux,dummy-virt (DT)
[   29.954574] Call trace:
[   29.955053]  show_stack+0x20/0x38 (C)
[   29.955633]  dump_stack_lvl+0x8c/0xd0
[   29.956285]  print_report+0x118/0x5e0
[   29.956817]  kasan_report+0xc8/0x118
[   29.957503]  __asan_report_store1_noabort+0x20/0x30
[   29.958178]  krealloc_more_oob_helper+0x5c8/0x680
[   29.959214]  krealloc_large_more_oob+0x20/0x38
[   29.960022]  kunit_try_run_case+0x14c/0x3d0
[   29.960692]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.961579]  kthread+0x24c/0x2d0
[   29.962275]  ret_from_fork+0x10/0x20
[   29.962847] 
[   29.963150] The buggy address belongs to the physical page:
[   29.963938] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062c4
[   29.964898] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.965944] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.966840] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.967779] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.968713] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.969649] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.970583] head: 0bfffe0000000002 ffffc1ffc318b101 ffffffffffffffff 0000000000000000
[   29.971531] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   29.972397] page dumped because: kasan: bad access detected
[   29.973054] 
[   29.973376] Memory state around the buggy address:
[   29.973998]  fff00000c62c5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.974884]  fff00000c62c6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.975814] >fff00000c62c6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   29.976670]                                                              ^
[   29.977538]  fff00000c62c6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.978344]  fff00000c62c6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.979268] ==================================================================
[   29.911441] ==================================================================
[   29.913061] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680
[   29.914007] Write of size 1 at addr fff00000c62c60eb by task kunit_try_catch/149
[   29.915096] 
[   29.916025] CPU: 0 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   29.917797] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.918378] Hardware name: linux,dummy-virt (DT)
[   29.918931] Call trace:
[   29.919680]  show_stack+0x20/0x38 (C)
[   29.920219]  dump_stack_lvl+0x8c/0xd0
[   29.920930]  print_report+0x118/0x5e0
[   29.921624]  kasan_report+0xc8/0x118
[   29.922133]  __asan_report_store1_noabort+0x20/0x30
[   29.922852]  krealloc_more_oob_helper+0x614/0x680
[   29.923850]  krealloc_large_more_oob+0x20/0x38
[   29.924547]  kunit_try_run_case+0x14c/0x3d0
[   29.925249]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.926187]  kthread+0x24c/0x2d0
[   29.926888]  ret_from_fork+0x10/0x20
[   29.927730] 
[   29.928079] The buggy address belongs to the physical page:
[   29.928852] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062c4
[   29.929742] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.930714] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.931822] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.933035] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.933982] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.934938] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.936892] head: 0bfffe0000000002 ffffc1ffc318b101 ffffffffffffffff 0000000000000000
[   29.938005] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   29.938909] page dumped because: kasan: bad access detected
[   29.939834] 
[   29.940463] Memory state around the buggy address:
[   29.941127]  fff00000c62c5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.942260]  fff00000c62c6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.943303] >fff00000c62c6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   29.944363]                                                           ^
[   29.945375]  fff00000c62c6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.946465]  fff00000c62c6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.947508] ==================================================================
[   29.589099] ==================================================================
[   29.589759] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680
[   29.590569] Write of size 1 at addr fff00000c09750f0 by task kunit_try_catch/145
[   29.592007] 
[   29.592397] CPU: 0 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   29.593605] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.594195] Hardware name: linux,dummy-virt (DT)
[   29.594836] Call trace:
[   29.595560]  show_stack+0x20/0x38 (C)
[   29.596177]  dump_stack_lvl+0x8c/0xd0
[   29.596860]  print_report+0x118/0x5e0
[   29.597767]  kasan_report+0xc8/0x118
[   29.598218]  __asan_report_store1_noabort+0x20/0x30
[   29.598743]  krealloc_more_oob_helper+0x5c8/0x680
[   29.600023]  krealloc_more_oob+0x20/0x38
[   29.600644]  kunit_try_run_case+0x14c/0x3d0
[   29.601211]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.602083]  kthread+0x24c/0x2d0
[   29.602702]  ret_from_fork+0x10/0x20
[   29.603510] 
[   29.604121] Allocated by task 145:
[   29.604515]  kasan_save_stack+0x3c/0x68
[   29.604959]  kasan_save_track+0x20/0x40
[   29.605874]  kasan_save_alloc_info+0x40/0x58
[   29.606643]  __kasan_krealloc+0x118/0x178
[   29.607521]  krealloc_noprof+0x128/0x360
[   29.608477]  krealloc_more_oob_helper+0x168/0x680
[   29.609381]  krealloc_more_oob+0x20/0x38
[   29.610146]  kunit_try_run_case+0x14c/0x3d0
[   29.610780]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.611839]  kthread+0x24c/0x2d0
[   29.612229]  ret_from_fork+0x10/0x20
[   29.612979] 
[   29.613381] The buggy address belongs to the object at fff00000c0975000
[   29.613381]  which belongs to the cache kmalloc-256 of size 256
[   29.614279] The buggy address is located 5 bytes to the right of
[   29.614279]  allocated 235-byte region [fff00000c0975000, fff00000c09750eb)
[   29.615244] 
[   29.615989] The buggy address belongs to the physical page:
[   29.616939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100974
[   29.617956] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.618830] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.620573] page_type: f5(slab)
[   29.620942] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.621433] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.622642] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   29.623933] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.624931] head: 0bfffe0000000001 ffffc1ffc3025d01 ffffffffffffffff 0000000000000000
[   29.625945] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   29.626775] page dumped because: kasan: bad access detected
[   29.627228] 
[   29.627637] Memory state around the buggy address:
[   29.628658]  fff00000c0974f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.630028]  fff00000c0975000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.631532] >fff00000c0975080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   29.632431]                                                              ^
[   29.633393]  fff00000c0975100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.634208]  fff00000c0975180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.635188] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[   29.497863] ==================================================================
[   29.499847] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   29.500600] Read of size 1 at addr fff00000c6540000 by task kunit_try_catch/143
[   29.501661] 
[   29.502208] CPU: 0 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   29.503981] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.504623] Hardware name: linux,dummy-virt (DT)
[   29.505512] Call trace:
[   29.506000]  show_stack+0x20/0x38 (C)
[   29.506636]  dump_stack_lvl+0x8c/0xd0
[   29.507657]  print_report+0x118/0x5e0
[   29.508245]  kasan_report+0xc8/0x118
[   29.508774]  __asan_report_load1_noabort+0x20/0x30
[   29.509485]  page_alloc_uaf+0x328/0x350
[   29.510128]  kunit_try_run_case+0x14c/0x3d0
[   29.510785]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.511537]  kthread+0x24c/0x2d0
[   29.512093]  ret_from_fork+0x10/0x20
[   29.512789] 
[   29.513165] The buggy address belongs to the physical page:
[   29.513977] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106540
[   29.514952] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.516153] page_type: f0(buddy)
[   29.516658] raw: 0bfffe0000000000 fff00000ff6151b0 fff00000ff6151b0 0000000000000000
[   29.517672] raw: 0000000000000000 0000000000000006 00000000f0000000 0000000000000000
[   29.518598] page dumped because: kasan: bad access detected
[   29.519551] 
[   29.519892] Memory state around the buggy address:
[   29.520442]  fff00000c653ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.521319]  fff00000c653ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.522249] >fff00000c6540000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.523318]                    ^
[   29.523895]  fff00000c6540080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.524798]  fff00000c6540100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.525547] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[   29.444262] ==================================================================
[   29.445516] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   29.446195] Free of addr fff00000c62c4001 by task kunit_try_catch/139
[   29.446982] 
[   29.447440] CPU: 0 UID: 0 PID: 139 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   29.448918] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.450149] Hardware name: linux,dummy-virt (DT)
[   29.450932] Call trace:
[   29.451698]  show_stack+0x20/0x38 (C)
[   29.452280]  dump_stack_lvl+0x8c/0xd0
[   29.452906]  print_report+0x118/0x5e0
[   29.453612]  kasan_report_invalid_free+0xb0/0xd8
[   29.454263]  __kasan_kfree_large+0x5c/0xa8
[   29.454918]  free_large_kmalloc+0x58/0x140
[   29.455559]  kfree+0x270/0x3c8
[   29.456177]  kmalloc_large_invalid_free+0x108/0x270
[   29.456913]  kunit_try_run_case+0x14c/0x3d0
[   29.457952]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.458505]  kthread+0x24c/0x2d0
[   29.459028]  ret_from_fork+0x10/0x20
[   29.459571] 
[   29.460000] The buggy address belongs to the physical page:
[   29.460712] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062c4
[   29.461905] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.462803] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.463765] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.465160] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.466727] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.468374] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.469427] head: 0bfffe0000000002 ffffc1ffc318b101 ffffffffffffffff 0000000000000000
[   29.470859] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   29.472000] page dumped because: kasan: bad access detected
[   29.472506] 
[   29.472680] Memory state around the buggy address:
[   29.472990]  fff00000c62c3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.473489]  fff00000c62c3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.475346] >fff00000c62c4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.476883]                    ^
[   29.477468]  fff00000c62c4080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.478520]  fff00000c62c4100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.479584] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[   29.407777] ==================================================================
[   29.409154] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   29.409863] Read of size 1 at addr fff00000c6428000 by task kunit_try_catch/137
[   29.410949] 
[   29.411620] CPU: 1 UID: 0 PID: 137 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   29.412848] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.413902] Hardware name: linux,dummy-virt (DT)
[   29.414526] Call trace:
[   29.415271]  show_stack+0x20/0x38 (C)
[   29.415901]  dump_stack_lvl+0x8c/0xd0
[   29.416543]  print_report+0x118/0x5e0
[   29.417078]  kasan_report+0xc8/0x118
[   29.417690]  __asan_report_load1_noabort+0x20/0x30
[   29.418418]  kmalloc_large_uaf+0x2cc/0x2f8
[   29.419253]  kunit_try_run_case+0x14c/0x3d0
[   29.419888]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.420748]  kthread+0x24c/0x2d0
[   29.421247]  ret_from_fork+0x10/0x20
[   29.421928] 
[   29.422202] The buggy address belongs to the physical page:
[   29.422994] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106428
[   29.424049] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.424899] raw: 0bfffe0000000000 fff00000da50bf80 fff00000da50bf80 0000000000000000
[   29.425931] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   29.426807] page dumped because: kasan: bad access detected
[   29.427629] 
[   29.428087] Memory state around the buggy address:
[   29.428698]  fff00000c6427f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.429543]  fff00000c6427f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.430414] >fff00000c6428000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.431530]                    ^
[   29.432124]  fff00000c6428080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.433060]  fff00000c6428100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.434278] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   29.361146] ==================================================================
[   29.362726] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   29.363992] Write of size 1 at addr fff00000c62c600a by task kunit_try_catch/135
[   29.365954] 
[   29.366402] CPU: 0 UID: 0 PID: 135 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   29.368201] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.368628] Hardware name: linux,dummy-virt (DT)
[   29.369890] Call trace:
[   29.370280]  show_stack+0x20/0x38 (C)
[   29.370993]  dump_stack_lvl+0x8c/0xd0
[   29.372236]  print_report+0x118/0x5e0
[   29.372817]  kasan_report+0xc8/0x118
[   29.373488]  __asan_report_store1_noabort+0x20/0x30
[   29.374161]  kmalloc_large_oob_right+0x278/0x2b8
[   29.374960]  kunit_try_run_case+0x14c/0x3d0
[   29.375620]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.376824]  kthread+0x24c/0x2d0
[   29.377302]  ret_from_fork+0x10/0x20
[   29.377869] 
[   29.378266] The buggy address belongs to the physical page:
[   29.380016] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062c4
[   29.380991] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.381894] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.382937] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.383879] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.385136] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.386148] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.387580] head: 0bfffe0000000002 ffffc1ffc318b101 ffffffffffffffff 0000000000000000
[   29.388299] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   29.389241] page dumped because: kasan: bad access detected
[   29.389999] 
[   29.390276] Memory state around the buggy address:
[   29.390997]  fff00000c62c5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.392449]  fff00000c62c5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.393197] >fff00000c62c6000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.394164]                       ^
[   29.395075]  fff00000c62c6080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.395943]  fff00000c62c6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   29.397195] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[   29.303833] ==================================================================
[   29.305106] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   29.306048] Write of size 1 at addr fff00000c5f65f00 by task kunit_try_catch/133
[   29.307070] 
[   29.307409] CPU: 1 UID: 0 PID: 133 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   29.308822] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.309255] Hardware name: linux,dummy-virt (DT)
[   29.310890] Call trace:
[   29.311641]  show_stack+0x20/0x38 (C)
[   29.312224]  dump_stack_lvl+0x8c/0xd0
[   29.312990]  print_report+0x118/0x5e0
[   29.313565]  kasan_report+0xc8/0x118
[   29.314230]  __asan_report_store1_noabort+0x20/0x30
[   29.314847]  kmalloc_big_oob_right+0x2a4/0x2f0
[   29.315725]  kunit_try_run_case+0x14c/0x3d0
[   29.316437]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.317233]  kthread+0x24c/0x2d0
[   29.317805]  ret_from_fork+0x10/0x20
[   29.318441] 
[   29.318745] Allocated by task 133:
[   29.319625]  kasan_save_stack+0x3c/0x68
[   29.320195]  kasan_save_track+0x20/0x40
[   29.320762]  kasan_save_alloc_info+0x40/0x58
[   29.321429]  __kasan_kmalloc+0xd4/0xd8
[   29.321983]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.322685]  kmalloc_big_oob_right+0xb8/0x2f0
[   29.323641]  kunit_try_run_case+0x14c/0x3d0
[   29.324207]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.324972]  kthread+0x24c/0x2d0
[   29.325481]  ret_from_fork+0x10/0x20
[   29.326027] 
[   29.326400] The buggy address belongs to the object at fff00000c5f64000
[   29.326400]  which belongs to the cache kmalloc-8k of size 8192
[   29.328820] The buggy address is located 0 bytes to the right of
[   29.328820]  allocated 7936-byte region [fff00000c5f64000, fff00000c5f65f00)
[   29.330898] 
[   29.331368] The buggy address belongs to the physical page:
[   29.331983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f60
[   29.333358] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.334241] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.335077] page_type: f5(slab)
[   29.335584] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   29.336741] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   29.337745] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   29.338818] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   29.340184] head: 0bfffe0000000003 ffffc1ffc317d801 ffffffffffffffff 0000000000000000
[   29.341189] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000
[   29.342171] page dumped because: kasan: bad access detected
[   29.343093] 
[   29.343375] Memory state around the buggy address:
[   29.344153]  fff00000c5f65e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.345013]  fff00000c5f65e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.346313] >fff00000c5f65f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.347149]                    ^
[   29.348184]  fff00000c5f65f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.349585]  fff00000c5f66000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.350447] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[   29.216488] ==================================================================
[   29.217683] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x414/0x490
[   29.218472] Write of size 1 at addr fff00000c646c978 by task kunit_try_catch/131
[   29.219667] 
[   29.220148] CPU: 0 UID: 0 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   29.221431] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.222506] Hardware name: linux,dummy-virt (DT)
[   29.222998] Call trace:
[   29.224157]  show_stack+0x20/0x38 (C)
[   29.225001]  dump_stack_lvl+0x8c/0xd0
[   29.225730]  print_report+0x118/0x5e0
[   29.226411]  kasan_report+0xc8/0x118
[   29.227116]  __asan_report_store1_noabort+0x20/0x30
[   29.228034]  kmalloc_track_caller_oob_right+0x414/0x490
[   29.228760]  kunit_try_run_case+0x14c/0x3d0
[   29.229413]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.230151]  kthread+0x24c/0x2d0
[   29.230855]  ret_from_fork+0x10/0x20
[   29.231417] 
[   29.231784] Allocated by task 131:
[   29.233023]  kasan_save_stack+0x3c/0x68
[   29.233944]  kasan_save_track+0x20/0x40
[   29.234773]  kasan_save_alloc_info+0x40/0x58
[   29.235805]  __kasan_kmalloc+0xd4/0xd8
[   29.236306]  __kmalloc_node_track_caller_noprof+0x184/0x4b8
[   29.237043]  kmalloc_track_caller_oob_right+0xa8/0x490
[   29.237734]  kunit_try_run_case+0x14c/0x3d0
[   29.238679]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.239550]  kthread+0x24c/0x2d0
[   29.239823]  ret_from_fork+0x10/0x20
[   29.240096] 
[   29.240266] The buggy address belongs to the object at fff00000c646c900
[   29.240266]  which belongs to the cache kmalloc-128 of size 128
[   29.243446] The buggy address is located 0 bytes to the right of
[   29.243446]  allocated 120-byte region [fff00000c646c900, fff00000c646c978)
[   29.245533] 
[   29.245879] The buggy address belongs to the physical page:
[   29.246558] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10646c
[   29.247888] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.248831] page_type: f5(slab)
[   29.249267] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.250637] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.252134] page dumped because: kasan: bad access detected
[   29.252615] 
[   29.252788] Memory state around the buggy address:
[   29.253098]  fff00000c646c800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   29.253540]  fff00000c646c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.253974] >fff00000c646c900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.254456]                                                                 ^
[   29.255305]  fff00000c646c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.256251]  fff00000c646ca00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.257641] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[   29.159038] ==================================================================
[   29.160127] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   29.161314] Read of size 1 at addr fff00000c640d000 by task kunit_try_catch/129
[   29.162270] 
[   29.162637] CPU: 1 UID: 0 PID: 129 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   29.164112] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.165266] Hardware name: linux,dummy-virt (DT)
[   29.165921] Call trace:
[   29.166342]  show_stack+0x20/0x38 (C)
[   29.167015]  dump_stack_lvl+0x8c/0xd0
[   29.167710]  print_report+0x118/0x5e0
[   29.168261]  kasan_report+0xc8/0x118
[   29.168845]  __asan_report_load1_noabort+0x20/0x30
[   29.169522]  kmalloc_node_oob_right+0x2f4/0x330
[   29.170142]  kunit_try_run_case+0x14c/0x3d0
[   29.170832]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.171541]  kthread+0x24c/0x2d0
[   29.172044]  ret_from_fork+0x10/0x20
[   29.172716] 
[   29.173000] Allocated by task 129:
[   29.173814]  kasan_save_stack+0x3c/0x68
[   29.174537]  kasan_save_track+0x20/0x40
[   29.175133]  kasan_save_alloc_info+0x40/0x58
[   29.176111]  __kasan_kmalloc+0xd4/0xd8
[   29.176682]  __kmalloc_cache_node_noprof+0x168/0x3d0
[   29.177465]  kmalloc_node_oob_right+0xbc/0x330
[   29.178154]  kunit_try_run_case+0x14c/0x3d0
[   29.178855]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.179736]  kthread+0x24c/0x2d0
[   29.180239]  ret_from_fork+0x10/0x20
[   29.180814] 
[   29.181873] The buggy address belongs to the object at fff00000c640c000
[   29.181873]  which belongs to the cache kmalloc-4k of size 4096
[   29.183257] The buggy address is located 0 bytes to the right of
[   29.183257]  allocated 4096-byte region [fff00000c640c000, fff00000c640d000)
[   29.184654] 
[   29.184954] The buggy address belongs to the physical page:
[   29.186136] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106408
[   29.187589] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.188487] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.189384] page_type: f5(slab)
[   29.189915] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   29.190754] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   29.192070] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   29.193097] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   29.194117] head: 0bfffe0000000003 ffffc1ffc3190201 ffffffffffffffff 0000000000000000
[   29.195053] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000
[   29.195981] page dumped because: kasan: bad access detected
[   29.196796] 
[   29.197070] Memory state around the buggy address:
[   29.198101]  fff00000c640cf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.198948]  fff00000c640cf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.200828] >fff00000c640d000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.201858]                    ^
[   29.202426]  fff00000c640d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.203515]  fff00000c640d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.204482] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   29.102668] ==================================================================
[   29.104114] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   29.104779] Read of size 1 at addr fff00000c631831f by task kunit_try_catch/127
[   29.105561] 
[   29.105938] CPU: 0 UID: 0 PID: 127 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   29.107257] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.107784] Hardware name: linux,dummy-virt (DT)
[   29.108455] Call trace:
[   29.108860]  show_stack+0x20/0x38 (C)
[   29.109484]  dump_stack_lvl+0x8c/0xd0
[   29.110142]  print_report+0x118/0x5e0
[   29.110831]  kasan_report+0xc8/0x118
[   29.111495]  __asan_report_load1_noabort+0x20/0x30
[   29.112200]  kmalloc_oob_left+0x2ec/0x320
[   29.112773]  kunit_try_run_case+0x14c/0x3d0
[   29.113428]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.114233]  kthread+0x24c/0x2d0
[   29.114902]  ret_from_fork+0x10/0x20
[   29.115728] 
[   29.116038] Allocated by task 28:
[   29.116430]  kasan_save_stack+0x3c/0x68
[   29.117031]  kasan_save_track+0x20/0x40
[   29.117916]  kasan_save_alloc_info+0x40/0x58
[   29.118602]  __kasan_kmalloc+0xd4/0xd8
[   29.119131]  __kmalloc_node_track_caller_noprof+0x184/0x4b8
[   29.120047]  kstrdup+0x54/0xc8
[   29.120706]  devtmpfs_work_loop+0x384/0x590
[   29.121360]  devtmpfsd+0x50/0x58
[   29.121896]  kthread+0x24c/0x2d0
[   29.122522]  ret_from_fork+0x10/0x20
[   29.123186] 
[   29.123696] Freed by task 28:
[   29.124739]  kasan_save_stack+0x3c/0x68
[   29.125260]  kasan_save_track+0x20/0x40
[   29.125781]  kasan_save_free_info+0x4c/0x78
[   29.126591]  __kasan_slab_free+0x6c/0x98
[   29.127511]  kfree+0x114/0x3c8
[   29.128051]  devtmpfs_work_loop+0x498/0x590
[   29.128547]  devtmpfsd+0x50/0x58
[   29.129177]  kthread+0x24c/0x2d0
[   29.130044]  ret_from_fork+0x10/0x20
[   29.130694] 
[   29.130979] The buggy address belongs to the object at fff00000c6318300
[   29.130979]  which belongs to the cache kmalloc-16 of size 16
[   29.132225] The buggy address is located 15 bytes to the right of
[   29.132225]  allocated 16-byte region [fff00000c6318300, fff00000c6318310)
[   29.134155] 
[   29.134480] The buggy address belongs to the physical page:
[   29.135921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106318
[   29.137097] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.138143] page_type: f5(slab)
[   29.139030] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   29.140508] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   29.141418] page dumped because: kasan: bad access detected
[   29.142091] 
[   29.143009] Memory state around the buggy address:
[   29.143971]  fff00000c6318200: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   29.144690]  fff00000c6318280: fa fb fc fc fa fb fc fc 00 02 fc fc 00 02 fc fc
[   29.145376] >fff00000c6318300: fa fb fc fc 00 07 fc fc fc fc fc fc fc fc fc fc
[   29.146072]                             ^
[   29.146544]  fff00000c6318380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.148145]  fff00000c6318400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.149228] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   29.006930] ==================================================================
[   29.007679] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   29.008569] Write of size 1 at addr fff00000c58bb178 by task kunit_try_catch/125
[   29.009509] 
[   29.010043] CPU: 1 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   29.011206] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.012135] Hardware name: linux,dummy-virt (DT)
[   29.012922] Call trace:
[   29.013433]  show_stack+0x20/0x38 (C)
[   29.014072]  dump_stack_lvl+0x8c/0xd0
[   29.014735]  print_report+0x118/0x5e0
[   29.015413]  kasan_report+0xc8/0x118
[   29.016258]  __asan_report_store1_noabort+0x20/0x30
[   29.016980]  kmalloc_oob_right+0x538/0x660
[   29.017665]  kunit_try_run_case+0x14c/0x3d0
[   29.018262]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.019452]  kthread+0x24c/0x2d0
[   29.020249]  ret_from_fork+0x10/0x20
[   29.020796] 
[   29.021145] Allocated by task 125:
[   29.021630]  kasan_save_stack+0x3c/0x68
[   29.022274]  kasan_save_track+0x20/0x40
[   29.023204]  kasan_save_alloc_info+0x40/0x58
[   29.024120]  __kasan_kmalloc+0xd4/0xd8
[   29.024858]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.025431]  kmalloc_oob_right+0xb0/0x660
[   29.026088]  kunit_try_run_case+0x14c/0x3d0
[   29.026689]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.028120]  kthread+0x24c/0x2d0
[   29.028748]  ret_from_fork+0x10/0x20
[   29.029612] 
[   29.029877] The buggy address belongs to the object at fff00000c58bb100
[   29.029877]  which belongs to the cache kmalloc-128 of size 128
[   29.032145] The buggy address is located 5 bytes to the right of
[   29.032145]  allocated 115-byte region [fff00000c58bb100, fff00000c58bb173)
[   29.033649] 
[   29.033998] The buggy address belongs to the physical page:
[   29.035260] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058bb
[   29.036784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.037612] page_type: f5(slab)
[   29.038102] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.039517] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.040707] page dumped because: kasan: bad access detected
[   29.041413] 
[   29.041698] Memory state around the buggy address:
[   29.042321]  fff00000c58bb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.043823]  fff00000c58bb080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.044861] >fff00000c58bb100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.045869]                                                                 ^
[   29.046690]  fff00000c58bb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.049099]  fff00000c58bb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.050091] ==================================================================
[   29.053928] ==================================================================
[   29.055390] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   29.056252] Read of size 1 at addr fff00000c58bb180 by task kunit_try_catch/125
[   29.057191] 
[   29.057660] CPU: 1 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   29.058967] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.059803] Hardware name: linux,dummy-virt (DT)
[   29.060468] Call trace:
[   29.061003]  show_stack+0x20/0x38 (C)
[   29.061628]  dump_stack_lvl+0x8c/0xd0
[   29.062185]  print_report+0x118/0x5e0
[   29.062909]  kasan_report+0xc8/0x118
[   29.063627]  __asan_report_load1_noabort+0x20/0x30
[   29.064589]  kmalloc_oob_right+0x5d0/0x660
[   29.065199]  kunit_try_run_case+0x14c/0x3d0
[   29.065877]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.066692]  kthread+0x24c/0x2d0
[   29.067377]  ret_from_fork+0x10/0x20
[   29.068143] 
[   29.068319] Allocated by task 125:
[   29.068896]  kasan_save_stack+0x3c/0x68
[   29.069633]  kasan_save_track+0x20/0x40
[   29.070244]  kasan_save_alloc_info+0x40/0x58
[   29.070866]  __kasan_kmalloc+0xd4/0xd8
[   29.071560]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.072502]  kmalloc_oob_right+0xb0/0x660
[   29.073093]  kunit_try_run_case+0x14c/0x3d0
[   29.073884]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.074488]  kthread+0x24c/0x2d0
[   29.074967]  ret_from_fork+0x10/0x20
[   29.076099] 
[   29.076368] The buggy address belongs to the object at fff00000c58bb100
[   29.076368]  which belongs to the cache kmalloc-128 of size 128
[   29.077460] The buggy address is located 13 bytes to the right of
[   29.077460]  allocated 115-byte region [fff00000c58bb100, fff00000c58bb173)
[   29.079291] 
[   29.079746] The buggy address belongs to the physical page:
[   29.080452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058bb
[   29.081441] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.082201] page_type: f5(slab)
[   29.082755] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.084132] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.085076] page dumped because: kasan: bad access detected
[   29.085586] 
[   29.085842] Memory state around the buggy address:
[   29.086286]  fff00000c58bb080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.086902]  fff00000c58bb100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.087561] >fff00000c58bb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.088610]                    ^
[   29.089043]  fff00000c58bb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.090229]  fff00000c58bb280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.091753] ==================================================================
[   28.954119] ==================================================================
[   28.955773] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   28.957919] Write of size 1 at addr fff00000c58bb173 by task kunit_try_catch/125
[   28.958851] 
[   28.960651] CPU: 1 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G                 N 6.13.0-rc1-next-20241203 #1
[   28.962137] Tainted: [N]=TEST
[   28.962668] Hardware name: linux,dummy-virt (DT)
[   28.963806] Call trace:
[   28.964676]  show_stack+0x20/0x38 (C)
[   28.965612]  dump_stack_lvl+0x8c/0xd0
[   28.966242]  print_report+0x118/0x5e0
[   28.966849]  kasan_report+0xc8/0x118
[   28.967669]  __asan_report_store1_noabort+0x20/0x30
[   28.968423]  kmalloc_oob_right+0x5a4/0x660
[   28.969185]  kunit_try_run_case+0x14c/0x3d0
[   28.969816]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.970657]  kthread+0x24c/0x2d0
[   28.971244]  ret_from_fork+0x10/0x20
[   28.972066] 
[   28.972555] Allocated by task 125:
[   28.973212]  kasan_save_stack+0x3c/0x68
[   28.973959]  kasan_save_track+0x20/0x40
[   28.974560]  kasan_save_alloc_info+0x40/0x58
[   28.975432]  __kasan_kmalloc+0xd4/0xd8
[   28.976344]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.977435]  kmalloc_oob_right+0xb0/0x660
[   28.978401]  kunit_try_run_case+0x14c/0x3d0
[   28.978974]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.980048]  kthread+0x24c/0x2d0
[   28.980453]  ret_from_fork+0x10/0x20
[   28.981314] 
[   28.981871] The buggy address belongs to the object at fff00000c58bb100
[   28.981871]  which belongs to the cache kmalloc-128 of size 128
[   28.982866] The buggy address is located 0 bytes to the right of
[   28.982866]  allocated 115-byte region [fff00000c58bb100, fff00000c58bb173)
[   28.985648] 
[   28.986224] The buggy address belongs to the physical page:
[   28.987630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058bb
[   28.988957] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.990207] page_type: f5(slab)
[   28.991395] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   28.992340] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.993369] page dumped because: kasan: bad access detected
[   28.994242] 
[   28.994610] Memory state around the buggy address:
[   28.996065]  fff00000c58bb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.997650]  fff00000c58bb080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.998726] >fff00000c58bb100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   28.999893]                                                              ^
[   29.001079]  fff00000c58bb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.001951]  fff00000c58bb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.003515] ==================================================================
Failure - log-parser-boot - internal-error-oops-oops-preempt-smp KNOWN ISSUE - kunit_test_null_dereference internal oops on qemu-arm64 KUNIT KASAN
[  147.105499] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
[  147.106635] Modules linked in:
[  147.107480] CPU: 0 UID: 0 PID: 621 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[  147.108939] Tainted: [B]=BAD_PAGE, [N]=TEST
[  147.109739] Hardware name: linux,dummy-virt (DT)
[  147.110529] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  147.111536] pc : kunit_test_null_dereference+0x70/0x170
[  147.112311] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[  147.113090] sp : ffff800083307dc0
[  147.113649] x29: ffff800083307e20 x28: 0000000000000000 x27: 0000000000000000
[  147.114936] x26: 0000000000000000 x25: 0000000000000000 x24: fff00000c634d780
[  147.115997] x23: ffffa03e8bfc2800 x22: ffffa03e8bfcb3c0 x21: fff00000c634d788
[  147.117079] x20: 1ffff00010660fb8 x19: ffff8000800879f0 x18: 00000000eafefbbc
[  147.118147] x17: 0000000000000001 x16: 0000000000000100 x15: 0000000000000000
[  147.119235] x14: 1ffe00001b49cb78 x13: 0000000000000000 x12: fffd8000193188b2
[  147.120343] x11: 1ffe0000193188b1 x10: fffd8000193188b1 x9 : ffffa03e8bfc2888
[  147.121490] x8 : ffff800083307cb8 x7 : 0000000000000001 x6 : 0000000041b58ab3
[  147.122594] x5 : ffff700010660fb8 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[  147.123653] x2 : dfff800000000000 x1 : fff00000c98c3cc0 x0 : ffff8000800879f0
[  147.124830] Call trace:
[  147.125385]  kunit_test_null_dereference+0x70/0x170 (P)
[  147.126092]  kunit_generic_run_threadfn_adapter+0x88/0x100 (L)
[  147.126871]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  147.127613]  kthread+0x24c/0x2d0
[  147.128179]  ret_from_fork+0x10/0x20
[  147.129178] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[  147.130421] ---[ end trace 0000000000000000 ]---