Hay
Date
Dec. 4, 2024, 3:07 p.m.
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[   67.843518] ==================================================================
[   67.844370] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[   67.844370] 
[   67.845184] Use-after-free read at 0x0000000075c59714 (in kfence-#207):
[   67.845942]  test_krealloc+0x51c/0x830
[   67.846510]  test_krealloc+0x458/0x830
[   67.847220]  kunit_try_run_case+0x14c/0x3d0
[   67.847849]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.848667]  kthread+0x24c/0x2d0
[   67.849297]  ret_from_fork+0x10/0x20
[   67.849972] 
[   67.850299] kfence-#207: 0x0000000075c59714-0x0000000098de6172, size=32, cache=kmalloc-32
[   67.850299] 
[   67.851431] allocated by task 325 on cpu 0 at 67.842490s (0.008930s ago):
[   67.852432]  test_alloc+0x298/0x620
[   67.852967]  test_krealloc+0xc0/0x830
[   67.853655]  kunit_try_run_case+0x14c/0x3d0
[   67.854428]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.855211]  kthread+0x24c/0x2d0
[   67.855816]  ret_from_fork+0x10/0x20
[   67.856459] 
[   67.856785] freed by task 325 on cpu 0 at 67.842890s (0.013884s ago):
[   67.857803]  krealloc_noprof+0x148/0x360
[   67.858376]  test_krealloc+0x1dc/0x830
[   67.859030]  kunit_try_run_case+0x14c/0x3d0
[   67.859668]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.860257]  kthread+0x24c/0x2d0
[   67.860871]  ret_from_fork+0x10/0x20
[   67.861397] 
[   67.861806] CPU: 0 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   67.863073] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.863532] Hardware name: linux,dummy-virt (DT)
[   67.864258] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[   67.655267] ==================================================================
[   67.656068] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[   67.656068] 
[   67.657201] Use-after-free read at 0x0000000050e1b1c0 (in kfence-#205):
[   67.657981]  test_memcache_typesafe_by_rcu+0x280/0x560
[   67.658930]  test_memcache_typesafe_by_rcu+0x260/0x560
[   67.659825]  kunit_try_run_case+0x14c/0x3d0
[   67.660432]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.661499]  kthread+0x24c/0x2d0
[   67.662227]  ret_from_fork+0x10/0x20
[   67.662782] 
[   67.663167] kfence-#205: 0x0000000050e1b1c0-0x00000000fdf6b0db, size=32, cache=test
[   67.663167] 
[   67.664152] allocated by task 323 on cpu 0 at 67.638291s (0.025852s ago):
[   67.665152]  test_alloc+0x22c/0x620
[   67.665616]  test_memcache_typesafe_by_rcu+0x15c/0x560
[   67.666447]  kunit_try_run_case+0x14c/0x3d0
[   67.666993]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.667828]  kthread+0x24c/0x2d0
[   67.668320]  ret_from_fork+0x10/0x20
[   67.668857] 
[   67.669320] freed by task 323 on cpu 0 at 67.638422s (0.030889s ago):
[   67.670137]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[   67.670987]  kunit_try_run_case+0x14c/0x3d0
[   67.671674]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.672361]  kthread+0x24c/0x2d0
[   67.672894]  ret_from_fork+0x10/0x20
[   67.673445] 
[   67.673820] CPU: 1 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   67.675003] Tainted: [B]=BAD_PAGE, [N]=TEST
[   67.675587] Hardware name: linux,dummy-virt (DT)
[   67.676272] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[   47.586276] ==================================================================
[   47.587672] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   47.587672] 
[   47.588639] Invalid read at 0x00000000eabf43fe:
[   47.589398]  test_invalid_access+0xdc/0x1f0
[   47.591404]  kunit_try_run_case+0x14c/0x3d0
[   47.592195]  kunit_try_run_case+0x14c/0x3d0
[   47.592914]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.593614]  kthread+0x24c/0x2d0
[   47.594466]  ret_from_fork+0x10/0x20
[   47.595136] 
[   47.595537] CPU: 0 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   47.597337] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.598853] Hardware name: linux,dummy-virt (DT)
[   47.599386] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[   47.354845] ==================================================================
[   47.355660] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   47.355660] 
[   47.356502] Corrupted memory at 0x000000005c619f7e [ ! . . . . . . . . . . . . . . . ] (in kfence-#201):
[   47.359048]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   47.359730]  kunit_try_run_case+0x14c/0x3d0
[   47.360311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.361090]  kthread+0x24c/0x2d0
[   47.361684]  ret_from_fork+0x10/0x20
[   47.362287] 
[   47.362645] kfence-#201: 0x0000000006c44b68-0x000000000d28e926, size=73, cache=kmalloc-96
[   47.362645] 
[   47.363736] allocated by task 313 on cpu 1 at 47.354427s (0.009299s ago):
[   47.364586]  test_alloc+0x298/0x620
[   47.365261]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   47.365962]  kunit_try_run_case+0x14c/0x3d0
[   47.366543]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.367287]  kthread+0x24c/0x2d0
[   47.367858]  ret_from_fork+0x10/0x20
[   47.368394] 
[   47.368780] freed by task 313 on cpu 1 at 47.354668s (0.014102s ago):
[   47.369831]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   47.370462]  kunit_try_run_case+0x14c/0x3d0
[   47.371168]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.371953]  kthread+0x24c/0x2d0
[   47.372476]  ret_from_fork+0x10/0x20
[   47.373063] 
[   47.373434] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   47.374569] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.375203] Hardware name: linux,dummy-virt (DT)
[   47.375883] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[   47.146937] ==================================================================
[   47.147674] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   47.147674] 
[   47.148944] Out-of-bounds read at 0x00000000e3b25392 (105B right of kfence-#199):
[   47.149771]  test_kmalloc_aligned_oob_read+0x238/0x468
[   47.150845]  test_kmalloc_aligned_oob_read+0x100/0x468
[   47.151551]  kunit_try_run_case+0x14c/0x3d0
[   47.152238]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.152989]  kthread+0x24c/0x2d0
[   47.153417]  ret_from_fork+0x10/0x20
[   47.154062] 
[   47.154470] kfence-#199: 0x000000008a6292ea-0x0000000016685bf9, size=73, cache=kmalloc-96
[   47.154470] 
[   47.155694] allocated by task 311 on cpu 0 at 47.146487s (0.009197s ago):
[   47.156460]  test_alloc+0x298/0x620
[   47.157092]  test_kmalloc_aligned_oob_read+0x100/0x468
[   47.157874]  kunit_try_run_case+0x14c/0x3d0
[   47.158556]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.159376]  kthread+0x24c/0x2d0
[   47.159989]  ret_from_fork+0x10/0x20
[   47.160597] 
[   47.161063] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   47.162340] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.162968] Hardware name: linux,dummy-virt (DT)
[   47.163656] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[   41.843128] ==================================================================
[   41.843903] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   41.843903] 
[   41.844873] Corrupted memory at 0x00000000cd9f54ff [ ! ] (in kfence-#148):
[   41.846109]  test_corruption+0x284/0x378
[   41.846732]  kunit_try_run_case+0x14c/0x3d0
[   41.847350]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.848348]  kthread+0x24c/0x2d0
[   41.848940]  ret_from_fork+0x10/0x20
[   41.849697] 
[   41.850047] kfence-#148: 0x00000000494f9c82-0x00000000489c03c0, size=32, cache=kmalloc-32
[   41.850047] 
[   41.851233] allocated by task 299 on cpu 1 at 41.842652s (0.008570s ago):
[   41.852230]  test_alloc+0x298/0x620
[   41.852881]  test_corruption+0x198/0x378
[   41.853405]  kunit_try_run_case+0x14c/0x3d0
[   41.854068]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.854895]  kthread+0x24c/0x2d0
[   41.855406]  ret_from_fork+0x10/0x20
[   41.856072] 
[   41.856398] freed by task 299 on cpu 1 at 41.842809s (0.013578s ago):
[   41.857376]  test_corruption+0x284/0x378
[   41.858001]  kunit_try_run_case+0x14c/0x3d0
[   41.858540]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.859415]  kthread+0x24c/0x2d0
[   41.859948]  ret_from_fork+0x10/0x20
[   41.860494] 
[   41.860972] CPU: 1 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   41.862139] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.862753] Hardware name: linux,dummy-virt (DT)
[   41.863270] ==================================================================
[   41.739225] ==================================================================
[   41.740150] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   41.740150] 
[   41.740999] Corrupted memory at 0x0000000039ea7e98 [ ! . . . . . . . . . . . . . . . ] (in kfence-#147):
[   41.744530]  test_corruption+0x278/0x378
[   41.745042]  kunit_try_run_case+0x14c/0x3d0
[   41.745743]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.746546]  kthread+0x24c/0x2d0
[   41.747136]  ret_from_fork+0x10/0x20
[   41.747681] 
[   41.748059] kfence-#147: 0x00000000ee66ca16-0x00000000cb77f3b0, size=32, cache=kmalloc-32
[   41.748059] 
[   41.749246] allocated by task 299 on cpu 1 at 41.738772s (0.010464s ago):
[   41.750265]  test_alloc+0x298/0x620
[   41.751033]  test_corruption+0xdc/0x378
[   41.751533]  kunit_try_run_case+0x14c/0x3d0
[   41.752309]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.753114]  kthread+0x24c/0x2d0
[   41.753617]  ret_from_fork+0x10/0x20
[   41.754131] 
[   41.754595] freed by task 299 on cpu 1 at 41.738958s (0.015628s ago):
[   41.755419]  test_corruption+0x278/0x378
[   41.756111]  kunit_try_run_case+0x14c/0x3d0
[   41.756817]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.757751]  kthread+0x24c/0x2d0
[   41.758283]  ret_from_fork+0x10/0x20
[   41.759070] 
[   41.759462] CPU: 1 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   41.760642] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.761321] Hardware name: linux,dummy-virt (DT)
[   41.761880] ==================================================================
[   41.946829] ==================================================================
[   41.947934] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   41.947934] 
[   41.948848] Corrupted memory at 0x00000000212e2aa9 [ ! . . . . . . . . . . . . . . . ] (in kfence-#149):
[   41.951357]  test_corruption+0x120/0x378
[   41.951974]  kunit_try_run_case+0x14c/0x3d0
[   41.952614]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.953447]  kthread+0x24c/0x2d0
[   41.954072]  ret_from_fork+0x10/0x20
[   41.954561] 
[   41.954921] kfence-#149: 0x000000007f718833-0x00000000c354d21f, size=32, cache=test
[   41.954921] 
[   41.955934] allocated by task 301 on cpu 0 at 41.946553s (0.009371s ago):
[   41.956884]  test_alloc+0x22c/0x620
[   41.957512]  test_corruption+0xdc/0x378
[   41.958082]  kunit_try_run_case+0x14c/0x3d0
[   41.958614]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.959435]  kthread+0x24c/0x2d0
[   41.960021]  ret_from_fork+0x10/0x20
[   41.960584] 
[   41.960950] freed by task 301 on cpu 0 at 41.946676s (0.014263s ago):
[   41.961886]  test_corruption+0x120/0x378
[   41.962448]  kunit_try_run_case+0x14c/0x3d0
[   41.962983]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.963785]  kthread+0x24c/0x2d0
[   41.964389]  ret_from_fork+0x10/0x20
[   41.964923] 
[   41.965410] CPU: 0 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   41.966585] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.967249] Hardware name: linux,dummy-virt (DT)
[   41.967878] ==================================================================
[   42.050919] ==================================================================
[   42.051773] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   42.051773] 
[   42.052683] Corrupted memory at 0x00000000e02c6ea8 [ ! ] (in kfence-#150):
[   42.053729]  test_corruption+0x1d8/0x378
[   42.054340]  kunit_try_run_case+0x14c/0x3d0
[   42.054993]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.055732]  kthread+0x24c/0x2d0
[   42.056426]  ret_from_fork+0x10/0x20
[   42.057152] 
[   42.057603] kfence-#150: 0x00000000904db895-0x00000000468e1d0a, size=32, cache=test
[   42.057603] 
[   42.058815] allocated by task 301 on cpu 0 at 42.050660s (0.008145s ago):
[   42.059766]  test_alloc+0x22c/0x620
[   42.060354]  test_corruption+0x198/0x378
[   42.060991]  kunit_try_run_case+0x14c/0x3d0
[   42.061570]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.062441]  kthread+0x24c/0x2d0
[   42.062972]  ret_from_fork+0x10/0x20
[   42.063517] 
[   42.063891] freed by task 301 on cpu 0 at 42.050757s (0.013124s ago):
[   42.064758]  test_corruption+0x1d8/0x378
[   42.065396]  kunit_try_run_case+0x14c/0x3d0
[   42.066089]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   42.066843]  kthread+0x24c/0x2d0
[   42.067365]  ret_from_fork+0x10/0x20
[   42.068052] 
[   42.068421] CPU: 0 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   42.069565] Tainted: [B]=BAD_PAGE, [N]=TEST
[   42.070290] Hardware name: linux,dummy-virt (DT)
[   42.070944] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[   41.530845] ==================================================================
[   41.531823] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   41.531823] 
[   41.532611] Invalid free of 0x00000000bf589abd (in kfence-#145):
[   41.533349]  test_invalid_addr_free+0x1ac/0x238
[   41.534531]  kunit_try_run_case+0x14c/0x3d0
[   41.535290]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.536034]  kthread+0x24c/0x2d0
[   41.536616]  ret_from_fork+0x10/0x20
[   41.537246] 
[   41.537562] kfence-#145: 0x00000000fc9d4e1e-0x0000000044d87612, size=32, cache=kmalloc-32
[   41.537562] 
[   41.538672] allocated by task 295 on cpu 0 at 41.530589s (0.008072s ago):
[   41.539583]  test_alloc+0x298/0x620
[   41.540241]  test_invalid_addr_free+0xd4/0x238
[   41.541086]  kunit_try_run_case+0x14c/0x3d0
[   41.541808]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.542619]  kthread+0x24c/0x2d0
[   41.543130]  ret_from_fork+0x10/0x20
[   41.543819] 
[   41.544290] CPU: 0 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   41.545493] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.546123] Hardware name: linux,dummy-virt (DT)
[   41.546775] ==================================================================
[   41.634806] ==================================================================
[   41.635881] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   41.635881] 
[   41.636794] Invalid free of 0x00000000daab33ce (in kfence-#146):
[   41.637578]  test_invalid_addr_free+0xec/0x238
[   41.639143]  kunit_try_run_case+0x14c/0x3d0
[   41.639817]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.640570]  kthread+0x24c/0x2d0
[   41.641243]  ret_from_fork+0x10/0x20
[   41.642095] 
[   41.642539] kfence-#146: 0x00000000eb414d9d-0x000000009e8cf10c, size=32, cache=test
[   41.642539] 
[   41.644013] allocated by task 297 on cpu 1 at 41.634584s (0.009417s ago):
[   41.645022]  test_alloc+0x22c/0x620
[   41.645769]  test_invalid_addr_free+0xd4/0x238
[   41.646506]  kunit_try_run_case+0x14c/0x3d0
[   41.647191]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.648232]  kthread+0x24c/0x2d0
[   41.648851]  ret_from_fork+0x10/0x20
[   41.649394] 
[   41.649784] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   41.650959] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.651452] Hardware name: linux,dummy-virt (DT)
[   41.652280] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[   41.427151] ==================================================================
[   41.428061] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   41.428061] 
[   41.428866] Invalid free of 0x00000000e67ff70e (in kfence-#144):
[   41.429796]  test_double_free+0x100/0x238
[   41.430320]  kunit_try_run_case+0x14c/0x3d0
[   41.431193]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.431896]  kthread+0x24c/0x2d0
[   41.432503]  ret_from_fork+0x10/0x20
[   41.433144] 
[   41.433473] kfence-#144: 0x00000000e67ff70e-0x000000009e384c8d, size=32, cache=test
[   41.433473] 
[   41.434691] allocated by task 293 on cpu 1 at 41.426657s (0.008024s ago):
[   41.435705]  test_alloc+0x22c/0x620
[   41.436434]  test_double_free+0xd4/0x238
[   41.437150]  kunit_try_run_case+0x14c/0x3d0
[   41.437793]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.438737]  kthread+0x24c/0x2d0
[   41.439283]  ret_from_fork+0x10/0x20
[   41.439863] 
[   41.440250] freed by task 293 on cpu 1 at 41.426764s (0.013476s ago):
[   41.441104]  test_double_free+0xf0/0x238
[   41.441692]  kunit_try_run_case+0x14c/0x3d0
[   41.442499]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.443172]  kthread+0x24c/0x2d0
[   41.443829]  ret_from_fork+0x10/0x20
[   41.444443] 
[   41.444945] CPU: 1 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   41.446141] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.446774] Hardware name: linux,dummy-virt (DT)
[   41.447382] ==================================================================
[   41.323256] ==================================================================
[   41.324191] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   41.324191] 
[   41.324984] Invalid free of 0x00000000317517ed (in kfence-#143):
[   41.326427]  test_double_free+0x1bc/0x238
[   41.326985]  kunit_try_run_case+0x14c/0x3d0
[   41.327850]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.328476]  kthread+0x24c/0x2d0
[   41.329149]  ret_from_fork+0x10/0x20
[   41.329711] 
[   41.330086] kfence-#143: 0x00000000317517ed-0x000000004c9a0283, size=32, cache=kmalloc-32
[   41.330086] 
[   41.331324] allocated by task 291 on cpu 0 at 41.322692s (0.008623s ago):
[   41.332115]  test_alloc+0x298/0x620
[   41.332807]  test_double_free+0xd4/0x238
[   41.333391]  kunit_try_run_case+0x14c/0x3d0
[   41.333989]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.334595]  kthread+0x24c/0x2d0
[   41.335246]  ret_from_fork+0x10/0x20
[   41.335816] 
[   41.336242] freed by task 291 on cpu 0 at 41.322817s (0.013416s ago):
[   41.337062]  test_double_free+0x1ac/0x238
[   41.337760]  kunit_try_run_case+0x14c/0x3d0
[   41.338489]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.339241]  kthread+0x24c/0x2d0
[   41.339846]  ret_from_fork+0x10/0x20
[   41.340470] 
[   41.340928] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   41.342119] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.342782] Hardware name: linux,dummy-virt (DT)
[   41.343509] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[   41.011055] ==================================================================
[   41.012100] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   41.012100] 
[   41.013249] Use-after-free read at 0x000000003c5a3b65 (in kfence-#140):
[   41.014445]  test_use_after_free_read+0x114/0x248
[   41.015406]  test_use_after_free_read+0xf0/0x248
[   41.016021]  kunit_try_run_case+0x14c/0x3d0
[   41.016677]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.017449]  kthread+0x24c/0x2d0
[   41.017955]  ret_from_fork+0x10/0x20
[   41.018578] 
[   41.019051] kfence-#140: 0x000000003c5a3b65-0x00000000ff482700, size=32, cache=test
[   41.019051] 
[   41.020103] allocated by task 285 on cpu 1 at 41.010695s (0.009399s ago):
[   41.021068]  test_alloc+0x22c/0x620
[   41.021587]  test_use_after_free_read+0xd0/0x248
[   41.022371]  kunit_try_run_case+0x14c/0x3d0
[   41.022957]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.023850]  kthread+0x24c/0x2d0
[   41.024374]  ret_from_fork+0x10/0x20
[   41.024881] 
[   41.025262] freed by task 285 on cpu 1 at 41.010798s (0.014455s ago):
[   41.026164]  test_use_after_free_read+0xf0/0x248
[   41.026982]  kunit_try_run_case+0x14c/0x3d0
[   41.027556]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   41.028318]  kthread+0x24c/0x2d0
[   41.028944]  ret_from_fork+0x10/0x20
[   41.029453] 
[   41.029901] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   41.031063] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.031776] Hardware name: linux,dummy-virt (DT)
[   41.032430] ==================================================================
[   40.907224] ==================================================================
[   40.908171] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   40.908171] 
[   40.909175] Use-after-free read at 0x000000004f4e8da3 (in kfence-#139):
[   40.909880]  test_use_after_free_read+0x114/0x248
[   40.910815]  test_use_after_free_read+0x1c0/0x248
[   40.911503]  kunit_try_run_case+0x14c/0x3d0
[   40.912236]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.913033]  kthread+0x24c/0x2d0
[   40.913558]  ret_from_fork+0x10/0x20
[   40.914217] 
[   40.914595] kfence-#139: 0x000000004f4e8da3-0x00000000c74ad180, size=32, cache=kmalloc-32
[   40.914595] 
[   40.915909] allocated by task 283 on cpu 0 at 40.906662s (0.009237s ago):
[   40.916862]  test_alloc+0x298/0x620
[   40.917412]  test_use_after_free_read+0xd0/0x248
[   40.918163]  kunit_try_run_case+0x14c/0x3d0
[   40.918798]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.919507]  kthread+0x24c/0x2d0
[   40.920101]  ret_from_fork+0x10/0x20
[   40.920656] 
[   40.921264] freed by task 283 on cpu 0 at 40.906783s (0.014325s ago):
[   40.922371]  test_use_after_free_read+0x1c0/0x248
[   40.923086]  kunit_try_run_case+0x14c/0x3d0
[   40.923692]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.924402]  kthread+0x24c/0x2d0
[   40.924968]  ret_from_fork+0x10/0x20
[   40.925563] 
[   40.925986] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   40.927961] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.928439] Hardware name: linux,dummy-virt (DT)
[   40.928935] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[   40.699115] ==================================================================
[   40.700103] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   40.700103] 
[   40.700942] Out-of-bounds write at 0x00000000797ee6d8 (1B left of kfence-#137):
[   40.702665]  test_out_of_bounds_write+0x100/0x240
[   40.703592]  test_out_of_bounds_write+0xc8/0x240
[   40.704208]  kunit_try_run_case+0x14c/0x3d0
[   40.704541]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.705134]  kthread+0x24c/0x2d0
[   40.705706]  ret_from_fork+0x10/0x20
[   40.706414] 
[   40.706789] kfence-#137: 0x00000000cb8067a0-0x00000000178172ab, size=32, cache=kmalloc-32
[   40.706789] 
[   40.708194] allocated by task 279 on cpu 0 at 40.698751s (0.009432s ago):
[   40.709093]  test_alloc+0x298/0x620
[   40.709803]  test_out_of_bounds_write+0xc8/0x240
[   40.710451]  kunit_try_run_case+0x14c/0x3d0
[   40.711164]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.711884]  kthread+0x24c/0x2d0
[   40.712346]  ret_from_fork+0x10/0x20
[   40.713046] 
[   40.713416] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   40.714593] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.715298] Hardware name: linux,dummy-virt (DT)
[   40.715867] ==================================================================
[   40.802851] ==================================================================
[   40.803779] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   40.803779] 
[   40.804704] Out-of-bounds write at 0x0000000036ad742f (1B left of kfence-#138):
[   40.805785]  test_out_of_bounds_write+0x100/0x240
[   40.806342]  test_out_of_bounds_write+0xc8/0x240
[   40.807184]  kunit_try_run_case+0x14c/0x3d0
[   40.807953]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.808806]  kthread+0x24c/0x2d0
[   40.809433]  ret_from_fork+0x10/0x20
[   40.810221] 
[   40.810601] kfence-#138: 0x00000000d96756f7-0x00000000087f0a00, size=32, cache=test
[   40.810601] 
[   40.811673] allocated by task 281 on cpu 0 at 40.802696s (0.008966s ago):
[   40.812586]  test_alloc+0x22c/0x620
[   40.813255]  test_out_of_bounds_write+0xc8/0x240
[   40.814019]  kunit_try_run_case+0x14c/0x3d0
[   40.814536]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.815397]  kthread+0x24c/0x2d0
[   40.815999]  ret_from_fork+0x10/0x20
[   40.816522] 
[   40.816892] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   40.818157] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.818819] Hardware name: linux,dummy-virt (DT)
[   40.819560] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[   40.490813] ==================================================================
[   40.491800] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   40.491800] 
[   40.492759] Out-of-bounds read at 0x00000000f8fc7b89 (1B left of kfence-#135):
[   40.493522]  test_out_of_bounds_read+0x114/0x3e0
[   40.494412]  test_out_of_bounds_read+0xdc/0x3e0
[   40.495117]  kunit_try_run_case+0x14c/0x3d0
[   40.495743]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.496450]  kthread+0x24c/0x2d0
[   40.496966]  ret_from_fork+0x10/0x20
[   40.497656] 
[   40.497977] kfence-#135: 0x00000000aa9bdd4f-0x00000000d4f799ea, size=32, cache=test
[   40.497977] 
[   40.498967] allocated by task 277 on cpu 0 at 40.490620s (0.008336s ago):
[   40.500100]  test_alloc+0x22c/0x620
[   40.500794]  test_out_of_bounds_read+0xdc/0x3e0
[   40.501519]  kunit_try_run_case+0x14c/0x3d0
[   40.502191]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.502928]  kthread+0x24c/0x2d0
[   40.503519]  ret_from_fork+0x10/0x20
[   40.504187] 
[   40.504545] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   40.505728] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.506386] Hardware name: linux,dummy-virt (DT)
[   40.507184] ==================================================================
[   40.179037] ==================================================================
[   40.179857] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   40.179857] 
[   40.180857] Out-of-bounds read at 0x00000000948dd830 (32B right of kfence-#132):
[   40.181894]  test_out_of_bounds_read+0x1c8/0x3e0
[   40.182671]  test_out_of_bounds_read+0x198/0x3e0
[   40.183260]  kunit_try_run_case+0x14c/0x3d0
[   40.184045]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.184736]  kthread+0x24c/0x2d0
[   40.185426]  ret_from_fork+0x10/0x20
[   40.186128] 
[   40.186545] kfence-#132: 0x00000000bf9e0475-0x00000000f1b250ff, size=32, cache=kmalloc-32
[   40.186545] 
[   40.187769] allocated by task 275 on cpu 1 at 40.178673s (0.009086s ago):
[   40.188588]  test_alloc+0x298/0x620
[   40.189235]  test_out_of_bounds_read+0x198/0x3e0
[   40.189922]  kunit_try_run_case+0x14c/0x3d0
[   40.190611]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.191267]  kthread+0x24c/0x2d0
[   40.191968]  ret_from_fork+0x10/0x20
[   40.192503] 
[   40.192962] CPU: 1 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   40.194215] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.194864] Hardware name: linux,dummy-virt (DT)
[   40.195470] ==================================================================
[   40.594876] ==================================================================
[   40.595765] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   40.595765] 
[   40.596576] Out-of-bounds read at 0x00000000fdf02350 (32B right of kfence-#136):
[   40.597599]  test_out_of_bounds_read+0x1c8/0x3e0
[   40.598299]  test_out_of_bounds_read+0x198/0x3e0
[   40.598845]  kunit_try_run_case+0x14c/0x3d0
[   40.599679]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.600541]  kthread+0x24c/0x2d0
[   40.601019]  ret_from_fork+0x10/0x20
[   40.601778] 
[   40.602169] kfence-#136: 0x0000000073e6a0ab-0x00000000e8743b31, size=32, cache=test
[   40.602169] 
[   40.603217] allocated by task 277 on cpu 0 at 40.594732s (0.008475s ago):
[   40.604220]  test_alloc+0x22c/0x620
[   40.604749]  test_out_of_bounds_read+0x198/0x3e0
[   40.605434]  kunit_try_run_case+0x14c/0x3d0
[   40.606252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   40.607104]  kthread+0x24c/0x2d0
[   40.607802]  ret_from_fork+0x10/0x20
[   40.608355] 
[   40.608839] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   40.610143] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.610754] Hardware name: linux,dummy-virt (DT)
[   40.611450] ==================================================================
[   39.764024] ==================================================================
[   39.764890] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   39.764890] 
[   39.765977] Out-of-bounds read at 0x00000000f8e4ece0 (1B left of kfence-#128):
[   39.767536]  test_out_of_bounds_read+0x114/0x3e0
[   39.768279]  test_out_of_bounds_read+0xdc/0x3e0
[   39.768914]  kunit_try_run_case+0x14c/0x3d0
[   39.769587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.770433]  kthread+0x24c/0x2d0
[   39.771187]  ret_from_fork+0x10/0x20
[   39.771764] 
[   39.772408] kfence-#128: 0x0000000042927e50-0x00000000382124db, size=32, cache=kmalloc-32
[   39.772408] 
[   39.773740] allocated by task 275 on cpu 1 at 39.762604s (0.010993s ago):
[   39.775325]  test_alloc+0x298/0x620
[   39.775899]  test_out_of_bounds_read+0xdc/0x3e0
[   39.776515]  kunit_try_run_case+0x14c/0x3d0
[   39.777155]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.777920]  kthread+0x24c/0x2d0
[   39.778568]  ret_from_fork+0x10/0x20
[   39.779323] 
[   39.779585] CPU: 1 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   39.780202] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.780487] Hardware name: linux,dummy-virt (DT)
[   39.781212] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[   39.557692] ==================================================================
[   39.559525] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   39.560747] Write of size 121 at addr fff00000c6766e00 by task kunit_try_catch/273
[   39.561597] 
[   39.562498] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   39.563895] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.564452] Hardware name: linux,dummy-virt (DT)
[   39.565089] Call trace:
[   39.565483]  show_stack+0x20/0x38 (C)
[   39.566504]  dump_stack_lvl+0x8c/0xd0
[   39.567352]  print_report+0x118/0x5e0
[   39.567913]  kasan_report+0xc8/0x118
[   39.568443]  kasan_check_range+0x100/0x1a8
[   39.569101]  __kasan_check_write+0x20/0x30
[   39.569759]  strncpy_from_user+0x3c/0x2a0
[   39.570525]  copy_user_test_oob+0x5c0/0xec0
[   39.571356]  kunit_try_run_case+0x14c/0x3d0
[   39.572172]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.572899]  kthread+0x24c/0x2d0
[   39.573392]  ret_from_fork+0x10/0x20
[   39.574216] 
[   39.574731] Allocated by task 273:
[   39.575382]  kasan_save_stack+0x3c/0x68
[   39.576093]  kasan_save_track+0x20/0x40
[   39.576868]  kasan_save_alloc_info+0x40/0x58
[   39.577705]  __kasan_kmalloc+0xd4/0xd8
[   39.578415]  __kmalloc_noprof+0x188/0x4c8
[   39.579269]  kunit_kmalloc_array+0x34/0x88
[   39.579980]  copy_user_test_oob+0xac/0xec0
[   39.580512]  kunit_try_run_case+0x14c/0x3d0
[   39.581047]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.581760]  kthread+0x24c/0x2d0
[   39.582272]  ret_from_fork+0x10/0x20
[   39.582967] 
[   39.583224] The buggy address belongs to the object at fff00000c6766e00
[   39.583224]  which belongs to the cache kmalloc-128 of size 128
[   39.584832] The buggy address is located 0 bytes inside of
[   39.584832]  allocated 120-byte region [fff00000c6766e00, fff00000c6766e78)
[   39.586246] 
[   39.586566] The buggy address belongs to the physical page:
[   39.587515] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106766
[   39.588366] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.589357] page_type: f5(slab)
[   39.589847] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   39.590990] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   39.591883] page dumped because: kasan: bad access detected
[   39.592593] 
[   39.593013] Memory state around the buggy address:
[   39.593601]  fff00000c6766d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   39.594817]  fff00000c6766d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.595730] >fff00000c6766e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   39.596845]                                                                 ^
[   39.597562]  fff00000c6766e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.598412]  fff00000c6766f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.599353] ==================================================================
[   39.601182] ==================================================================
[   39.602447] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   39.603466] Write of size 1 at addr fff00000c6766e78 by task kunit_try_catch/273
[   39.604585] 
[   39.605086] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   39.606371] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.607066] Hardware name: linux,dummy-virt (DT)
[   39.607792] Call trace:
[   39.608358]  show_stack+0x20/0x38 (C)
[   39.608953]  dump_stack_lvl+0x8c/0xd0
[   39.609573]  print_report+0x118/0x5e0
[   39.610157]  kasan_report+0xc8/0x118
[   39.610666]  __asan_report_store1_noabort+0x20/0x30
[   39.611562]  strncpy_from_user+0x270/0x2a0
[   39.612250]  copy_user_test_oob+0x5c0/0xec0
[   39.612888]  kunit_try_run_case+0x14c/0x3d0
[   39.613569]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.614329]  kthread+0x24c/0x2d0
[   39.614999]  ret_from_fork+0x10/0x20
[   39.615589] 
[   39.616034] Allocated by task 273:
[   39.616543]  kasan_save_stack+0x3c/0x68
[   39.617152]  kasan_save_track+0x20/0x40
[   39.617744]  kasan_save_alloc_info+0x40/0x58
[   39.618441]  __kasan_kmalloc+0xd4/0xd8
[   39.619030]  __kmalloc_noprof+0x188/0x4c8
[   39.619727]  kunit_kmalloc_array+0x34/0x88
[   39.620344]  copy_user_test_oob+0xac/0xec0
[   39.621049]  kunit_try_run_case+0x14c/0x3d0
[   39.621568]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.622385]  kthread+0x24c/0x2d0
[   39.623028]  ret_from_fork+0x10/0x20
[   39.623577] 
[   39.623947] The buggy address belongs to the object at fff00000c6766e00
[   39.623947]  which belongs to the cache kmalloc-128 of size 128
[   39.625330] The buggy address is located 0 bytes to the right of
[   39.625330]  allocated 120-byte region [fff00000c6766e00, fff00000c6766e78)
[   39.626824] 
[   39.627184] The buggy address belongs to the physical page:
[   39.627893] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106766
[   39.628884] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.629721] page_type: f5(slab)
[   39.630190] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   39.631274] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   39.632153] page dumped because: kasan: bad access detected
[   39.632958] 
[   39.633386] Memory state around the buggy address:
[   39.633934]  fff00000c6766d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   39.634752]  fff00000c6766d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.635762] >fff00000c6766e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   39.636734]                                                                 ^
[   39.637675]  fff00000c6766e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.638694]  fff00000c6766f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.639556] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[   39.437521] ==================================================================
[   39.438233] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec0
[   39.439309] Read of size 121 at addr fff00000c6766e00 by task kunit_try_catch/273
[   39.440750] 
[   39.441087] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   39.443880] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.444691] Hardware name: linux,dummy-virt (DT)
[   39.445485] Call trace:
[   39.445917]  show_stack+0x20/0x38 (C)
[   39.446505]  dump_stack_lvl+0x8c/0xd0
[   39.447039]  print_report+0x118/0x5e0
[   39.447559]  kasan_report+0xc8/0x118
[   39.448147]  kasan_check_range+0x100/0x1a8
[   39.448764]  __kasan_check_read+0x20/0x30
[   39.449469]  copy_user_test_oob+0x3c8/0xec0
[   39.450016]  kunit_try_run_case+0x14c/0x3d0
[   39.450742]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.451593]  kthread+0x24c/0x2d0
[   39.452189]  ret_from_fork+0x10/0x20
[   39.452851] 
[   39.453262] Allocated by task 273:
[   39.453739]  kasan_save_stack+0x3c/0x68
[   39.454329]  kasan_save_track+0x20/0x40
[   39.454766]  kasan_save_alloc_info+0x40/0x58
[   39.455229]  __kasan_kmalloc+0xd4/0xd8
[   39.455675]  __kmalloc_noprof+0x188/0x4c8
[   39.456100]  kunit_kmalloc_array+0x34/0x88
[   39.456753]  copy_user_test_oob+0xac/0xec0
[   39.457586]  kunit_try_run_case+0x14c/0x3d0
[   39.458074]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.458745]  kthread+0x24c/0x2d0
[   39.459370]  ret_from_fork+0x10/0x20
[   39.459918] 
[   39.460213] The buggy address belongs to the object at fff00000c6766e00
[   39.460213]  which belongs to the cache kmalloc-128 of size 128
[   39.461870] The buggy address is located 0 bytes inside of
[   39.461870]  allocated 120-byte region [fff00000c6766e00, fff00000c6766e78)
[   39.463487] 
[   39.463813] The buggy address belongs to the physical page:
[   39.464538] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106766
[   39.465229] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.466192] page_type: f5(slab)
[   39.466682] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   39.467735] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   39.468874] page dumped because: kasan: bad access detected
[   39.469572] 
[   39.469966] Memory state around the buggy address:
[   39.470651]  fff00000c6766d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   39.471706]  fff00000c6766d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.472701] >fff00000c6766e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   39.473520]                                                                 ^
[   39.474401]  fff00000c6766e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.475282]  fff00000c6766f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.476232] ==================================================================
[   39.479349] ==================================================================
[   39.480226] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec0
[   39.480971] Write of size 121 at addr fff00000c6766e00 by task kunit_try_catch/273
[   39.481896] 
[   39.482408] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   39.483657] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.484192] Hardware name: linux,dummy-virt (DT)
[   39.484818] Call trace:
[   39.485306]  show_stack+0x20/0x38 (C)
[   39.485983]  dump_stack_lvl+0x8c/0xd0
[   39.486689]  print_report+0x118/0x5e0
[   39.487273]  kasan_report+0xc8/0x118
[   39.488032]  kasan_check_range+0x100/0x1a8
[   39.488759]  __kasan_check_write+0x20/0x30
[   39.489356]  copy_user_test_oob+0x434/0xec0
[   39.490038]  kunit_try_run_case+0x14c/0x3d0
[   39.490707]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.491478]  kthread+0x24c/0x2d0
[   39.492100]  ret_from_fork+0x10/0x20
[   39.492808] 
[   39.493136] Allocated by task 273:
[   39.493645]  kasan_save_stack+0x3c/0x68
[   39.494253]  kasan_save_track+0x20/0x40
[   39.494856]  kasan_save_alloc_info+0x40/0x58
[   39.495371]  __kasan_kmalloc+0xd4/0xd8
[   39.496122]  __kmalloc_noprof+0x188/0x4c8
[   39.496679]  kunit_kmalloc_array+0x34/0x88
[   39.497304]  copy_user_test_oob+0xac/0xec0
[   39.497941]  kunit_try_run_case+0x14c/0x3d0
[   39.498646]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.499366]  kthread+0x24c/0x2d0
[   39.499823]  ret_from_fork+0x10/0x20
[   39.500443] 
[   39.500814] The buggy address belongs to the object at fff00000c6766e00
[   39.500814]  which belongs to the cache kmalloc-128 of size 128
[   39.502165] The buggy address is located 0 bytes inside of
[   39.502165]  allocated 120-byte region [fff00000c6766e00, fff00000c6766e78)
[   39.503564] 
[   39.503911] The buggy address belongs to the physical page:
[   39.504791] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106766
[   39.505724] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.506649] page_type: f5(slab)
[   39.507263] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   39.508108] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   39.509136] page dumped because: kasan: bad access detected
[   39.509970] 
[   39.510318] Memory state around the buggy address:
[   39.510957]  fff00000c6766d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   39.511940]  fff00000c6766d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.512965] >fff00000c6766e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   39.513847]                                                                 ^
[   39.514781]  fff00000c6766e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.515682]  fff00000c6766f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.516505] ==================================================================
[   39.295031] ==================================================================
[   39.296469] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec0
[   39.297285] Write of size 121 at addr fff00000c6766e00 by task kunit_try_catch/273
[   39.298070] 
[   39.299177] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   39.300510] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.301127] Hardware name: linux,dummy-virt (DT)
[   39.301955] Call trace:
[   39.302456]  show_stack+0x20/0x38 (C)
[   39.303145]  dump_stack_lvl+0x8c/0xd0
[   39.303850]  print_report+0x118/0x5e0
[   39.304416]  kasan_report+0xc8/0x118
[   39.304961]  kasan_check_range+0x100/0x1a8
[   39.305530]  __kasan_check_write+0x20/0x30
[   39.306481]  copy_user_test_oob+0x234/0xec0
[   39.307154]  kunit_try_run_case+0x14c/0x3d0
[   39.307754]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.308514]  kthread+0x24c/0x2d0
[   39.309072]  ret_from_fork+0x10/0x20
[   39.309820] 
[   39.310277] Allocated by task 273:
[   39.311228]  kasan_save_stack+0x3c/0x68
[   39.311831]  kasan_save_track+0x20/0x40
[   39.312340]  kasan_save_alloc_info+0x40/0x58
[   39.313083]  __kasan_kmalloc+0xd4/0xd8
[   39.313652]  __kmalloc_noprof+0x188/0x4c8
[   39.314383]  kunit_kmalloc_array+0x34/0x88
[   39.315296]  copy_user_test_oob+0xac/0xec0
[   39.315862]  kunit_try_run_case+0x14c/0x3d0
[   39.316758]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.317745]  kthread+0x24c/0x2d0
[   39.319101]  ret_from_fork+0x10/0x20
[   39.319537] 
[   39.320099] The buggy address belongs to the object at fff00000c6766e00
[   39.320099]  which belongs to the cache kmalloc-128 of size 128
[   39.321445] The buggy address is located 0 bytes inside of
[   39.321445]  allocated 120-byte region [fff00000c6766e00, fff00000c6766e78)
[   39.323309] 
[   39.323785] The buggy address belongs to the physical page:
[   39.324501] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106766
[   39.325436] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.326485] page_type: f5(slab)
[   39.327275] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   39.328197] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   39.329154] page dumped because: kasan: bad access detected
[   39.329758] 
[   39.330235] Memory state around the buggy address:
[   39.331466]  fff00000c6766d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   39.332491]  fff00000c6766d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.333464] >fff00000c6766e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   39.335012]                                                                 ^
[   39.335619]  fff00000c6766e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.336830]  fff00000c6766f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.337684] ==================================================================
[   39.346381] ==================================================================
[   39.347785] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec0
[   39.348673] Read of size 121 at addr fff00000c6766e00 by task kunit_try_catch/273
[   39.350179] 
[   39.351057] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   39.352527] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.353238] Hardware name: linux,dummy-virt (DT)
[   39.353967] Call trace:
[   39.354372]  show_stack+0x20/0x38 (C)
[   39.355017]  dump_stack_lvl+0x8c/0xd0
[   39.355613]  print_report+0x118/0x5e0
[   39.356234]  kasan_report+0xc8/0x118
[   39.356911]  kasan_check_range+0x100/0x1a8
[   39.357642]  __kasan_check_read+0x20/0x30
[   39.358197]  copy_user_test_oob+0x728/0xec0
[   39.358950]  kunit_try_run_case+0x14c/0x3d0
[   39.359697]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.360446]  kthread+0x24c/0x2d0
[   39.360999]  ret_from_fork+0x10/0x20
[   39.361732] 
[   39.362177] Allocated by task 273:
[   39.362775]  kasan_save_stack+0x3c/0x68
[   39.363259]  kasan_save_track+0x20/0x40
[   39.364003]  kasan_save_alloc_info+0x40/0x58
[   39.364535]  __kasan_kmalloc+0xd4/0xd8
[   39.365185]  __kmalloc_noprof+0x188/0x4c8
[   39.365959]  kunit_kmalloc_array+0x34/0x88
[   39.366521]  copy_user_test_oob+0xac/0xec0
[   39.367238]  kunit_try_run_case+0x14c/0x3d0
[   39.367865]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.368607]  kthread+0x24c/0x2d0
[   39.369121]  ret_from_fork+0x10/0x20
[   39.369657] 
[   39.370085] The buggy address belongs to the object at fff00000c6766e00
[   39.370085]  which belongs to the cache kmalloc-128 of size 128
[   39.371451] The buggy address is located 0 bytes inside of
[   39.371451]  allocated 120-byte region [fff00000c6766e00, fff00000c6766e78)
[   39.372832] 
[   39.373246] The buggy address belongs to the physical page:
[   39.373937] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106766
[   39.374942] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.375746] page_type: f5(slab)
[   39.376293] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   39.377244] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   39.378188] page dumped because: kasan: bad access detected
[   39.378866] 
[   39.379194] Memory state around the buggy address:
[   39.379856]  fff00000c6766d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   39.380647]  fff00000c6766d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.381656] >fff00000c6766e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   39.382483]                                                                 ^
[   39.383392]  fff00000c6766e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.384304]  fff00000c6766f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.385263] ==================================================================
[   39.394559] ==================================================================
[   39.395345] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec0
[   39.396136] Write of size 121 at addr fff00000c6766e00 by task kunit_try_catch/273
[   39.397018] 
[   39.397401] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   39.399172] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.399834] Hardware name: linux,dummy-virt (DT)
[   39.400566] Call trace:
[   39.401104]  show_stack+0x20/0x38 (C)
[   39.401939]  dump_stack_lvl+0x8c/0xd0
[   39.402681]  print_report+0x118/0x5e0
[   39.403296]  kasan_report+0xc8/0x118
[   39.403982]  kasan_check_range+0x100/0x1a8
[   39.404695]  __kasan_check_write+0x20/0x30
[   39.405379]  copy_user_test_oob+0x35c/0xec0
[   39.406074]  kunit_try_run_case+0x14c/0x3d0
[   39.406823]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.407702]  kthread+0x24c/0x2d0
[   39.408293]  ret_from_fork+0x10/0x20
[   39.408851] 
[   39.409108] Allocated by task 273:
[   39.409501]  kasan_save_stack+0x3c/0x68
[   39.409953]  kasan_save_track+0x20/0x40
[   39.410397]  kasan_save_alloc_info+0x40/0x58
[   39.411070]  __kasan_kmalloc+0xd4/0xd8
[   39.411927]  __kmalloc_noprof+0x188/0x4c8
[   39.412588]  kunit_kmalloc_array+0x34/0x88
[   39.413058]  copy_user_test_oob+0xac/0xec0
[   39.416293]  kunit_try_run_case+0x14c/0x3d0
[   39.416977]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.417730]  kthread+0x24c/0x2d0
[   39.418219]  ret_from_fork+0x10/0x20
[   39.418962] 
[   39.419293] The buggy address belongs to the object at fff00000c6766e00
[   39.419293]  which belongs to the cache kmalloc-128 of size 128
[   39.420715] The buggy address is located 0 bytes inside of
[   39.420715]  allocated 120-byte region [fff00000c6766e00, fff00000c6766e78)
[   39.422574] 
[   39.423036] The buggy address belongs to the physical page:
[   39.424033] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106766
[   39.424987] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.425729] page_type: f5(slab)
[   39.426272] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   39.427769] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   39.428640] page dumped because: kasan: bad access detected
[   39.429329] 
[   39.429668] Memory state around the buggy address:
[   39.430409]  fff00000c6766d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   39.431258]  fff00000c6766d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.432287] >fff00000c6766e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   39.433194]                                                                 ^
[   39.434131]  fff00000c6766e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.435034]  fff00000c6766f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.436038] ==================================================================
[   39.518205] ==================================================================
[   39.519129] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec0
[   39.520418] Read of size 121 at addr fff00000c6766e00 by task kunit_try_catch/273
[   39.521146] 
[   39.521485] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   39.523027] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.523559] Hardware name: linux,dummy-virt (DT)
[   39.524336] Call trace:
[   39.524820]  show_stack+0x20/0x38 (C)
[   39.525343]  dump_stack_lvl+0x8c/0xd0
[   39.526069]  print_report+0x118/0x5e0
[   39.526680]  kasan_report+0xc8/0x118
[   39.527270]  kasan_check_range+0x100/0x1a8
[   39.527903]  __kasan_check_read+0x20/0x30
[   39.528490]  copy_user_test_oob+0x4a0/0xec0
[   39.529111]  kunit_try_run_case+0x14c/0x3d0
[   39.529954]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.530671]  kthread+0x24c/0x2d0
[   39.531237]  ret_from_fork+0x10/0x20
[   39.531893] 
[   39.532260] Allocated by task 273:
[   39.532754]  kasan_save_stack+0x3c/0x68
[   39.533367]  kasan_save_track+0x20/0x40
[   39.534106]  kasan_save_alloc_info+0x40/0x58
[   39.534745]  __kasan_kmalloc+0xd4/0xd8
[   39.535228]  __kmalloc_noprof+0x188/0x4c8
[   39.535920]  kunit_kmalloc_array+0x34/0x88
[   39.536536]  copy_user_test_oob+0xac/0xec0
[   39.537155]  kunit_try_run_case+0x14c/0x3d0
[   39.537698]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.538521]  kthread+0x24c/0x2d0
[   39.539067]  ret_from_fork+0x10/0x20
[   39.539807] 
[   39.540102] The buggy address belongs to the object at fff00000c6766e00
[   39.540102]  which belongs to the cache kmalloc-128 of size 128
[   39.541533] The buggy address is located 0 bytes inside of
[   39.541533]  allocated 120-byte region [fff00000c6766e00, fff00000c6766e78)
[   39.543031] 
[   39.543366] The buggy address belongs to the physical page:
[   39.544113] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106766
[   39.545038] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.545864] page_type: f5(slab)
[   39.546452] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   39.547407] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   39.548398] page dumped because: kasan: bad access detected
[   39.549090] 
[   39.549420] Memory state around the buggy address:
[   39.550090]  fff00000c6766d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   39.551035]  fff00000c6766d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.551907] >fff00000c6766e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   39.552782]                                                                 ^
[   39.553650]  fff00000c6766e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.554530]  fff00000c6766f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.555436] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[   39.159297] ==================================================================
[   39.160923] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   39.161997] Read of size 8 at addr fff00000c6646978 by task kunit_try_catch/269
[   39.162848] 
[   39.163252] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   39.165945] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.166887] Hardware name: linux,dummy-virt (DT)
[   39.167365] Call trace:
[   39.167959]  show_stack+0x20/0x38 (C)
[   39.168951]  dump_stack_lvl+0x8c/0xd0
[   39.169606]  print_report+0x118/0x5e0
[   39.170479]  kasan_report+0xc8/0x118
[   39.171181]  __asan_report_load8_noabort+0x20/0x30
[   39.172812]  copy_to_kernel_nofault+0x204/0x250
[   39.173561]  copy_to_kernel_nofault_oob+0x158/0x418
[   39.174375]  kunit_try_run_case+0x14c/0x3d0
[   39.175680]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.177391]  kthread+0x24c/0x2d0
[   39.178093]  ret_from_fork+0x10/0x20
[   39.178870] 
[   39.179285] Allocated by task 269:
[   39.179905]  kasan_save_stack+0x3c/0x68
[   39.180490]  kasan_save_track+0x20/0x40
[   39.181295]  kasan_save_alloc_info+0x40/0x58
[   39.182084]  __kasan_kmalloc+0xd4/0xd8
[   39.183353]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.184756]  copy_to_kernel_nofault_oob+0xc8/0x418
[   39.185412]  kunit_try_run_case+0x14c/0x3d0
[   39.186116]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.187374]  kthread+0x24c/0x2d0
[   39.188165]  ret_from_fork+0x10/0x20
[   39.188768] 
[   39.189249] The buggy address belongs to the object at fff00000c6646900
[   39.189249]  which belongs to the cache kmalloc-128 of size 128
[   39.191319] The buggy address is located 0 bytes to the right of
[   39.191319]  allocated 120-byte region [fff00000c6646900, fff00000c6646978)
[   39.192680] 
[   39.192982] The buggy address belongs to the physical page:
[   39.194741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106646
[   39.195845] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.196488] page_type: f5(slab)
[   39.197175] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   39.198487] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   39.199766] page dumped because: kasan: bad access detected
[   39.200579] 
[   39.201066] Memory state around the buggy address:
[   39.201828]  fff00000c6646800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   39.203421]  fff00000c6646880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.204169] >fff00000c6646900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   39.205058]                                                                 ^
[   39.207184]  fff00000c6646980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.208203]  fff00000c6646a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.209102] ==================================================================
[   39.212007] ==================================================================
[   39.212751] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   39.213877] Write of size 8 at addr fff00000c6646978 by task kunit_try_catch/269
[   39.215153] 
[   39.215490] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   39.218547] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.219491] Hardware name: linux,dummy-virt (DT)
[   39.220955] Call trace:
[   39.221492]  show_stack+0x20/0x38 (C)
[   39.222609]  dump_stack_lvl+0x8c/0xd0
[   39.223327]  print_report+0x118/0x5e0
[   39.224168]  kasan_report+0xc8/0x118
[   39.224968]  kasan_check_range+0x100/0x1a8
[   39.225615]  __kasan_check_write+0x20/0x30
[   39.226854]  copy_to_kernel_nofault+0x8c/0x250
[   39.227383]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   39.227909]  kunit_try_run_case+0x14c/0x3d0
[   39.228726]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.229600]  kthread+0x24c/0x2d0
[   39.230650]  ret_from_fork+0x10/0x20
[   39.231332] 
[   39.231778] Allocated by task 269:
[   39.232454]  kasan_save_stack+0x3c/0x68
[   39.233039]  kasan_save_track+0x20/0x40
[   39.234383]  kasan_save_alloc_info+0x40/0x58
[   39.235050]  __kasan_kmalloc+0xd4/0xd8
[   39.235372]  __kmalloc_cache_noprof+0x15c/0x3c0
[   39.235753]  copy_to_kernel_nofault_oob+0xc8/0x418
[   39.236558]  kunit_try_run_case+0x14c/0x3d0
[   39.237487]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.238638]  kthread+0x24c/0x2d0
[   39.239074]  ret_from_fork+0x10/0x20
[   39.239763] 
[   39.240188] The buggy address belongs to the object at fff00000c6646900
[   39.240188]  which belongs to the cache kmalloc-128 of size 128
[   39.241908] The buggy address is located 0 bytes to the right of
[   39.241908]  allocated 120-byte region [fff00000c6646900, fff00000c6646978)
[   39.243913] 
[   39.244933] The buggy address belongs to the physical page:
[   39.245987] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106646
[   39.247878] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.248319] page_type: f5(slab)
[   39.248586] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   39.249074] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   39.249513] page dumped because: kasan: bad access detected
[   39.251919] 
[   39.252319] Memory state around the buggy address:
[   39.252991]  fff00000c6646800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   39.253891]  fff00000c6646880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.254783] >fff00000c6646900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   39.256201]                                                                 ^
[   39.257143]  fff00000c6646980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.258580]  fff00000c6646a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.259917] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[   39.032213] ==================================================================
[   39.033682] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   39.034698] Read of size 1 at addr ffff80008010b7f3 by task kunit_try_catch/257
[   39.036256] 
[   39.036588] CPU: 0 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   39.037553] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.038391] Hardware name: linux,dummy-virt (DT)
[   39.039015] Call trace:
[   39.039446]  show_stack+0x20/0x38 (C)
[   39.040167]  dump_stack_lvl+0x8c/0xd0
[   39.040698]  print_report+0x2fc/0x5e0
[   39.041319]  kasan_report+0xc8/0x118
[   39.042184]  __asan_report_load1_noabort+0x20/0x30
[   39.043221]  vmalloc_oob+0x578/0x5d0
[   39.044313]  kunit_try_run_case+0x14c/0x3d0
[   39.045088]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.046119]  kthread+0x24c/0x2d0
[   39.047247]  ret_from_fork+0x10/0x20
[   39.048037] 
[   39.048299] The buggy address belongs to the virtual mapping at
[   39.048299]  [ffff80008010b000, ffff80008010d000) created by:
[   39.048299]  vmalloc_oob+0x98/0x5d0
[   39.050296] 
[   39.050712] The buggy address belongs to the physical page:
[   39.052000] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10666d
[   39.053100] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.054111] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   39.055563] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   39.056442] page dumped because: kasan: bad access detected
[   39.057274] 
[   39.057707] Memory state around the buggy address:
[   39.058684]  ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.060002]  ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.060755] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   39.061750]                                                              ^
[   39.063243]  ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   39.064478]  ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   39.065240] ==================================================================
[   39.068751] ==================================================================
[   39.070209] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   39.071334] Read of size 1 at addr ffff80008010b7f8 by task kunit_try_catch/257
[   39.072591] 
[   39.073022] CPU: 0 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   39.074581] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.075031] Hardware name: linux,dummy-virt (DT)
[   39.075603] Call trace:
[   39.076022]  show_stack+0x20/0x38 (C)
[   39.076817]  dump_stack_lvl+0x8c/0xd0
[   39.077409]  print_report+0x2fc/0x5e0
[   39.078427]  kasan_report+0xc8/0x118
[   39.079010]  __asan_report_load1_noabort+0x20/0x30
[   39.079935]  vmalloc_oob+0x51c/0x5d0
[   39.080666]  kunit_try_run_case+0x14c/0x3d0
[   39.081319]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.082416]  kthread+0x24c/0x2d0
[   39.083267]  ret_from_fork+0x10/0x20
[   39.083886] 
[   39.084182] The buggy address belongs to the virtual mapping at
[   39.084182]  [ffff80008010b000, ffff80008010d000) created by:
[   39.084182]  vmalloc_oob+0x98/0x5d0
[   39.086397] 
[   39.086980] The buggy address belongs to the physical page:
[   39.088391] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10666d
[   39.089566] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.090988] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   39.092554] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   39.093928] page dumped because: kasan: bad access detected
[   39.094709] 
[   39.095036] Memory state around the buggy address:
[   39.095954]  ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.096875]  ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.097996] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   39.099252]                                                                 ^
[   39.100912]  ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   39.102589]  ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   39.104389] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   37.643395] ==================================================================
[   37.644357] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   37.645930] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   37.647000] 
[   37.647292] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   37.648533] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.649855] Hardware name: linux,dummy-virt (DT)
[   37.650590] Call trace:
[   37.651092]  show_stack+0x20/0x38 (C)
[   37.651771]  dump_stack_lvl+0x8c/0xd0
[   37.652421]  print_report+0x118/0x5e0
[   37.653078]  kasan_report+0xc8/0x118
[   37.653717]  kasan_check_range+0x100/0x1a8
[   37.654446]  __kasan_check_write+0x20/0x30
[   37.655129]  kasan_atomics_helper+0xca0/0x4858
[   37.655854]  kasan_atomics+0x198/0x2e8
[   37.656576]  kunit_try_run_case+0x14c/0x3d0
[   37.657338]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.658184]  kthread+0x24c/0x2d0
[   37.658850]  ret_from_fork+0x10/0x20
[   37.659522] 
[   37.659891] Allocated by task 253:
[   37.660483]  kasan_save_stack+0x3c/0x68
[   37.661246]  kasan_save_track+0x20/0x40
[   37.662018]  kasan_save_alloc_info+0x40/0x58
[   37.662752]  __kasan_kmalloc+0xd4/0xd8
[   37.663372]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.664119]  kasan_atomics+0xb8/0x2e8
[   37.664784]  kunit_try_run_case+0x14c/0x3d0
[   37.665474]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.666268]  kthread+0x24c/0x2d0
[   37.666991]  ret_from_fork+0x10/0x20
[   37.667708] 
[   37.668098] The buggy address belongs to the object at fff00000c6767080
[   37.668098]  which belongs to the cache kmalloc-64 of size 64
[   37.668874] The buggy address is located 0 bytes to the right of
[   37.668874]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   37.670692] 
[   37.671186] The buggy address belongs to the physical page:
[   37.671952] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   37.673065] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.673947] page_type: f5(slab)
[   37.674531] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.675562] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.676534] page dumped because: kasan: bad access detected
[   37.677315] 
[   37.677679] Memory state around the buggy address:
[   37.678408]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.679453]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.680406] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.681287]                                      ^
[   37.682015]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.682954]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.683926] ==================================================================
[   37.886319] ==================================================================
[   37.887927] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   37.889220] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   37.890572] 
[   37.890984] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   37.892061] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.892659] Hardware name: linux,dummy-virt (DT)
[   37.893439] Call trace:
[   37.893843]  show_stack+0x20/0x38 (C)
[   37.894466]  dump_stack_lvl+0x8c/0xd0
[   37.895151]  print_report+0x118/0x5e0
[   37.895804]  kasan_report+0xc8/0x118
[   37.896378]  kasan_check_range+0x100/0x1a8
[   37.897034]  __kasan_check_write+0x20/0x30
[   37.897588]  kasan_atomics_helper+0xe44/0x4858
[   37.898349]  kasan_atomics+0x198/0x2e8
[   37.898976]  kunit_try_run_case+0x14c/0x3d0
[   37.899320]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.899773]  kthread+0x24c/0x2d0
[   37.900330]  ret_from_fork+0x10/0x20
[   37.901084] 
[   37.901396] Allocated by task 253:
[   37.902141]  kasan_save_stack+0x3c/0x68
[   37.902740]  kasan_save_track+0x20/0x40
[   37.903549]  kasan_save_alloc_info+0x40/0x58
[   37.904231]  __kasan_kmalloc+0xd4/0xd8
[   37.904913]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.905528]  kasan_atomics+0xb8/0x2e8
[   37.906103]  kunit_try_run_case+0x14c/0x3d0
[   37.906789]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.907447]  kthread+0x24c/0x2d0
[   37.908093]  ret_from_fork+0x10/0x20
[   37.908586] 
[   37.908955] The buggy address belongs to the object at fff00000c6767080
[   37.908955]  which belongs to the cache kmalloc-64 of size 64
[   37.910383] The buggy address is located 0 bytes to the right of
[   37.910383]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   37.911826] 
[   37.912165] The buggy address belongs to the physical page:
[   37.913069] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   37.913897] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.914872] page_type: f5(slab)
[   37.915356] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.916428] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.917372] page dumped because: kasan: bad access detected
[   37.918027] 
[   37.918416] Memory state around the buggy address:
[   37.919126]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.919971]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.920894] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.921787]                                      ^
[   37.922388]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.923299]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.924224] ==================================================================
[   38.248189] ==================================================================
[   38.249018] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   38.249913] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   38.250797] 
[   38.251202] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   38.252316] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.253089] Hardware name: linux,dummy-virt (DT)
[   38.253842] Call trace:
[   38.254288]  show_stack+0x20/0x38 (C)
[   38.254847]  dump_stack_lvl+0x8c/0xd0
[   38.255524]  print_report+0x118/0x5e0
[   38.256156]  kasan_report+0xc8/0x118
[   38.256732]  kasan_check_range+0x100/0x1a8
[   38.257469]  __kasan_check_write+0x20/0x30
[   38.258147]  kasan_atomics_helper+0x1190/0x4858
[   38.258945]  kasan_atomics+0x198/0x2e8
[   38.259493]  kunit_try_run_case+0x14c/0x3d0
[   38.260086]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.261059]  kthread+0x24c/0x2d0
[   38.261700]  ret_from_fork+0x10/0x20
[   38.262300] 
[   38.262639] Allocated by task 253:
[   38.263142]  kasan_save_stack+0x3c/0x68
[   38.263857]  kasan_save_track+0x20/0x40
[   38.264387]  kasan_save_alloc_info+0x40/0x58
[   38.265038]  __kasan_kmalloc+0xd4/0xd8
[   38.265641]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.266216]  kasan_atomics+0xb8/0x2e8
[   38.266923]  kunit_try_run_case+0x14c/0x3d0
[   38.267524]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.268299]  kthread+0x24c/0x2d0
[   38.268787]  ret_from_fork+0x10/0x20
[   38.269461] 
[   38.269777] The buggy address belongs to the object at fff00000c6767080
[   38.269777]  which belongs to the cache kmalloc-64 of size 64
[   38.271190] The buggy address is located 0 bytes to the right of
[   38.271190]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   38.272741] 
[   38.273141] The buggy address belongs to the physical page:
[   38.273920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   38.274988] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.275794] page_type: f5(slab)
[   38.276375] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.277310] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.278243] page dumped because: kasan: bad access detected
[   38.278964] 
[   38.279290] Memory state around the buggy address:
[   38.279926]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.280785]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.281591] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.282536]                                      ^
[   38.283297]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.284229]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.285095] ==================================================================
[   38.085497] ==================================================================
[   38.086397] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   38.087368] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   38.088162] 
[   38.088738] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   38.090185] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.090863] Hardware name: linux,dummy-virt (DT)
[   38.091535] Call trace:
[   38.092056]  show_stack+0x20/0x38 (C)
[   38.092797]  dump_stack_lvl+0x8c/0xd0
[   38.093411]  print_report+0x118/0x5e0
[   38.094141]  kasan_report+0xc8/0x118
[   38.094841]  kasan_check_range+0x100/0x1a8
[   38.095526]  __kasan_check_write+0x20/0x30
[   38.096269]  kasan_atomics_helper+0xff0/0x4858
[   38.097039]  kasan_atomics+0x198/0x2e8
[   38.097708]  kunit_try_run_case+0x14c/0x3d0
[   38.098417]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.099353]  kthread+0x24c/0x2d0
[   38.100002]  ret_from_fork+0x10/0x20
[   38.100658] 
[   38.101020] Allocated by task 253:
[   38.101684]  kasan_save_stack+0x3c/0x68
[   38.102402]  kasan_save_track+0x20/0x40
[   38.103079]  kasan_save_alloc_info+0x40/0x58
[   38.103816]  __kasan_kmalloc+0xd4/0xd8
[   38.104461]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.105148]  kasan_atomics+0xb8/0x2e8
[   38.105788]  kunit_try_run_case+0x14c/0x3d0
[   38.106508]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.107375]  kthread+0x24c/0x2d0
[   38.108068]  ret_from_fork+0x10/0x20
[   38.108739] 
[   38.109087] The buggy address belongs to the object at fff00000c6767080
[   38.109087]  which belongs to the cache kmalloc-64 of size 64
[   38.110692] The buggy address is located 0 bytes to the right of
[   38.110692]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   38.112205] 
[   38.112747] The buggy address belongs to the physical page:
[   38.113537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   38.114740] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.115728] page_type: f5(slab)
[   38.116370] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.117468] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.118311] page dumped because: kasan: bad access detected
[   38.119165] 
[   38.119693] Memory state around the buggy address:
[   38.120405]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.121434]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.122489] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.123439]                                      ^
[   38.124133]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.125107]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.126005] ==================================================================
[   37.237396] ==================================================================
[   37.238771] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   37.239642] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   37.240500] 
[   37.240913] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   37.242466] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.243168] Hardware name: linux,dummy-virt (DT)
[   37.243903] Call trace:
[   37.244411]  show_stack+0x20/0x38 (C)
[   37.245163]  dump_stack_lvl+0x8c/0xd0
[   37.245896]  print_report+0x118/0x5e0
[   37.246563]  kasan_report+0xc8/0x118
[   37.247359]  kasan_check_range+0x100/0x1a8
[   37.248094]  __kasan_check_write+0x20/0x30
[   37.248955]  kasan_atomics_helper+0x934/0x4858
[   37.249710]  kasan_atomics+0x198/0x2e8
[   37.250370]  kunit_try_run_case+0x14c/0x3d0
[   37.251098]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.251945]  kthread+0x24c/0x2d0
[   37.252536]  ret_from_fork+0x10/0x20
[   37.253173] 
[   37.253524] Allocated by task 253:
[   37.254252]  kasan_save_stack+0x3c/0x68
[   37.255017]  kasan_save_track+0x20/0x40
[   37.255657]  kasan_save_alloc_info+0x40/0x58
[   37.256306]  __kasan_kmalloc+0xd4/0xd8
[   37.256962]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.257691]  kasan_atomics+0xb8/0x2e8
[   37.258337]  kunit_try_run_case+0x14c/0x3d0
[   37.259137]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.259937]  kthread+0x24c/0x2d0
[   37.260495]  ret_from_fork+0x10/0x20
[   37.261061] 
[   37.261406] The buggy address belongs to the object at fff00000c6767080
[   37.261406]  which belongs to the cache kmalloc-64 of size 64
[   37.263031] The buggy address is located 0 bytes to the right of
[   37.263031]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   37.264617] 
[   37.265146] The buggy address belongs to the physical page:
[   37.265933] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   37.267017] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.267900] page_type: f5(slab)
[   37.268473] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.269502] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.270450] page dumped because: kasan: bad access detected
[   37.271228] 
[   37.271581] Memory state around the buggy address:
[   37.272382]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.273358]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.274316] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.275248]                                      ^
[   37.276021]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.276965]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.277871] ==================================================================
[   38.769796] ==================================================================
[   38.770760] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   38.772185] Read of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   38.773210] 
[   38.773684] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   38.774882] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.775650] Hardware name: linux,dummy-virt (DT)
[   38.776303] Call trace:
[   38.776883]  show_stack+0x20/0x38 (C)
[   38.777387]  dump_stack_lvl+0x8c/0xd0
[   38.778120]  print_report+0x118/0x5e0
[   38.778758]  kasan_report+0xc8/0x118
[   38.779520]  __asan_report_load8_noabort+0x20/0x30
[   38.780250]  kasan_atomics_helper+0x3df4/0x4858
[   38.781009]  kasan_atomics+0x198/0x2e8
[   38.781506]  kunit_try_run_case+0x14c/0x3d0
[   38.782236]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.783014]  kthread+0x24c/0x2d0
[   38.783716]  ret_from_fork+0x10/0x20
[   38.784357] 
[   38.784799] Allocated by task 253:
[   38.785245]  kasan_save_stack+0x3c/0x68
[   38.785873]  kasan_save_track+0x20/0x40
[   38.786612]  kasan_save_alloc_info+0x40/0x58
[   38.787262]  __kasan_kmalloc+0xd4/0xd8
[   38.787923]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.788588]  kasan_atomics+0xb8/0x2e8
[   38.789249]  kunit_try_run_case+0x14c/0x3d0
[   38.790005]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.790727]  kthread+0x24c/0x2d0
[   38.791203]  ret_from_fork+0x10/0x20
[   38.791869] 
[   38.792253] The buggy address belongs to the object at fff00000c6767080
[   38.792253]  which belongs to the cache kmalloc-64 of size 64
[   38.793598] The buggy address is located 0 bytes to the right of
[   38.793598]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   38.795189] 
[   38.795515] The buggy address belongs to the physical page:
[   38.796186] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   38.797188] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.798096] page_type: f5(slab)
[   38.798618] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.799718] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.800704] page dumped because: kasan: bad access detected
[   38.801415] 
[   38.801772] Memory state around the buggy address:
[   38.802338]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.803218]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.804153] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.805066]                                      ^
[   38.805576]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.806453]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.807466] ==================================================================
[   37.926261] ==================================================================
[   37.927294] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   37.928117] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   37.929063] 
[   37.929404] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   37.930681] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.931315] Hardware name: linux,dummy-virt (DT)
[   37.931926] Call trace:
[   37.932393]  show_stack+0x20/0x38 (C)
[   37.933136]  dump_stack_lvl+0x8c/0xd0
[   37.933735]  print_report+0x118/0x5e0
[   37.934414]  kasan_report+0xc8/0x118
[   37.934938]  __asan_report_store8_noabort+0x20/0x30
[   37.935758]  kasan_atomics_helper+0x3e5c/0x4858
[   37.936442]  kasan_atomics+0x198/0x2e8
[   37.937123]  kunit_try_run_case+0x14c/0x3d0
[   37.937799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.938465]  kthread+0x24c/0x2d0
[   37.939129]  ret_from_fork+0x10/0x20
[   37.939697] 
[   37.940062] Allocated by task 253:
[   37.940608]  kasan_save_stack+0x3c/0x68
[   37.941154]  kasan_save_track+0x20/0x40
[   37.941839]  kasan_save_alloc_info+0x40/0x58
[   37.942428]  __kasan_kmalloc+0xd4/0xd8
[   37.943137]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.943787]  kasan_atomics+0xb8/0x2e8
[   37.944343]  kunit_try_run_case+0x14c/0x3d0
[   37.945105]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.945840]  kthread+0x24c/0x2d0
[   37.946289]  ret_from_fork+0x10/0x20
[   37.947049] 
[   37.947419] The buggy address belongs to the object at fff00000c6767080
[   37.947419]  which belongs to the cache kmalloc-64 of size 64
[   37.948595] The buggy address is located 0 bytes to the right of
[   37.948595]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   37.950186] 
[   37.950512] The buggy address belongs to the physical page:
[   37.951264] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   37.952362] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.953113] page_type: f5(slab)
[   37.953693] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.954657] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.955547] page dumped because: kasan: bad access detected
[   37.956193] 
[   37.956551] Memory state around the buggy address:
[   37.957200]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.958065]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.959024] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.959902]                                      ^
[   37.960497]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.961445]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.962297] ==================================================================
[   38.166774] ==================================================================
[   38.167718] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   38.168543] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   38.169323] 
[   38.169783] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   38.171258] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.171987] Hardware name: linux,dummy-virt (DT)
[   38.172605] Call trace:
[   38.173058]  show_stack+0x20/0x38 (C)
[   38.173696]  dump_stack_lvl+0x8c/0xd0
[   38.174365]  print_report+0x118/0x5e0
[   38.174860]  kasan_report+0xc8/0x118
[   38.175527]  kasan_check_range+0x100/0x1a8
[   38.176168]  __kasan_check_write+0x20/0x30
[   38.176813]  kasan_atomics_helper+0x10c0/0x4858
[   38.177466]  kasan_atomics+0x198/0x2e8
[   38.178131]  kunit_try_run_case+0x14c/0x3d0
[   38.178778]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.179551]  kthread+0x24c/0x2d0
[   38.180195]  ret_from_fork+0x10/0x20
[   38.180824] 
[   38.181187] Allocated by task 253:
[   38.181721]  kasan_save_stack+0x3c/0x68
[   38.182291]  kasan_save_track+0x20/0x40
[   38.182955]  kasan_save_alloc_info+0x40/0x58
[   38.183699]  __kasan_kmalloc+0xd4/0xd8
[   38.184277]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.184907]  kasan_atomics+0xb8/0x2e8
[   38.185527]  kunit_try_run_case+0x14c/0x3d0
[   38.186121]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.186928]  kthread+0x24c/0x2d0
[   38.187504]  ret_from_fork+0x10/0x20
[   38.188028] 
[   38.188472] The buggy address belongs to the object at fff00000c6767080
[   38.188472]  which belongs to the cache kmalloc-64 of size 64
[   38.189884] The buggy address is located 0 bytes to the right of
[   38.189884]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   38.191298] 
[   38.191648] The buggy address belongs to the physical page:
[   38.192324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   38.193263] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.194003] page_type: f5(slab)
[   38.194578] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.195538] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.196423] page dumped because: kasan: bad access detected
[   38.197138] 
[   38.197458] Memory state around the buggy address:
[   38.198129]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.198926]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.199932] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.200773]                                      ^
[   38.201435]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.202361]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.203304] ==================================================================
[   38.205404] ==================================================================
[   38.206960] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   38.207739] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   38.208190] 
[   38.208379] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   38.209431] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.210091] Hardware name: linux,dummy-virt (DT)
[   38.211102] Call trace:
[   38.211773]  show_stack+0x20/0x38 (C)
[   38.212533]  dump_stack_lvl+0x8c/0xd0
[   38.213315]  print_report+0x118/0x5e0
[   38.214111]  kasan_report+0xc8/0x118
[   38.214737]  kasan_check_range+0x100/0x1a8
[   38.215361]  __kasan_check_write+0x20/0x30
[   38.216063]  kasan_atomics_helper+0x1128/0x4858
[   38.216752]  kasan_atomics+0x198/0x2e8
[   38.217477]  kunit_try_run_case+0x14c/0x3d0
[   38.218152]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.218979]  kthread+0x24c/0x2d0
[   38.219574]  ret_from_fork+0x10/0x20
[   38.220317] 
[   38.220683] Allocated by task 253:
[   38.221392]  kasan_save_stack+0x3c/0x68
[   38.222078]  kasan_save_track+0x20/0x40
[   38.222722]  kasan_save_alloc_info+0x40/0x58
[   38.223442]  __kasan_kmalloc+0xd4/0xd8
[   38.224043]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.224809]  kasan_atomics+0xb8/0x2e8
[   38.225440]  kunit_try_run_case+0x14c/0x3d0
[   38.226108]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.226959]  kthread+0x24c/0x2d0
[   38.227669]  ret_from_fork+0x10/0x20
[   38.228307] 
[   38.228663] The buggy address belongs to the object at fff00000c6767080
[   38.228663]  which belongs to the cache kmalloc-64 of size 64
[   38.230278] The buggy address is located 0 bytes to the right of
[   38.230278]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   38.231929] 
[   38.232383] The buggy address belongs to the physical page:
[   38.233173] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   38.234216] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.235092] page_type: f5(slab)
[   38.235711] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.236721] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.237682] page dumped because: kasan: bad access detected
[   38.238455] 
[   38.238860] Memory state around the buggy address:
[   38.239562]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.240613]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.241547] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.242477]                                      ^
[   38.243230]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.244280]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.245195] ==================================================================
[   37.111017] ==================================================================
[   37.111783] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   37.112701] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   37.113537] 
[   37.113993] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   37.115379] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.115886] Hardware name: linux,dummy-virt (DT)
[   37.116699] Call trace:
[   37.117121]  show_stack+0x20/0x38 (C)
[   37.117781]  dump_stack_lvl+0x8c/0xd0
[   37.118445]  print_report+0x118/0x5e0
[   37.119055]  kasan_report+0xc8/0x118
[   37.119690]  kasan_check_range+0x100/0x1a8
[   37.120356]  __kasan_check_write+0x20/0x30
[   37.120979]  kasan_atomics_helper+0x7cc/0x4858
[   37.121760]  kasan_atomics+0x198/0x2e8
[   37.122370]  kunit_try_run_case+0x14c/0x3d0
[   37.123005]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.123731]  kthread+0x24c/0x2d0
[   37.124380]  ret_from_fork+0x10/0x20
[   37.124998] 
[   37.125366] Allocated by task 253:
[   37.125996]  kasan_save_stack+0x3c/0x68
[   37.126568]  kasan_save_track+0x20/0x40
[   37.127206]  kasan_save_alloc_info+0x40/0x58
[   37.127808]  __kasan_kmalloc+0xd4/0xd8
[   37.128564]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.129178]  kasan_atomics+0xb8/0x2e8
[   37.129918]  kunit_try_run_case+0x14c/0x3d0
[   37.130455]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.131463]  kthread+0x24c/0x2d0
[   37.132061]  ret_from_fork+0x10/0x20
[   37.132692] 
[   37.133030] The buggy address belongs to the object at fff00000c6767080
[   37.133030]  which belongs to the cache kmalloc-64 of size 64
[   37.134950] The buggy address is located 0 bytes to the right of
[   37.134950]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   37.136491] 
[   37.136832] The buggy address belongs to the physical page:
[   37.137619] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   37.138722] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.139653] page_type: f5(slab)
[   37.140238] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.141183] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.142079] page dumped because: kasan: bad access detected
[   37.142795] 
[   37.143068] Memory state around the buggy address:
[   37.143801]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.144899]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.145908] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.146755]                                      ^
[   37.147405]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.148257]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.149212] ==================================================================
[   37.442587] ==================================================================
[   37.443656] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   37.444457] Read of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   37.445226] 
[   37.445804] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   37.447134] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.447765] Hardware name: linux,dummy-virt (DT)
[   37.448442] Call trace:
[   37.448818]  show_stack+0x20/0x38 (C)
[   37.449538]  dump_stack_lvl+0x8c/0xd0
[   37.450117]  print_report+0x118/0x5e0
[   37.450681]  kasan_report+0xc8/0x118
[   37.451333]  __asan_report_load4_noabort+0x20/0x30
[   37.452033]  kasan_atomics_helper+0x3dcc/0x4858
[   37.452740]  kasan_atomics+0x198/0x2e8
[   37.453386]  kunit_try_run_case+0x14c/0x3d0
[   37.454021]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.454728]  kthread+0x24c/0x2d0
[   37.455294]  ret_from_fork+0x10/0x20
[   37.455936] 
[   37.456290] Allocated by task 253:
[   37.456893]  kasan_save_stack+0x3c/0x68
[   37.457416]  kasan_save_track+0x20/0x40
[   37.458097]  kasan_save_alloc_info+0x40/0x58
[   37.458653]  __kasan_kmalloc+0xd4/0xd8
[   37.459309]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.459940]  kasan_atomics+0xb8/0x2e8
[   37.460453]  kunit_try_run_case+0x14c/0x3d0
[   37.461085]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.461908]  kthread+0x24c/0x2d0
[   37.462514]  ret_from_fork+0x10/0x20
[   37.463120] 
[   37.463462] The buggy address belongs to the object at fff00000c6767080
[   37.463462]  which belongs to the cache kmalloc-64 of size 64
[   37.465049] The buggy address is located 0 bytes to the right of
[   37.465049]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   37.466346] 
[   37.466683] The buggy address belongs to the physical page:
[   37.467380] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   37.468432] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.469330] page_type: f5(slab)
[   37.470019] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.471025] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.471995] page dumped because: kasan: bad access detected
[   37.472692] 
[   37.473057] Memory state around the buggy address:
[   37.473760]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.474698]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.475613] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.476469]                                      ^
[   37.477119]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.478045]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.479033] ==================================================================
[   37.559576] ==================================================================
[   37.560441] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   37.561456] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   37.563126] 
[   37.563720] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   37.564989] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.565682] Hardware name: linux,dummy-virt (DT)
[   37.566412] Call trace:
[   37.566817]  show_stack+0x20/0x38 (C)
[   37.567392]  dump_stack_lvl+0x8c/0xd0
[   37.568037]  print_report+0x118/0x5e0
[   37.568671]  kasan_report+0xc8/0x118
[   37.569577]  kasan_check_range+0x100/0x1a8
[   37.570295]  __kasan_check_write+0x20/0x30
[   37.571084]  kasan_atomics_helper+0xc08/0x4858
[   37.571811]  kasan_atomics+0x198/0x2e8
[   37.572529]  kunit_try_run_case+0x14c/0x3d0
[   37.573238]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.574060]  kthread+0x24c/0x2d0
[   37.574709]  ret_from_fork+0x10/0x20
[   37.575412] 
[   37.575771] Allocated by task 253:
[   37.576478]  kasan_save_stack+0x3c/0x68
[   37.577022]  kasan_save_track+0x20/0x40
[   37.577766]  kasan_save_alloc_info+0x40/0x58
[   37.578439]  __kasan_kmalloc+0xd4/0xd8
[   37.579192]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.579857]  kasan_atomics+0xb8/0x2e8
[   37.580567]  kunit_try_run_case+0x14c/0x3d0
[   37.581204]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.582019]  kthread+0x24c/0x2d0
[   37.582693]  ret_from_fork+0x10/0x20
[   37.583327] 
[   37.583733] The buggy address belongs to the object at fff00000c6767080
[   37.583733]  which belongs to the cache kmalloc-64 of size 64
[   37.585504] The buggy address is located 0 bytes to the right of
[   37.585504]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   37.587145] 
[   37.587461] The buggy address belongs to the physical page:
[   37.588235] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   37.589619] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.590787] page_type: f5(slab)
[   37.591698] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.592795] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.593884] page dumped because: kasan: bad access detected
[   37.594871] 
[   37.595252] Memory state around the buggy address:
[   37.596159]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.597293]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.598244] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.599478]                                      ^
[   37.600151]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.601342]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.602445] ==================================================================
[   37.685849] ==================================================================
[   37.686889] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   37.687978] Read of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   37.689382] 
[   37.689716] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   37.691387] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.692100] Hardware name: linux,dummy-virt (DT)
[   37.692721] Call trace:
[   37.693040]  show_stack+0x20/0x38 (C)
[   37.693690]  dump_stack_lvl+0x8c/0xd0
[   37.694280]  print_report+0x118/0x5e0
[   37.694899]  kasan_report+0xc8/0x118
[   37.695510]  __asan_report_load4_noabort+0x20/0x30
[   37.696182]  kasan_atomics_helper+0x3dd8/0x4858
[   37.696859]  kasan_atomics+0x198/0x2e8
[   37.697512]  kunit_try_run_case+0x14c/0x3d0
[   37.698135]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.698807]  kthread+0x24c/0x2d0
[   37.699279]  ret_from_fork+0x10/0x20
[   37.700080] 
[   37.700496] Allocated by task 253:
[   37.701089]  kasan_save_stack+0x3c/0x68
[   37.701724]  kasan_save_track+0x20/0x40
[   37.702372]  kasan_save_alloc_info+0x40/0x58
[   37.702938]  __kasan_kmalloc+0xd4/0xd8
[   37.703654]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.704292]  kasan_atomics+0xb8/0x2e8
[   37.704941]  kunit_try_run_case+0x14c/0x3d0
[   37.705533]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.706299]  kthread+0x24c/0x2d0
[   37.706809]  ret_from_fork+0x10/0x20
[   37.707603] 
[   37.707981] The buggy address belongs to the object at fff00000c6767080
[   37.707981]  which belongs to the cache kmalloc-64 of size 64
[   37.709326] The buggy address is located 0 bytes to the right of
[   37.709326]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   37.710946] 
[   37.711346] The buggy address belongs to the physical page:
[   37.712119] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   37.713084] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.713985] page_type: f5(slab)
[   37.714473] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.715451] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.716352] page dumped because: kasan: bad access detected
[   37.717120] 
[   37.717436] Memory state around the buggy address:
[   37.718096]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.718948]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.719885] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.720807]                                      ^
[   37.721465]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.722467]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.723355] ==================================================================
[   38.128567] ==================================================================
[   38.129992] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   38.130876] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   38.131348] 
[   38.131539] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   38.132165] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.132445] Hardware name: linux,dummy-virt (DT)
[   38.132866] Call trace:
[   38.133219]  show_stack+0x20/0x38 (C)
[   38.134328]  dump_stack_lvl+0x8c/0xd0
[   38.135498]  print_report+0x118/0x5e0
[   38.136266]  kasan_report+0xc8/0x118
[   38.136811]  kasan_check_range+0x100/0x1a8
[   38.137412]  __kasan_check_write+0x20/0x30
[   38.138094]  kasan_atomics_helper+0x1058/0x4858
[   38.138702]  kasan_atomics+0x198/0x2e8
[   38.139395]  kunit_try_run_case+0x14c/0x3d0
[   38.139985]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.140784]  kthread+0x24c/0x2d0
[   38.141417]  ret_from_fork+0x10/0x20
[   38.142047] 
[   38.142397] Allocated by task 253:
[   38.142988]  kasan_save_stack+0x3c/0x68
[   38.143566]  kasan_save_track+0x20/0x40
[   38.144213]  kasan_save_alloc_info+0x40/0x58
[   38.144778]  __kasan_kmalloc+0xd4/0xd8
[   38.145404]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.146032]  kasan_atomics+0xb8/0x2e8
[   38.146686]  kunit_try_run_case+0x14c/0x3d0
[   38.147334]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.148236]  kthread+0x24c/0x2d0
[   38.148764]  ret_from_fork+0x10/0x20
[   38.149360] 
[   38.149687] The buggy address belongs to the object at fff00000c6767080
[   38.149687]  which belongs to the cache kmalloc-64 of size 64
[   38.151250] The buggy address is located 0 bytes to the right of
[   38.151250]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   38.152647] 
[   38.152998] The buggy address belongs to the physical page:
[   38.153717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   38.154600] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.155500] page_type: f5(slab)
[   38.156022] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.156989] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.157920] page dumped because: kasan: bad access detected
[   38.158571] 
[   38.158975] Memory state around the buggy address:
[   38.159589]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.160467]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.161278] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.162224]                                      ^
[   38.162853]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.163827]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.164683] ==================================================================
[   37.320134] ==================================================================
[   37.320998] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   37.322747] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   37.323866] 
[   37.324248] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   37.325584] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.326217] Hardware name: linux,dummy-virt (DT)
[   37.326898] Call trace:
[   37.327498]  show_stack+0x20/0x38 (C)
[   37.328138]  dump_stack_lvl+0x8c/0xd0
[   37.328897]  print_report+0x118/0x5e0
[   37.329573]  kasan_report+0xc8/0x118
[   37.330325]  kasan_check_range+0x100/0x1a8
[   37.331119]  __kasan_check_write+0x20/0x30
[   37.331878]  kasan_atomics_helper+0xa04/0x4858
[   37.332651]  kasan_atomics+0x198/0x2e8
[   37.333294]  kunit_try_run_case+0x14c/0x3d0
[   37.333990]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.334817]  kthread+0x24c/0x2d0
[   37.335496]  ret_from_fork+0x10/0x20
[   37.336132] 
[   37.336555] Allocated by task 253:
[   37.337173]  kasan_save_stack+0x3c/0x68
[   37.337910]  kasan_save_track+0x20/0x40
[   37.338456]  kasan_save_alloc_info+0x40/0x58
[   37.339280]  __kasan_kmalloc+0xd4/0xd8
[   37.339865]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.340671]  kasan_atomics+0xb8/0x2e8
[   37.341372]  kunit_try_run_case+0x14c/0x3d0
[   37.342200]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.343027]  kthread+0x24c/0x2d0
[   37.343746]  ret_from_fork+0x10/0x20
[   37.344461] 
[   37.344813] The buggy address belongs to the object at fff00000c6767080
[   37.344813]  which belongs to the cache kmalloc-64 of size 64
[   37.346485] The buggy address is located 0 bytes to the right of
[   37.346485]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   37.348222] 
[   37.348708] The buggy address belongs to the physical page:
[   37.349403] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   37.350602] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.351436] page_type: f5(slab)
[   37.352030] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.353019] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.353827] page dumped because: kasan: bad access detected
[   37.354544] 
[   37.354988] Memory state around the buggy address:
[   37.355662]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.356521]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.357391] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.358319]                                      ^
[   37.358964]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.359898]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.360801] ==================================================================
[   38.731006] ==================================================================
[   38.731817] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   38.734075] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   38.734929] 
[   38.735242] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   38.736318] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.736808] Hardware name: linux,dummy-virt (DT)
[   38.737546] Call trace:
[   38.737990]  show_stack+0x20/0x38 (C)
[   38.738496]  dump_stack_lvl+0x8c/0xd0
[   38.739234]  print_report+0x118/0x5e0
[   38.739961]  kasan_report+0xc8/0x118
[   38.740646]  kasan_check_range+0x100/0x1a8
[   38.741350]  __kasan_check_write+0x20/0x30
[   38.742021]  kasan_atomics_helper+0x1644/0x4858
[   38.742667]  kasan_atomics+0x198/0x2e8
[   38.743298]  kunit_try_run_case+0x14c/0x3d0
[   38.744033]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.744746]  kthread+0x24c/0x2d0
[   38.745359]  ret_from_fork+0x10/0x20
[   38.745936] 
[   38.746318] Allocated by task 253:
[   38.746970]  kasan_save_stack+0x3c/0x68
[   38.747689]  kasan_save_track+0x20/0x40
[   38.748273]  kasan_save_alloc_info+0x40/0x58
[   38.748842]  __kasan_kmalloc+0xd4/0xd8
[   38.749487]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.750100]  kasan_atomics+0xb8/0x2e8
[   38.750789]  kunit_try_run_case+0x14c/0x3d0
[   38.751416]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.752176]  kthread+0x24c/0x2d0
[   38.752678]  ret_from_fork+0x10/0x20
[   38.753176] 
[   38.753577] The buggy address belongs to the object at fff00000c6767080
[   38.753577]  which belongs to the cache kmalloc-64 of size 64
[   38.754964] The buggy address is located 0 bytes to the right of
[   38.754964]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   38.756402] 
[   38.756779] The buggy address belongs to the physical page:
[   38.757499] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   38.758452] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.759161] page_type: f5(slab)
[   38.759680] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.760642] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.761558] page dumped because: kasan: bad access detected
[   38.762315] 
[   38.762683] Memory state around the buggy address:
[   38.763187]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.764171]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.765007] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.765957]                                      ^
[   38.766520]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.767475]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.768379] ==================================================================
[   37.604575] ==================================================================
[   37.605472] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   37.606782] Read of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   37.607700] 
[   37.608054] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   37.609244] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.609777] Hardware name: linux,dummy-virt (DT)
[   37.610587] Call trace:
[   37.611261]  show_stack+0x20/0x38 (C)
[   37.611982]  dump_stack_lvl+0x8c/0xd0
[   37.612567]  print_report+0x118/0x5e0
[   37.613146]  kasan_report+0xc8/0x118
[   37.613802]  __asan_report_load4_noabort+0x20/0x30
[   37.614557]  kasan_atomics_helper+0x3de4/0x4858
[   37.615259]  kasan_atomics+0x198/0x2e8
[   37.615889]  kunit_try_run_case+0x14c/0x3d0
[   37.616458]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.617260]  kthread+0x24c/0x2d0
[   37.617899]  ret_from_fork+0x10/0x20
[   37.618453] 
[   37.618834] Allocated by task 253:
[   37.619409]  kasan_save_stack+0x3c/0x68
[   37.619973]  kasan_save_track+0x20/0x40
[   37.620648]  kasan_save_alloc_info+0x40/0x58
[   37.621292]  __kasan_kmalloc+0xd4/0xd8
[   37.621832]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.622614]  kasan_atomics+0xb8/0x2e8
[   37.623129]  kunit_try_run_case+0x14c/0x3d0
[   37.623840]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.624571]  kthread+0x24c/0x2d0
[   37.625240]  ret_from_fork+0x10/0x20
[   37.625819] 
[   37.626197] The buggy address belongs to the object at fff00000c6767080
[   37.626197]  which belongs to the cache kmalloc-64 of size 64
[   37.627671] The buggy address is located 0 bytes to the right of
[   37.627671]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   37.629177] 
[   37.629500] The buggy address belongs to the physical page:
[   37.630131] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   37.631103] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.632098] page_type: f5(slab)
[   37.632563] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.633605] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.634536] page dumped because: kasan: bad access detected
[   37.635233] 
[   37.635577] Memory state around the buggy address:
[   37.636216]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.637035]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.637920] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.638927]                                      ^
[   37.639582]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.640503]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.641395] ==================================================================
[   37.024815] ==================================================================
[   37.025586] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   37.026506] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   37.027817] 
[   37.029157] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   37.030550] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.031136] Hardware name: linux,dummy-virt (DT)
[   37.031983] Call trace:
[   37.032315]  show_stack+0x20/0x38 (C)
[   37.033119]  dump_stack_lvl+0x8c/0xd0
[   37.033710]  print_report+0x118/0x5e0
[   37.034321]  kasan_report+0xc8/0x118
[   37.035102]  kasan_check_range+0x100/0x1a8
[   37.035894]  __kasan_check_write+0x20/0x30
[   37.036573]  kasan_atomics_helper+0x6ec/0x4858
[   37.037305]  kasan_atomics+0x198/0x2e8
[   37.037969]  kunit_try_run_case+0x14c/0x3d0
[   37.038728]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.039547]  kthread+0x24c/0x2d0
[   37.040241]  ret_from_fork+0x10/0x20
[   37.040887] 
[   37.041229] Allocated by task 253:
[   37.041952]  kasan_save_stack+0x3c/0x68
[   37.042663]  kasan_save_track+0x20/0x40
[   37.043385]  kasan_save_alloc_info+0x40/0x58
[   37.044066]  __kasan_kmalloc+0xd4/0xd8
[   37.044718]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.045535]  kasan_atomics+0xb8/0x2e8
[   37.046155]  kunit_try_run_case+0x14c/0x3d0
[   37.046844]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.047708]  kthread+0x24c/0x2d0
[   37.048317]  ret_from_fork+0x10/0x20
[   37.048981] 
[   37.049325] The buggy address belongs to the object at fff00000c6767080
[   37.049325]  which belongs to the cache kmalloc-64 of size 64
[   37.050887] The buggy address is located 0 bytes to the right of
[   37.050887]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   37.052594] 
[   37.053055] The buggy address belongs to the physical page:
[   37.053860] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   37.054961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.055871] page_type: f5(slab)
[   37.056565] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.057600] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.058597] page dumped because: kasan: bad access detected
[   37.059491] 
[   37.059984] Memory state around the buggy address:
[   37.060756]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.061753]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.062751] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.063698]                                      ^
[   37.064483]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.065513]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.066407] ==================================================================
[   37.193381] ==================================================================
[   37.195175] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   37.196713] Read of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   37.197914] 
[   37.198375] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   37.199917] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.200698] Hardware name: linux,dummy-virt (DT)
[   37.201459] Call trace:
[   37.201907]  show_stack+0x20/0x38 (C)
[   37.202514]  dump_stack_lvl+0x8c/0xd0
[   37.203339]  print_report+0x118/0x5e0
[   37.204007]  kasan_report+0xc8/0x118
[   37.204697]  __asan_report_load4_noabort+0x20/0x30
[   37.205425]  kasan_atomics_helper+0x42d8/0x4858
[   37.206136]  kasan_atomics+0x198/0x2e8
[   37.206744]  kunit_try_run_case+0x14c/0x3d0
[   37.207534]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.208438]  kthread+0x24c/0x2d0
[   37.209009]  ret_from_fork+0x10/0x20
[   37.209683] 
[   37.210040] Allocated by task 253:
[   37.210620]  kasan_save_stack+0x3c/0x68
[   37.211325]  kasan_save_track+0x20/0x40
[   37.211885]  kasan_save_alloc_info+0x40/0x58
[   37.212722]  __kasan_kmalloc+0xd4/0xd8
[   37.213353]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.214066]  kasan_atomics+0xb8/0x2e8
[   37.214721]  kunit_try_run_case+0x14c/0x3d0
[   37.215418]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.216198]  kthread+0x24c/0x2d0
[   37.216817]  ret_from_fork+0x10/0x20
[   37.217459] 
[   37.217907] The buggy address belongs to the object at fff00000c6767080
[   37.217907]  which belongs to the cache kmalloc-64 of size 64
[   37.219435] The buggy address is located 0 bytes to the right of
[   37.219435]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   37.221041] 
[   37.221532] The buggy address belongs to the physical page:
[   37.222350] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   37.223436] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.224297] page_type: f5(slab)
[   37.224871] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.225972] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.227071] page dumped because: kasan: bad access detected
[   37.227866] 
[   37.228299] Memory state around the buggy address:
[   37.229013]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.230065]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.231042] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.232010]                                      ^
[   37.232734]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.233692]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.234566] ==================================================================
[   36.328983] ==================================================================
[   36.330523] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   36.333554] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   36.334856] 
[   36.335409] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   36.336676] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.337441] Hardware name: linux,dummy-virt (DT)
[   36.338953] Call trace:
[   36.339679]  show_stack+0x20/0x38 (C)
[   36.340268]  dump_stack_lvl+0x8c/0xd0
[   36.340946]  print_report+0x118/0x5e0
[   36.341566]  kasan_report+0xc8/0x118
[   36.342159]  __asan_report_store4_noabort+0x20/0x30
[   36.342969]  kasan_atomics_helper+0x3f7c/0x4858
[   36.343712]  kasan_atomics+0x198/0x2e8
[   36.344661]  kunit_try_run_case+0x14c/0x3d0
[   36.345325]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.346116]  kthread+0x24c/0x2d0
[   36.347234]  ret_from_fork+0x10/0x20
[   36.347831] 
[   36.348129] Allocated by task 253:
[   36.348669]  kasan_save_stack+0x3c/0x68
[   36.349359]  kasan_save_track+0x20/0x40
[   36.349904]  kasan_save_alloc_info+0x40/0x58
[   36.350798]  __kasan_kmalloc+0xd4/0xd8
[   36.352144]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.352674]  kasan_atomics+0xb8/0x2e8
[   36.354012]  kunit_try_run_case+0x14c/0x3d0
[   36.354641]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.355364]  kthread+0x24c/0x2d0
[   36.356353]  ret_from_fork+0x10/0x20
[   36.357117] 
[   36.357610] The buggy address belongs to the object at fff00000c6767080
[   36.357610]  which belongs to the cache kmalloc-64 of size 64
[   36.359508] The buggy address is located 0 bytes to the right of
[   36.359508]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   36.361261] 
[   36.361553] The buggy address belongs to the physical page:
[   36.362321] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   36.363358] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.364197] page_type: f5(slab)
[   36.364766] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.365926] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.366958] page dumped because: kasan: bad access detected
[   36.367550] 
[   36.367908] Memory state around the buggy address:
[   36.368475]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.369421]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.371297] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.372445]                                      ^
[   36.373084]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.374709]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.375375] ==================================================================
[   36.983383] ==================================================================
[   36.984413] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   36.985512] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   36.987422] 
[   36.987797] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   36.989863] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.990834] Hardware name: linux,dummy-virt (DT)
[   36.991579] Call trace:
[   36.991985]  show_stack+0x20/0x38 (C)
[   36.992654]  dump_stack_lvl+0x8c/0xd0
[   36.993339]  print_report+0x118/0x5e0
[   36.993880]  kasan_report+0xc8/0x118
[   36.994532]  kasan_check_range+0x100/0x1a8
[   36.995198]  __kasan_check_write+0x20/0x30
[   36.995852]  kasan_atomics_helper+0x684/0x4858
[   36.996520]  kasan_atomics+0x198/0x2e8
[   36.997122]  kunit_try_run_case+0x14c/0x3d0
[   36.997701]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.998544]  kthread+0x24c/0x2d0
[   36.999100]  ret_from_fork+0x10/0x20
[   36.999679] 
[   36.999963] Allocated by task 253:
[   37.000515]  kasan_save_stack+0x3c/0x68
[   37.001168]  kasan_save_track+0x20/0x40
[   37.001769]  kasan_save_alloc_info+0x40/0x58
[   37.002315]  __kasan_kmalloc+0xd4/0xd8
[   37.003016]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.003519]  kasan_atomics+0xb8/0x2e8
[   37.004201]  kunit_try_run_case+0x14c/0x3d0
[   37.004774]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.005527]  kthread+0x24c/0x2d0
[   37.006007]  ret_from_fork+0x10/0x20
[   37.006735] 
[   37.007126] The buggy address belongs to the object at fff00000c6767080
[   37.007126]  which belongs to the cache kmalloc-64 of size 64
[   37.008617] The buggy address is located 0 bytes to the right of
[   37.008617]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   37.010200] 
[   37.010499] The buggy address belongs to the physical page:
[   37.011412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   37.012278] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.013153] page_type: f5(slab)
[   37.013814] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.014756] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.015768] page dumped because: kasan: bad access detected
[   37.016397] 
[   37.016732] Memory state around the buggy address:
[   37.017366]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.018493]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.019374] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.020294]                                      ^
[   37.020943]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.021869]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.022719] ==================================================================
[   37.804578] ==================================================================
[   37.805518] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   37.806923] Read of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   37.808216] 
[   37.808970] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   37.810235] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.810780] Hardware name: linux,dummy-virt (DT)
[   37.811547] Call trace:
[   37.812093]  show_stack+0x20/0x38 (C)
[   37.812737]  dump_stack_lvl+0x8c/0xd0
[   37.813365]  print_report+0x118/0x5e0
[   37.813999]  kasan_report+0xc8/0x118
[   37.814655]  kasan_check_range+0x100/0x1a8
[   37.815239]  __kasan_check_read+0x20/0x30
[   37.815927]  kasan_atomics_helper+0xdd4/0x4858
[   37.816598]  kasan_atomics+0x198/0x2e8
[   37.817208]  kunit_try_run_case+0x14c/0x3d0
[   37.817861]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.818606]  kthread+0x24c/0x2d0
[   37.819297]  ret_from_fork+0x10/0x20
[   37.819901] 
[   37.820214] Allocated by task 253:
[   37.820726]  kasan_save_stack+0x3c/0x68
[   37.821414]  kasan_save_track+0x20/0x40
[   37.821968]  kasan_save_alloc_info+0x40/0x58
[   37.822608]  __kasan_kmalloc+0xd4/0xd8
[   37.823447]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.824121]  kasan_atomics+0xb8/0x2e8
[   37.824773]  kunit_try_run_case+0x14c/0x3d0
[   37.825364]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.826148]  kthread+0x24c/0x2d0
[   37.826662]  ret_from_fork+0x10/0x20
[   37.827266] 
[   37.827574] The buggy address belongs to the object at fff00000c6767080
[   37.827574]  which belongs to the cache kmalloc-64 of size 64
[   37.829120] The buggy address is located 0 bytes to the right of
[   37.829120]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   37.830564] 
[   37.830925] The buggy address belongs to the physical page:
[   37.831760] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   37.832733] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.833657] page_type: f5(slab)
[   37.834272] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.835351] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.836268] page dumped because: kasan: bad access detected
[   37.836944] 
[   37.837302] Memory state around the buggy address:
[   37.837939]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.838895]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.839718] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.840579]                                      ^
[   37.841277]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.842080]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.843101] ==================================================================
[   36.704679] ==================================================================
[   36.705462] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   36.706877] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   36.708406] 
[   36.708983] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   36.711426] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.712705] Hardware name: linux,dummy-virt (DT)
[   36.713040] Call trace:
[   36.713252]  show_stack+0x20/0x38 (C)
[   36.713566]  dump_stack_lvl+0x8c/0xd0
[   36.715066]  print_report+0x118/0x5e0
[   36.715996]  kasan_report+0xc8/0x118
[   36.716785]  kasan_check_range+0x100/0x1a8
[   36.717447]  __kasan_check_write+0x20/0x30
[   36.718374]  kasan_atomics_helper+0x414/0x4858
[   36.719316]  kasan_atomics+0x198/0x2e8
[   36.719998]  kunit_try_run_case+0x14c/0x3d0
[   36.720661]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.721445]  kthread+0x24c/0x2d0
[   36.722040]  ret_from_fork+0x10/0x20
[   36.722746] 
[   36.723040] Allocated by task 253:
[   36.724079]  kasan_save_stack+0x3c/0x68
[   36.724699]  kasan_save_track+0x20/0x40
[   36.725273]  kasan_save_alloc_info+0x40/0x58
[   36.726524]  __kasan_kmalloc+0xd4/0xd8
[   36.727020]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.727484]  kasan_atomics+0xb8/0x2e8
[   36.728490]  kunit_try_run_case+0x14c/0x3d0
[   36.729184]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.730784]  kthread+0x24c/0x2d0
[   36.731211]  ret_from_fork+0x10/0x20
[   36.731784] 
[   36.732105] The buggy address belongs to the object at fff00000c6767080
[   36.732105]  which belongs to the cache kmalloc-64 of size 64
[   36.733389] The buggy address is located 0 bytes to the right of
[   36.733389]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   36.735719] 
[   36.736100] The buggy address belongs to the physical page:
[   36.736927] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   36.738513] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.739542] page_type: f5(slab)
[   36.740076] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.741244] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.742662] page dumped because: kasan: bad access detected
[   36.743439] 
[   36.743763] Memory state around the buggy address:
[   36.744399]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.745330]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.746643] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.748263]                                      ^
[   36.749396]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.751085]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.752731] ==================================================================
[   37.481012] ==================================================================
[   37.481899] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   37.482781] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   37.483786] 
[   37.484245] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   37.485426] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.486123] Hardware name: linux,dummy-virt (DT)
[   37.486710] Call trace:
[   37.487259]  show_stack+0x20/0x38 (C)
[   37.487989]  dump_stack_lvl+0x8c/0xd0
[   37.488693]  print_report+0x118/0x5e0
[   37.489338]  kasan_report+0xc8/0x118
[   37.489919]  kasan_check_range+0x100/0x1a8
[   37.490533]  __kasan_check_write+0x20/0x30
[   37.491240]  kasan_atomics_helper+0xb70/0x4858
[   37.492007]  kasan_atomics+0x198/0x2e8
[   37.492671]  kunit_try_run_case+0x14c/0x3d0
[   37.493342]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.494162]  kthread+0x24c/0x2d0
[   37.494824]  ret_from_fork+0x10/0x20
[   37.495403] 
[   37.495752] Allocated by task 253:
[   37.496301]  kasan_save_stack+0x3c/0x68
[   37.496984]  kasan_save_track+0x20/0x40
[   37.497546]  kasan_save_alloc_info+0x40/0x58
[   37.498234]  __kasan_kmalloc+0xd4/0xd8
[   37.498891]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.499552]  kasan_atomics+0xb8/0x2e8
[   37.500091]  kunit_try_run_case+0x14c/0x3d0
[   37.500703]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.501384]  kthread+0x24c/0x2d0
[   37.501936]  ret_from_fork+0x10/0x20
[   37.502504] 
[   37.502970] The buggy address belongs to the object at fff00000c6767080
[   37.502970]  which belongs to the cache kmalloc-64 of size 64
[   37.504280] The buggy address is located 0 bytes to the right of
[   37.504280]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   37.505839] 
[   37.506307] The buggy address belongs to the physical page:
[   37.507068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   37.508043] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.508981] page_type: f5(slab)
[   37.509357] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.510340] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.511370] page dumped because: kasan: bad access detected
[   37.512079] 
[   37.512385] Memory state around the buggy address:
[   37.513049]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.513886]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.514826] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.515690]                                      ^
[   37.516324]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.517152]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.518065] ==================================================================
[   36.427002] ==================================================================
[   36.427787] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   36.428541] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   36.429678] 
[   36.430151] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   36.431461] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.432427] Hardware name: linux,dummy-virt (DT)
[   36.433378] Call trace:
[   36.434115]  show_stack+0x20/0x38 (C)
[   36.434607]  dump_stack_lvl+0x8c/0xd0
[   36.435234]  print_report+0x118/0x5e0
[   36.436037]  kasan_report+0xc8/0x118
[   36.436692]  kasan_check_range+0x100/0x1a8
[   36.437446]  __kasan_check_write+0x20/0x30
[   36.438394]  kasan_atomics_helper+0x24c/0x4858
[   36.439070]  kasan_atomics+0x198/0x2e8
[   36.439683]  kunit_try_run_case+0x14c/0x3d0
[   36.440271]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.441056]  kthread+0x24c/0x2d0
[   36.441692]  ret_from_fork+0x10/0x20
[   36.442458] 
[   36.443382] Allocated by task 253:
[   36.444056]  kasan_save_stack+0x3c/0x68
[   36.444876]  kasan_save_track+0x20/0x40
[   36.445410]  kasan_save_alloc_info+0x40/0x58
[   36.446051]  __kasan_kmalloc+0xd4/0xd8
[   36.446480]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.447019]  kasan_atomics+0xb8/0x2e8
[   36.447681]  kunit_try_run_case+0x14c/0x3d0
[   36.448265]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.449235]  kthread+0x24c/0x2d0
[   36.449794]  ret_from_fork+0x10/0x20
[   36.451106] 
[   36.451572] The buggy address belongs to the object at fff00000c6767080
[   36.451572]  which belongs to the cache kmalloc-64 of size 64
[   36.453415] The buggy address is located 0 bytes to the right of
[   36.453415]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   36.455120] 
[   36.455310] The buggy address belongs to the physical page:
[   36.455687] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   36.456971] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.457705] page_type: f5(slab)
[   36.458602] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.459714] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.461189] page dumped because: kasan: bad access detected
[   36.462052] 
[   36.462699] Memory state around the buggy address:
[   36.463961]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.465198]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.466057] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.466877]                                      ^
[   36.467504]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.468993]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.470114] ==================================================================
[   38.531693] ==================================================================
[   38.532333] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   38.533868] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   38.534837] 
[   38.535191] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   38.536453] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.536968] Hardware name: linux,dummy-virt (DT)
[   38.537726] Call trace:
[   38.538118]  show_stack+0x20/0x38 (C)
[   38.538890]  dump_stack_lvl+0x8c/0xd0
[   38.539554]  print_report+0x118/0x5e0
[   38.540074]  kasan_report+0xc8/0x118
[   38.540768]  kasan_check_range+0x100/0x1a8
[   38.541351]  __kasan_check_write+0x20/0x30
[   38.542129]  kasan_atomics_helper+0x147c/0x4858
[   38.542812]  kasan_atomics+0x198/0x2e8
[   38.543469]  kunit_try_run_case+0x14c/0x3d0
[   38.544173]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.544996]  kthread+0x24c/0x2d0
[   38.545607]  ret_from_fork+0x10/0x20
[   38.546316] 
[   38.546794] Allocated by task 253:
[   38.547376]  kasan_save_stack+0x3c/0x68
[   38.547932]  kasan_save_track+0x20/0x40
[   38.548588]  kasan_save_alloc_info+0x40/0x58
[   38.549203]  __kasan_kmalloc+0xd4/0xd8
[   38.549967]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.550647]  kasan_atomics+0xb8/0x2e8
[   38.551322]  kunit_try_run_case+0x14c/0x3d0
[   38.551868]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.552830]  kthread+0x24c/0x2d0
[   38.553352]  ret_from_fork+0x10/0x20
[   38.554019] 
[   38.554324] The buggy address belongs to the object at fff00000c6767080
[   38.554324]  which belongs to the cache kmalloc-64 of size 64
[   38.555920] The buggy address is located 0 bytes to the right of
[   38.555920]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   38.557376] 
[   38.557764] The buggy address belongs to the physical page:
[   38.558457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   38.559442] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.560270] page_type: f5(slab)
[   38.560884] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.561867] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.562772] page dumped because: kasan: bad access detected
[   38.563465] 
[   38.563802] Memory state around the buggy address:
[   38.564483]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.565256]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.566257] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.567156]                                      ^
[   38.567730]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.568614]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.569519] ==================================================================
[   36.851178] ==================================================================
[   36.852067] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   36.852798] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   36.853680] 
[   36.854611] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   36.856884] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.857642] Hardware name: linux,dummy-virt (DT)
[   36.858613] Call trace:
[   36.859006]  show_stack+0x20/0x38 (C)
[   36.859811]  dump_stack_lvl+0x8c/0xd0
[   36.860373]  print_report+0x118/0x5e0
[   36.861054]  kasan_report+0xc8/0x118
[   36.861645]  kasan_check_range+0x100/0x1a8
[   36.862674]  __kasan_check_write+0x20/0x30
[   36.863516]  kasan_atomics_helper+0x54c/0x4858
[   36.864249]  kasan_atomics+0x198/0x2e8
[   36.864904]  kunit_try_run_case+0x14c/0x3d0
[   36.865922]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.866752]  kthread+0x24c/0x2d0
[   36.867284]  ret_from_fork+0x10/0x20
[   36.867704] 
[   36.868097] Allocated by task 253:
[   36.868581]  kasan_save_stack+0x3c/0x68
[   36.869088]  kasan_save_track+0x20/0x40
[   36.869946]  kasan_save_alloc_info+0x40/0x58
[   36.870890]  __kasan_kmalloc+0xd4/0xd8
[   36.871646]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.872257]  kasan_atomics+0xb8/0x2e8
[   36.872861]  kunit_try_run_case+0x14c/0x3d0
[   36.873571]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.874712]  kthread+0x24c/0x2d0
[   36.875983]  ret_from_fork+0x10/0x20
[   36.876582] 
[   36.877078] The buggy address belongs to the object at fff00000c6767080
[   36.877078]  which belongs to the cache kmalloc-64 of size 64
[   36.879076] The buggy address is located 0 bytes to the right of
[   36.879076]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   36.881124] 
[   36.881325] The buggy address belongs to the physical page:
[   36.882157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   36.883306] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.884185] page_type: f5(slab)
[   36.884694] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.885580] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.886882] page dumped because: kasan: bad access detected
[   36.887744] 
[   36.888095] Memory state around the buggy address:
[   36.889003]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.890072]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.891290] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.892255]                                      ^
[   36.892959]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.894042]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.895992] ==================================================================
[   38.688940] ==================================================================
[   38.690648] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   38.691838] Read of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   38.692943] 
[   38.693808] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   38.695071] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.695592] Hardware name: linux,dummy-virt (DT)
[   38.696303] Call trace:
[   38.696759]  show_stack+0x20/0x38 (C)
[   38.697434]  dump_stack_lvl+0x8c/0xd0
[   38.698148]  print_report+0x118/0x5e0
[   38.698880]  kasan_report+0xc8/0x118
[   38.699585]  __asan_report_load8_noabort+0x20/0x30
[   38.700367]  kasan_atomics_helper+0x3db0/0x4858
[   38.701077]  kasan_atomics+0x198/0x2e8
[   38.701728]  kunit_try_run_case+0x14c/0x3d0
[   38.702472]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.703336]  kthread+0x24c/0x2d0
[   38.703963]  ret_from_fork+0x10/0x20
[   38.704595] 
[   38.705015] Allocated by task 253:
[   38.705605]  kasan_save_stack+0x3c/0x68
[   38.706356]  kasan_save_track+0x20/0x40
[   38.707081]  kasan_save_alloc_info+0x40/0x58
[   38.707828]  __kasan_kmalloc+0xd4/0xd8
[   38.708489]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.709201]  kasan_atomics+0xb8/0x2e8
[   38.709846]  kunit_try_run_case+0x14c/0x3d0
[   38.710593]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.711439]  kthread+0x24c/0x2d0
[   38.711974]  ret_from_fork+0x10/0x20
[   38.712679] 
[   38.713021] The buggy address belongs to the object at fff00000c6767080
[   38.713021]  which belongs to the cache kmalloc-64 of size 64
[   38.714464] The buggy address is located 0 bytes to the right of
[   38.714464]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   38.716062] 
[   38.716557] The buggy address belongs to the physical page:
[   38.717355] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   38.718396] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.719326] page_type: f5(slab)
[   38.719829] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.720948] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.721941] page dumped because: kasan: bad access detected
[   38.722780] 
[   38.723235] Memory state around the buggy address:
[   38.723875]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.724712]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.725587] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.726453]                                      ^
[   38.727077]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.728005]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.728888] ==================================================================
[   38.932121] ==================================================================
[   38.932872] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   38.934268] Read of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   38.935393] 
[   38.935757] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   38.937195] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.937718] Hardware name: linux,dummy-virt (DT)
[   38.938408] Call trace:
[   38.938958]  show_stack+0x20/0x38 (C)
[   38.939493]  dump_stack_lvl+0x8c/0xd0
[   38.940171]  print_report+0x118/0x5e0
[   38.940754]  kasan_report+0xc8/0x118
[   38.941396]  __asan_report_load8_noabort+0x20/0x30
[   38.942006]  kasan_atomics_helper+0x3e20/0x4858
[   38.942763]  kasan_atomics+0x198/0x2e8
[   38.943472]  kunit_try_run_case+0x14c/0x3d0
[   38.944077]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.944960]  kthread+0x24c/0x2d0
[   38.945527]  ret_from_fork+0x10/0x20
[   38.946100] 
[   38.946440] Allocated by task 253:
[   38.946938]  kasan_save_stack+0x3c/0x68
[   38.947526]  kasan_save_track+0x20/0x40
[   38.948185]  kasan_save_alloc_info+0x40/0x58
[   38.948700]  __kasan_kmalloc+0xd4/0xd8
[   38.949438]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.950126]  kasan_atomics+0xb8/0x2e8
[   38.950690]  kunit_try_run_case+0x14c/0x3d0
[   38.951299]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.952105]  kthread+0x24c/0x2d0
[   38.952737]  ret_from_fork+0x10/0x20
[   38.953270] 
[   38.953662] The buggy address belongs to the object at fff00000c6767080
[   38.953662]  which belongs to the cache kmalloc-64 of size 64
[   38.955097] The buggy address is located 0 bytes to the right of
[   38.955097]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   38.956524] 
[   38.956902] The buggy address belongs to the physical page:
[   38.957686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   38.958804] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.959684] page_type: f5(slab)
[   38.960156] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.961182] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.962163] page dumped because: kasan: bad access detected
[   38.962876] 
[   38.963228] Memory state around the buggy address:
[   38.963967]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.964826]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.965711] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.966648]                                      ^
[   38.967267]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.968184]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.969077] ==================================================================
[   36.518173] ==================================================================
[   36.519841] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   36.520925] Read of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   36.522840] 
[   36.523346] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   36.524494] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.525125] Hardware name: linux,dummy-virt (DT)
[   36.525444] Call trace:
[   36.525733]  show_stack+0x20/0x38 (C)
[   36.527076]  dump_stack_lvl+0x8c/0xd0
[   36.527694]  print_report+0x118/0x5e0
[   36.528396]  kasan_report+0xc8/0x118
[   36.529021]  __asan_report_load4_noabort+0x20/0x30
[   36.529936]  kasan_atomics_helper+0x40fc/0x4858
[   36.530692]  kasan_atomics+0x198/0x2e8
[   36.531177]  kunit_try_run_case+0x14c/0x3d0
[   36.531909]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.532583]  kthread+0x24c/0x2d0
[   36.533255]  ret_from_fork+0x10/0x20
[   36.533969] 
[   36.534251] Allocated by task 253:
[   36.534995]  kasan_save_stack+0x3c/0x68
[   36.535667]  kasan_save_track+0x20/0x40
[   36.536437]  kasan_save_alloc_info+0x40/0x58
[   36.537386]  __kasan_kmalloc+0xd4/0xd8
[   36.538230]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.539230]  kasan_atomics+0xb8/0x2e8
[   36.539991]  kunit_try_run_case+0x14c/0x3d0
[   36.540794]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.541556]  kthread+0x24c/0x2d0
[   36.542379]  ret_from_fork+0x10/0x20
[   36.542927] 
[   36.543319] The buggy address belongs to the object at fff00000c6767080
[   36.543319]  which belongs to the cache kmalloc-64 of size 64
[   36.545283] The buggy address is located 0 bytes to the right of
[   36.545283]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   36.547183] 
[   36.547505] The buggy address belongs to the physical page:
[   36.548121] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   36.549365] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.550674] page_type: f5(slab)
[   36.551097] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.552986] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.554057] page dumped because: kasan: bad access detected
[   36.556100] 
[   36.556354] Memory state around the buggy address:
[   36.556732]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.557581]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.558415] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.559407]                                      ^
[   36.560302]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.561726]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.562823] ==================================================================
[   38.889974] ==================================================================
[   38.890946] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   38.891854] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   38.892690] 
[   38.893177] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   38.894758] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.895397] Hardware name: linux,dummy-virt (DT)
[   38.896055] Call trace:
[   38.896595]  show_stack+0x20/0x38 (C)
[   38.897316]  dump_stack_lvl+0x8c/0xd0
[   38.898002]  print_report+0x118/0x5e0
[   38.898658]  kasan_report+0xc8/0x118
[   38.899340]  kasan_check_range+0x100/0x1a8
[   38.900080]  __kasan_check_write+0x20/0x30
[   38.900775]  kasan_atomics_helper+0x175c/0x4858
[   38.901541]  kasan_atomics+0x198/0x2e8
[   38.902201]  kunit_try_run_case+0x14c/0x3d0
[   38.902937]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.903734]  kthread+0x24c/0x2d0
[   38.904372]  ret_from_fork+0x10/0x20
[   38.905014] 
[   38.905349] Allocated by task 253:
[   38.905958]  kasan_save_stack+0x3c/0x68
[   38.906612]  kasan_save_track+0x20/0x40
[   38.907319]  kasan_save_alloc_info+0x40/0x58
[   38.908058]  __kasan_kmalloc+0xd4/0xd8
[   38.908794]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.909509]  kasan_atomics+0xb8/0x2e8
[   38.910156]  kunit_try_run_case+0x14c/0x3d0
[   38.910846]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.911684]  kthread+0x24c/0x2d0
[   38.912259]  ret_from_fork+0x10/0x20
[   38.912992] 
[   38.913409] The buggy address belongs to the object at fff00000c6767080
[   38.913409]  which belongs to the cache kmalloc-64 of size 64
[   38.915104] The buggy address is located 0 bytes to the right of
[   38.915104]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   38.916726] 
[   38.917241] The buggy address belongs to the physical page:
[   38.917977] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   38.919150] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.920075] page_type: f5(slab)
[   38.920763] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.921827] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.922829] page dumped because: kasan: bad access detected
[   38.923647] 
[   38.923986] Memory state around the buggy address:
[   38.924748]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.925845]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.926844] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.927981]                                      ^
[   38.928715]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.929715]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.930597] ==================================================================
[   36.754855] ==================================================================
[   36.756019] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   36.757391] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   36.759060] 
[   36.759704] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   36.761013] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.761547] Hardware name: linux,dummy-virt (DT)
[   36.762182] Call trace:
[   36.762566]  show_stack+0x20/0x38 (C)
[   36.763546]  dump_stack_lvl+0x8c/0xd0
[   36.764143]  print_report+0x118/0x5e0
[   36.764853]  kasan_report+0xc8/0x118
[   36.765417]  kasan_check_range+0x100/0x1a8
[   36.766473]  __kasan_check_write+0x20/0x30
[   36.767152]  kasan_atomics_helper+0x47c/0x4858
[   36.767775]  kasan_atomics+0x198/0x2e8
[   36.768330]  kunit_try_run_case+0x14c/0x3d0
[   36.769311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.770466]  kthread+0x24c/0x2d0
[   36.771386]  ret_from_fork+0x10/0x20
[   36.772105] 
[   36.772430] Allocated by task 253:
[   36.772919]  kasan_save_stack+0x3c/0x68
[   36.773450]  kasan_save_track+0x20/0x40
[   36.774765]  kasan_save_alloc_info+0x40/0x58
[   36.775234]  __kasan_kmalloc+0xd4/0xd8
[   36.776093]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.776911]  kasan_atomics+0xb8/0x2e8
[   36.777580]  kunit_try_run_case+0x14c/0x3d0
[   36.778731]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.779471]  kthread+0x24c/0x2d0
[   36.780094]  ret_from_fork+0x10/0x20
[   36.780770] 
[   36.781117] The buggy address belongs to the object at fff00000c6767080
[   36.781117]  which belongs to the cache kmalloc-64 of size 64
[   36.783180] The buggy address is located 0 bytes to the right of
[   36.783180]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   36.784573] 
[   36.785060] The buggy address belongs to the physical page:
[   36.786213] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   36.787439] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.788332] page_type: f5(slab)
[   36.788880] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.790001] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.791031] page dumped because: kasan: bad access detected
[   36.791882] 
[   36.792187] Memory state around the buggy address:
[   36.793193]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.794863]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.796439] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.797216]                                      ^
[   36.798150]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.799104]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.800024] ==================================================================
[   36.659327] ==================================================================
[   36.660275] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[   36.661119] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   36.662463] 
[   36.663134] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   36.664393] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.665460] Hardware name: linux,dummy-virt (DT)
[   36.666253] Call trace:
[   36.666949]  show_stack+0x20/0x38 (C)
[   36.667367]  dump_stack_lvl+0x8c/0xd0
[   36.668043]  print_report+0x118/0x5e0
[   36.668829]  kasan_report+0xc8/0x118
[   36.669475]  kasan_check_range+0x100/0x1a8
[   36.670425]  __kasan_check_write+0x20/0x30
[   36.671472]  kasan_atomics_helper+0x3ac/0x4858
[   36.672087]  kasan_atomics+0x198/0x2e8
[   36.672723]  kunit_try_run_case+0x14c/0x3d0
[   36.673361]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.674157]  kthread+0x24c/0x2d0
[   36.674802]  ret_from_fork+0x10/0x20
[   36.675502] 
[   36.675836] Allocated by task 253:
[   36.676434]  kasan_save_stack+0x3c/0x68
[   36.677114]  kasan_save_track+0x20/0x40
[   36.677769]  kasan_save_alloc_info+0x40/0x58
[   36.679029]  __kasan_kmalloc+0xd4/0xd8
[   36.680708]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.681343]  kasan_atomics+0xb8/0x2e8
[   36.681933]  kunit_try_run_case+0x14c/0x3d0
[   36.682537]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.683290]  kthread+0x24c/0x2d0
[   36.684023]  ret_from_fork+0x10/0x20
[   36.684569] 
[   36.685068] The buggy address belongs to the object at fff00000c6767080
[   36.685068]  which belongs to the cache kmalloc-64 of size 64
[   36.687328] The buggy address is located 0 bytes to the right of
[   36.687328]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   36.688812] 
[   36.689125] The buggy address belongs to the physical page:
[   36.690114] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   36.691192] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.692022] page_type: f5(slab)
[   36.692677] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.693684] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.695196] page dumped because: kasan: bad access detected
[   36.695943] 
[   36.696381] Memory state around the buggy address:
[   36.697137]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.697935]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.699182] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.700185]                                      ^
[   36.701075]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.702018]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.703307] ==================================================================
[   36.281290] ==================================================================
[   36.283456] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   36.284435] Read of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   36.285130] 
[   36.285479] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   36.287566] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.288281] Hardware name: linux,dummy-virt (DT)
[   36.288918] Call trace:
[   36.289309]  show_stack+0x20/0x38 (C)
[   36.290250]  dump_stack_lvl+0x8c/0xd0
[   36.290925]  print_report+0x118/0x5e0
[   36.291447]  kasan_report+0xc8/0x118
[   36.292143]  __asan_report_load4_noabort+0x20/0x30
[   36.292981]  kasan_atomics_helper+0x40a8/0x4858
[   36.293846]  kasan_atomics+0x198/0x2e8
[   36.294802]  kunit_try_run_case+0x14c/0x3d0
[   36.295581]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.296500]  kthread+0x24c/0x2d0
[   36.297050]  ret_from_fork+0x10/0x20
[   36.297381] 
[   36.297558] Allocated by task 253:
[   36.298764]  kasan_save_stack+0x3c/0x68
[   36.299840]  kasan_save_track+0x20/0x40
[   36.300824]  kasan_save_alloc_info+0x40/0x58
[   36.301657]  __kasan_kmalloc+0xd4/0xd8
[   36.302481]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.302977]  kasan_atomics+0xb8/0x2e8
[   36.304061]  kunit_try_run_case+0x14c/0x3d0
[   36.304931]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.305701]  kthread+0x24c/0x2d0
[   36.306770]  ret_from_fork+0x10/0x20
[   36.307354] 
[   36.307841] The buggy address belongs to the object at fff00000c6767080
[   36.307841]  which belongs to the cache kmalloc-64 of size 64
[   36.309230] The buggy address is located 0 bytes to the right of
[   36.309230]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   36.311414] 
[   36.311761] The buggy address belongs to the physical page:
[   36.312462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   36.313568] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.315208] page_type: f5(slab)
[   36.315853] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.316808] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.317720] page dumped because: kasan: bad access detected
[   36.318401] 
[   36.319206] Memory state around the buggy address:
[   36.319969]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.320959]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.322451] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.323175]                                      ^
[   36.323808]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.324895]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.326501] ==================================================================
[   37.068472] ==================================================================
[   37.069382] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[   37.070690] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   37.072235] 
[   37.072837] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   37.074224] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.075006] Hardware name: linux,dummy-virt (DT)
[   37.075809] Call trace:
[   37.076406]  show_stack+0x20/0x38 (C)
[   37.077104]  dump_stack_lvl+0x8c/0xd0
[   37.077838]  print_report+0x118/0x5e0
[   37.078583]  kasan_report+0xc8/0x118
[   37.079283]  kasan_check_range+0x100/0x1a8
[   37.079893]  __kasan_check_write+0x20/0x30
[   37.080487]  kasan_atomics_helper+0x760/0x4858
[   37.081257]  kasan_atomics+0x198/0x2e8
[   37.082034]  kunit_try_run_case+0x14c/0x3d0
[   37.082693]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.083662]  kthread+0x24c/0x2d0
[   37.084340]  ret_from_fork+0x10/0x20
[   37.085033] 
[   37.085386] Allocated by task 253:
[   37.086059]  kasan_save_stack+0x3c/0x68
[   37.086732]  kasan_save_track+0x20/0x40
[   37.087352]  kasan_save_alloc_info+0x40/0x58
[   37.087999]  __kasan_kmalloc+0xd4/0xd8
[   37.088719]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.089430]  kasan_atomics+0xb8/0x2e8
[   37.090134]  kunit_try_run_case+0x14c/0x3d0
[   37.090922]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.091729]  kthread+0x24c/0x2d0
[   37.092409]  ret_from_fork+0x10/0x20
[   37.093014] 
[   37.093431] The buggy address belongs to the object at fff00000c6767080
[   37.093431]  which belongs to the cache kmalloc-64 of size 64
[   37.094940] The buggy address is located 0 bytes to the right of
[   37.094940]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   37.096590] 
[   37.097060] The buggy address belongs to the physical page:
[   37.097839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   37.098864] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.099906] page_type: f5(slab)
[   37.100360] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.101181] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.102279] page dumped because: kasan: bad access detected
[   37.103051] 
[   37.103360] Memory state around the buggy address:
[   37.103991]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.104888]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.105814] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.106813]                                      ^
[   37.107587]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.108413]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.109347] ==================================================================
[   36.898753] ==================================================================
[   36.899545] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   36.900996] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   36.902497] 
[   36.903004] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   36.905016] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.905712] Hardware name: linux,dummy-virt (DT)
[   36.906430] Call trace:
[   36.906945]  show_stack+0x20/0x38 (C)
[   36.907710]  dump_stack_lvl+0x8c/0xd0
[   36.908379]  print_report+0x118/0x5e0
[   36.909044]  kasan_report+0xc8/0x118
[   36.909766]  kasan_check_range+0x100/0x1a8
[   36.910486]  __kasan_check_write+0x20/0x30
[   36.911285]  kasan_atomics_helper+0x5b4/0x4858
[   36.912040]  kasan_atomics+0x198/0x2e8
[   36.912717]  kunit_try_run_case+0x14c/0x3d0
[   36.913500]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.914309]  kthread+0x24c/0x2d0
[   36.914953]  ret_from_fork+0x10/0x20
[   36.915590] 
[   36.915906] Allocated by task 253:
[   36.916432]  kasan_save_stack+0x3c/0x68
[   36.917123]  kasan_save_track+0x20/0x40
[   36.917749]  kasan_save_alloc_info+0x40/0x58
[   36.918488]  __kasan_kmalloc+0xd4/0xd8
[   36.919133]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.919834]  kasan_atomics+0xb8/0x2e8
[   36.920442]  kunit_try_run_case+0x14c/0x3d0
[   36.921069]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.921929]  kthread+0x24c/0x2d0
[   36.922606]  ret_from_fork+0x10/0x20
[   36.923251] 
[   36.923688] The buggy address belongs to the object at fff00000c6767080
[   36.923688]  which belongs to the cache kmalloc-64 of size 64
[   36.925164] The buggy address is located 0 bytes to the right of
[   36.925164]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   36.927235] 
[   36.927565] The buggy address belongs to the physical page:
[   36.928485] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   36.929557] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.930445] page_type: f5(slab)
[   36.931069] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.932142] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.933093] page dumped because: kasan: bad access detected
[   36.933878] 
[   36.934281] Memory state around the buggy address:
[   36.934967]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.936008]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.936956] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.937967]                                      ^
[   36.938707]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.939803]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.940701] ==================================================================
[   37.401654] ==================================================================
[   37.402499] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   37.403378] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   37.405740] 
[   37.406113] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   37.407562] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.408179] Hardware name: linux,dummy-virt (DT)
[   37.408719] Call trace:
[   37.409139]  show_stack+0x20/0x38 (C)
[   37.409830]  dump_stack_lvl+0x8c/0xd0
[   37.410479]  print_report+0x118/0x5e0
[   37.411096]  kasan_report+0xc8/0x118
[   37.411770]  kasan_check_range+0x100/0x1a8
[   37.412488]  __kasan_check_write+0x20/0x30
[   37.413115]  kasan_atomics_helper+0xad4/0x4858
[   37.413775]  kasan_atomics+0x198/0x2e8
[   37.414386]  kunit_try_run_case+0x14c/0x3d0
[   37.415059]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.415746]  kthread+0x24c/0x2d0
[   37.416365]  ret_from_fork+0x10/0x20
[   37.417032] 
[   37.417339] Allocated by task 253:
[   37.417937]  kasan_save_stack+0x3c/0x68
[   37.418466]  kasan_save_track+0x20/0x40
[   37.419189]  kasan_save_alloc_info+0x40/0x58
[   37.419785]  __kasan_kmalloc+0xd4/0xd8
[   37.420454]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.421114]  kasan_atomics+0xb8/0x2e8
[   37.421609]  kunit_try_run_case+0x14c/0x3d0
[   37.422313]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.422989]  kthread+0x24c/0x2d0
[   37.423606]  ret_from_fork+0x10/0x20
[   37.424251] 
[   37.424532] The buggy address belongs to the object at fff00000c6767080
[   37.424532]  which belongs to the cache kmalloc-64 of size 64
[   37.426482] The buggy address is located 0 bytes to the right of
[   37.426482]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   37.427945] 
[   37.428275] The buggy address belongs to the physical page:
[   37.429145] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   37.430104] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.431054] page_type: f5(slab)
[   37.431647] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.432570] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.433517] page dumped because: kasan: bad access detected
[   37.434228] 
[   37.434571] Memory state around the buggy address:
[   37.435237]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.436095]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.437247] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.438113]                                      ^
[   37.438841]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.439714]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.440530] ==================================================================
[   36.564748] ==================================================================
[   36.565754] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   36.567809] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   36.568758] 
[   36.569201] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   36.570505] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.571067] Hardware name: linux,dummy-virt (DT)
[   36.572177] Call trace:
[   36.572539]  show_stack+0x20/0x38 (C)
[   36.573308]  dump_stack_lvl+0x8c/0xd0
[   36.574210]  print_report+0x118/0x5e0
[   36.575100]  kasan_report+0xc8/0x118
[   36.575893]  kasan_check_range+0x100/0x1a8
[   36.576568]  __kasan_check_write+0x20/0x30
[   36.577161]  kasan_atomics_helper+0x32c/0x4858
[   36.578315]  kasan_atomics+0x198/0x2e8
[   36.579129]  kunit_try_run_case+0x14c/0x3d0
[   36.579857]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.580552]  kthread+0x24c/0x2d0
[   36.581149]  ret_from_fork+0x10/0x20
[   36.582193] 
[   36.582488] Allocated by task 253:
[   36.583017]  kasan_save_stack+0x3c/0x68
[   36.583714]  kasan_save_track+0x20/0x40
[   36.584264]  kasan_save_alloc_info+0x40/0x58
[   36.585033]  __kasan_kmalloc+0xd4/0xd8
[   36.585526]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.586863]  kasan_atomics+0xb8/0x2e8
[   36.587872]  kunit_try_run_case+0x14c/0x3d0
[   36.588834]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.589437]  kthread+0x24c/0x2d0
[   36.590252]  ret_from_fork+0x10/0x20
[   36.591237] 
[   36.591545] The buggy address belongs to the object at fff00000c6767080
[   36.591545]  which belongs to the cache kmalloc-64 of size 64
[   36.593084] The buggy address is located 0 bytes to the right of
[   36.593084]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   36.595025] 
[   36.595398] The buggy address belongs to the physical page:
[   36.596240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   36.597300] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.598509] page_type: f5(slab)
[   36.599341] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.600466] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.601496] page dumped because: kasan: bad access detected
[   36.602271] 
[   36.602835] Memory state around the buggy address:
[   36.603926]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.605066]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.606151] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.607262]                                      ^
[   36.607920]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.609109]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.610261] ==================================================================
[   38.407953] ==================================================================
[   38.408839] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   38.409740] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   38.410584] 
[   38.410955] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   38.412382] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.412936] Hardware name: linux,dummy-virt (DT)
[   38.413512] Call trace:
[   38.414243]  show_stack+0x20/0x38 (C)
[   38.414877]  dump_stack_lvl+0x8c/0xd0
[   38.415470]  print_report+0x118/0x5e0
[   38.416393]  kasan_report+0xc8/0x118
[   38.417171]  kasan_check_range+0x100/0x1a8
[   38.417926]  __kasan_check_write+0x20/0x30
[   38.418662]  kasan_atomics_helper+0x1384/0x4858
[   38.419408]  kasan_atomics+0x198/0x2e8
[   38.420117]  kunit_try_run_case+0x14c/0x3d0
[   38.420957]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.421726]  kthread+0x24c/0x2d0
[   38.422255]  ret_from_fork+0x10/0x20
[   38.423151] 
[   38.423488] Allocated by task 253:
[   38.424017]  kasan_save_stack+0x3c/0x68
[   38.424526]  kasan_save_track+0x20/0x40
[   38.425336]  kasan_save_alloc_info+0x40/0x58
[   38.426155]  __kasan_kmalloc+0xd4/0xd8
[   38.426802]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.427606]  kasan_atomics+0xb8/0x2e8
[   38.428235]  kunit_try_run_case+0x14c/0x3d0
[   38.428907]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.429699]  kthread+0x24c/0x2d0
[   38.430260]  ret_from_fork+0x10/0x20
[   38.430965] 
[   38.431314] The buggy address belongs to the object at fff00000c6767080
[   38.431314]  which belongs to the cache kmalloc-64 of size 64
[   38.432945] The buggy address is located 0 bytes to the right of
[   38.432945]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   38.434533] 
[   38.435057] The buggy address belongs to the physical page:
[   38.435872] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   38.436950] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.437866] page_type: f5(slab)
[   38.438440] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.439505] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.440441] page dumped because: kasan: bad access detected
[   38.441246] 
[   38.441529] Memory state around the buggy address:
[   38.442290]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.443386]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.444308] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.445227]                                      ^
[   38.445939]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.446859]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.447384] ==================================================================
[   37.844585] ==================================================================
[   37.845658] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   37.846835] Read of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   37.848510] 
[   37.849106] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   37.850245] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.850830] Hardware name: linux,dummy-virt (DT)
[   37.851765] Call trace:
[   37.852199]  show_stack+0x20/0x38 (C)
[   37.852846]  dump_stack_lvl+0x8c/0xd0
[   37.853519]  print_report+0x118/0x5e0
[   37.854237]  kasan_report+0xc8/0x118
[   37.854937]  __asan_report_load8_noabort+0x20/0x30
[   37.855704]  kasan_atomics_helper+0x3f58/0x4858
[   37.856412]  kasan_atomics+0x198/0x2e8
[   37.857039]  kunit_try_run_case+0x14c/0x3d0
[   37.857697]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.858509]  kthread+0x24c/0x2d0
[   37.859145]  ret_from_fork+0x10/0x20
[   37.859875] 
[   37.860214] Allocated by task 253:
[   37.860863]  kasan_save_stack+0x3c/0x68
[   37.861471]  kasan_save_track+0x20/0x40
[   37.862216]  kasan_save_alloc_info+0x40/0x58
[   37.863012]  __kasan_kmalloc+0xd4/0xd8
[   37.863682]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.864369]  kasan_atomics+0xb8/0x2e8
[   37.865029]  kunit_try_run_case+0x14c/0x3d0
[   37.865729]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.866547]  kthread+0x24c/0x2d0
[   37.867169]  ret_from_fork+0x10/0x20
[   37.867789] 
[   37.868194] The buggy address belongs to the object at fff00000c6767080
[   37.868194]  which belongs to the cache kmalloc-64 of size 64
[   37.869580] The buggy address is located 0 bytes to the right of
[   37.869580]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   37.871183] 
[   37.871683] The buggy address belongs to the physical page:
[   37.872445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   37.873485] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.874439] page_type: f5(slab)
[   37.875059] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.876012] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.876938] page dumped because: kasan: bad access detected
[   37.877696] 
[   37.878084] Memory state around the buggy address:
[   37.878805]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.879892]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.880854] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.881785]                                      ^
[   37.882497]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.883393]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.884290] ==================================================================
[   36.472505] ==================================================================
[   36.473409] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   36.474278] Read of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   36.475699] 
[   36.476023] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   36.477539] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.478782] Hardware name: linux,dummy-virt (DT)
[   36.479582] Call trace:
[   36.479959]  show_stack+0x20/0x38 (C)
[   36.480798]  dump_stack_lvl+0x8c/0xd0
[   36.481596]  print_report+0x118/0x5e0
[   36.482253]  kasan_report+0xc8/0x118
[   36.483286]  kasan_check_range+0x100/0x1a8
[   36.483923]  __kasan_check_read+0x20/0x30
[   36.484563]  kasan_atomics_helper+0x2b0/0x4858
[   36.485196]  kasan_atomics+0x198/0x2e8
[   36.485948]  kunit_try_run_case+0x14c/0x3d0
[   36.486295]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.486750]  kthread+0x24c/0x2d0
[   36.487579]  ret_from_fork+0x10/0x20
[   36.488738] 
[   36.489266] Allocated by task 253:
[   36.490186]  kasan_save_stack+0x3c/0x68
[   36.490852]  kasan_save_track+0x20/0x40
[   36.491551]  kasan_save_alloc_info+0x40/0x58
[   36.492253]  __kasan_kmalloc+0xd4/0xd8
[   36.492897]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.493588]  kasan_atomics+0xb8/0x2e8
[   36.494597]  kunit_try_run_case+0x14c/0x3d0
[   36.495976]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.496770]  kthread+0x24c/0x2d0
[   36.497464]  ret_from_fork+0x10/0x20
[   36.498535] 
[   36.499029] The buggy address belongs to the object at fff00000c6767080
[   36.499029]  which belongs to the cache kmalloc-64 of size 64
[   36.500536] The buggy address is located 0 bytes to the right of
[   36.500536]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   36.502150] 
[   36.502618] The buggy address belongs to the physical page:
[   36.503837] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   36.504894] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.506080] page_type: f5(slab)
[   36.506594] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.507791] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.508774] page dumped because: kasan: bad access detected
[   36.509532] 
[   36.510380] Memory state around the buggy address:
[   36.511146]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.512208]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.513158] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.514589]                                      ^
[   36.515103]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.515576]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.516176] ==================================================================
[   38.326168] ==================================================================
[   38.326999] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   38.328155] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   38.329259] 
[   38.329704] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   38.330988] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.331844] Hardware name: linux,dummy-virt (DT)
[   38.332465] Call trace:
[   38.332929]  show_stack+0x20/0x38 (C)
[   38.333687]  dump_stack_lvl+0x8c/0xd0
[   38.334206]  print_report+0x118/0x5e0
[   38.334925]  kasan_report+0xc8/0x118
[   38.335607]  kasan_check_range+0x100/0x1a8
[   38.336283]  __kasan_check_write+0x20/0x30
[   38.337057]  kasan_atomics_helper+0x126c/0x4858
[   38.337713]  kasan_atomics+0x198/0x2e8
[   38.338379]  kunit_try_run_case+0x14c/0x3d0
[   38.339133]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.340000]  kthread+0x24c/0x2d0
[   38.340659]  ret_from_fork+0x10/0x20
[   38.341218] 
[   38.341609] Allocated by task 253:
[   38.342169]  kasan_save_stack+0x3c/0x68
[   38.342898]  kasan_save_track+0x20/0x40
[   38.343474]  kasan_save_alloc_info+0x40/0x58
[   38.344126]  __kasan_kmalloc+0xd4/0xd8
[   38.344649]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.345340]  kasan_atomics+0xb8/0x2e8
[   38.345941]  kunit_try_run_case+0x14c/0x3d0
[   38.346568]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.347208]  kthread+0x24c/0x2d0
[   38.347810]  ret_from_fork+0x10/0x20
[   38.348302] 
[   38.348781] The buggy address belongs to the object at fff00000c6767080
[   38.348781]  which belongs to the cache kmalloc-64 of size 64
[   38.350215] The buggy address is located 0 bytes to the right of
[   38.350215]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   38.351678] 
[   38.352014] The buggy address belongs to the physical page:
[   38.352776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   38.353769] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.354592] page_type: f5(slab)
[   38.355161] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.356188] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.357093] page dumped because: kasan: bad access detected
[   38.357834] 
[   38.358149] Memory state around the buggy address:
[   38.358760]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.359578]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.360570] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.361512]                                      ^
[   38.362118]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.363051]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.363898] ==================================================================
[   38.003779] ==================================================================
[   38.004592] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   38.005398] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   38.006794] 
[   38.007277] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   38.008578] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.009137] Hardware name: linux,dummy-virt (DT)
[   38.009775] Call trace:
[   38.010240]  show_stack+0x20/0x38 (C)
[   38.010845]  dump_stack_lvl+0x8c/0xd0
[   38.011425]  print_report+0x118/0x5e0
[   38.011991]  kasan_report+0xc8/0x118
[   38.012578]  kasan_check_range+0x100/0x1a8
[   38.013224]  __kasan_check_write+0x20/0x30
[   38.013904]  kasan_atomics_helper+0xf20/0x4858
[   38.014591]  kasan_atomics+0x198/0x2e8
[   38.015188]  kunit_try_run_case+0x14c/0x3d0
[   38.015853]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.016716]  kthread+0x24c/0x2d0
[   38.017245]  ret_from_fork+0x10/0x20
[   38.017845] 
[   38.018214] Allocated by task 253:
[   38.018784]  kasan_save_stack+0x3c/0x68
[   38.019355]  kasan_save_track+0x20/0x40
[   38.019950]  kasan_save_alloc_info+0x40/0x58
[   38.020694]  __kasan_kmalloc+0xd4/0xd8
[   38.021243]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.021946]  kasan_atomics+0xb8/0x2e8
[   38.022479]  kunit_try_run_case+0x14c/0x3d0
[   38.023271]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.024015]  kthread+0x24c/0x2d0
[   38.024543]  ret_from_fork+0x10/0x20
[   38.025293] 
[   38.025607] The buggy address belongs to the object at fff00000c6767080
[   38.025607]  which belongs to the cache kmalloc-64 of size 64
[   38.027273] The buggy address is located 0 bytes to the right of
[   38.027273]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   38.029303] 
[   38.029695] The buggy address belongs to the physical page:
[   38.030409] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   38.031270] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.032199] page_type: f5(slab)
[   38.032683] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.033662] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.034282] page dumped because: kasan: bad access detected
[   38.034660] 
[   38.034987] Memory state around the buggy address:
[   38.035667]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.036673]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.037558] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.038412]                                      ^
[   38.039154]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.040028]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.040988] ==================================================================
[   38.366547] ==================================================================
[   38.367497] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   38.368515] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   38.369666] 
[   38.370143] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   38.371490] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.372073] Hardware name: linux,dummy-virt (DT)
[   38.372841] Call trace:
[   38.373558]  show_stack+0x20/0x38 (C)
[   38.374393]  dump_stack_lvl+0x8c/0xd0
[   38.374795]  print_report+0x118/0x5e0
[   38.375511]  kasan_report+0xc8/0x118
[   38.376334]  kasan_check_range+0x100/0x1a8
[   38.377062]  __kasan_check_write+0x20/0x30
[   38.377764]  kasan_atomics_helper+0x12d8/0x4858
[   38.378484]  kasan_atomics+0x198/0x2e8
[   38.379138]  kunit_try_run_case+0x14c/0x3d0
[   38.379910]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.380721]  kthread+0x24c/0x2d0
[   38.381332]  ret_from_fork+0x10/0x20
[   38.382011] 
[   38.382342] Allocated by task 253:
[   38.382948]  kasan_save_stack+0x3c/0x68
[   38.383738]  kasan_save_track+0x20/0x40
[   38.384380]  kasan_save_alloc_info+0x40/0x58
[   38.385072]  __kasan_kmalloc+0xd4/0xd8
[   38.385707]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.386526]  kasan_atomics+0xb8/0x2e8
[   38.387171]  kunit_try_run_case+0x14c/0x3d0
[   38.387885]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.388926]  kthread+0x24c/0x2d0
[   38.389400]  ret_from_fork+0x10/0x20
[   38.389906] 
[   38.390294] The buggy address belongs to the object at fff00000c6767080
[   38.390294]  which belongs to the cache kmalloc-64 of size 64
[   38.391751] The buggy address is located 0 bytes to the right of
[   38.391751]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   38.393241] 
[   38.393560] The buggy address belongs to the physical page:
[   38.394255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   38.395249] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.396171] page_type: f5(slab)
[   38.396613] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.397568] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.398497] page dumped because: kasan: bad access detected
[   38.399272] 
[   38.399598] Memory state around the buggy address:
[   38.400236]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.401175]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.402082] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.403075]                                      ^
[   38.403714]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.404579]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.405511] ==================================================================
[   38.492054] ==================================================================
[   38.493051] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   38.495072] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   38.496156] 
[   38.496566] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   38.497760] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.498335] Hardware name: linux,dummy-virt (DT)
[   38.498969] Call trace:
[   38.499420]  show_stack+0x20/0x38 (C)
[   38.500000]  dump_stack_lvl+0x8c/0xd0
[   38.500604]  print_report+0x118/0x5e0
[   38.501228]  kasan_report+0xc8/0x118
[   38.501843]  kasan_check_range+0x100/0x1a8
[   38.502559]  __kasan_check_write+0x20/0x30
[   38.503104]  kasan_atomics_helper+0x1414/0x4858
[   38.503919]  kasan_atomics+0x198/0x2e8
[   38.504509]  kunit_try_run_case+0x14c/0x3d0
[   38.505232]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.506061]  kthread+0x24c/0x2d0
[   38.506703]  ret_from_fork+0x10/0x20
[   38.507256] 
[   38.507743] Allocated by task 253:
[   38.508307]  kasan_save_stack+0x3c/0x68
[   38.508943]  kasan_save_track+0x20/0x40
[   38.509503]  kasan_save_alloc_info+0x40/0x58
[   38.510275]  __kasan_kmalloc+0xd4/0xd8
[   38.510856]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.511648]  kasan_atomics+0xb8/0x2e8
[   38.512210]  kunit_try_run_case+0x14c/0x3d0
[   38.512802]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.513459]  kthread+0x24c/0x2d0
[   38.514080]  ret_from_fork+0x10/0x20
[   38.514572] 
[   38.515047] The buggy address belongs to the object at fff00000c6767080
[   38.515047]  which belongs to the cache kmalloc-64 of size 64
[   38.516513] The buggy address is located 0 bytes to the right of
[   38.516513]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   38.518063] 
[   38.518377] The buggy address belongs to the physical page:
[   38.519070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   38.520078] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.520920] page_type: f5(slab)
[   38.521404] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.522343] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.523369] page dumped because: kasan: bad access detected
[   38.524075] 
[   38.524386] Memory state around the buggy address:
[   38.525040]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.525919]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.526837] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.527782]                                      ^
[   38.528410]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.529274]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.530190] ==================================================================
[   37.963832] ==================================================================
[   37.964529] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   37.965620] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   37.966933] 
[   37.967312] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   37.968520] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.969088] Hardware name: linux,dummy-virt (DT)
[   37.969838] Call trace:
[   37.970297]  show_stack+0x20/0x38 (C)
[   37.971119]  dump_stack_lvl+0x8c/0xd0
[   37.971756]  print_report+0x118/0x5e0
[   37.972339]  kasan_report+0xc8/0x118
[   37.972888]  kasan_check_range+0x100/0x1a8
[   37.973589]  __kasan_check_write+0x20/0x30
[   37.974236]  kasan_atomics_helper+0xeb8/0x4858
[   37.974885]  kasan_atomics+0x198/0x2e8
[   37.975490]  kunit_try_run_case+0x14c/0x3d0
[   37.976170]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.976962]  kthread+0x24c/0x2d0
[   37.977494]  ret_from_fork+0x10/0x20
[   37.977988] 
[   37.978386] Allocated by task 253:
[   37.978970]  kasan_save_stack+0x3c/0x68
[   37.979662]  kasan_save_track+0x20/0x40
[   37.980215]  kasan_save_alloc_info+0x40/0x58
[   37.980897]  __kasan_kmalloc+0xd4/0xd8
[   37.981412]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.982213]  kasan_atomics+0xb8/0x2e8
[   37.982796]  kunit_try_run_case+0x14c/0x3d0
[   37.983380]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.984131]  kthread+0x24c/0x2d0
[   37.984760]  ret_from_fork+0x10/0x20
[   37.985303] 
[   37.985618] The buggy address belongs to the object at fff00000c6767080
[   37.985618]  which belongs to the cache kmalloc-64 of size 64
[   37.987122] The buggy address is located 0 bytes to the right of
[   37.987122]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   37.988497] 
[   37.988890] The buggy address belongs to the physical page:
[   37.989575] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   37.990519] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.991471] page_type: f5(slab)
[   37.991986] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.992899] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.993806] page dumped because: kasan: bad access detected
[   37.994456] 
[   37.994793] Memory state around the buggy address:
[   37.995457]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.996422]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.997388] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.998253]                                      ^
[   37.998942]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.999802]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.000697] ==================================================================
[   37.363065] ==================================================================
[   37.363877] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   37.364732] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   37.365515] 
[   37.365993] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   37.367122] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.367930] Hardware name: linux,dummy-virt (DT)
[   37.368509] Call trace:
[   37.369012]  show_stack+0x20/0x38 (C)
[   37.369585]  dump_stack_lvl+0x8c/0xd0
[   37.370277]  print_report+0x118/0x5e0
[   37.370893]  kasan_report+0xc8/0x118
[   37.371458]  kasan_check_range+0x100/0x1a8
[   37.372127]  __kasan_check_write+0x20/0x30
[   37.372870]  kasan_atomics_helper+0xa6c/0x4858
[   37.373482]  kasan_atomics+0x198/0x2e8
[   37.374119]  kunit_try_run_case+0x14c/0x3d0
[   37.374724]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.375530]  kthread+0x24c/0x2d0
[   37.376130]  ret_from_fork+0x10/0x20
[   37.376718] 
[   37.377099] Allocated by task 253:
[   37.377672]  kasan_save_stack+0x3c/0x68
[   37.378157]  kasan_save_track+0x20/0x40
[   37.378837]  kasan_save_alloc_info+0x40/0x58
[   37.379539]  __kasan_kmalloc+0xd4/0xd8
[   37.380111]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.380727]  kasan_atomics+0xb8/0x2e8
[   37.381342]  kunit_try_run_case+0x14c/0x3d0
[   37.381965]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.382663]  kthread+0x24c/0x2d0
[   37.383264]  ret_from_fork+0x10/0x20
[   37.383831] 
[   37.384138] The buggy address belongs to the object at fff00000c6767080
[   37.384138]  which belongs to the cache kmalloc-64 of size 64
[   37.385477] The buggy address is located 0 bytes to the right of
[   37.385477]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   37.386967] 
[   37.387373] The buggy address belongs to the physical page:
[   37.388051] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   37.389023] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.389934] page_type: f5(slab)
[   37.390481] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.391444] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.392362] page dumped because: kasan: bad access detected
[   37.393038] 
[   37.393402] Memory state around the buggy address:
[   37.394110]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.394923]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.395910] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.396787]                                      ^
[   37.397436]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.398318]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.399243] ==================================================================
[   36.801363] ==================================================================
[   36.802742] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   36.805138] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   36.805937] 
[   36.806694] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   36.808062] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.808804] Hardware name: linux,dummy-virt (DT)
[   36.809588] Call trace:
[   36.810177]  show_stack+0x20/0x38 (C)
[   36.811050]  dump_stack_lvl+0x8c/0xd0
[   36.811756]  print_report+0x118/0x5e0
[   36.812671]  kasan_report+0xc8/0x118
[   36.813227]  kasan_check_range+0x100/0x1a8
[   36.814091]  __kasan_check_write+0x20/0x30
[   36.814995]  kasan_atomics_helper+0x4e4/0x4858
[   36.815909]  kasan_atomics+0x198/0x2e8
[   36.816521]  kunit_try_run_case+0x14c/0x3d0
[   36.817293]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.818458]  kthread+0x24c/0x2d0
[   36.818923]  ret_from_fork+0x10/0x20
[   36.819702] 
[   36.819984] Allocated by task 253:
[   36.820786]  kasan_save_stack+0x3c/0x68
[   36.821549]  kasan_save_track+0x20/0x40
[   36.822369]  kasan_save_alloc_info+0x40/0x58
[   36.823210]  __kasan_kmalloc+0xd4/0xd8
[   36.824183]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.825215]  kasan_atomics+0xb8/0x2e8
[   36.825924]  kunit_try_run_case+0x14c/0x3d0
[   36.826657]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.828020]  kthread+0x24c/0x2d0
[   36.828604]  ret_from_fork+0x10/0x20
[   36.829289] 
[   36.829721] The buggy address belongs to the object at fff00000c6767080
[   36.829721]  which belongs to the cache kmalloc-64 of size 64
[   36.831572] The buggy address is located 0 bytes to the right of
[   36.831572]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   36.832894] 
[   36.833202] The buggy address belongs to the physical page:
[   36.833968] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   36.835416] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.836408] page_type: f5(slab)
[   36.837097] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.838550] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.839385] page dumped because: kasan: bad access detected
[   36.840328] 
[   36.840705] Memory state around the buggy address:
[   36.841479]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.843091]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.844270] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.845158]                                      ^
[   36.845884]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.847394]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.848395] ==================================================================
[   38.847797] ==================================================================
[   38.848653] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   38.849822] Read of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   38.850560] 
[   38.851116] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   38.853107] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.853840] Hardware name: linux,dummy-virt (DT)
[   38.854542] Call trace:
[   38.855141]  show_stack+0x20/0x38 (C)
[   38.855783]  dump_stack_lvl+0x8c/0xd0
[   38.856469]  print_report+0x118/0x5e0
[   38.857102]  kasan_report+0xc8/0x118
[   38.857824]  __asan_report_load8_noabort+0x20/0x30
[   38.858577]  kasan_atomics_helper+0x3e10/0x4858
[   38.859402]  kasan_atomics+0x198/0x2e8
[   38.860100]  kunit_try_run_case+0x14c/0x3d0
[   38.860845]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.861751]  kthread+0x24c/0x2d0
[   38.862361]  ret_from_fork+0x10/0x20
[   38.863076] 
[   38.863428] Allocated by task 253:
[   38.864061]  kasan_save_stack+0x3c/0x68
[   38.864690]  kasan_save_track+0x20/0x40
[   38.865411]  kasan_save_alloc_info+0x40/0x58
[   38.866083]  __kasan_kmalloc+0xd4/0xd8
[   38.866729]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.867392]  kasan_atomics+0xb8/0x2e8
[   38.868053]  kunit_try_run_case+0x14c/0x3d0
[   38.868767]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.869542]  kthread+0x24c/0x2d0
[   38.870145]  ret_from_fork+0x10/0x20
[   38.870790] 
[   38.871155] The buggy address belongs to the object at fff00000c6767080
[   38.871155]  which belongs to the cache kmalloc-64 of size 64
[   38.872807] The buggy address is located 0 bytes to the right of
[   38.872807]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   38.874361] 
[   38.874814] The buggy address belongs to the physical page:
[   38.875586] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   38.876599] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.877665] page_type: f5(slab)
[   38.878233] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.879284] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.880242] page dumped because: kasan: bad access detected
[   38.881062] 
[   38.881395] Memory state around the buggy address:
[   38.882147]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.883103]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.884091] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.885011]                                      ^
[   38.885756]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.886689]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.887641] ==================================================================
[   37.280898] ==================================================================
[   37.281805] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   37.283052] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   37.284229] 
[   37.284770] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   37.286125] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.286714] Hardware name: linux,dummy-virt (DT)
[   37.287414] Call trace:
[   37.287831]  show_stack+0x20/0x38 (C)
[   37.288350]  dump_stack_lvl+0x8c/0xd0
[   37.289003]  print_report+0x118/0x5e0
[   37.289724]  kasan_report+0xc8/0x118
[   37.290416]  kasan_check_range+0x100/0x1a8
[   37.290973]  __kasan_check_write+0x20/0x30
[   37.291707]  kasan_atomics_helper+0x99c/0x4858
[   37.292456]  kasan_atomics+0x198/0x2e8
[   37.293154]  kunit_try_run_case+0x14c/0x3d0
[   37.293824]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.294575]  kthread+0x24c/0x2d0
[   37.295113]  ret_from_fork+0x10/0x20
[   37.295794] 
[   37.296201] Allocated by task 253:
[   37.296653]  kasan_save_stack+0x3c/0x68
[   37.297359]  kasan_save_track+0x20/0x40
[   37.297946]  kasan_save_alloc_info+0x40/0x58
[   37.298614]  __kasan_kmalloc+0xd4/0xd8
[   37.299218]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.299866]  kasan_atomics+0xb8/0x2e8
[   37.300614]  kunit_try_run_case+0x14c/0x3d0
[   37.301182]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.302031]  kthread+0x24c/0x2d0
[   37.302528]  ret_from_fork+0x10/0x20
[   37.303061] 
[   37.303528] The buggy address belongs to the object at fff00000c6767080
[   37.303528]  which belongs to the cache kmalloc-64 of size 64
[   37.304936] The buggy address is located 0 bytes to the right of
[   37.304936]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   37.306364] 
[   37.306797] The buggy address belongs to the physical page:
[   37.307508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   37.308523] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.309324] page_type: f5(slab)
[   37.309894] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.310822] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.311845] page dumped because: kasan: bad access detected
[   37.312522] 
[   37.312958] Memory state around the buggy address:
[   37.313660]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.314503]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.315429] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.316310]                                      ^
[   37.316958]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.317838]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.318688] ==================================================================
[   37.766706] ==================================================================
[   37.767662] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   37.768413] Read of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   37.769258] 
[   37.769716] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   37.771422] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.771960] Hardware name: linux,dummy-virt (DT)
[   37.772618] Call trace:
[   37.773036]  show_stack+0x20/0x38 (C)
[   37.773678]  dump_stack_lvl+0x8c/0xd0
[   37.774242]  print_report+0x118/0x5e0
[   37.774852]  kasan_report+0xc8/0x118
[   37.775487]  __asan_report_load4_noabort+0x20/0x30
[   37.776204]  kasan_atomics_helper+0x3e04/0x4858
[   37.776850]  kasan_atomics+0x198/0x2e8
[   37.777509]  kunit_try_run_case+0x14c/0x3d0
[   37.778083]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.778942]  kthread+0x24c/0x2d0
[   37.779575]  ret_from_fork+0x10/0x20
[   37.780214] 
[   37.780504] Allocated by task 253:
[   37.781015]  kasan_save_stack+0x3c/0x68
[   37.781745]  kasan_save_track+0x20/0x40
[   37.782397]  kasan_save_alloc_info+0x40/0x58
[   37.783034]  __kasan_kmalloc+0xd4/0xd8
[   37.783700]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.784431]  kasan_atomics+0xb8/0x2e8
[   37.784989]  kunit_try_run_case+0x14c/0x3d0
[   37.785498]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.786286]  kthread+0x24c/0x2d0
[   37.786774]  ret_from_fork+0x10/0x20
[   37.787427] 
[   37.787808] The buggy address belongs to the object at fff00000c6767080
[   37.787808]  which belongs to the cache kmalloc-64 of size 64
[   37.789168] The buggy address is located 0 bytes to the right of
[   37.789168]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   37.790705] 
[   37.791087] The buggy address belongs to the physical page:
[   37.791920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   37.792780] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.793679] page_type: f5(slab)
[   37.794229] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.795236] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.796262] page dumped because: kasan: bad access detected
[   37.796953] 
[   37.797288] Memory state around the buggy address:
[   37.797893]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.798699]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.799653] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.800533]                                      ^
[   37.801250]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.802186]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.803080] ==================================================================
[   37.151220] ==================================================================
[   37.152095] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   37.152982] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   37.154131] 
[   37.154702] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   37.155884] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.156697] Hardware name: linux,dummy-virt (DT)
[   37.157267] Call trace:
[   37.157834]  show_stack+0x20/0x38 (C)
[   37.158385]  dump_stack_lvl+0x8c/0xd0
[   37.159077]  print_report+0x118/0x5e0
[   37.159734]  kasan_report+0xc8/0x118
[   37.160341]  kasan_check_range+0x100/0x1a8
[   37.161052]  __kasan_check_write+0x20/0x30
[   37.161824]  kasan_atomics_helper+0x894/0x4858
[   37.162539]  kasan_atomics+0x198/0x2e8
[   37.163103]  kunit_try_run_case+0x14c/0x3d0
[   37.163793]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.164686]  kthread+0x24c/0x2d0
[   37.165357]  ret_from_fork+0x10/0x20
[   37.166149] 
[   37.166527] Allocated by task 253:
[   37.167133]  kasan_save_stack+0x3c/0x68
[   37.167778]  kasan_save_track+0x20/0x40
[   37.168373]  kasan_save_alloc_info+0x40/0x58
[   37.168993]  __kasan_kmalloc+0xd4/0xd8
[   37.169617]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.170356]  kasan_atomics+0xb8/0x2e8
[   37.171064]  kunit_try_run_case+0x14c/0x3d0
[   37.171659]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.172495]  kthread+0x24c/0x2d0
[   37.173068]  ret_from_fork+0x10/0x20
[   37.173756] 
[   37.174107] The buggy address belongs to the object at fff00000c6767080
[   37.174107]  which belongs to the cache kmalloc-64 of size 64
[   37.175866] The buggy address is located 0 bytes to the right of
[   37.175866]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   37.177693] 
[   37.178243] The buggy address belongs to the physical page:
[   37.178932] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   37.180121] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.181071] page_type: f5(slab)
[   37.181610] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.182804] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.183953] page dumped because: kasan: bad access detected
[   37.184870] 
[   37.185414] Memory state around the buggy address:
[   37.186191]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.187209]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.188055] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.189158]                                      ^
[   37.189493]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.190679]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.191745] ==================================================================
[   38.286568] ==================================================================
[   38.287748] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   38.288741] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   38.290290] 
[   38.290610] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   38.291809] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.292438] Hardware name: linux,dummy-virt (DT)
[   38.293047] Call trace:
[   38.293428]  show_stack+0x20/0x38 (C)
[   38.294135]  dump_stack_lvl+0x8c/0xd0
[   38.294848]  print_report+0x118/0x5e0
[   38.295551]  kasan_report+0xc8/0x118
[   38.296105]  kasan_check_range+0x100/0x1a8
[   38.296825]  __kasan_check_write+0x20/0x30
[   38.297447]  kasan_atomics_helper+0x11f8/0x4858
[   38.298095]  kasan_atomics+0x198/0x2e8
[   38.298594]  kunit_try_run_case+0x14c/0x3d0
[   38.299398]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.300168]  kthread+0x24c/0x2d0
[   38.300716]  ret_from_fork+0x10/0x20
[   38.301343] 
[   38.301757] Allocated by task 253:
[   38.302247]  kasan_save_stack+0x3c/0x68
[   38.302992]  kasan_save_track+0x20/0x40
[   38.303642]  kasan_save_alloc_info+0x40/0x58
[   38.304352]  __kasan_kmalloc+0xd4/0xd8
[   38.304850]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.305564]  kasan_atomics+0xb8/0x2e8
[   38.306096]  kunit_try_run_case+0x14c/0x3d0
[   38.306791]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.307526]  kthread+0x24c/0x2d0
[   38.308219]  ret_from_fork+0x10/0x20
[   38.308807] 
[   38.309182] The buggy address belongs to the object at fff00000c6767080
[   38.309182]  which belongs to the cache kmalloc-64 of size 64
[   38.310727] The buggy address is located 0 bytes to the right of
[   38.310727]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   38.312168] 
[   38.312512] The buggy address belongs to the physical page:
[   38.313212] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   38.314144] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.315043] page_type: f5(slab)
[   38.315543] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.316566] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.317492] page dumped because: kasan: bad access detected
[   38.318316] 
[   38.318672] Memory state around the buggy address:
[   38.319229]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.320185]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.320983] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.321969]                                      ^
[   38.322608]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.323572]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.324409] ==================================================================
[   36.942425] ==================================================================
[   36.943420] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   36.944433] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   36.945350] 
[   36.945803] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   36.947570] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.948283] Hardware name: linux,dummy-virt (DT)
[   36.949075] Call trace:
[   36.949603]  show_stack+0x20/0x38 (C)
[   36.950207]  dump_stack_lvl+0x8c/0xd0
[   36.950767]  print_report+0x118/0x5e0
[   36.951325]  kasan_report+0xc8/0x118
[   36.952199]  kasan_check_range+0x100/0x1a8
[   36.952841]  __kasan_check_write+0x20/0x30
[   36.953438]  kasan_atomics_helper+0x61c/0x4858
[   36.954069]  kasan_atomics+0x198/0x2e8
[   36.954734]  kunit_try_run_case+0x14c/0x3d0
[   36.955503]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.956534]  kthread+0x24c/0x2d0
[   36.957272]  ret_from_fork+0x10/0x20
[   36.957726] 
[   36.958070] Allocated by task 253:
[   36.958517]  kasan_save_stack+0x3c/0x68
[   36.959042]  kasan_save_track+0x20/0x40
[   36.959692]  kasan_save_alloc_info+0x40/0x58
[   36.960332]  __kasan_kmalloc+0xd4/0xd8
[   36.960899]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.961746]  kasan_atomics+0xb8/0x2e8
[   36.962224]  kunit_try_run_case+0x14c/0x3d0
[   36.962996]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.963781]  kthread+0x24c/0x2d0
[   36.964377]  ret_from_fork+0x10/0x20
[   36.964994] 
[   36.965288] The buggy address belongs to the object at fff00000c6767080
[   36.965288]  which belongs to the cache kmalloc-64 of size 64
[   36.966805] The buggy address is located 0 bytes to the right of
[   36.966805]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   36.968281] 
[   36.968602] The buggy address belongs to the physical page:
[   36.969340] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   36.970271] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.971115] page_type: f5(slab)
[   36.971728] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.972695] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.973595] page dumped because: kasan: bad access detected
[   36.974286] 
[   36.974517] Memory state around the buggy address:
[   36.975356]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.976236]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.977059] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.978059]                                      ^
[   36.978980]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.980168]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.981291] ==================================================================
[   38.610706] ==================================================================
[   38.611366] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   38.612414] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   38.613077] 
[   38.613380] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   38.615165] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.615956] Hardware name: linux,dummy-virt (DT)
[   38.616862] Call trace:
[   38.617855]  show_stack+0x20/0x38 (C)
[   38.618510]  dump_stack_lvl+0x8c/0xd0
[   38.619130]  print_report+0x118/0x5e0
[   38.619918]  kasan_report+0xc8/0x118
[   38.620397]  kasan_check_range+0x100/0x1a8
[   38.621044]  __kasan_check_write+0x20/0x30
[   38.621648]  kasan_atomics_helper+0x154c/0x4858
[   38.622287]  kasan_atomics+0x198/0x2e8
[   38.623082]  kunit_try_run_case+0x14c/0x3d0
[   38.623717]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.624433]  kthread+0x24c/0x2d0
[   38.625172]  ret_from_fork+0x10/0x20
[   38.625871] 
[   38.626241] Allocated by task 253:
[   38.626941]  kasan_save_stack+0x3c/0x68
[   38.627584]  kasan_save_track+0x20/0x40
[   38.628091]  kasan_save_alloc_info+0x40/0x58
[   38.628800]  __kasan_kmalloc+0xd4/0xd8
[   38.629400]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.630059]  kasan_atomics+0xb8/0x2e8
[   38.630661]  kunit_try_run_case+0x14c/0x3d0
[   38.631391]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.632012]  kthread+0x24c/0x2d0
[   38.632612]  ret_from_fork+0x10/0x20
[   38.633142] 
[   38.633510] The buggy address belongs to the object at fff00000c6767080
[   38.633510]  which belongs to the cache kmalloc-64 of size 64
[   38.635056] The buggy address is located 0 bytes to the right of
[   38.635056]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   38.636570] 
[   38.636898] The buggy address belongs to the physical page:
[   38.637616] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   38.638692] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.639548] page_type: f5(slab)
[   38.640020] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.641059] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.642002] page dumped because: kasan: bad access detected
[   38.642646] 
[   38.643031] Memory state around the buggy address:
[   38.643652]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.644489]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.645398] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.646289]                                      ^
[   38.646860]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.647855]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.648761] ==================================================================
[   36.377333] ==================================================================
[   36.378708] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   36.379454] Read of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   36.380422] 
[   36.380773] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   36.382421] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.383219] Hardware name: linux,dummy-virt (DT)
[   36.383945] Call trace:
[   36.384302]  show_stack+0x20/0x38 (C)
[   36.385095]  dump_stack_lvl+0x8c/0xd0
[   36.385751]  print_report+0x118/0x5e0
[   36.387018]  kasan_report+0xc8/0x118
[   36.387663]  kasan_check_range+0x100/0x1a8
[   36.388583]  __kasan_check_read+0x20/0x30
[   36.389269]  kasan_atomics_helper+0x1ec/0x4858
[   36.390702]  kasan_atomics+0x198/0x2e8
[   36.391412]  kunit_try_run_case+0x14c/0x3d0
[   36.392081]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.392469]  kthread+0x24c/0x2d0
[   36.393058]  ret_from_fork+0x10/0x20
[   36.394126] 
[   36.394847] Allocated by task 253:
[   36.395558]  kasan_save_stack+0x3c/0x68
[   36.396148]  kasan_save_track+0x20/0x40
[   36.396722]  kasan_save_alloc_info+0x40/0x58
[   36.397372]  __kasan_kmalloc+0xd4/0xd8
[   36.397906]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.399470]  kasan_atomics+0xb8/0x2e8
[   36.400872]  kunit_try_run_case+0x14c/0x3d0
[   36.401507]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.402761]  kthread+0x24c/0x2d0
[   36.403432]  ret_from_fork+0x10/0x20
[   36.404300] 
[   36.404749] The buggy address belongs to the object at fff00000c6767080
[   36.404749]  which belongs to the cache kmalloc-64 of size 64
[   36.406671] The buggy address is located 0 bytes to the right of
[   36.406671]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   36.408576] 
[   36.409215] The buggy address belongs to the physical page:
[   36.410619] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   36.412074] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.412522] page_type: f5(slab)
[   36.412978] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.414436] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.415619] page dumped because: kasan: bad access detected
[   36.416556] 
[   36.416992] Memory state around the buggy address:
[   36.417901]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.418827]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.420124] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.421324]                                      ^
[   36.422160]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.423805]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.424818] ==================================================================
[   38.971127] ==================================================================
[   38.972418] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   38.973213] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   38.974747] 
[   38.975403] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   38.976686] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.977247] Hardware name: linux,dummy-virt (DT)
[   38.978030] Call trace:
[   38.978679]  show_stack+0x20/0x38 (C)
[   38.979461]  dump_stack_lvl+0x8c/0xd0
[   38.980044]  print_report+0x118/0x5e0
[   38.980775]  kasan_report+0xc8/0x118
[   38.981480]  kasan_check_range+0x100/0x1a8
[   38.982150]  __kasan_check_write+0x20/0x30
[   38.982943]  kasan_atomics_helper+0x17ec/0x4858
[   38.983561]  kasan_atomics+0x198/0x2e8
[   38.984303]  kunit_try_run_case+0x14c/0x3d0
[   38.985131]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.985935]  kthread+0x24c/0x2d0
[   38.986652]  ret_from_fork+0x10/0x20
[   38.987286] 
[   38.987718] Allocated by task 253:
[   38.988362]  kasan_save_stack+0x3c/0x68
[   38.989062]  kasan_save_track+0x20/0x40
[   38.989688]  kasan_save_alloc_info+0x40/0x58
[   38.990405]  __kasan_kmalloc+0xd4/0xd8
[   38.990960]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.991504]  kasan_atomics+0xb8/0x2e8
[   38.992078]  kunit_try_run_case+0x14c/0x3d0
[   38.992862]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.993545]  kthread+0x24c/0x2d0
[   38.994095]  ret_from_fork+0x10/0x20
[   38.994922] 
[   38.995286] The buggy address belongs to the object at fff00000c6767080
[   38.995286]  which belongs to the cache kmalloc-64 of size 64
[   38.996849] The buggy address is located 0 bytes to the right of
[   38.996849]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   38.998433] 
[   38.998720] The buggy address belongs to the physical page:
[   38.999407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   39.000506] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.001609] page_type: f5(slab)
[   39.002112] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   39.003217] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   39.004299] page dumped because: kasan: bad access detected
[   39.004951] 
[   39.005270] Memory state around the buggy address:
[   39.005915]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.006663]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   39.007850] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   39.008742]                                      ^
[   39.009505]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.010365]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   39.011337] ==================================================================
[   38.809186] ==================================================================
[   38.810011] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   38.810843] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   38.811938] 
[   38.812293] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   38.813470] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.814080] Hardware name: linux,dummy-virt (DT)
[   38.814841] Call trace:
[   38.815218]  show_stack+0x20/0x38 (C)
[   38.815873]  dump_stack_lvl+0x8c/0xd0
[   38.816423]  print_report+0x118/0x5e0
[   38.817086]  kasan_report+0xc8/0x118
[   38.817721]  kasan_check_range+0x100/0x1a8
[   38.818481]  __kasan_check_write+0x20/0x30
[   38.819043]  kasan_atomics_helper+0x16d0/0x4858
[   38.819827]  kasan_atomics+0x198/0x2e8
[   38.820547]  kunit_try_run_case+0x14c/0x3d0
[   38.821226]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.822013]  kthread+0x24c/0x2d0
[   38.822733]  ret_from_fork+0x10/0x20
[   38.823249] 
[   38.823591] Allocated by task 253:
[   38.824200]  kasan_save_stack+0x3c/0x68
[   38.824772]  kasan_save_track+0x20/0x40
[   38.825395]  kasan_save_alloc_info+0x40/0x58
[   38.826072]  __kasan_kmalloc+0xd4/0xd8
[   38.826647]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.827320]  kasan_atomics+0xb8/0x2e8
[   38.827854]  kunit_try_run_case+0x14c/0x3d0
[   38.828458]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.829339]  kthread+0x24c/0x2d0
[   38.829887]  ret_from_fork+0x10/0x20
[   38.830416] 
[   38.830778] The buggy address belongs to the object at fff00000c6767080
[   38.830778]  which belongs to the cache kmalloc-64 of size 64
[   38.832082] The buggy address is located 0 bytes to the right of
[   38.832082]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   38.833532] 
[   38.833865] The buggy address belongs to the physical page:
[   38.834640] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   38.835584] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.836538] page_type: f5(slab)
[   38.837127] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.838025] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.839090] page dumped because: kasan: bad access detected
[   38.839913] 
[   38.840260] Memory state around the buggy address:
[   38.840919]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.841836]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.842822] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.843671]                                      ^
[   38.844284]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.845229]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.846086] ==================================================================
[   38.650766] ==================================================================
[   38.651557] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   38.652384] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   38.653204] 
[   38.653718] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   38.654979] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.655538] Hardware name: linux,dummy-virt (DT)
[   38.656247] Call trace:
[   38.656655]  show_stack+0x20/0x38 (C)
[   38.657339]  dump_stack_lvl+0x8c/0xd0
[   38.658036]  print_report+0x118/0x5e0
[   38.658560]  kasan_report+0xc8/0x118
[   38.659214]  kasan_check_range+0x100/0x1a8
[   38.659925]  __kasan_check_write+0x20/0x30
[   38.660579]  kasan_atomics_helper+0x15b4/0x4858
[   38.661266]  kasan_atomics+0x198/0x2e8
[   38.661827]  kunit_try_run_case+0x14c/0x3d0
[   38.662416]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.663256]  kthread+0x24c/0x2d0
[   38.663876]  ret_from_fork+0x10/0x20
[   38.664564] 
[   38.664886] Allocated by task 253:
[   38.665467]  kasan_save_stack+0x3c/0x68
[   38.666145]  kasan_save_track+0x20/0x40
[   38.666836]  kasan_save_alloc_info+0x40/0x58
[   38.667451]  __kasan_kmalloc+0xd4/0xd8
[   38.668066]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.668895]  kasan_atomics+0xb8/0x2e8
[   38.669400]  kunit_try_run_case+0x14c/0x3d0
[   38.670106]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.670725]  kthread+0x24c/0x2d0
[   38.671322]  ret_from_fork+0x10/0x20
[   38.671928] 
[   38.672246] The buggy address belongs to the object at fff00000c6767080
[   38.672246]  which belongs to the cache kmalloc-64 of size 64
[   38.673569] The buggy address is located 0 bytes to the right of
[   38.673569]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   38.675111] 
[   38.675419] The buggy address belongs to the physical page:
[   38.676270] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   38.677256] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.678090] page_type: f5(slab)
[   38.678581] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.679524] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.680499] page dumped because: kasan: bad access detected
[   38.681248] 
[   38.681590] Memory state around the buggy address:
[   38.682245]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.683215]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.684152] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.685040]                                      ^
[   38.685764]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.686699]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.687547] ==================================================================
[   38.043549] ==================================================================
[   38.044297] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   38.045607] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   38.046848] 
[   38.047373] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   38.048565] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.049240] Hardware name: linux,dummy-virt (DT)
[   38.050092] Call trace:
[   38.050438]  show_stack+0x20/0x38 (C)
[   38.051201]  dump_stack_lvl+0x8c/0xd0
[   38.051917]  print_report+0x118/0x5e0
[   38.052445]  kasan_report+0xc8/0x118
[   38.053084]  kasan_check_range+0x100/0x1a8
[   38.053834]  __kasan_check_write+0x20/0x30
[   38.054588]  kasan_atomics_helper+0xf88/0x4858
[   38.055364]  kasan_atomics+0x198/0x2e8
[   38.056001]  kunit_try_run_case+0x14c/0x3d0
[   38.056580]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.057428]  kthread+0x24c/0x2d0
[   38.058168]  ret_from_fork+0x10/0x20
[   38.058849] 
[   38.059260] Allocated by task 253:
[   38.059941]  kasan_save_stack+0x3c/0x68
[   38.060560]  kasan_save_track+0x20/0x40
[   38.061278]  kasan_save_alloc_info+0x40/0x58
[   38.062027]  __kasan_kmalloc+0xd4/0xd8
[   38.062691]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.063417]  kasan_atomics+0xb8/0x2e8
[   38.064023]  kunit_try_run_case+0x14c/0x3d0
[   38.064723]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.065460]  kthread+0x24c/0x2d0
[   38.066050]  ret_from_fork+0x10/0x20
[   38.066762] 
[   38.067157] The buggy address belongs to the object at fff00000c6767080
[   38.067157]  which belongs to the cache kmalloc-64 of size 64
[   38.068768] The buggy address is located 0 bytes to the right of
[   38.068768]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   38.070417] 
[   38.070853] The buggy address belongs to the physical page:
[   38.071586] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   38.072695] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.073555] page_type: f5(slab)
[   38.074156] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.075207] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.076183] page dumped because: kasan: bad access detected
[   38.076971] 
[   38.077382] Memory state around the buggy address:
[   38.078162]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.079165]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.080187] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.081079]                                      ^
[   38.081773]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.082783]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.083712] ==================================================================
[   38.449350] ==================================================================
[   38.450575] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   38.451562] Read of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   38.452507] 
[   38.452890] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   38.454404] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.455122] Hardware name: linux,dummy-virt (DT)
[   38.455926] Call trace:
[   38.456358]  show_stack+0x20/0x38 (C)
[   38.457097]  dump_stack_lvl+0x8c/0xd0
[   38.457835]  print_report+0x118/0x5e0
[   38.458494]  kasan_report+0xc8/0x118
[   38.459151]  __asan_report_load8_noabort+0x20/0x30
[   38.459912]  kasan_atomics_helper+0x3f04/0x4858
[   38.460602]  kasan_atomics+0x198/0x2e8
[   38.461221]  kunit_try_run_case+0x14c/0x3d0
[   38.461979]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.462834]  kthread+0x24c/0x2d0
[   38.463457]  ret_from_fork+0x10/0x20
[   38.464087] 
[   38.464499] Allocated by task 253:
[   38.465086]  kasan_save_stack+0x3c/0x68
[   38.465830]  kasan_save_track+0x20/0x40
[   38.466528]  kasan_save_alloc_info+0x40/0x58
[   38.467257]  __kasan_kmalloc+0xd4/0xd8
[   38.467965]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.468707]  kasan_atomics+0xb8/0x2e8
[   38.469322]  kunit_try_run_case+0x14c/0x3d0
[   38.470019]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.470820]  kthread+0x24c/0x2d0
[   38.471509]  ret_from_fork+0x10/0x20
[   38.472167] 
[   38.472544] The buggy address belongs to the object at fff00000c6767080
[   38.472544]  which belongs to the cache kmalloc-64 of size 64
[   38.474110] The buggy address is located 0 bytes to the right of
[   38.474110]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   38.475675] 
[   38.476064] The buggy address belongs to the physical page:
[   38.476687] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   38.477949] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.478860] page_type: f5(slab)
[   38.479459] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.480522] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.481493] page dumped because: kasan: bad access detected
[   38.482320] 
[   38.482693] Memory state around the buggy address:
[   38.483495]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.484491]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.485462] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.486394]                                      ^
[   38.487174]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.488106]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.489018] ==================================================================
[   38.572332] ==================================================================
[   38.573080] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   38.573509] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253
[   38.574166] 
[   38.574644] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   38.575904] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.576690] Hardware name: linux,dummy-virt (DT)
[   38.577328] Call trace:
[   38.577710]  show_stack+0x20/0x38 (C)
[   38.578451]  dump_stack_lvl+0x8c/0xd0
[   38.579000]  print_report+0x118/0x5e0
[   38.579798]  kasan_report+0xc8/0x118
[   38.580390]  kasan_check_range+0x100/0x1a8
[   38.581254]  __kasan_check_write+0x20/0x30
[   38.581875]  kasan_atomics_helper+0x14e4/0x4858
[   38.582745]  kasan_atomics+0x198/0x2e8
[   38.583360]  kunit_try_run_case+0x14c/0x3d0
[   38.583936]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.584834]  kthread+0x24c/0x2d0
[   38.585383]  ret_from_fork+0x10/0x20
[   38.586054] 
[   38.586427] Allocated by task 253:
[   38.586933]  kasan_save_stack+0x3c/0x68
[   38.587595]  kasan_save_track+0x20/0x40
[   38.588216]  kasan_save_alloc_info+0x40/0x58
[   38.588847]  __kasan_kmalloc+0xd4/0xd8
[   38.589410]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.590104]  kasan_atomics+0xb8/0x2e8
[   38.590682]  kunit_try_run_case+0x14c/0x3d0
[   38.591348]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.592237]  kthread+0x24c/0x2d0
[   38.592876]  ret_from_fork+0x10/0x20
[   38.593390] 
[   38.593809] The buggy address belongs to the object at fff00000c6767080
[   38.593809]  which belongs to the cache kmalloc-64 of size 64
[   38.595126] The buggy address is located 0 bytes to the right of
[   38.595126]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   38.596488] 
[   38.596827] The buggy address belongs to the physical page:
[   38.597439] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   38.598471] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.599369] page_type: f5(slab)
[   38.600110] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   38.601015] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   38.601973] page dumped because: kasan: bad access detected
[   38.602572] 
[   38.602977] Memory state around the buggy address:
[   38.603678]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.604515]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   38.605445] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   38.606418]                                      ^
[   38.607029]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.607998]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.608871] ==================================================================
[   37.520103] ==================================================================
[   37.520963] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   37.522106] Read of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   37.523050] 
[   37.523422] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   37.525150] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.525875] Hardware name: linux,dummy-virt (DT)
[   37.526472] Call trace:
[   37.527182]  show_stack+0x20/0x38 (C)
[   37.527803]  dump_stack_lvl+0x8c/0xd0
[   37.528616]  print_report+0x118/0x5e0
[   37.529110]  kasan_report+0xc8/0x118
[   37.529610]  __asan_report_load4_noabort+0x20/0x30
[   37.530512]  kasan_atomics_helper+0x3dbc/0x4858
[   37.531077]  kasan_atomics+0x198/0x2e8
[   37.532005]  kunit_try_run_case+0x14c/0x3d0
[   37.532815]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.533691]  kthread+0x24c/0x2d0
[   37.534229]  ret_from_fork+0x10/0x20
[   37.534896] 
[   37.535254] Allocated by task 253:
[   37.535841]  kasan_save_stack+0x3c/0x68
[   37.536463]  kasan_save_track+0x20/0x40
[   37.537111]  kasan_save_alloc_info+0x40/0x58
[   37.537776]  __kasan_kmalloc+0xd4/0xd8
[   37.538403]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.539058]  kasan_atomics+0xb8/0x2e8
[   37.539669]  kunit_try_run_case+0x14c/0x3d0
[   37.540326]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.541031]  kthread+0x24c/0x2d0
[   37.541604]  ret_from_fork+0x10/0x20
[   37.542149] 
[   37.542507] The buggy address belongs to the object at fff00000c6767080
[   37.542507]  which belongs to the cache kmalloc-64 of size 64
[   37.544072] The buggy address is located 0 bytes to the right of
[   37.544072]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   37.545689] 
[   37.546005] The buggy address belongs to the physical page:
[   37.546721] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   37.547683] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.548570] page_type: f5(slab)
[   37.549166] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.550170] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.551057] page dumped because: kasan: bad access detected
[   37.551726] 
[   37.552094] Memory state around the buggy address:
[   37.552823]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.553554]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.554471] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.555350]                                      ^
[   37.556046]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.557031]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.557926] ==================================================================
[   36.612316] ==================================================================
[   36.613094] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   36.614953] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   36.616471] 
[   36.617125] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   36.618570] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.619420] Hardware name: linux,dummy-virt (DT)
[   36.620187] Call trace:
[   36.620591]  show_stack+0x20/0x38 (C)
[   36.621198]  dump_stack_lvl+0x8c/0xd0
[   36.622313]  print_report+0x118/0x5e0
[   36.622863]  kasan_report+0xc8/0x118
[   36.623257]  __asan_report_store4_noabort+0x20/0x30
[   36.623934]  kasan_atomics_helper+0x3f94/0x4858
[   36.624577]  kasan_atomics+0x198/0x2e8
[   36.625107]  kunit_try_run_case+0x14c/0x3d0
[   36.625665]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.626504]  kthread+0x24c/0x2d0
[   36.627291]  ret_from_fork+0x10/0x20
[   36.628056] 
[   36.628461] Allocated by task 253:
[   36.628976]  kasan_save_stack+0x3c/0x68
[   36.629713]  kasan_save_track+0x20/0x40
[   36.630538]  kasan_save_alloc_info+0x40/0x58
[   36.631576]  __kasan_kmalloc+0xd4/0xd8
[   36.632543]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.633315]  kasan_atomics+0xb8/0x2e8
[   36.633944]  kunit_try_run_case+0x14c/0x3d0
[   36.634768]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.635888]  kthread+0x24c/0x2d0
[   36.636288]  ret_from_fork+0x10/0x20
[   36.636759] 
[   36.637351] The buggy address belongs to the object at fff00000c6767080
[   36.637351]  which belongs to the cache kmalloc-64 of size 64
[   36.639855] The buggy address is located 0 bytes to the right of
[   36.639855]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   36.641355] 
[   36.642158] The buggy address belongs to the physical page:
[   36.642950] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   36.643881] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.644851] page_type: f5(slab)
[   36.645334] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.646971] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.647744] page dumped because: kasan: bad access detected
[   36.648942] 
[   36.649252] Memory state around the buggy address:
[   36.650493]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.651552]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.652522] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.653560]                                      ^
[   36.654563]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.656036]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.656991] ==================================================================
[   37.725066] ==================================================================
[   37.725743] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   37.726799] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253
[   37.728042] 
[   37.728494] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   37.729741] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.731092] Hardware name: linux,dummy-virt (DT)
[   37.731659] Call trace:
[   37.732116]  show_stack+0x20/0x38 (C)
[   37.733403]  dump_stack_lvl+0x8c/0xd0
[   37.734165]  print_report+0x118/0x5e0
[   37.734832]  kasan_report+0xc8/0x118
[   37.735517]  kasan_check_range+0x100/0x1a8
[   37.736152]  __kasan_check_write+0x20/0x30
[   37.737012]  kasan_atomics_helper+0xd3c/0x4858
[   37.737688]  kasan_atomics+0x198/0x2e8
[   37.738290]  kunit_try_run_case+0x14c/0x3d0
[   37.738670]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.739440]  kthread+0x24c/0x2d0
[   37.740151]  ret_from_fork+0x10/0x20
[   37.740854] 
[   37.741219] Allocated by task 253:
[   37.741792]  kasan_save_stack+0x3c/0x68
[   37.742389]  kasan_save_track+0x20/0x40
[   37.743122]  kasan_save_alloc_info+0x40/0x58
[   37.743659]  __kasan_kmalloc+0xd4/0xd8
[   37.744317]  __kmalloc_cache_noprof+0x15c/0x3c0
[   37.745000]  kasan_atomics+0xb8/0x2e8
[   37.745650]  kunit_try_run_case+0x14c/0x3d0
[   37.746248]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.747196]  kthread+0x24c/0x2d0
[   37.747648]  ret_from_fork+0x10/0x20
[   37.748327] 
[   37.748683] The buggy address belongs to the object at fff00000c6767080
[   37.748683]  which belongs to the cache kmalloc-64 of size 64
[   37.750107] The buggy address is located 0 bytes to the right of
[   37.750107]  allocated 48-byte region [fff00000c6767080, fff00000c67670b0)
[   37.751526] 
[   37.751855] The buggy address belongs to the physical page:
[   37.752439] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767
[   37.753546] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.754329] page_type: f5(slab)
[   37.755004] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.755955] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.756952] page dumped because: kasan: bad access detected
[   37.757648] 
[   37.757996] Memory state around the buggy address:
[   37.758696]  fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.759601]  fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.760409] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.761404]                                      ^
[   37.761950]  fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.762895]  fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.763826] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   35.978257] ==================================================================
[   35.979314] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[   35.980359] Write of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249
[   35.981067] 
[   35.981504] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   35.983044] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.983768] Hardware name: linux,dummy-virt (DT)
[   35.984459] Call trace:
[   35.984985]  show_stack+0x20/0x38 (C)
[   35.985707]  dump_stack_lvl+0x8c/0xd0
[   35.986521]  print_report+0x118/0x5e0
[   35.987142]  kasan_report+0xc8/0x118
[   35.987793]  kasan_check_range+0x100/0x1a8
[   35.988477]  __kasan_check_write+0x20/0x30
[   35.989173]  kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[   35.990063]  kasan_bitops_generic+0x11c/0x1c8
[   35.990788]  kunit_try_run_case+0x14c/0x3d0
[   35.991532]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.992372]  kthread+0x24c/0x2d0
[   35.992967]  ret_from_fork+0x10/0x20
[   35.993716] 
[   35.994063] Allocated by task 249:
[   35.994716]  kasan_save_stack+0x3c/0x68
[   35.995430]  kasan_save_track+0x20/0x40
[   35.996092]  kasan_save_alloc_info+0x40/0x58
[   35.996824]  __kasan_kmalloc+0xd4/0xd8
[   35.997449]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.998080]  kasan_bitops_generic+0xa0/0x1c8
[   35.998820]  kunit_try_run_case+0x14c/0x3d0
[   35.999554]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.000350]  kthread+0x24c/0x2d0
[   36.000980]  ret_from_fork+0x10/0x20
[   36.001684] 
[   36.002036] The buggy address belongs to the object at fff00000c6153d80
[   36.002036]  which belongs to the cache kmalloc-16 of size 16
[   36.003655] The buggy address is located 8 bytes inside of
[   36.003655]  allocated 9-byte region [fff00000c6153d80, fff00000c6153d89)
[   36.005185] 
[   36.005650] The buggy address belongs to the physical page:
[   36.006359] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153
[   36.007527] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.008555] page_type: f5(slab)
[   36.009145] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   36.010172] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   36.011261] page dumped because: kasan: bad access detected
[   36.012001] 
[   36.012347] Memory state around the buggy address:
[   36.013324]  fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   36.014311]  fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   36.015297] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.016361]                       ^
[   36.016980]  fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.017974]  fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.018899] ==================================================================
[   36.183371] ==================================================================
[   36.184262] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8
[   36.185226] Read of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249
[   36.186244] 
[   36.186709] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   36.187881] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.188532] Hardware name: linux,dummy-virt (DT)
[   36.189232] Call trace:
[   36.189648]  show_stack+0x20/0x38 (C)
[   36.190228]  dump_stack_lvl+0x8c/0xd0
[   36.190893]  print_report+0x118/0x5e0
[   36.191413]  kasan_report+0xc8/0x118
[   36.192140]  __asan_report_load8_noabort+0x20/0x30
[   36.192814]  kasan_bitops_test_and_modify.constprop.0+0xa44/0xbc8
[   36.193683]  kasan_bitops_generic+0x11c/0x1c8
[   36.194278]  kunit_try_run_case+0x14c/0x3d0
[   36.195051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.195819]  kthread+0x24c/0x2d0
[   36.196450]  ret_from_fork+0x10/0x20
[   36.197063] 
[   36.197400] Allocated by task 249:
[   36.197922]  kasan_save_stack+0x3c/0x68
[   36.198458]  kasan_save_track+0x20/0x40
[   36.199167]  kasan_save_alloc_info+0x40/0x58
[   36.199802]  __kasan_kmalloc+0xd4/0xd8
[   36.200341]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.201111]  kasan_bitops_generic+0xa0/0x1c8
[   36.201744]  kunit_try_run_case+0x14c/0x3d0
[   36.202347]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.203092]  kthread+0x24c/0x2d0
[   36.203609]  ret_from_fork+0x10/0x20
[   36.204137] 
[   36.204468] The buggy address belongs to the object at fff00000c6153d80
[   36.204468]  which belongs to the cache kmalloc-16 of size 16
[   36.205914] The buggy address is located 8 bytes inside of
[   36.205914]  allocated 9-byte region [fff00000c6153d80, fff00000c6153d89)
[   36.207381] 
[   36.207803] The buggy address belongs to the physical page:
[   36.208500] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153
[   36.209457] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.210338] page_type: f5(slab)
[   36.210877] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   36.211814] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   36.212731] page dumped because: kasan: bad access detected
[   36.213455] 
[   36.213844] Memory state around the buggy address:
[   36.214566]  fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   36.215400]  fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   36.216293] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.217169]                       ^
[   36.217670]  fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.218662]  fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.219572] ==================================================================
[   36.222155] ==================================================================
[   36.223482] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8
[   36.224206] Read of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249
[   36.224867] 
[   36.225143] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   36.226695] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.227700] Hardware name: linux,dummy-virt (DT)
[   36.228450] Call trace:
[   36.228958]  show_stack+0x20/0x38 (C)
[   36.229719]  dump_stack_lvl+0x8c/0xd0
[   36.230441]  print_report+0x118/0x5e0
[   36.231050]  kasan_report+0xc8/0x118
[   36.231585]  __asan_report_load8_noabort+0x20/0x30
[   36.232234]  kasan_bitops_test_and_modify.constprop.0+0xa8c/0xbc8
[   36.233342]  kasan_bitops_generic+0x11c/0x1c8
[   36.234128]  kunit_try_run_case+0x14c/0x3d0
[   36.234819]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.235585]  kthread+0x24c/0x2d0
[   36.236442]  ret_from_fork+0x10/0x20
[   36.237120] 
[   36.237333] Allocated by task 249:
[   36.237597]  kasan_save_stack+0x3c/0x68
[   36.238197]  kasan_save_track+0x20/0x40
[   36.238931]  kasan_save_alloc_info+0x40/0x58
[   36.239831]  __kasan_kmalloc+0xd4/0xd8
[   36.240447]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.241240]  kasan_bitops_generic+0xa0/0x1c8
[   36.241929]  kunit_try_run_case+0x14c/0x3d0
[   36.242642]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.243436]  kthread+0x24c/0x2d0
[   36.244016]  ret_from_fork+0x10/0x20
[   36.244659] 
[   36.245015] The buggy address belongs to the object at fff00000c6153d80
[   36.245015]  which belongs to the cache kmalloc-16 of size 16
[   36.246650] The buggy address is located 8 bytes inside of
[   36.246650]  allocated 9-byte region [fff00000c6153d80, fff00000c6153d89)
[   36.248221] 
[   36.248713] The buggy address belongs to the physical page:
[   36.249405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153
[   36.250561] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.251467] page_type: f5(slab)
[   36.251984] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   36.253053] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   36.254115] page dumped because: kasan: bad access detected
[   36.255004] 
[   36.255520] Memory state around the buggy address:
[   36.256121]  fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   36.257094]  fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   36.257865] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.258922]                       ^
[   36.259417]  fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.260249]  fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.261219] ==================================================================
[   35.888022] ==================================================================
[   35.889188] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[   35.891645] Write of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249
[   35.893231] 
[   35.893552] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   35.895823] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.897361] Hardware name: linux,dummy-virt (DT)
[   35.898285] Call trace:
[   35.898870]  show_stack+0x20/0x38 (C)
[   35.899496]  dump_stack_lvl+0x8c/0xd0
[   35.900091]  print_report+0x118/0x5e0
[   35.900675]  kasan_report+0xc8/0x118
[   35.901367]  kasan_check_range+0x100/0x1a8
[   35.902082]  __kasan_check_write+0x20/0x30
[   35.902415]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[   35.903135]  kasan_bitops_generic+0x11c/0x1c8
[   35.904185]  kunit_try_run_case+0x14c/0x3d0
[   35.905062]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.906027]  kthread+0x24c/0x2d0
[   35.906718]  ret_from_fork+0x10/0x20
[   35.907347] 
[   35.907731] Allocated by task 249:
[   35.908323]  kasan_save_stack+0x3c/0x68
[   35.909018]  kasan_save_track+0x20/0x40
[   35.909728]  kasan_save_alloc_info+0x40/0x58
[   35.910409]  __kasan_kmalloc+0xd4/0xd8
[   35.911060]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.911789]  kasan_bitops_generic+0xa0/0x1c8
[   35.912454]  kunit_try_run_case+0x14c/0x3d0
[   35.913094]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.913965]  kthread+0x24c/0x2d0
[   35.914545]  ret_from_fork+0x10/0x20
[   35.915173] 
[   35.915658] The buggy address belongs to the object at fff00000c6153d80
[   35.915658]  which belongs to the cache kmalloc-16 of size 16
[   35.917200] The buggy address is located 8 bytes inside of
[   35.917200]  allocated 9-byte region [fff00000c6153d80, fff00000c6153d89)
[   35.918672] 
[   35.919067] The buggy address belongs to the physical page:
[   35.919824] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153
[   35.920907] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.921919] page_type: f5(slab)
[   35.922519] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.923508] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   35.924473] page dumped because: kasan: bad access detected
[   35.924985] 
[   35.925242] Memory state around the buggy address:
[   35.925922]  fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   35.926890]  fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.928018] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.929105]                       ^
[   35.929743]  fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.930740]  fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.931793] ==================================================================
[   36.021213] ==================================================================
[   36.022175] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8
[   36.023360] Read of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249
[   36.024218] 
[   36.024791] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   36.026147] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.026929] Hardware name: linux,dummy-virt (DT)
[   36.027655] Call trace:
[   36.028118]  show_stack+0x20/0x38 (C)
[   36.028824]  dump_stack_lvl+0x8c/0xd0
[   36.029537]  print_report+0x118/0x5e0
[   36.030207]  kasan_report+0xc8/0x118
[   36.030858]  __asan_report_load8_noabort+0x20/0x30
[   36.031605]  kasan_bitops_test_and_modify.constprop.0+0xa50/0xbc8
[   36.032461]  kasan_bitops_generic+0x11c/0x1c8
[   36.033155]  kunit_try_run_case+0x14c/0x3d0
[   36.033858]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.034698]  kthread+0x24c/0x2d0
[   36.035327]  ret_from_fork+0x10/0x20
[   36.035980] 
[   36.036364] Allocated by task 249:
[   36.037022]  kasan_save_stack+0x3c/0x68
[   36.037679]  kasan_save_track+0x20/0x40
[   36.038441]  kasan_save_alloc_info+0x40/0x58
[   36.039355]  __kasan_kmalloc+0xd4/0xd8
[   36.040041]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.040722]  kasan_bitops_generic+0xa0/0x1c8
[   36.041456]  kunit_try_run_case+0x14c/0x3d0
[   36.042230]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.043162]  kthread+0x24c/0x2d0
[   36.043830]  ret_from_fork+0x10/0x20
[   36.044413] 
[   36.044823] The buggy address belongs to the object at fff00000c6153d80
[   36.044823]  which belongs to the cache kmalloc-16 of size 16
[   36.046401] The buggy address is located 8 bytes inside of
[   36.046401]  allocated 9-byte region [fff00000c6153d80, fff00000c6153d89)
[   36.047991] 
[   36.048458] The buggy address belongs to the physical page:
[   36.049324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153
[   36.050387] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.051211] page_type: f5(slab)
[   36.051692] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   36.052872] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   36.053829] page dumped because: kasan: bad access detected
[   36.054589] 
[   36.055023] Memory state around the buggy address:
[   36.055704]  fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   36.056794]  fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   36.057762] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.058693]                       ^
[   36.059387]  fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.060342]  fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.061261] ==================================================================
[   36.063457] ==================================================================
[   36.064359] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[   36.065380] Write of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249
[   36.066382] 
[   36.066958] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   36.068363] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.068999] Hardware name: linux,dummy-virt (DT)
[   36.069767] Call trace:
[   36.070317]  show_stack+0x20/0x38 (C)
[   36.070952]  dump_stack_lvl+0x8c/0xd0
[   36.071706]  print_report+0x118/0x5e0
[   36.072299]  kasan_report+0xc8/0x118
[   36.072882]  kasan_check_range+0x100/0x1a8
[   36.073476]  __kasan_check_write+0x20/0x30
[   36.074131]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[   36.075226]  kasan_bitops_generic+0x11c/0x1c8
[   36.075589]  kunit_try_run_case+0x14c/0x3d0
[   36.076060]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.076951]  kthread+0x24c/0x2d0
[   36.077560]  ret_from_fork+0x10/0x20
[   36.078346] 
[   36.078718] Allocated by task 249:
[   36.079563]  kasan_save_stack+0x3c/0x68
[   36.080235]  kasan_save_track+0x20/0x40
[   36.080763]  kasan_save_alloc_info+0x40/0x58
[   36.081383]  __kasan_kmalloc+0xd4/0xd8
[   36.081887]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.082750]  kasan_bitops_generic+0xa0/0x1c8
[   36.083344]  kunit_try_run_case+0x14c/0x3d0
[   36.084031]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.084744]  kthread+0x24c/0x2d0
[   36.085314]  ret_from_fork+0x10/0x20
[   36.085878] 
[   36.086295] The buggy address belongs to the object at fff00000c6153d80
[   36.086295]  which belongs to the cache kmalloc-16 of size 16
[   36.087708] The buggy address is located 8 bytes inside of
[   36.087708]  allocated 9-byte region [fff00000c6153d80, fff00000c6153d89)
[   36.089130] 
[   36.089495] The buggy address belongs to the physical page:
[   36.090375] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153
[   36.091274] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.092260] page_type: f5(slab)
[   36.092759] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   36.093780] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   36.094720] page dumped because: kasan: bad access detected
[   36.095357] 
[   36.095751] Memory state around the buggy address:
[   36.096269]  fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   36.097256]  fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   36.098045] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.099002]                       ^
[   36.099520]  fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.100377]  fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.101227] ==================================================================
[   35.934036] ==================================================================
[   35.934947] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8
[   35.936527] Read of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249
[   35.937483] 
[   35.938008] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   35.939279] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.940038] Hardware name: linux,dummy-virt (DT)
[   35.940742] Call trace:
[   35.941193]  show_stack+0x20/0x38 (C)
[   35.941923]  dump_stack_lvl+0x8c/0xd0
[   35.942564]  print_report+0x118/0x5e0
[   35.943258]  kasan_report+0xc8/0x118
[   35.943977]  __asan_report_load8_noabort+0x20/0x30
[   35.944731]  kasan_bitops_test_and_modify.constprop.0+0xa08/0xbc8
[   35.945655]  kasan_bitops_generic+0x11c/0x1c8
[   35.946350]  kunit_try_run_case+0x14c/0x3d0
[   35.947211]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.948025]  kthread+0x24c/0x2d0
[   35.948655]  ret_from_fork+0x10/0x20
[   35.949306] 
[   35.949678] Allocated by task 249:
[   35.950409]  kasan_save_stack+0x3c/0x68
[   35.951102]  kasan_save_track+0x20/0x40
[   35.951837]  kasan_save_alloc_info+0x40/0x58
[   35.952646]  __kasan_kmalloc+0xd4/0xd8
[   35.953290]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.954131]  kasan_bitops_generic+0xa0/0x1c8
[   35.954895]  kunit_try_run_case+0x14c/0x3d0
[   35.955568]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.956378]  kthread+0x24c/0x2d0
[   35.956981]  ret_from_fork+0x10/0x20
[   35.957616] 
[   35.958052] The buggy address belongs to the object at fff00000c6153d80
[   35.958052]  which belongs to the cache kmalloc-16 of size 16
[   35.959619] The buggy address is located 8 bytes inside of
[   35.959619]  allocated 9-byte region [fff00000c6153d80, fff00000c6153d89)
[   35.961116] 
[   35.961555] The buggy address belongs to the physical page:
[   35.962356] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153
[   35.963474] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.964430] page_type: f5(slab)
[   35.965011] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.966101] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   35.967136] page dumped because: kasan: bad access detected
[   35.967923] 
[   35.968388] Memory state around the buggy address:
[   35.969125]  fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   35.970186]  fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.971313] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.972253]                       ^
[   35.972867]  fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.973819]  fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.974821] ==================================================================
[   36.143036] ==================================================================
[   36.143787] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[   36.145386] Write of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249
[   36.146426] 
[   36.146885] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   36.148220] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.148825] Hardware name: linux,dummy-virt (DT)
[   36.149579] Call trace:
[   36.149958]  show_stack+0x20/0x38 (C)
[   36.150694]  dump_stack_lvl+0x8c/0xd0
[   36.151387]  print_report+0x118/0x5e0
[   36.152012]  kasan_report+0xc8/0x118
[   36.152613]  kasan_check_range+0x100/0x1a8
[   36.153189]  __kasan_check_write+0x20/0x30
[   36.153929]  kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[   36.154790]  kasan_bitops_generic+0x11c/0x1c8
[   36.155446]  kunit_try_run_case+0x14c/0x3d0
[   36.156141]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.156941]  kthread+0x24c/0x2d0
[   36.157590]  ret_from_fork+0x10/0x20
[   36.158194] 
[   36.158524] Allocated by task 249:
[   36.159021]  kasan_save_stack+0x3c/0x68
[   36.159737]  kasan_save_track+0x20/0x40
[   36.160233]  kasan_save_alloc_info+0x40/0x58
[   36.160951]  __kasan_kmalloc+0xd4/0xd8
[   36.161459]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.162215]  kasan_bitops_generic+0xa0/0x1c8
[   36.162829]  kunit_try_run_case+0x14c/0x3d0
[   36.163436]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.164329]  kthread+0x24c/0x2d0
[   36.164914]  ret_from_fork+0x10/0x20
[   36.165466] 
[   36.165843] The buggy address belongs to the object at fff00000c6153d80
[   36.165843]  which belongs to the cache kmalloc-16 of size 16
[   36.167184] The buggy address is located 8 bytes inside of
[   36.167184]  allocated 9-byte region [fff00000c6153d80, fff00000c6153d89)
[   36.168733] 
[   36.169047] The buggy address belongs to the physical page:
[   36.170007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153
[   36.170973] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.171867] page_type: f5(slab)
[   36.172338] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   36.173401] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   36.174329] page dumped because: kasan: bad access detected
[   36.175025] 
[   36.175424] Memory state around the buggy address:
[   36.176097]  fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   36.176999]  fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   36.177865] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.178681]                       ^
[   36.179264]  fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.180200]  fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.181189] ==================================================================
[   36.103274] ==================================================================
[   36.104008] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8
[   36.105602] Read of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249
[   36.106587] 
[   36.106936] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   36.108686] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.109202] Hardware name: linux,dummy-virt (DT)
[   36.110468] Call trace:
[   36.111084]  show_stack+0x20/0x38 (C)
[   36.111729]  dump_stack_lvl+0x8c/0xd0
[   36.112277]  print_report+0x118/0x5e0
[   36.112921]  kasan_report+0xc8/0x118
[   36.113405]  __asan_report_load8_noabort+0x20/0x30
[   36.114219]  kasan_bitops_test_and_modify.constprop.0+0xad4/0xbc8
[   36.115111]  kasan_bitops_generic+0x11c/0x1c8
[   36.115867]  kunit_try_run_case+0x14c/0x3d0
[   36.116414]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.117200]  kthread+0x24c/0x2d0
[   36.117853]  ret_from_fork+0x10/0x20
[   36.118528] 
[   36.118849] Allocated by task 249:
[   36.119455]  kasan_save_stack+0x3c/0x68
[   36.119966]  kasan_save_track+0x20/0x40
[   36.120659]  kasan_save_alloc_info+0x40/0x58
[   36.121295]  __kasan_kmalloc+0xd4/0xd8
[   36.121938]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.122712]  kasan_bitops_generic+0xa0/0x1c8
[   36.123359]  kunit_try_run_case+0x14c/0x3d0
[   36.123933]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.124744]  kthread+0x24c/0x2d0
[   36.125240]  ret_from_fork+0x10/0x20
[   36.125814] 
[   36.126222] The buggy address belongs to the object at fff00000c6153d80
[   36.126222]  which belongs to the cache kmalloc-16 of size 16
[   36.127683] The buggy address is located 8 bytes inside of
[   36.127683]  allocated 9-byte region [fff00000c6153d80, fff00000c6153d89)
[   36.129130] 
[   36.129461] The buggy address belongs to the physical page:
[   36.130127] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153
[   36.131130] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.132076] page_type: f5(slab)
[   36.132557] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   36.133521] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   36.134655] page dumped because: kasan: bad access detected
[   36.135390] 
[   36.135747] Memory state around the buggy address:
[   36.136429]  fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   36.137315]  fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   36.138134] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.139148]                       ^
[   36.139683]  fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.140593]  fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.141607] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[   35.620370] ==================================================================
[   35.621885] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[   35.623406] Write of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249
[   35.624196] 
[   35.624569] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   35.625879] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.626511] Hardware name: linux,dummy-virt (DT)
[   35.627834] Call trace:
[   35.628263]  show_stack+0x20/0x38 (C)
[   35.628759]  dump_stack_lvl+0x8c/0xd0
[   35.629270]  print_report+0x118/0x5e0
[   35.629819]  kasan_report+0xc8/0x118
[   35.631145]  kasan_check_range+0x100/0x1a8
[   35.631933]  __kasan_check_write+0x20/0x30
[   35.632613]  kasan_bitops_modify.constprop.0+0x2b4/0xbc8
[   35.633482]  kasan_bitops_generic+0x110/0x1c8
[   35.635134]  kunit_try_run_case+0x14c/0x3d0
[   35.635943]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.636902]  kthread+0x24c/0x2d0
[   35.637583]  ret_from_fork+0x10/0x20
[   35.638696] 
[   35.639037] Allocated by task 249:
[   35.639682]  kasan_save_stack+0x3c/0x68
[   35.640189]  kasan_save_track+0x20/0x40
[   35.640874]  kasan_save_alloc_info+0x40/0x58
[   35.641402]  __kasan_kmalloc+0xd4/0xd8
[   35.642990]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.643773]  kasan_bitops_generic+0xa0/0x1c8
[   35.644329]  kunit_try_run_case+0x14c/0x3d0
[   35.645044]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.645913]  kthread+0x24c/0x2d0
[   35.646717]  ret_from_fork+0x10/0x20
[   35.647395] 
[   35.647837] The buggy address belongs to the object at fff00000c6153d80
[   35.647837]  which belongs to the cache kmalloc-16 of size 16
[   35.649339] The buggy address is located 8 bytes inside of
[   35.649339]  allocated 9-byte region [fff00000c6153d80, fff00000c6153d89)
[   35.651739] 
[   35.652442] The buggy address belongs to the physical page:
[   35.653442] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153
[   35.654934] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.656036] page_type: f5(slab)
[   35.656879] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.658322] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   35.659575] page dumped because: kasan: bad access detected
[   35.660855] 
[   35.661184] Memory state around the buggy address:
[   35.662231]  fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   35.664300]  fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.665264] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.666526]                       ^
[   35.668325]  fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.669473]  fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.670653] ==================================================================
[   35.718215] ==================================================================
[   35.719056] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[   35.719908] Read of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249
[   35.720957] 
[   35.721340] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   35.723427] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.724070] Hardware name: linux,dummy-virt (DT)
[   35.725138] Call trace:
[   35.725459]  show_stack+0x20/0x38 (C)
[   35.726146]  dump_stack_lvl+0x8c/0xd0
[   35.727494]  print_report+0x118/0x5e0
[   35.728280]  kasan_report+0xc8/0x118
[   35.728872]  __asan_report_load8_noabort+0x20/0x30
[   35.729678]  kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[   35.730414]  kasan_bitops_generic+0x110/0x1c8
[   35.731055]  kunit_try_run_case+0x14c/0x3d0
[   35.732050]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.732701]  kthread+0x24c/0x2d0
[   35.733357]  ret_from_fork+0x10/0x20
[   35.734566] 
[   35.734946] Allocated by task 249:
[   35.735451]  kasan_save_stack+0x3c/0x68
[   35.736131]  kasan_save_track+0x20/0x40
[   35.737357]  kasan_save_alloc_info+0x40/0x58
[   35.738431]  __kasan_kmalloc+0xd4/0xd8
[   35.739234]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.740006]  kasan_bitops_generic+0xa0/0x1c8
[   35.740869]  kunit_try_run_case+0x14c/0x3d0
[   35.741579]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.742361]  kthread+0x24c/0x2d0
[   35.742933]  ret_from_fork+0x10/0x20
[   35.743504] 
[   35.744323] The buggy address belongs to the object at fff00000c6153d80
[   35.744323]  which belongs to the cache kmalloc-16 of size 16
[   35.745667] The buggy address is located 8 bytes inside of
[   35.745667]  allocated 9-byte region [fff00000c6153d80, fff00000c6153d89)
[   35.748256] 
[   35.748496] The buggy address belongs to the physical page:
[   35.749390] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153
[   35.750930] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.751809] page_type: f5(slab)
[   35.752362] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.753397] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   35.755208] page dumped because: kasan: bad access detected
[   35.756469] 
[   35.756792] Memory state around the buggy address:
[   35.757860]  fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   35.759135]  fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.759969] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.761230]                       ^
[   35.761738]  fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.763168]  fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.763608] ==================================================================
[   35.476872] ==================================================================
[   35.477826] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[   35.478958] Read of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249
[   35.481082] 
[   35.481895] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   35.483533] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.484084] Hardware name: linux,dummy-virt (DT)
[   35.484936] Call trace:
[   35.485321]  show_stack+0x20/0x38 (C)
[   35.486130]  dump_stack_lvl+0x8c/0xd0
[   35.486567]  print_report+0x118/0x5e0
[   35.487047]  kasan_report+0xc8/0x118
[   35.487526]  __asan_report_load8_noabort+0x20/0x30
[   35.488644]  kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[   35.489069]  kasan_bitops_generic+0x110/0x1c8
[   35.489394]  kunit_try_run_case+0x14c/0x3d0
[   35.489903]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.491768]  kthread+0x24c/0x2d0
[   35.492336]  ret_from_fork+0x10/0x20
[   35.493108] 
[   35.493616] Allocated by task 249:
[   35.494447]  kasan_save_stack+0x3c/0x68
[   35.494976]  kasan_save_track+0x20/0x40
[   35.495856]  kasan_save_alloc_info+0x40/0x58
[   35.496407]  __kasan_kmalloc+0xd4/0xd8
[   35.496998]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.498227]  kasan_bitops_generic+0xa0/0x1c8
[   35.499083]  kunit_try_run_case+0x14c/0x3d0
[   35.499706]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.500609]  kthread+0x24c/0x2d0
[   35.501170]  ret_from_fork+0x10/0x20
[   35.501744] 
[   35.502731] The buggy address belongs to the object at fff00000c6153d80
[   35.502731]  which belongs to the cache kmalloc-16 of size 16
[   35.504149] The buggy address is located 8 bytes inside of
[   35.504149]  allocated 9-byte region [fff00000c6153d80, fff00000c6153d89)
[   35.506139] 
[   35.506960] The buggy address belongs to the physical page:
[   35.507936] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153
[   35.508941] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.509839] page_type: f5(slab)
[   35.510319] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.511474] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   35.512787] page dumped because: kasan: bad access detected
[   35.513414] 
[   35.514069] Memory state around the buggy address:
[   35.515232]  fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   35.516160]  fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.516881] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.517713]                       ^
[   35.518214]  fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.519610]  fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.520876] ==================================================================
[   35.672874] ==================================================================
[   35.674232] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc8
[   35.675204] Write of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249
[   35.676156] 
[   35.676531] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   35.677787] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.678517] Hardware name: linux,dummy-virt (DT)
[   35.679260] Call trace:
[   35.679743]  show_stack+0x20/0x38 (C)
[   35.680268]  dump_stack_lvl+0x8c/0xd0
[   35.681049]  print_report+0x118/0x5e0
[   35.681757]  kasan_report+0xc8/0x118
[   35.682263]  kasan_check_range+0x100/0x1a8
[   35.683585]  __kasan_check_write+0x20/0x30
[   35.684108]  kasan_bitops_modify.constprop.0+0x320/0xbc8
[   35.684977]  kasan_bitops_generic+0x110/0x1c8
[   35.686403]  kunit_try_run_case+0x14c/0x3d0
[   35.687096]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.687797]  kthread+0x24c/0x2d0
[   35.688428]  ret_from_fork+0x10/0x20
[   35.689033] 
[   35.689408] Allocated by task 249:
[   35.690833]  kasan_save_stack+0x3c/0x68
[   35.691341]  kasan_save_track+0x20/0x40
[   35.692077]  kasan_save_alloc_info+0x40/0x58
[   35.692760]  __kasan_kmalloc+0xd4/0xd8
[   35.693292]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.694653]  kasan_bitops_generic+0xa0/0x1c8
[   35.695230]  kunit_try_run_case+0x14c/0x3d0
[   35.695890]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.696718]  kthread+0x24c/0x2d0
[   35.697197]  ret_from_fork+0x10/0x20
[   35.698167] 
[   35.698542] The buggy address belongs to the object at fff00000c6153d80
[   35.698542]  which belongs to the cache kmalloc-16 of size 16
[   35.699885] The buggy address is located 8 bytes inside of
[   35.699885]  allocated 9-byte region [fff00000c6153d80, fff00000c6153d89)
[   35.701754] 
[   35.702173] The buggy address belongs to the physical page:
[   35.702981] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153
[   35.704067] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.704935] page_type: f5(slab)
[   35.705663] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.707617] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   35.708272] page dumped because: kasan: bad access detected
[   35.708693] 
[   35.709328] Memory state around the buggy address:
[   35.710270]  fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   35.711105]  fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.711997] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.712930]                       ^
[   35.713667]  fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.714533]  fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.715764] ==================================================================
[   35.571011] ==================================================================
[   35.571945] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8
[   35.572832] Read of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249
[   35.573687] 
[   35.574044] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   35.575892] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.576655] Hardware name: linux,dummy-virt (DT)
[   35.577228] Call trace:
[   35.578103]  show_stack+0x20/0x38 (C)
[   35.578576]  dump_stack_lvl+0x8c/0xd0
[   35.579305]  print_report+0x118/0x5e0
[   35.580382]  kasan_report+0xc8/0x118
[   35.580973]  __asan_report_load8_noabort+0x20/0x30
[   35.581793]  kasan_bitops_modify.constprop.0+0xa88/0xbc8
[   35.582583]  kasan_bitops_generic+0x110/0x1c8
[   35.583258]  kunit_try_run_case+0x14c/0x3d0
[   35.584251]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.585077]  kthread+0x24c/0x2d0
[   35.585699]  ret_from_fork+0x10/0x20
[   35.586528] 
[   35.587645] Allocated by task 249:
[   35.588548]  kasan_save_stack+0x3c/0x68
[   35.589164]  kasan_save_track+0x20/0x40
[   35.589930]  kasan_save_alloc_info+0x40/0x58
[   35.590558]  __kasan_kmalloc+0xd4/0xd8
[   35.591095]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.592052]  kasan_bitops_generic+0xa0/0x1c8
[   35.592737]  kunit_try_run_case+0x14c/0x3d0
[   35.593330]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.594251]  kthread+0x24c/0x2d0
[   35.594974]  ret_from_fork+0x10/0x20
[   35.596301] 
[   35.596711] The buggy address belongs to the object at fff00000c6153d80
[   35.596711]  which belongs to the cache kmalloc-16 of size 16
[   35.598117] The buggy address is located 8 bytes inside of
[   35.598117]  allocated 9-byte region [fff00000c6153d80, fff00000c6153d89)
[   35.600402] 
[   35.601021] The buggy address belongs to the physical page:
[   35.602171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153
[   35.603484] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.605258] page_type: f5(slab)
[   35.606327] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.608036] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   35.609029] page dumped because: kasan: bad access detected
[   35.610132] 
[   35.610475] Memory state around the buggy address:
[   35.611218]  fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   35.612926]  fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.613885] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.614315]                       ^
[   35.614581]  fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.616499]  fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.617458] ==================================================================
[   35.522453] ==================================================================
[   35.523922] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[   35.524735] Write of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249
[   35.525326] 
[   35.526301] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   35.528110] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.528766] Hardware name: linux,dummy-virt (DT)
[   35.529484] Call trace:
[   35.530575]  show_stack+0x20/0x38 (C)
[   35.531075]  dump_stack_lvl+0x8c/0xd0
[   35.532064]  print_report+0x118/0x5e0
[   35.532672]  kasan_report+0xc8/0x118
[   35.533251]  kasan_check_range+0x100/0x1a8
[   35.534047]  __kasan_check_write+0x20/0x30
[   35.534671]  kasan_bitops_modify.constprop.0+0x1dc/0xbc8
[   35.535468]  kasan_bitops_generic+0x110/0x1c8
[   35.536383]  kunit_try_run_case+0x14c/0x3d0
[   35.537104]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.537881]  kthread+0x24c/0x2d0
[   35.538356]  ret_from_fork+0x10/0x20
[   35.539237] 
[   35.539594] Allocated by task 249:
[   35.540072]  kasan_save_stack+0x3c/0x68
[   35.540692]  kasan_save_track+0x20/0x40
[   35.541342]  kasan_save_alloc_info+0x40/0x58
[   35.542416]  __kasan_kmalloc+0xd4/0xd8
[   35.543015]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.544527]  kasan_bitops_generic+0xa0/0x1c8
[   35.545355]  kunit_try_run_case+0x14c/0x3d0
[   35.546412]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.547278]  kthread+0x24c/0x2d0
[   35.547817]  ret_from_fork+0x10/0x20
[   35.548439] 
[   35.548781] The buggy address belongs to the object at fff00000c6153d80
[   35.548781]  which belongs to the cache kmalloc-16 of size 16
[   35.550110] The buggy address is located 8 bytes inside of
[   35.550110]  allocated 9-byte region [fff00000c6153d80, fff00000c6153d89)
[   35.551811] 
[   35.552107] The buggy address belongs to the physical page:
[   35.553874] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153
[   35.554844] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.555925] page_type: f5(slab)
[   35.556466] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.557600] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   35.558954] page dumped because: kasan: bad access detected
[   35.560232] 
[   35.560558] Memory state around the buggy address:
[   35.561191]  fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   35.562258]  fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.563546] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.564367]                       ^
[   35.564907]  fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.566468]  fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.567967] ==================================================================
[   35.765329] ==================================================================
[   35.767433] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc8
[   35.768316] Write of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249
[   35.769166] 
[   35.769565] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   35.770847] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.771478] Hardware name: linux,dummy-virt (DT)
[   35.772954] Call trace:
[   35.773366]  show_stack+0x20/0x38 (C)
[   35.774231]  dump_stack_lvl+0x8c/0xd0
[   35.774819]  print_report+0x118/0x5e0
[   35.775694]  kasan_report+0xc8/0x118
[   35.776279]  kasan_check_range+0x100/0x1a8
[   35.777418]  __kasan_check_write+0x20/0x30
[   35.778392]  kasan_bitops_modify.constprop.0+0x344/0xbc8
[   35.779159]  kasan_bitops_generic+0x110/0x1c8
[   35.780007]  kunit_try_run_case+0x14c/0x3d0
[   35.780761]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.781724]  kthread+0x24c/0x2d0
[   35.782362]  ret_from_fork+0x10/0x20
[   35.783138] 
[   35.783566] Allocated by task 249:
[   35.784305]  kasan_save_stack+0x3c/0x68
[   35.784927]  kasan_save_track+0x20/0x40
[   35.785678]  kasan_save_alloc_info+0x40/0x58
[   35.786476]  __kasan_kmalloc+0xd4/0xd8
[   35.787226]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.787893]  kasan_bitops_generic+0xa0/0x1c8
[   35.788678]  kunit_try_run_case+0x14c/0x3d0
[   35.789445]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.790293]  kthread+0x24c/0x2d0
[   35.790811]  ret_from_fork+0x10/0x20
[   35.791302] 
[   35.791772] The buggy address belongs to the object at fff00000c6153d80
[   35.791772]  which belongs to the cache kmalloc-16 of size 16
[   35.793067] The buggy address is located 8 bytes inside of
[   35.793067]  allocated 9-byte region [fff00000c6153d80, fff00000c6153d89)
[   35.794606] 
[   35.794981] The buggy address belongs to the physical page:
[   35.795746] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153
[   35.796745] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.797673] page_type: f5(slab)
[   35.798161] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.799117] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   35.800008] page dumped because: kasan: bad access detected
[   35.800738] 
[   35.801122] Memory state around the buggy address:
[   35.801772]  fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   35.802850]  fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.803691] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.804608]                       ^
[   35.805163]  fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.806172]  fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.807057] ==================================================================
[   35.850927] ==================================================================
[   35.851757] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8
[   35.852558] Read of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249
[   35.853512] 
[   35.853988] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   35.855476] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.855998] Hardware name: linux,dummy-virt (DT)
[   35.856649] Call trace:
[   35.857132]  show_stack+0x20/0x38 (C)
[   35.857772]  dump_stack_lvl+0x8c/0xd0
[   35.858461]  print_report+0x118/0x5e0
[   35.859070]  kasan_report+0xc8/0x118
[   35.859655]  __asan_report_load8_noabort+0x20/0x30
[   35.860292]  kasan_bitops_modify.constprop.0+0xa28/0xbc8
[   35.861153]  kasan_bitops_generic+0x110/0x1c8
[   35.861673]  kunit_try_run_case+0x14c/0x3d0
[   35.862405]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.863115]  kthread+0x24c/0x2d0
[   35.863770]  ret_from_fork+0x10/0x20
[   35.864331] 
[   35.864721] Allocated by task 249:
[   35.865155]  kasan_save_stack+0x3c/0x68
[   35.865807]  kasan_save_track+0x20/0x40
[   35.866390]  kasan_save_alloc_info+0x40/0x58
[   35.866972]  __kasan_kmalloc+0xd4/0xd8
[   35.867678]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.868409]  kasan_bitops_generic+0xa0/0x1c8
[   35.869087]  kunit_try_run_case+0x14c/0x3d0
[   35.869719]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.870457]  kthread+0x24c/0x2d0
[   35.870974]  ret_from_fork+0x10/0x20
[   35.871593] 
[   35.871963] The buggy address belongs to the object at fff00000c6153d80
[   35.871963]  which belongs to the cache kmalloc-16 of size 16
[   35.873378] The buggy address is located 8 bytes inside of
[   35.873378]  allocated 9-byte region [fff00000c6153d80, fff00000c6153d89)
[   35.874754] 
[   35.875090] The buggy address belongs to the physical page:
[   35.875895] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153
[   35.876804] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.877800] page_type: f5(slab)
[   35.878276] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.879267] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   35.880175] page dumped because: kasan: bad access detected
[   35.880899] 
[   35.881244] Memory state around the buggy address:
[   35.881874]  fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   35.882860]  fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.883668] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.884615]                       ^
[   35.885034]  fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.885661]  fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.886262] ==================================================================
[   35.808905] ==================================================================
[   35.810228] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[   35.811335] Write of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249
[   35.812162] 
[   35.812614] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   35.814517] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.815067] Hardware name: linux,dummy-virt (DT)
[   35.815733] Call trace:
[   35.816152]  show_stack+0x20/0x38 (C)
[   35.816744]  dump_stack_lvl+0x8c/0xd0
[   35.817343]  print_report+0x118/0x5e0
[   35.817970]  kasan_report+0xc8/0x118
[   35.818502]  kasan_check_range+0x100/0x1a8
[   35.819270]  __kasan_check_write+0x20/0x30
[   35.820000]  kasan_bitops_modify.constprop.0+0x3b0/0xbc8
[   35.820927]  kasan_bitops_generic+0x110/0x1c8
[   35.821549]  kunit_try_run_case+0x14c/0x3d0
[   35.822252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.823047]  kthread+0x24c/0x2d0
[   35.823687]  ret_from_fork+0x10/0x20
[   35.824409] 
[   35.824846] Allocated by task 249:
[   35.825275]  kasan_save_stack+0x3c/0x68
[   35.825962]  kasan_save_track+0x20/0x40
[   35.826569]  kasan_save_alloc_info+0x40/0x58
[   35.827303]  __kasan_kmalloc+0xd4/0xd8
[   35.827835]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.828562]  kasan_bitops_generic+0xa0/0x1c8
[   35.829211]  kunit_try_run_case+0x14c/0x3d0
[   35.830054]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.830769]  kthread+0x24c/0x2d0
[   35.831348]  ret_from_fork+0x10/0x20
[   35.831983] 
[   35.832418] The buggy address belongs to the object at fff00000c6153d80
[   35.832418]  which belongs to the cache kmalloc-16 of size 16
[   35.833786] The buggy address is located 8 bytes inside of
[   35.833786]  allocated 9-byte region [fff00000c6153d80, fff00000c6153d89)
[   35.835338] 
[   35.835734] The buggy address belongs to the physical page:
[   35.836382] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153
[   35.837340] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.838293] page_type: f5(slab)
[   35.838972] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.839949] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   35.840800] page dumped because: kasan: bad access detected
[   35.841547] 
[   35.841897] Memory state around the buggy address:
[   35.842495]  fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   35.843439]  fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.844390] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.845389]                       ^
[   35.845875]  fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.846855]  fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.847805] ==================================================================
[   35.424650] ==================================================================
[   35.425834] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc8
[   35.426941] Write of size 8 at addr fff00000c6153d88 by task kunit_try_catch/249
[   35.429296] 
[   35.430297] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   35.432065] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.432957] Hardware name: linux,dummy-virt (DT)
[   35.433442] Call trace:
[   35.434355]  show_stack+0x20/0x38 (C)
[   35.435483]  dump_stack_lvl+0x8c/0xd0
[   35.436466]  print_report+0x118/0x5e0
[   35.437122]  kasan_report+0xc8/0x118
[   35.438032]  kasan_check_range+0x100/0x1a8
[   35.439057]  __kasan_check_write+0x20/0x30
[   35.439834]  kasan_bitops_modify.constprop.0+0x100/0xbc8
[   35.440597]  kasan_bitops_generic+0x110/0x1c8
[   35.441434]  kunit_try_run_case+0x14c/0x3d0
[   35.442180]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.442992]  kthread+0x24c/0x2d0
[   35.443579]  ret_from_fork+0x10/0x20
[   35.444968] 
[   35.445291] Allocated by task 249:
[   35.445795]  kasan_save_stack+0x3c/0x68
[   35.446396]  kasan_save_track+0x20/0x40
[   35.447019]  kasan_save_alloc_info+0x40/0x58
[   35.447751]  __kasan_kmalloc+0xd4/0xd8
[   35.448321]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.450529]  kasan_bitops_generic+0xa0/0x1c8
[   35.451242]  kunit_try_run_case+0x14c/0x3d0
[   35.452163]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.453052]  kthread+0x24c/0x2d0
[   35.453860]  ret_from_fork+0x10/0x20
[   35.454688] 
[   35.455092] The buggy address belongs to the object at fff00000c6153d80
[   35.455092]  which belongs to the cache kmalloc-16 of size 16
[   35.456679] The buggy address is located 8 bytes inside of
[   35.456679]  allocated 9-byte region [fff00000c6153d80, fff00000c6153d89)
[   35.458539] 
[   35.459035] The buggy address belongs to the physical page:
[   35.459983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153
[   35.460949] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.462011] page_type: f5(slab)
[   35.462801] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   35.464023] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   35.464897] page dumped because: kasan: bad access detected
[   35.466545] 
[   35.467315] Memory state around the buggy address:
[   35.468401]  fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   35.469594]  fff00000c6153d00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   35.470856] >fff00000c6153d80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.472515]                       ^
[   35.472959]  fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.474583]  fff00000c6153e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.475386] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen
[   35.363796] ==================================================================
[   35.365133] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88
[   35.365805] Read of size 1 at addr fff00000c6643a90 by task kunit_try_catch/247
[   35.367178] 
[   35.367652] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   35.368962] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.369569] Hardware name: linux,dummy-virt (DT)
[   35.370346] Call trace:
[   35.370977]  show_stack+0x20/0x38 (C)
[   35.371644]  dump_stack_lvl+0x8c/0xd0
[   35.372286]  print_report+0x118/0x5e0
[   35.372964]  kasan_report+0xc8/0x118
[   35.373599]  __asan_report_load1_noabort+0x20/0x30
[   35.374375]  strnlen+0x80/0x88
[   35.375016]  kasan_strings+0x364/0x8d8
[   35.375675]  kunit_try_run_case+0x14c/0x3d0
[   35.376397]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.377282]  kthread+0x24c/0x2d0
[   35.377910]  ret_from_fork+0x10/0x20
[   35.378572] 
[   35.378960] Allocated by task 247:
[   35.379648]  kasan_save_stack+0x3c/0x68
[   35.380391]  kasan_save_track+0x20/0x40
[   35.381090]  kasan_save_alloc_info+0x40/0x58
[   35.381864]  __kasan_kmalloc+0xd4/0xd8
[   35.382503]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.383160]  kasan_strings+0xb0/0x8d8
[   35.383886]  kunit_try_run_case+0x14c/0x3d0
[   35.384688]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.385468]  kthread+0x24c/0x2d0
[   35.386052]  ret_from_fork+0x10/0x20
[   35.386998] 
[   35.387775] Freed by task 247:
[   35.388898]  kasan_save_stack+0x3c/0x68
[   35.389693]  kasan_save_track+0x20/0x40
[   35.390666]  kasan_save_free_info+0x4c/0x78
[   35.392130]  __kasan_slab_free+0x6c/0x98
[   35.392868]  kfree+0x114/0x3c8
[   35.393571]  kasan_strings+0x124/0x8d8
[   35.394279]  kunit_try_run_case+0x14c/0x3d0
[   35.395236]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.395955]  kthread+0x24c/0x2d0
[   35.396438]  ret_from_fork+0x10/0x20
[   35.397062] 
[   35.397432] The buggy address belongs to the object at fff00000c6643a80
[   35.397432]  which belongs to the cache kmalloc-32 of size 32
[   35.398872] The buggy address is located 16 bytes inside of
[   35.398872]  freed 32-byte region [fff00000c6643a80, fff00000c6643aa0)
[   35.400185] 
[   35.400521] The buggy address belongs to the physical page:
[   35.401356] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106643
[   35.402397] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.403411] page_type: f5(slab)
[   35.403934] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   35.404988] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   35.405889] page dumped because: kasan: bad access detected
[   35.406647] 
[   35.407045] Memory state around the buggy address:
[   35.407616]  fff00000c6643980: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   35.408613]  fff00000c6643a00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   35.409583] >fff00000c6643a80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   35.410408]                          ^
[   35.411063]  fff00000c6643b00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   35.411888]  fff00000c6643b80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   35.412735] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen
[   35.314743] ==================================================================
[   35.315557] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   35.316283] Read of size 1 at addr fff00000c6643a90 by task kunit_try_catch/247
[   35.317200] 
[   35.317587] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   35.318987] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.319555] Hardware name: linux,dummy-virt (DT)
[   35.320072] Call trace:
[   35.320620]  show_stack+0x20/0x38 (C)
[   35.321977]  dump_stack_lvl+0x8c/0xd0
[   35.322547]  print_report+0x118/0x5e0
[   35.323185]  kasan_report+0xc8/0x118
[   35.323834]  __asan_report_load1_noabort+0x20/0x30
[   35.324524]  strlen+0xa8/0xb0
[   35.325145]  kasan_strings+0x304/0x8d8
[   35.325770]  kunit_try_run_case+0x14c/0x3d0
[   35.326466]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.327313]  kthread+0x24c/0x2d0
[   35.327948]  ret_from_fork+0x10/0x20
[   35.328501] 
[   35.328920] Allocated by task 247:
[   35.329508]  kasan_save_stack+0x3c/0x68
[   35.330222]  kasan_save_track+0x20/0x40
[   35.330781]  kasan_save_alloc_info+0x40/0x58
[   35.331509]  __kasan_kmalloc+0xd4/0xd8
[   35.332002]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.332772]  kasan_strings+0xb0/0x8d8
[   35.333290]  kunit_try_run_case+0x14c/0x3d0
[   35.334214]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.334878]  kthread+0x24c/0x2d0
[   35.335179]  ret_from_fork+0x10/0x20
[   35.335458] 
[   35.335659] Freed by task 247:
[   35.336048]  kasan_save_stack+0x3c/0x68
[   35.336868]  kasan_save_track+0x20/0x40
[   35.337382]  kasan_save_free_info+0x4c/0x78
[   35.338239]  __kasan_slab_free+0x6c/0x98
[   35.339116]  kfree+0x114/0x3c8
[   35.339580]  kasan_strings+0x124/0x8d8
[   35.340254]  kunit_try_run_case+0x14c/0x3d0
[   35.341073]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.341888]  kthread+0x24c/0x2d0
[   35.342489]  ret_from_fork+0x10/0x20
[   35.343180] 
[   35.343585] The buggy address belongs to the object at fff00000c6643a80
[   35.343585]  which belongs to the cache kmalloc-32 of size 32
[   35.345161] The buggy address is located 16 bytes inside of
[   35.345161]  freed 32-byte region [fff00000c6643a80, fff00000c6643aa0)
[   35.346736] 
[   35.347174] The buggy address belongs to the physical page:
[   35.347953] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106643
[   35.349125] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.350011] page_type: f5(slab)
[   35.350686] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   35.351697] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   35.352578] page dumped because: kasan: bad access detected
[   35.353420] 
[   35.353786] Memory state around the buggy address:
[   35.354548]  fff00000c6643980: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   35.355478]  fff00000c6643a00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   35.356434] >fff00000c6643a80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   35.357357]                          ^
[   35.357964]  fff00000c6643b00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   35.358996]  fff00000c6643b80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   35.359901] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[   35.259050] ==================================================================
[   35.259881] BUG: KASAN: slab-use-after-free in kasan_strings+0x838/0x8d8
[   35.260714] Read of size 1 at addr fff00000c6643a90 by task kunit_try_catch/247
[   35.262374] 
[   35.262966] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   35.264458] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.265037] Hardware name: linux,dummy-virt (DT)
[   35.266254] Call trace:
[   35.267364]  show_stack+0x20/0x38 (C)
[   35.268063]  dump_stack_lvl+0x8c/0xd0
[   35.268857]  print_report+0x118/0x5e0
[   35.269425]  kasan_report+0xc8/0x118
[   35.270053]  __asan_report_load1_noabort+0x20/0x30
[   35.271330]  kasan_strings+0x838/0x8d8
[   35.272053]  kunit_try_run_case+0x14c/0x3d0
[   35.272923]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.274182]  kthread+0x24c/0x2d0
[   35.274847]  ret_from_fork+0x10/0x20
[   35.275554] 
[   35.275978] Allocated by task 247:
[   35.276713]  kasan_save_stack+0x3c/0x68
[   35.277447]  kasan_save_track+0x20/0x40
[   35.278527]  kasan_save_alloc_info+0x40/0x58
[   35.279076]  __kasan_kmalloc+0xd4/0xd8
[   35.280098]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.281093]  kasan_strings+0xb0/0x8d8
[   35.282012]  kunit_try_run_case+0x14c/0x3d0
[   35.282668]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.283445]  kthread+0x24c/0x2d0
[   35.283998]  ret_from_fork+0x10/0x20
[   35.284509] 
[   35.285013] Freed by task 247:
[   35.285586]  kasan_save_stack+0x3c/0x68
[   35.286203]  kasan_save_track+0x20/0x40
[   35.287309]  kasan_save_free_info+0x4c/0x78
[   35.288131]  __kasan_slab_free+0x6c/0x98
[   35.288832]  kfree+0x114/0x3c8
[   35.289337]  kasan_strings+0x124/0x8d8
[   35.290261]  kunit_try_run_case+0x14c/0x3d0
[   35.290845]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.291718]  kthread+0x24c/0x2d0
[   35.292304]  ret_from_fork+0x10/0x20
[   35.292937] 
[   35.293254] The buggy address belongs to the object at fff00000c6643a80
[   35.293254]  which belongs to the cache kmalloc-32 of size 32
[   35.295073] The buggy address is located 16 bytes inside of
[   35.295073]  freed 32-byte region [fff00000c6643a80, fff00000c6643aa0)
[   35.296527] 
[   35.297149] The buggy address belongs to the physical page:
[   35.297824] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106643
[   35.299462] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.300990] page_type: f5(slab)
[   35.302036] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   35.302835] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   35.303474] page dumped because: kasan: bad access detected
[   35.304338] 
[   35.304694] Memory state around the buggy address:
[   35.305612]  fff00000c6643980: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   35.306745]  fff00000c6643a00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   35.307953] >fff00000c6643a80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   35.308898]                          ^
[   35.309386]  fff00000c6643b00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   35.310416]  fff00000c6643b80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   35.311724] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
[   35.200814] ==================================================================
[   35.204481] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   35.206689] Read of size 1 at addr fff00000c6643a90 by task kunit_try_catch/247
[   35.207473] 
[   35.207891] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   35.209390] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.210734] Hardware name: linux,dummy-virt (DT)
[   35.212030] Call trace:
[   35.212576]  show_stack+0x20/0x38 (C)
[   35.213398]  dump_stack_lvl+0x8c/0xd0
[   35.214004]  print_report+0x118/0x5e0
[   35.215020]  kasan_report+0xc8/0x118
[   35.215758]  __asan_report_load1_noabort+0x20/0x30
[   35.216669]  strcmp+0xc0/0xc8
[   35.217186]  kasan_strings+0x228/0x8d8
[   35.217955]  kunit_try_run_case+0x14c/0x3d0
[   35.219040]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.219796]  kthread+0x24c/0x2d0
[   35.220482]  ret_from_fork+0x10/0x20
[   35.221113] 
[   35.221455] Allocated by task 247:
[   35.222144]  kasan_save_stack+0x3c/0x68
[   35.222970]  kasan_save_track+0x20/0x40
[   35.224053]  kasan_save_alloc_info+0x40/0x58
[   35.224580]  __kasan_kmalloc+0xd4/0xd8
[   35.226230]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.226849]  kasan_strings+0xb0/0x8d8
[   35.227345]  kunit_try_run_case+0x14c/0x3d0
[   35.228069]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.228704]  kthread+0x24c/0x2d0
[   35.229281]  ret_from_fork+0x10/0x20
[   35.230532] 
[   35.230978] Freed by task 247:
[   35.231509]  kasan_save_stack+0x3c/0x68
[   35.232117]  kasan_save_track+0x20/0x40
[   35.232731]  kasan_save_free_info+0x4c/0x78
[   35.233362]  __kasan_slab_free+0x6c/0x98
[   35.233896]  kfree+0x114/0x3c8
[   35.234474]  kasan_strings+0x124/0x8d8
[   35.235478]  kunit_try_run_case+0x14c/0x3d0
[   35.236189]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.236879]  kthread+0x24c/0x2d0
[   35.237456]  ret_from_fork+0x10/0x20
[   35.237930] 
[   35.238666] The buggy address belongs to the object at fff00000c6643a80
[   35.238666]  which belongs to the cache kmalloc-32 of size 32
[   35.240234] The buggy address is located 16 bytes inside of
[   35.240234]  freed 32-byte region [fff00000c6643a80, fff00000c6643aa0)
[   35.241670] 
[   35.241982] The buggy address belongs to the physical page:
[   35.243855] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106643
[   35.244700] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.245604] page_type: f5(slab)
[   35.246570] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   35.247502] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   35.248447] page dumped because: kasan: bad access detected
[   35.249164] 
[   35.249470] Memory state around the buggy address:
[   35.250617]  fff00000c6643980: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   35.251477]  fff00000c6643a00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   35.252427] >fff00000c6643a80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   35.253279]                          ^
[   35.254021]  fff00000c6643b00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   35.254859]  fff00000c6643b80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   35.256084] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[   35.139678] ==================================================================
[   35.140864] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   35.141748] Read of size 1 at addr fff00000c66439d8 by task kunit_try_catch/245
[   35.142485] 
[   35.143011] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   35.144428] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.145106] Hardware name: linux,dummy-virt (DT)
[   35.146557] Call trace:
[   35.147256]  show_stack+0x20/0x38 (C)
[   35.148018]  dump_stack_lvl+0x8c/0xd0
[   35.148784]  print_report+0x118/0x5e0
[   35.149420]  kasan_report+0xc8/0x118
[   35.150038]  __asan_report_load1_noabort+0x20/0x30
[   35.150896]  memcmp+0x198/0x1d8
[   35.151433]  kasan_memcmp+0x16c/0x300
[   35.152462]  kunit_try_run_case+0x14c/0x3d0
[   35.153131]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.153966]  kthread+0x24c/0x2d0
[   35.154565]  ret_from_fork+0x10/0x20
[   35.155216] 
[   35.155529] Allocated by task 245:
[   35.156377]  kasan_save_stack+0x3c/0x68
[   35.157025]  kasan_save_track+0x20/0x40
[   35.157970]  kasan_save_alloc_info+0x40/0x58
[   35.158734]  __kasan_kmalloc+0xd4/0xd8
[   35.159308]  __kmalloc_cache_noprof+0x15c/0x3c0
[   35.160090]  kasan_memcmp+0xbc/0x300
[   35.160653]  kunit_try_run_case+0x14c/0x3d0
[   35.161295]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.162729]  kthread+0x24c/0x2d0
[   35.164220]  ret_from_fork+0x10/0x20
[   35.164921] 
[   35.165248] The buggy address belongs to the object at fff00000c66439c0
[   35.165248]  which belongs to the cache kmalloc-32 of size 32
[   35.167045] The buggy address is located 0 bytes to the right of
[   35.167045]  allocated 24-byte region [fff00000c66439c0, fff00000c66439d8)
[   35.168151] 
[   35.168587] The buggy address belongs to the physical page:
[   35.169281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106643
[   35.170769] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.171686] page_type: f5(slab)
[   35.172184] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   35.173031] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   35.173948] page dumped because: kasan: bad access detected
[   35.175097] 
[   35.175403] Memory state around the buggy address:
[   35.176338]  fff00000c6643880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   35.177557]  fff00000c6643900: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   35.179026] >fff00000c6643980: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   35.180079]                                                     ^
[   35.181116]  fff00000c6643a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.182258]  fff00000c6643a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.183156] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[   35.084109] ==================================================================
[   35.085426] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2e4/0x348
[   35.086401] Read of size 1 at addr ffff800080bf7bea by task kunit_try_catch/241
[   35.087115] 
[   35.088288] CPU: 1 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   35.089620] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.090449] Hardware name: linux,dummy-virt (DT)
[   35.091404] Call trace:
[   35.092062]  show_stack+0x20/0x38 (C)
[   35.092858]  dump_stack_lvl+0x8c/0xd0
[   35.093416]  print_report+0x2fc/0x5e0
[   35.094471]  kasan_report+0xc8/0x118
[   35.095239]  __asan_report_load1_noabort+0x20/0x30
[   35.095652]  kasan_alloca_oob_right+0x2e4/0x348
[   35.095993]  kunit_try_run_case+0x14c/0x3d0
[   35.096317]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.096844]  kthread+0x24c/0x2d0
[   35.097820]  ret_from_fork+0x10/0x20
[   35.098408] 
[   35.098765] The buggy address belongs to stack of task kunit_try_catch/241
[   35.100271] 
[   35.100554] The buggy address belongs to the virtual mapping at
[   35.100554]  [ffff800080bf0000, ffff800080bf9000) created by:
[   35.100554]  kernel_clone+0x140/0x788
[   35.102337] 
[   35.103033] The buggy address belongs to the physical page:
[   35.103730] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106709
[   35.104933] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.106472] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   35.107459] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   35.108266] page dumped because: kasan: bad access detected
[   35.109035] 
[   35.109377] Memory state around the buggy address:
[   35.110493]  ffff800080bf7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.111749]  ffff800080bf7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.112582] >ffff800080bf7b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   35.113734]                                                           ^
[   35.114844]  ffff800080bf7c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2
[   35.115559]  ffff800080bf7c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00
[   35.116535] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[   35.037004] ==================================================================
[   35.038812] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   35.039826] Read of size 1 at addr ffff800080bf7bdf by task kunit_try_catch/239
[   35.040445] 
[   35.041423] CPU: 1 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   35.042857] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.043471] Hardware name: linux,dummy-virt (DT)
[   35.044940] Call trace:
[   35.045541]  show_stack+0x20/0x38 (C)
[   35.046822]  dump_stack_lvl+0x8c/0xd0
[   35.047577]  print_report+0x2fc/0x5e0
[   35.048205]  kasan_report+0xc8/0x118
[   35.048770]  __asan_report_load1_noabort+0x20/0x30
[   35.049461]  kasan_alloca_oob_left+0x2b8/0x310
[   35.050979]  kunit_try_run_case+0x14c/0x3d0
[   35.051528]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.052358]  kthread+0x24c/0x2d0
[   35.052925]  ret_from_fork+0x10/0x20
[   35.053501] 
[   35.053862] The buggy address belongs to stack of task kunit_try_catch/239
[   35.054781] 
[   35.055134] The buggy address belongs to the virtual mapping at
[   35.055134]  [ffff800080bf0000, ffff800080bf9000) created by:
[   35.055134]  kernel_clone+0x140/0x788
[   35.057604] 
[   35.058347] The buggy address belongs to the physical page:
[   35.059041] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106709
[   35.060270] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.061134] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   35.062443] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   35.064237] page dumped because: kasan: bad access detected
[   35.064845] 
[   35.065061] Memory state around the buggy address:
[   35.065583]  ffff800080bf7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.067430]  ffff800080bf7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.068044] >ffff800080bf7b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   35.068862]                                                     ^
[   35.069645]  ffff800080bf7c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2
[   35.070988]  ffff800080bf7c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00
[   35.071822] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[   34.979162] ==================================================================
[   34.980706] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x230/0x268
[   34.981683] Read of size 1 at addr ffff800080b97cba by task kunit_try_catch/237
[   34.983353] 
[   34.984304] CPU: 1 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   34.986520] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.987642] Hardware name: linux,dummy-virt (DT)
[   34.988852] Call trace:
[   34.989257]  show_stack+0x20/0x38 (C)
[   34.989888]  dump_stack_lvl+0x8c/0xd0
[   34.990404]  print_report+0x2fc/0x5e0
[   34.992032]  kasan_report+0xc8/0x118
[   34.992520]  __asan_report_load1_noabort+0x20/0x30
[   34.993191]  kasan_stack_oob+0x230/0x268
[   34.994146]  kunit_try_run_case+0x14c/0x3d0
[   34.994870]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.995963]  kthread+0x24c/0x2d0
[   34.996507]  ret_from_fork+0x10/0x20
[   34.997291] 
[   34.998355] The buggy address belongs to stack of task kunit_try_catch/237
[   34.999265]  and is located at offset 138 in frame:
[   34.999592]  kasan_stack_oob+0x0/0x268
[   35.000464] 
[   35.001021] This frame has 4 objects:
[   35.001827]  [48, 49) '__assertion'
[   35.002364]  [64, 72) 'array'
[   35.002966]  [96, 112) '__assertion'
[   35.003544]  [128, 138) 'stack_array'
[   35.004206] 
[   35.004927] The buggy address belongs to the virtual mapping at
[   35.004927]  [ffff800080b90000, ffff800080b99000) created by:
[   35.004927]  kernel_clone+0x140/0x788
[   35.007230] 
[   35.008086] The buggy address belongs to the physical page:
[   35.008798] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106646
[   35.010445] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.011648] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   35.012676] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   35.013788] page dumped because: kasan: bad access detected
[   35.015057] 
[   35.015605] Memory state around the buggy address:
[   35.016396]  ffff800080b97b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.017455]  ffff800080b97c00: 00 00 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2
[   35.018781] >ffff800080b97c80: f2 f2 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00
[   35.020308]                                         ^
[   35.021007]  ffff800080b97d00: 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00
[   35.021761]  ffff800080b97d80: f2 f2 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00
[   35.023482] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   34.922591] ==================================================================
[   34.924006] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   34.924819] Read of size 1 at addr ffff9826426e302d by task kunit_try_catch/233
[   34.925581] 
[   34.926047] CPU: 0 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   34.927462] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.928553] Hardware name: linux,dummy-virt (DT)
[   34.929206] Call trace:
[   34.929569]  show_stack+0x20/0x38 (C)
[   34.930933]  dump_stack_lvl+0x8c/0xd0
[   34.932110]  print_report+0x2fc/0x5e0
[   34.932658]  kasan_report+0xc8/0x118
[   34.933273]  __asan_report_load1_noabort+0x20/0x30
[   34.934459]  kasan_global_oob_right+0x230/0x270
[   34.935140]  kunit_try_run_case+0x14c/0x3d0
[   34.935895]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.936561]  kthread+0x24c/0x2d0
[   34.938698]  ret_from_fork+0x10/0x20
[   34.939325] 
[   34.939759] The buggy address belongs to the variable:
[   34.940364]  global_array+0xd/0x40
[   34.941178] 
[   34.941547] The buggy address belongs to the virtual mapping at
[   34.941547]  [ffff982640a20000, ffff9826427a1000) created by:
[   34.941547]  paging_init+0x668/0x7c8
[   34.943829] 
[   34.944477] The buggy address belongs to the physical page:
[   34.945142] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x478e3
[   34.947059] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   34.948069] raw: 03fffe0000002000 ffffc1ffc01e38c8 ffffc1ffc01e38c8 0000000000000000
[   34.949165] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   34.950241] page dumped because: kasan: bad access detected
[   34.951127] 
[   34.951496] Memory state around the buggy address:
[   34.952011]  ffff9826426e2f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.953659]  ffff9826426e2f80: 00 00 00 00 00 00 00 00 00 00 00 00 02 f9 f9 f9
[   34.954956] >ffff9826426e3000: f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9
[   34.955989]                                   ^
[   34.956559]  ffff9826426e3080: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9
[   34.957376]  ffff9826426e3100: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 00 00 00
[   34.959280] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[   34.813255] ==================================================================
[   34.814924] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[   34.815895] Free of addr fff00000c667b301 by task kunit_try_catch/229
[   34.816965] 
[   34.817359] CPU: 0 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   34.818848] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.820006] Hardware name: linux,dummy-virt (DT)
[   34.820680] Call trace:
[   34.821125]  show_stack+0x20/0x38 (C)
[   34.821890]  dump_stack_lvl+0x8c/0xd0
[   34.822611]  print_report+0x118/0x5e0
[   34.823251]  kasan_report_invalid_free+0xb0/0xd8
[   34.824253]  check_slab_allocation+0xfc/0x108
[   34.825345]  __kasan_mempool_poison_object+0x78/0x150
[   34.826584]  mempool_free+0x28c/0x328
[   34.827388]  mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[   34.828230]  mempool_kmalloc_invalid_free+0xb8/0x110
[   34.828938]  kunit_try_run_case+0x14c/0x3d0
[   34.829539]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.830715]  kthread+0x24c/0x2d0
[   34.831023]  ret_from_fork+0x10/0x20
[   34.831315] 
[   34.831482] Allocated by task 229:
[   34.831829]  kasan_save_stack+0x3c/0x68
[   34.832455]  kasan_save_track+0x20/0x40
[   34.833394]  kasan_save_alloc_info+0x40/0x58
[   34.834015]  __kasan_mempool_unpoison_object+0x11c/0x180
[   34.835135]  remove_element+0x130/0x1f8
[   34.836007]  mempool_alloc_preallocated+0x58/0xc0
[   34.836688]  mempool_kmalloc_invalid_free_helper+0x94/0x2a0
[   34.837556]  mempool_kmalloc_invalid_free+0xb8/0x110
[   34.838579]  kunit_try_run_case+0x14c/0x3d0
[   34.839113]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.840291]  kthread+0x24c/0x2d0
[   34.840945]  ret_from_fork+0x10/0x20
[   34.841584] 
[   34.842106] The buggy address belongs to the object at fff00000c667b300
[   34.842106]  which belongs to the cache kmalloc-128 of size 128
[   34.844050] The buggy address is located 1 bytes inside of
[   34.844050]  128-byte region [fff00000c667b300, fff00000c667b380)
[   34.845985] 
[   34.846700] The buggy address belongs to the physical page:
[   34.847452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10667b
[   34.848500] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.849425] page_type: f5(slab)
[   34.850507] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.851726] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.852848] page dumped because: kasan: bad access detected
[   34.853554] 
[   34.854260] Memory state around the buggy address:
[   34.854596]  fff00000c667b200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.855529]  fff00000c667b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.856379] >fff00000c667b300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.857422]                    ^
[   34.857923]  fff00000c667b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.859674]  fff00000c667b400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.861098] ==================================================================
[   34.873224] ==================================================================
[   34.874746] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[   34.875510] Free of addr fff00000c6848001 by task kunit_try_catch/231
[   34.876555] 
[   34.877027] CPU: 0 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   34.879216] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.880020] Hardware name: linux,dummy-virt (DT)
[   34.880907] Call trace:
[   34.881270]  show_stack+0x20/0x38 (C)
[   34.881901]  dump_stack_lvl+0x8c/0xd0
[   34.882551]  print_report+0x118/0x5e0
[   34.883791]  kasan_report_invalid_free+0xb0/0xd8
[   34.884345]  __kasan_mempool_poison_object+0xfc/0x150
[   34.885451]  mempool_free+0x28c/0x328
[   34.887269]  mempool_kmalloc_invalid_free_helper+0x118/0x2a0
[   34.888144]  mempool_kmalloc_large_invalid_free+0xb8/0x110
[   34.889186]  kunit_try_run_case+0x14c/0x3d0
[   34.889894]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.890826]  kthread+0x24c/0x2d0
[   34.891349]  ret_from_fork+0x10/0x20
[   34.892776] 
[   34.893056] The buggy address belongs to the physical page:
[   34.894237] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106848
[   34.895306] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.896386] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   34.897309] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.898536] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   34.900278] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.901192] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   34.902294] head: 0bfffe0000000002 ffffc1ffc31a1201 ffffffffffffffff 0000000000000000
[   34.903237] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   34.904373] page dumped because: kasan: bad access detected
[   34.905004] 
[   34.905378] Memory state around the buggy address:
[   34.906474]  fff00000c6847f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.907122]  fff00000c6847f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.907812] >fff00000c6848000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.908646]                    ^
[   34.909080]  fff00000c6848080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.910514]  fff00000c6848100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.911439] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[   34.721134] ==================================================================
[   34.722992] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   34.724413] Free of addr fff00000c6854000 by task kunit_try_catch/225
[   34.725275] 
[   34.725650] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   34.727091] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.727611] Hardware name: linux,dummy-virt (DT)
[   34.728171] Call trace:
[   34.728682]  show_stack+0x20/0x38 (C)
[   34.729307]  dump_stack_lvl+0x8c/0xd0
[   34.730299]  print_report+0x118/0x5e0
[   34.730847]  kasan_report_invalid_free+0xb0/0xd8
[   34.731593]  __kasan_mempool_poison_object+0x14c/0x150
[   34.732440]  mempool_free+0x28c/0x328
[   34.733039]  mempool_double_free_helper+0x150/0x2e0
[   34.733688]  mempool_kmalloc_large_double_free+0xb8/0x110
[   34.734564]  kunit_try_run_case+0x14c/0x3d0
[   34.735442]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.736243]  kthread+0x24c/0x2d0
[   34.737148]  ret_from_fork+0x10/0x20
[   34.737680] 
[   34.738059] The buggy address belongs to the physical page:
[   34.739406] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106854
[   34.740377] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.741316] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   34.742593] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.743449] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   34.744449] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.745999] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   34.746749] head: 0bfffe0000000002 ffffc1ffc31a1501 ffffffffffffffff 0000000000000000
[   34.747801] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   34.748490] page dumped because: kasan: bad access detected
[   34.749248] 
[   34.749554] Memory state around the buggy address:
[   34.750738]  fff00000c6853f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.751697]  fff00000c6853f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.752539] >fff00000c6854000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.753369]                    ^
[   34.753862]  fff00000c6854080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.755107]  fff00000c6854100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.756080] ==================================================================
[   34.767314] ==================================================================
[   34.768679] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   34.769500] Free of addr fff00000c6848000 by task kunit_try_catch/227
[   34.771768] 
[   34.772473] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   34.774864] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.775439] Hardware name: linux,dummy-virt (DT)
[   34.776089] Call trace:
[   34.776550]  show_stack+0x20/0x38 (C)
[   34.777286]  dump_stack_lvl+0x8c/0xd0
[   34.778305]  print_report+0x118/0x5e0
[   34.779281]  kasan_report_invalid_free+0xb0/0xd8
[   34.780066]  __kasan_mempool_poison_pages+0xe0/0xe8
[   34.780864]  mempool_free+0x24c/0x328
[   34.781549]  mempool_double_free_helper+0x150/0x2e0
[   34.782536]  mempool_page_alloc_double_free+0xb4/0x110
[   34.783300]  kunit_try_run_case+0x14c/0x3d0
[   34.783991]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.784849]  kthread+0x24c/0x2d0
[   34.785499]  ret_from_fork+0x10/0x20
[   34.786430] 
[   34.787310] The buggy address belongs to the physical page:
[   34.788197] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106848
[   34.789364] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.790285] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   34.791853] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   34.792950] page dumped because: kasan: bad access detected
[   34.793915] 
[   34.794385] Memory state around the buggy address:
[   34.795654]  fff00000c6847f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.796602]  fff00000c6847f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.797742] >fff00000c6848000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.798502]                    ^
[   34.799732]  fff00000c6848080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.800620]  fff00000c6848100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.801452] ==================================================================
[   34.653065] ==================================================================
[   34.654270] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   34.655268] Free of addr fff00000c66a6d00 by task kunit_try_catch/223
[   34.656026] 
[   34.656414] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   34.659145] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.659693] Hardware name: linux,dummy-virt (DT)
[   34.660375] Call trace:
[   34.660750]  show_stack+0x20/0x38 (C)
[   34.661427]  dump_stack_lvl+0x8c/0xd0
[   34.662036]  print_report+0x118/0x5e0
[   34.662527]  kasan_report_invalid_free+0xb0/0xd8
[   34.663582]  check_slab_allocation+0xd4/0x108
[   34.664224]  __kasan_mempool_poison_object+0x78/0x150
[   34.665064]  mempool_free+0x28c/0x328
[   34.666268]  mempool_double_free_helper+0x150/0x2e0
[   34.666956]  mempool_kmalloc_double_free+0xb8/0x110
[   34.667500]  kunit_try_run_case+0x14c/0x3d0
[   34.668372]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.669144]  kthread+0x24c/0x2d0
[   34.669680]  ret_from_fork+0x10/0x20
[   34.671008] 
[   34.671361] Allocated by task 223:
[   34.671883]  kasan_save_stack+0x3c/0x68
[   34.672455]  kasan_save_track+0x20/0x40
[   34.673026]  kasan_save_alloc_info+0x40/0x58
[   34.673700]  __kasan_mempool_unpoison_object+0x11c/0x180
[   34.674961]  remove_element+0x130/0x1f8
[   34.675464]  mempool_alloc_preallocated+0x58/0xc0
[   34.676270]  mempool_double_free_helper+0x94/0x2e0
[   34.676900]  mempool_kmalloc_double_free+0xb8/0x110
[   34.677706]  kunit_try_run_case+0x14c/0x3d0
[   34.678971]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.679724]  kthread+0x24c/0x2d0
[   34.680464]  ret_from_fork+0x10/0x20
[   34.681198] 
[   34.681533] Freed by task 223:
[   34.682241]  kasan_save_stack+0x3c/0x68
[   34.683192]  kasan_save_track+0x20/0x40
[   34.683545]  kasan_save_free_info+0x4c/0x78
[   34.683912]  __kasan_mempool_poison_object+0xc0/0x150
[   34.684548]  mempool_free+0x28c/0x328
[   34.685544]  mempool_double_free_helper+0x100/0x2e0
[   34.686826]  mempool_kmalloc_double_free+0xb8/0x110
[   34.687651]  kunit_try_run_case+0x14c/0x3d0
[   34.688303]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.689013]  kthread+0x24c/0x2d0
[   34.689600]  ret_from_fork+0x10/0x20
[   34.690238] 
[   34.690704] The buggy address belongs to the object at fff00000c66a6d00
[   34.690704]  which belongs to the cache kmalloc-128 of size 128
[   34.692767] The buggy address is located 0 bytes inside of
[   34.692767]  128-byte region [fff00000c66a6d00, fff00000c66a6d80)
[   34.694360] 
[   34.695098] The buggy address belongs to the physical page:
[   34.695814] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066a6
[   34.696958] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.698047] page_type: f5(slab)
[   34.698755] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.699895] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.700887] page dumped because: kasan: bad access detected
[   34.702153] 
[   34.702764] Memory state around the buggy address:
[   34.703421]  fff00000c66a6c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.704376]  fff00000c66a6c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.705362] >fff00000c66a6d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.706370]                    ^
[   34.707319]  fff00000c66a6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.708218]  fff00000c66a6e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.709202] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[   34.608812] ==================================================================
[   34.610767] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   34.611854] Read of size 1 at addr fff00000c6844000 by task kunit_try_catch/221
[   34.613384] 
[   34.614365] CPU: 0 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   34.615783] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.616563] Hardware name: linux,dummy-virt (DT)
[   34.617219] Call trace:
[   34.617570]  show_stack+0x20/0x38 (C)
[   34.618323]  dump_stack_lvl+0x8c/0xd0
[   34.619004]  print_report+0x118/0x5e0
[   34.619540]  kasan_report+0xc8/0x118
[   34.620564]  __asan_report_load1_noabort+0x20/0x30
[   34.621273]  mempool_uaf_helper+0x314/0x340
[   34.621855]  mempool_page_alloc_uaf+0xb8/0x118
[   34.622552]  kunit_try_run_case+0x14c/0x3d0
[   34.623655]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.624316]  kthread+0x24c/0x2d0
[   34.624946]  ret_from_fork+0x10/0x20
[   34.625529] 
[   34.626471] The buggy address belongs to the physical page:
[   34.627159] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106844
[   34.628241] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.629371] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   34.630966] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   34.631841] page dumped because: kasan: bad access detected
[   34.632492] 
[   34.632885] Memory state around the buggy address:
[   34.633484]  fff00000c6843f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.634718]  fff00000c6843f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.635582] >fff00000c6844000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.636495]                    ^
[   34.637487]  fff00000c6844080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.638820]  fff00000c6844100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.640137] ==================================================================
[   34.484870] ==================================================================
[   34.486104] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   34.487028] Read of size 1 at addr fff00000c6844000 by task kunit_try_catch/217
[   34.487908] 
[   34.488307] CPU: 0 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   34.489711] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.490601] Hardware name: linux,dummy-virt (DT)
[   34.491147] Call trace:
[   34.491754]  show_stack+0x20/0x38 (C)
[   34.492538]  dump_stack_lvl+0x8c/0xd0
[   34.493388]  print_report+0x118/0x5e0
[   34.494241]  kasan_report+0xc8/0x118
[   34.494793]  __asan_report_load1_noabort+0x20/0x30
[   34.495488]  mempool_uaf_helper+0x314/0x340
[   34.496454]  mempool_kmalloc_large_uaf+0xbc/0x118
[   34.497127]  kunit_try_run_case+0x14c/0x3d0
[   34.498694]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.499476]  kthread+0x24c/0x2d0
[   34.500000]  ret_from_fork+0x10/0x20
[   34.500690] 
[   34.501066] The buggy address belongs to the physical page:
[   34.501833] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106844
[   34.503205] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.504127] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   34.505294] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.506465] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   34.507880] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.508812] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   34.509821] head: 0bfffe0000000002 ffffc1ffc31a1101 ffffffffffffffff 0000000000000000
[   34.511406] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   34.512289] page dumped because: kasan: bad access detected
[   34.513025] 
[   34.513333] Memory state around the buggy address:
[   34.514209]  fff00000c6843f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.515512]  fff00000c6843f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.516480] >fff00000c6844000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.517395]                    ^
[   34.518520]  fff00000c6844080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.519471]  fff00000c6844100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   34.520414] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[   34.423764] ==================================================================
[   34.424977] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   34.425703] Read of size 1 at addr fff00000c66e1900 by task kunit_try_catch/215
[   34.426843] 
[   34.427958] CPU: 1 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   34.429289] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.430566] Hardware name: linux,dummy-virt (DT)
[   34.431179] Call trace:
[   34.431713]  show_stack+0x20/0x38 (C)
[   34.432388]  dump_stack_lvl+0x8c/0xd0
[   34.433007]  print_report+0x118/0x5e0
[   34.433606]  kasan_report+0xc8/0x118
[   34.434165]  __asan_report_load1_noabort+0x20/0x30
[   34.434976]  mempool_uaf_helper+0x314/0x340
[   34.435605]  mempool_kmalloc_uaf+0xbc/0x118
[   34.436237]  kunit_try_run_case+0x14c/0x3d0
[   34.436798]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.437602]  kthread+0x24c/0x2d0
[   34.438225]  ret_from_fork+0x10/0x20
[   34.438773] 
[   34.439243] Allocated by task 215:
[   34.439690]  kasan_save_stack+0x3c/0x68
[   34.440354]  kasan_save_track+0x20/0x40
[   34.440925]  kasan_save_alloc_info+0x40/0x58
[   34.441526]  __kasan_mempool_unpoison_object+0x11c/0x180
[   34.442155]  remove_element+0x130/0x1f8
[   34.442846]  mempool_alloc_preallocated+0x58/0xc0
[   34.443567]  mempool_uaf_helper+0xa4/0x340
[   34.444229]  mempool_kmalloc_uaf+0xbc/0x118
[   34.444761]  kunit_try_run_case+0x14c/0x3d0
[   34.445485]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.446143]  kthread+0x24c/0x2d0
[   34.446840]  ret_from_fork+0x10/0x20
[   34.447429] 
[   34.447871] Freed by task 215:
[   34.448358]  kasan_save_stack+0x3c/0x68
[   34.449086]  kasan_save_track+0x20/0x40
[   34.449612]  kasan_save_free_info+0x4c/0x78
[   34.450184]  __kasan_mempool_poison_object+0xc0/0x150
[   34.451113]  mempool_free+0x28c/0x328
[   34.451719]  mempool_uaf_helper+0x104/0x340
[   34.452406]  mempool_kmalloc_uaf+0xbc/0x118
[   34.453001]  kunit_try_run_case+0x14c/0x3d0
[   34.453597]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.454402]  kthread+0x24c/0x2d0
[   34.455016]  ret_from_fork+0x10/0x20
[   34.455558] 
[   34.455922] The buggy address belongs to the object at fff00000c66e1900
[   34.455922]  which belongs to the cache kmalloc-128 of size 128
[   34.457405] The buggy address is located 0 bytes inside of
[   34.457405]  freed 128-byte region [fff00000c66e1900, fff00000c66e1980)
[   34.458804] 
[   34.459125] The buggy address belongs to the physical page:
[   34.459892] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e1
[   34.460979] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.461757] page_type: f5(slab)
[   34.462348] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.463391] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.464309] page dumped because: kasan: bad access detected
[   34.464949] 
[   34.465317] Memory state around the buggy address:
[   34.465939]  fff00000c66e1800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.466946]  fff00000c66e1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.467845] >fff00000c66e1900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.468778]                    ^
[   34.469229]  fff00000c66e1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.470119]  fff00000c66e1a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.471063] ==================================================================
[   34.533199] ==================================================================
[   34.534885] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   34.535836] Read of size 1 at addr fff00000c6643240 by task kunit_try_catch/219
[   34.537503] 
[   34.538048] CPU: 0 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   34.539615] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.540045] Hardware name: linux,dummy-virt (DT)
[   34.540831] Call trace:
[   34.541518]  show_stack+0x20/0x38 (C)
[   34.542662]  dump_stack_lvl+0x8c/0xd0
[   34.543256]  print_report+0x118/0x5e0
[   34.543852]  kasan_report+0xc8/0x118
[   34.544430]  __asan_report_load1_noabort+0x20/0x30
[   34.545151]  mempool_uaf_helper+0x314/0x340
[   34.545843]  mempool_slab_uaf+0xb8/0x110
[   34.546341]  kunit_try_run_case+0x14c/0x3d0
[   34.547708]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.548382]  kthread+0x24c/0x2d0
[   34.549103]  ret_from_fork+0x10/0x20
[   34.550460] 
[   34.550783] Allocated by task 219:
[   34.551284]  kasan_save_stack+0x3c/0x68
[   34.551811]  kasan_save_track+0x20/0x40
[   34.552513]  kasan_save_alloc_info+0x40/0x58
[   34.553297]  __kasan_mempool_unpoison_object+0xbc/0x180
[   34.554014]  remove_element+0x16c/0x1f8
[   34.554569]  mempool_alloc_preallocated+0x58/0xc0
[   34.555288]  mempool_uaf_helper+0xa4/0x340
[   34.555985]  mempool_slab_uaf+0xb8/0x110
[   34.556575]  kunit_try_run_case+0x14c/0x3d0
[   34.558263]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.559014]  kthread+0x24c/0x2d0
[   34.559541]  ret_from_fork+0x10/0x20
[   34.560363] 
[   34.560691] Freed by task 219:
[   34.561116]  kasan_save_stack+0x3c/0x68
[   34.562744]  kasan_save_track+0x20/0x40
[   34.563363]  kasan_save_free_info+0x4c/0x78
[   34.563925]  __kasan_mempool_poison_object+0xc0/0x150
[   34.564611]  mempool_free+0x28c/0x328
[   34.565287]  mempool_uaf_helper+0x104/0x340
[   34.566013]  mempool_slab_uaf+0xb8/0x110
[   34.566714]  kunit_try_run_case+0x14c/0x3d0
[   34.567339]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.568009]  kthread+0x24c/0x2d0
[   34.569015]  ret_from_fork+0x10/0x20
[   34.569584] 
[   34.569942] The buggy address belongs to the object at fff00000c6643240
[   34.569942]  which belongs to the cache test_cache of size 123
[   34.571946] The buggy address is located 0 bytes inside of
[   34.571946]  freed 123-byte region [fff00000c6643240, fff00000c66432bb)
[   34.573287] 
[   34.573669] The buggy address belongs to the physical page:
[   34.574914] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106643
[   34.576060] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.577037] page_type: f5(slab)
[   34.577499] raw: 0bfffe0000000000 fff00000c6651140 dead000000000122 0000000000000000
[   34.578763] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   34.579425] page dumped because: kasan: bad access detected
[   34.580246] 
[   34.580546] Memory state around the buggy address:
[   34.581371]  fff00000c6643100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.582260]  fff00000c6643180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.583673] >fff00000c6643200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   34.584497]                                            ^
[   34.585245]  fff00000c6643280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   34.586359]  fff00000c6643300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.587253] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[   34.349559] ==================================================================
[   34.351261] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   34.351953] Read of size 1 at addr fff00000c664e2bb by task kunit_try_catch/213
[   34.352571] 
[   34.353111] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   34.354863] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.355651] Hardware name: linux,dummy-virt (DT)
[   34.356503] Call trace:
[   34.358137]  show_stack+0x20/0x38 (C)
[   34.359675]  dump_stack_lvl+0x8c/0xd0
[   34.360694]  print_report+0x118/0x5e0
[   34.362032]  kasan_report+0xc8/0x118
[   34.363066]  __asan_report_load1_noabort+0x20/0x30
[   34.364116]  mempool_oob_right_helper+0x2ac/0x2f0
[   34.364869]  mempool_slab_oob_right+0xb8/0x110
[   34.365486]  kunit_try_run_case+0x14c/0x3d0
[   34.366529]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.367528]  kthread+0x24c/0x2d0
[   34.368503]  ret_from_fork+0x10/0x20
[   34.369156] 
[   34.369547] Allocated by task 213:
[   34.370236]  kasan_save_stack+0x3c/0x68
[   34.371160]  kasan_save_track+0x20/0x40
[   34.371573]  kasan_save_alloc_info+0x40/0x58
[   34.372538]  __kasan_mempool_unpoison_object+0xbc/0x180
[   34.373646]  remove_element+0x16c/0x1f8
[   34.375038]  mempool_alloc_preallocated+0x58/0xc0
[   34.376272]  mempool_oob_right_helper+0x98/0x2f0
[   34.377056]  mempool_slab_oob_right+0xb8/0x110
[   34.377663]  kunit_try_run_case+0x14c/0x3d0
[   34.378978]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.379854]  kthread+0x24c/0x2d0
[   34.380753]  ret_from_fork+0x10/0x20
[   34.381280] 
[   34.381570] The buggy address belongs to the object at fff00000c664e240
[   34.381570]  which belongs to the cache test_cache of size 123
[   34.383490] The buggy address is located 0 bytes to the right of
[   34.383490]  allocated 123-byte region [fff00000c664e240, fff00000c664e2bb)
[   34.385127] 
[   34.385457] The buggy address belongs to the physical page:
[   34.387258] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664e
[   34.388210] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.388956] page_type: f5(slab)
[   34.389477] raw: 0bfffe0000000000 fff00000c6651000 dead000000000122 0000000000000000
[   34.391191] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   34.392257] page dumped because: kasan: bad access detected
[   34.392603] 
[   34.392888] Memory state around the buggy address:
[   34.393481]  fff00000c664e180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.395826]  fff00000c664e200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   34.396469] >fff00000c664e280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   34.397096]                                         ^
[   34.397596]  fff00000c664e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.398714]  fff00000c664e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.400377] ==================================================================
[   34.249312] ==================================================================
[   34.250669] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   34.251395] Read of size 1 at addr fff00000c66e1373 by task kunit_try_catch/209
[   34.252514] 
[   34.252873] CPU: 1 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   34.253984] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.254648] Hardware name: linux,dummy-virt (DT)
[   34.255262] Call trace:
[   34.255765]  show_stack+0x20/0x38 (C)
[   34.256380]  dump_stack_lvl+0x8c/0xd0
[   34.256903]  print_report+0x118/0x5e0
[   34.257548]  kasan_report+0xc8/0x118
[   34.258119]  __asan_report_load1_noabort+0x20/0x30
[   34.258923]  mempool_oob_right_helper+0x2ac/0x2f0
[   34.259730]  mempool_kmalloc_oob_right+0xbc/0x118
[   34.260346]  kunit_try_run_case+0x14c/0x3d0
[   34.261053]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.261809]  kthread+0x24c/0x2d0
[   34.262363]  ret_from_fork+0x10/0x20
[   34.263068] 
[   34.263374] Allocated by task 209:
[   34.263918]  kasan_save_stack+0x3c/0x68
[   34.264601]  kasan_save_track+0x20/0x40
[   34.265117]  kasan_save_alloc_info+0x40/0x58
[   34.265758]  __kasan_mempool_unpoison_object+0x11c/0x180
[   34.266222]  remove_element+0x130/0x1f8
[   34.266595]  mempool_alloc_preallocated+0x58/0xc0
[   34.267062]  mempool_oob_right_helper+0x98/0x2f0
[   34.267476]  mempool_kmalloc_oob_right+0xbc/0x118
[   34.267989]  kunit_try_run_case+0x14c/0x3d0
[   34.268462]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.269437]  kthread+0x24c/0x2d0
[   34.270046]  ret_from_fork+0x10/0x20
[   34.270644] 
[   34.270984] The buggy address belongs to the object at fff00000c66e1300
[   34.270984]  which belongs to the cache kmalloc-128 of size 128
[   34.272257] The buggy address is located 0 bytes to the right of
[   34.272257]  allocated 115-byte region [fff00000c66e1300, fff00000c66e1373)
[   34.273912] 
[   34.274263] The buggy address belongs to the physical page:
[   34.274883] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e1
[   34.275954] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.276672] page_type: f5(slab)
[   34.277239] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.278347] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.279126] page dumped because: kasan: bad access detected
[   34.279959] 
[   34.280297] Memory state around the buggy address:
[   34.281036]  fff00000c66e1200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.281947]  fff00000c66e1280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.282770] >fff00000c66e1300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   34.283736]                                                              ^
[   34.284395]  fff00000c66e1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.285335]  fff00000c66e1400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   34.286258] ==================================================================
[   34.299973] ==================================================================
[   34.301215] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   34.302399] Read of size 1 at addr fff00000c6856001 by task kunit_try_catch/211
[   34.303357] 
[   34.303720] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   34.305719] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.306614] Hardware name: linux,dummy-virt (DT)
[   34.307298] Call trace:
[   34.307719]  show_stack+0x20/0x38 (C)
[   34.308524]  dump_stack_lvl+0x8c/0xd0
[   34.309224]  print_report+0x118/0x5e0
[   34.310167]  kasan_report+0xc8/0x118
[   34.310733]  __asan_report_load1_noabort+0x20/0x30
[   34.311604]  mempool_oob_right_helper+0x2ac/0x2f0
[   34.312348]  mempool_kmalloc_large_oob_right+0xbc/0x118
[   34.313386]  kunit_try_run_case+0x14c/0x3d0
[   34.314794]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.315549]  kthread+0x24c/0x2d0
[   34.316211]  ret_from_fork+0x10/0x20
[   34.316898] 
[   34.317258] The buggy address belongs to the physical page:
[   34.318344] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106854
[   34.319470] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   34.320379] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   34.321512] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.322517] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   34.324260] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   34.325918] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   34.326996] head: 0bfffe0000000002 ffffc1ffc31a1501 ffffffffffffffff 0000000000000000
[   34.328034] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   34.328917] page dumped because: kasan: bad access detected
[   34.329567] 
[   34.329920] Memory state around the buggy address:
[   34.330658]  fff00000c6855f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.331416]  fff00000c6855f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.332395] >fff00000c6856000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   34.333286]                    ^
[   34.333959]  fff00000c6856080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   34.334802]  fff00000c6856100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   34.335740] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[   33.612096] ==================================================================
[   33.613577] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x17c/0x2f8
[   33.615014] Read of size 1 at addr fff00000c5699dc0 by task kunit_try_catch/203
[   33.616068] 
[   33.616355] CPU: 1 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   33.618656] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.619162] Hardware name: linux,dummy-virt (DT)
[   33.619611] Call trace:
[   33.620132]  show_stack+0x20/0x38 (C)
[   33.620666]  dump_stack_lvl+0x8c/0xd0
[   33.621479]  print_report+0x118/0x5e0
[   33.623023]  kasan_report+0xc8/0x118
[   33.623945]  __kasan_check_byte+0x54/0x70
[   33.624725]  kmem_cache_destroy+0x34/0x218
[   33.625399]  kmem_cache_double_destroy+0x17c/0x2f8
[   33.626382]  kunit_try_run_case+0x14c/0x3d0
[   33.627045]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.627963]  kthread+0x24c/0x2d0
[   33.628611]  ret_from_fork+0x10/0x20
[   33.629193] 
[   33.629497] Allocated by task 203:
[   33.630208]  kasan_save_stack+0x3c/0x68
[   33.630926]  kasan_save_track+0x20/0x40
[   33.632076]  kasan_save_alloc_info+0x40/0x58
[   33.632690]  __kasan_slab_alloc+0xa8/0xb0
[   33.633303]  kmem_cache_alloc_noprof+0x108/0x398
[   33.634386]  __kmem_cache_create_args+0x18c/0x2b0
[   33.635215]  kmem_cache_double_destroy+0xc8/0x2f8
[   33.636028]  kunit_try_run_case+0x14c/0x3d0
[   33.637219]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.638509]  kthread+0x24c/0x2d0
[   33.638981]  ret_from_fork+0x10/0x20
[   33.639727] 
[   33.640194] Freed by task 203:
[   33.640820]  kasan_save_stack+0x3c/0x68
[   33.641589]  kasan_save_track+0x20/0x40
[   33.642469]  kasan_save_free_info+0x4c/0x78
[   33.642958]  __kasan_slab_free+0x6c/0x98
[   33.643415]  kmem_cache_free+0x118/0x470
[   33.644194]  slab_kmem_cache_release+0x38/0x50
[   33.644852]  kmem_cache_release+0x1c/0x30
[   33.645316]  kobject_put+0x17c/0x430
[   33.645786]  sysfs_slab_release+0x1c/0x30
[   33.646575]  kmem_cache_destroy+0x118/0x218
[   33.648139]  kmem_cache_double_destroy+0x130/0x2f8
[   33.649025]  kunit_try_run_case+0x14c/0x3d0
[   33.650172]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.651410]  kthread+0x24c/0x2d0
[   33.651884]  ret_from_fork+0x10/0x20
[   33.652440] 
[   33.652700] The buggy address belongs to the object at fff00000c5699dc0
[   33.652700]  which belongs to the cache kmem_cache of size 208
[   33.655058] The buggy address is located 0 bytes inside of
[   33.655058]  freed 208-byte region [fff00000c5699dc0, fff00000c5699e90)
[   33.656442] 
[   33.656770] The buggy address belongs to the physical page:
[   33.657558] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105699
[   33.659389] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.660327] page_type: f5(slab)
[   33.661184] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000
[   33.662379] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   33.663876] page dumped because: kasan: bad access detected
[   33.664592] 
[   33.665227] Memory state around the buggy address:
[   33.666360]  fff00000c5699c80: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.667316]  fff00000c5699d00: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   33.668739] >fff00000c5699d80: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   33.669587]                                            ^
[   33.671066]  fff00000c5699e00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.672110]  fff00000c5699e80: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.673174] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[   33.499241] ==================================================================
[   33.500912] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x390/0x468
[   33.501754] Read of size 1 at addr fff00000c66a3000 by task kunit_try_catch/201
[   33.502932] 
[   33.503821] CPU: 1 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   33.505447] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.506444] Hardware name: linux,dummy-virt (DT)
[   33.507394] Call trace:
[   33.507821]  show_stack+0x20/0x38 (C)
[   33.508397]  dump_stack_lvl+0x8c/0xd0
[   33.509010]  print_report+0x118/0x5e0
[   33.509534]  kasan_report+0xc8/0x118
[   33.510864]  __asan_report_load1_noabort+0x20/0x30
[   33.511914]  kmem_cache_rcu_uaf+0x390/0x468
[   33.512344]  kunit_try_run_case+0x14c/0x3d0
[   33.513102]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.514130]  kthread+0x24c/0x2d0
[   33.515058]  ret_from_fork+0x10/0x20
[   33.515781] 
[   33.516117] Allocated by task 201:
[   33.516823]  kasan_save_stack+0x3c/0x68
[   33.517500]  kasan_save_track+0x20/0x40
[   33.518110]  kasan_save_alloc_info+0x40/0x58
[   33.519083]  __kasan_slab_alloc+0xa8/0xb0
[   33.520091]  kmem_cache_alloc_noprof+0x108/0x398
[   33.520589]  kmem_cache_rcu_uaf+0x12c/0x468
[   33.521041]  kunit_try_run_case+0x14c/0x3d0
[   33.522607]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.523658]  kthread+0x24c/0x2d0
[   33.524411]  ret_from_fork+0x10/0x20
[   33.525149] 
[   33.525725] Freed by task 0:
[   33.526514]  kasan_save_stack+0x3c/0x68
[   33.528038]  kasan_save_track+0x20/0x40
[   33.528783]  kasan_save_free_info+0x4c/0x78
[   33.529251]  __kasan_slab_free+0x6c/0x98
[   33.529558]  slab_free_after_rcu_debug+0xd4/0x2f8
[   33.530259]  rcu_core+0x9f4/0x1e20
[   33.531070]  rcu_core_si+0x18/0x30
[   33.532602]  handle_softirqs+0x374/0xb20
[   33.533319]  __do_softirq+0x1c/0x28
[   33.534328] 
[   33.534599] Last potentially related work creation:
[   33.535095]  kasan_save_stack+0x3c/0x68
[   33.535667]  kasan_record_aux_stack+0xb4/0xc8
[   33.536500]  kmem_cache_free+0x28c/0x470
[   33.537059]  kmem_cache_rcu_uaf+0x16c/0x468
[   33.537676]  kunit_try_run_case+0x14c/0x3d0
[   33.538884]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.539673]  kthread+0x24c/0x2d0
[   33.540258]  ret_from_fork+0x10/0x20
[   33.540813] 
[   33.541087] The buggy address belongs to the object at fff00000c66a3000
[   33.541087]  which belongs to the cache test_cache of size 200
[   33.543011] The buggy address is located 0 bytes inside of
[   33.543011]  freed 200-byte region [fff00000c66a3000, fff00000c66a30c8)
[   33.544579] 
[   33.544869] The buggy address belongs to the physical page:
[   33.546034] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066a3
[   33.546938] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.548356] page_type: f5(slab)
[   33.548977] raw: 0bfffe0000000000 fff00000c105cb40 dead000000000122 0000000000000000
[   33.550333] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   33.551175] page dumped because: kasan: bad access detected
[   33.552028] 
[   33.552407] Memory state around the buggy address:
[   33.553049]  fff00000c66a2f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.554835]  fff00000c66a2f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.556145] >fff00000c66a3000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.557204]                    ^
[   33.557806]  fff00000c66a3080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   33.559399]  fff00000c66a3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.560469] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   33.389694] ==================================================================
[   33.391375] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3b8
[   33.392352] Free of addr fff00000c66ad001 by task kunit_try_catch/199
[   33.393038] 
[   33.393470] CPU: 1 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   33.395170] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.395782] Hardware name: linux,dummy-virt (DT)
[   33.396345] Call trace:
[   33.396794]  show_stack+0x20/0x38 (C)
[   33.397522]  dump_stack_lvl+0x8c/0xd0
[   33.398476]  print_report+0x118/0x5e0
[   33.399094]  kasan_report_invalid_free+0xb0/0xd8
[   33.399736]  check_slab_allocation+0xfc/0x108
[   33.400480]  __kasan_slab_pre_free+0x2c/0x48
[   33.401015]  kmem_cache_free+0xf0/0x470
[   33.401778]  kmem_cache_invalid_free+0x184/0x3b8
[   33.402462]  kunit_try_run_case+0x14c/0x3d0
[   33.403150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.403852]  kthread+0x24c/0x2d0
[   33.404499]  ret_from_fork+0x10/0x20
[   33.405292] 
[   33.405613] Allocated by task 199:
[   33.407076]  kasan_save_stack+0x3c/0x68
[   33.407383]  kasan_save_track+0x20/0x40
[   33.407711]  kasan_save_alloc_info+0x40/0x58
[   33.408538]  __kasan_slab_alloc+0xa8/0xb0
[   33.409255]  kmem_cache_alloc_noprof+0x108/0x398
[   33.409906]  kmem_cache_invalid_free+0x12c/0x3b8
[   33.411174]  kunit_try_run_case+0x14c/0x3d0
[   33.411600]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.412463]  kthread+0x24c/0x2d0
[   33.413246]  ret_from_fork+0x10/0x20
[   33.414075] 
[   33.414697] The buggy address belongs to the object at fff00000c66ad000
[   33.414697]  which belongs to the cache test_cache of size 200
[   33.416492] The buggy address is located 1 bytes inside of
[   33.416492]  200-byte region [fff00000c66ad000, fff00000c66ad0c8)
[   33.417494] 
[   33.417970] The buggy address belongs to the physical page:
[   33.419387] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ad
[   33.420911] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.421641] page_type: f5(slab)
[   33.422492] raw: 0bfffe0000000000 fff00000c5699c80 dead000000000122 0000000000000000
[   33.424023] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   33.425297] page dumped because: kasan: bad access detected
[   33.426028] 
[   33.426350] Memory state around the buggy address:
[   33.427830]  fff00000c66acf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.428982]  fff00000c66acf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.429573] >fff00000c66ad000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.430818]                    ^
[   33.431305]  fff00000c66ad080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   33.432266]  fff00000c66ad100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.433124] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   33.323510] ==================================================================
[   33.325150] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   33.326037] Free of addr fff00000c66ed000 by task kunit_try_catch/197
[   33.326738] 
[   33.327173] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   33.328457] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.328989] Hardware name: linux,dummy-virt (DT)
[   33.329683] Call trace:
[   33.330041]  show_stack+0x20/0x38 (C)
[   33.330753]  dump_stack_lvl+0x8c/0xd0
[   33.331360]  print_report+0x118/0x5e0
[   33.331920]  kasan_report_invalid_free+0xb0/0xd8
[   33.332673]  check_slab_allocation+0xd4/0x108
[   33.333260]  __kasan_slab_pre_free+0x2c/0x48
[   33.333828]  kmem_cache_free+0xf0/0x470
[   33.334489]  kmem_cache_double_free+0x190/0x3c8
[   33.335135]  kunit_try_run_case+0x14c/0x3d0
[   33.335890]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.336644]  kthread+0x24c/0x2d0
[   33.337243]  ret_from_fork+0x10/0x20
[   33.337838] 
[   33.338142] Allocated by task 197:
[   33.338577]  kasan_save_stack+0x3c/0x68
[   33.339291]  kasan_save_track+0x20/0x40
[   33.339826]  kasan_save_alloc_info+0x40/0x58
[   33.340472]  __kasan_slab_alloc+0xa8/0xb0
[   33.341088]  kmem_cache_alloc_noprof+0x108/0x398
[   33.341755]  kmem_cache_double_free+0x12c/0x3c8
[   33.342264]  kunit_try_run_case+0x14c/0x3d0
[   33.343028]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.343700]  kthread+0x24c/0x2d0
[   33.344184]  ret_from_fork+0x10/0x20
[   33.344676] 
[   33.345061] Freed by task 197:
[   33.345537]  kasan_save_stack+0x3c/0x68
[   33.346063]  kasan_save_track+0x20/0x40
[   33.346766]  kasan_save_free_info+0x4c/0x78
[   33.347431]  __kasan_slab_free+0x6c/0x98
[   33.348110]  kmem_cache_free+0x118/0x470
[   33.348709]  kmem_cache_double_free+0x140/0x3c8
[   33.349438]  kunit_try_run_case+0x14c/0x3d0
[   33.349982]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.350851]  kthread+0x24c/0x2d0
[   33.351339]  ret_from_fork+0x10/0x20
[   33.352009] 
[   33.352338] The buggy address belongs to the object at fff00000c66ed000
[   33.352338]  which belongs to the cache test_cache of size 200
[   33.353856] The buggy address is located 0 bytes inside of
[   33.353856]  200-byte region [fff00000c66ed000, fff00000c66ed0c8)
[   33.355208] 
[   33.355542] The buggy address belongs to the physical page:
[   33.356445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066ed
[   33.357381] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.358209] page_type: f5(slab)
[   33.358681] raw: 0bfffe0000000000 fff00000c5699b40 dead000000000122 0000000000000000
[   33.359777] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   33.360828] page dumped because: kasan: bad access detected
[   33.361727] 
[   33.362055] Memory state around the buggy address:
[   33.362706]  fff00000c66ecf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.363508]  fff00000c66ecf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.364675] >fff00000c66ed000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.365442]                    ^
[   33.365881]  fff00000c66ed080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   33.366925]  fff00000c66ed100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.367971] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   33.228730] ==================================================================
[   33.229800] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x33c/0x428
[   33.230511] Read of size 1 at addr fff00000c66cd0c8 by task kunit_try_catch/195
[   33.232062] 
[   33.232402] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   33.234607] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.235171] Hardware name: linux,dummy-virt (DT)
[   33.235917] Call trace:
[   33.236314]  show_stack+0x20/0x38 (C)
[   33.236884]  dump_stack_lvl+0x8c/0xd0
[   33.237468]  print_report+0x118/0x5e0
[   33.238502]  kasan_report+0xc8/0x118
[   33.239337]  __asan_report_load1_noabort+0x20/0x30
[   33.240312]  kmem_cache_oob+0x33c/0x428
[   33.241363]  kunit_try_run_case+0x14c/0x3d0
[   33.242114]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.243474]  kthread+0x24c/0x2d0
[   33.244743]  ret_from_fork+0x10/0x20
[   33.245356] 
[   33.245734] Allocated by task 195:
[   33.246589]  kasan_save_stack+0x3c/0x68
[   33.247754]  kasan_save_track+0x20/0x40
[   33.248329]  kasan_save_alloc_info+0x40/0x58
[   33.248937]  __kasan_slab_alloc+0xa8/0xb0
[   33.249583]  kmem_cache_alloc_noprof+0x108/0x398
[   33.251057]  kmem_cache_oob+0x12c/0x428
[   33.251607]  kunit_try_run_case+0x14c/0x3d0
[   33.252570]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.253376]  kthread+0x24c/0x2d0
[   33.254665]  ret_from_fork+0x10/0x20
[   33.255091] 
[   33.255263] The buggy address belongs to the object at fff00000c66cd000
[   33.255263]  which belongs to the cache test_cache of size 200
[   33.256244] The buggy address is located 0 bytes to the right of
[   33.256244]  allocated 200-byte region [fff00000c66cd000, fff00000c66cd0c8)
[   33.257792] 
[   33.258692] The buggy address belongs to the physical page:
[   33.259420] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066cd
[   33.260359] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.261573] page_type: f5(slab)
[   33.262762] raw: 0bfffe0000000000 fff00000c5699a00 dead000000000122 0000000000000000
[   33.263894] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   33.264857] page dumped because: kasan: bad access detected
[   33.265939] 
[   33.266533] Memory state around the buggy address:
[   33.268116]  fff00000c66ccf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.269106]  fff00000c66cd000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.270147] >fff00000c66cd080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   33.271011]                                               ^
[   33.272552]  fff00000c66cd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.273336]  fff00000c66cd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.275463] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[   33.133399] ==================================================================
[   33.135468] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   33.136326] Read of size 8 at addr fff00000c6609440 by task kunit_try_catch/188
[   33.137242] 
[   33.138417] CPU: 0 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   33.139816] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.140340] Hardware name: linux,dummy-virt (DT)
[   33.140857] Call trace:
[   33.141340]  show_stack+0x20/0x38 (C)
[   33.142123]  dump_stack_lvl+0x8c/0xd0
[   33.143232]  print_report+0x118/0x5e0
[   33.143723]  kasan_report+0xc8/0x118
[   33.144571]  __asan_report_load8_noabort+0x20/0x30
[   33.145543]  workqueue_uaf+0x480/0x4a8
[   33.146189]  kunit_try_run_case+0x14c/0x3d0
[   33.146930]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.148144]  kthread+0x24c/0x2d0
[   33.148805]  ret_from_fork+0x10/0x20
[   33.149439] 
[   33.149770] Allocated by task 188:
[   33.150450]  kasan_save_stack+0x3c/0x68
[   33.151745]  kasan_save_track+0x20/0x40
[   33.152790]  kasan_save_alloc_info+0x40/0x58
[   33.153271]  __kasan_kmalloc+0xd4/0xd8
[   33.153847]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.155080]  workqueue_uaf+0x13c/0x4a8
[   33.155673]  kunit_try_run_case+0x14c/0x3d0
[   33.156473]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.157193]  kthread+0x24c/0x2d0
[   33.157935]  ret_from_fork+0x10/0x20
[   33.158442] 
[   33.158739] Freed by task 8:
[   33.159242]  kasan_save_stack+0x3c/0x68
[   33.160738]  kasan_save_track+0x20/0x40
[   33.161222]  kasan_save_free_info+0x4c/0x78
[   33.161821]  __kasan_slab_free+0x6c/0x98
[   33.162279]  kfree+0x114/0x3c8
[   33.163288]  workqueue_uaf_work+0x18/0x30
[   33.163822]  process_one_work+0x530/0xf98
[   33.164449]  worker_thread+0x614/0xf28
[   33.164994]  kthread+0x24c/0x2d0
[   33.165578]  ret_from_fork+0x10/0x20
[   33.166777] 
[   33.167128] Last potentially related work creation:
[   33.167618]  kasan_save_stack+0x3c/0x68
[   33.168320]  kasan_record_aux_stack+0xb4/0xc8
[   33.170109]  __queue_work+0x65c/0xfd8
[   33.170676]  queue_work_on+0xbc/0xf8
[   33.171247]  workqueue_uaf+0x210/0x4a8
[   33.171908]  kunit_try_run_case+0x14c/0x3d0
[   33.172497]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.173189]  kthread+0x24c/0x2d0
[   33.173692]  ret_from_fork+0x10/0x20
[   33.174690] 
[   33.174999] The buggy address belongs to the object at fff00000c6609440
[   33.174999]  which belongs to the cache kmalloc-32 of size 32
[   33.176406] The buggy address is located 0 bytes inside of
[   33.176406]  freed 32-byte region [fff00000c6609440, fff00000c6609460)
[   33.178751] 
[   33.179162] The buggy address belongs to the physical page:
[   33.180311] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106609
[   33.181437] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.182141] page_type: f5(slab)
[   33.182731] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   33.184394] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   33.185328] page dumped because: kasan: bad access detected
[   33.186620] 
[   33.187320] Memory state around the buggy address:
[   33.188012]  fff00000c6609300: 00 00 00 fc fc fc fc fc 00 00 05 fc fc fc fc fc
[   33.188993]  fff00000c6609380: 00 00 07 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   33.189816] >fff00000c6609400: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   33.191073]                                            ^
[   33.191805]  fff00000c6609480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.192726]  fff00000c6609500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.193531] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[   33.046346] ==================================================================
[   33.047383] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   33.048316] Read of size 4 at addr fff00000c67471c0 by task swapper/1/0
[   33.049563] 
[   33.050250] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   33.052445] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.053100] Hardware name: linux,dummy-virt (DT)
[   33.053863] Call trace:
[   33.054443]  show_stack+0x20/0x38 (C)
[   33.055335]  dump_stack_lvl+0x8c/0xd0
[   33.055917]  print_report+0x118/0x5e0
[   33.056501]  kasan_report+0xc8/0x118
[   33.057167]  __asan_report_load4_noabort+0x20/0x30
[   33.057763]  rcu_uaf_reclaim+0x64/0x70
[   33.058435]  rcu_core+0x9f4/0x1e20
[   33.058986]  rcu_core_si+0x18/0x30
[   33.059611]  handle_softirqs+0x374/0xb20
[   33.060533]  __do_softirq+0x1c/0x28
[   33.061101]  ____do_softirq+0x18/0x30
[   33.062028]  call_on_irq_stack+0x24/0x58
[   33.062674]  do_softirq_own_stack+0x24/0x38
[   33.063368]  __irq_exit_rcu+0x1fc/0x318
[   33.063925]  irq_exit_rcu+0x1c/0x80
[   33.064675]  el1_interrupt+0x38/0x58
[   33.065436]  el1h_64_irq_handler+0x18/0x28
[   33.066420]  el1h_64_irq+0x6c/0x70
[   33.067138]  arch_local_irq_enable+0x4/0x8 (P)
[   33.067826]  default_idle_call+0x6c/0x78 (L)
[   33.068482]  do_idle+0x384/0x4e8
[   33.069105]  cpu_startup_entry+0x64/0x80
[   33.069683]  secondary_start_kernel+0x288/0x340
[   33.070726]  __secondary_switched+0xc0/0xc8
[   33.071483] 
[   33.071851] Allocated by task 186:
[   33.072409]  kasan_save_stack+0x3c/0x68
[   33.073129]  kasan_save_track+0x20/0x40
[   33.074030]  kasan_save_alloc_info+0x40/0x58
[   33.074764]  __kasan_kmalloc+0xd4/0xd8
[   33.075486]  __kmalloc_cache_noprof+0x15c/0x3c0
[   33.076171]  rcu_uaf+0xb0/0x2d0
[   33.076718]  kunit_try_run_case+0x14c/0x3d0
[   33.077387]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.078347]  kthread+0x24c/0x2d0
[   33.079222]  ret_from_fork+0x10/0x20
[   33.079911] 
[   33.080369] Freed by task 0:
[   33.080886]  kasan_save_stack+0x3c/0x68
[   33.081400]  kasan_save_track+0x20/0x40
[   33.082480]  kasan_save_free_info+0x4c/0x78
[   33.083310]  __kasan_slab_free+0x6c/0x98
[   33.083990]  kfree+0x114/0x3c8
[   33.084455]  rcu_uaf_reclaim+0x28/0x70
[   33.085012]  rcu_core+0x9f4/0x1e20
[   33.085600]  rcu_core_si+0x18/0x30
[   33.086168]  handle_softirqs+0x374/0xb20
[   33.086879]  __do_softirq+0x1c/0x28
[   33.087482] 
[   33.088236] Last potentially related work creation:
[   33.088939]  kasan_save_stack+0x3c/0x68
[   33.089592]  kasan_record_aux_stack+0xb4/0xc8
[   33.090718]  __call_rcu_common.constprop.0+0x74/0xa10
[   33.091420]  call_rcu+0x18/0x30
[   33.092004]  rcu_uaf+0x14c/0x2d0
[   33.092558]  kunit_try_run_case+0x14c/0x3d0
[   33.093205]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.094203]  kthread+0x24c/0x2d0
[   33.094781]  ret_from_fork+0x10/0x20
[   33.095359] 
[   33.095770] The buggy address belongs to the object at fff00000c67471c0
[   33.095770]  which belongs to the cache kmalloc-32 of size 32
[   33.097114] The buggy address is located 0 bytes inside of
[   33.097114]  freed 32-byte region [fff00000c67471c0, fff00000c67471e0)
[   33.098925] 
[   33.099241] The buggy address belongs to the physical page:
[   33.099877] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106747
[   33.100956] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.102059] page_type: f5(slab)
[   33.102682] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   33.103471] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   33.104521] page dumped because: kasan: bad access detected
[   33.105141] 
[   33.105496] Memory state around the buggy address:
[   33.106694]  fff00000c6747080: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   33.107643]  fff00000c6747100: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   33.108534] >fff00000c6747180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   33.109496]                                            ^
[   33.110184]  fff00000c6747200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.111584]  fff00000c6747280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.112477] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[   32.964754] ==================================================================
[   32.965497] BUG: KASAN: slab-use-after-free in ksize_uaf+0x548/0x600
[   32.966963] Read of size 1 at addr fff00000c6763a78 by task kunit_try_catch/184
[   32.968791] 
[   32.969321] CPU: 0 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   32.971137] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.971935] Hardware name: linux,dummy-virt (DT)
[   32.972785] Call trace:
[   32.973254]  show_stack+0x20/0x38 (C)
[   32.973846]  dump_stack_lvl+0x8c/0xd0
[   32.974355]  print_report+0x118/0x5e0
[   32.975400]  kasan_report+0xc8/0x118
[   32.976039]  __asan_report_load1_noabort+0x20/0x30
[   32.976738]  ksize_uaf+0x548/0x600
[   32.977382]  kunit_try_run_case+0x14c/0x3d0
[   32.978729]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.979307]  kthread+0x24c/0x2d0
[   32.979843]  ret_from_fork+0x10/0x20
[   32.980290] 
[   32.980567] Allocated by task 184:
[   32.981302]  kasan_save_stack+0x3c/0x68
[   32.982127]  kasan_save_track+0x20/0x40
[   32.983600]  kasan_save_alloc_info+0x40/0x58
[   32.984336]  __kasan_kmalloc+0xd4/0xd8
[   32.984873]  __kmalloc_cache_noprof+0x15c/0x3c0
[   32.985486]  ksize_uaf+0xb8/0x600
[   32.986031]  kunit_try_run_case+0x14c/0x3d0
[   32.986617]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.987398]  kthread+0x24c/0x2d0
[   32.988694]  ret_from_fork+0x10/0x20
[   32.989585] 
[   32.990702] Freed by task 184:
[   32.991103]  kasan_save_stack+0x3c/0x68
[   32.991874]  kasan_save_track+0x20/0x40
[   32.992334]  kasan_save_free_info+0x4c/0x78
[   32.993125]  __kasan_slab_free+0x6c/0x98
[   32.994404]  kfree+0x114/0x3c8
[   32.995330]  ksize_uaf+0x11c/0x600
[   32.996017]  kunit_try_run_case+0x14c/0x3d0
[   32.996859]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.998193]  kthread+0x24c/0x2d0
[   32.998770]  ret_from_fork+0x10/0x20
[   32.999371] 
[   32.999867] The buggy address belongs to the object at fff00000c6763a00
[   32.999867]  which belongs to the cache kmalloc-128 of size 128
[   33.001448] The buggy address is located 120 bytes inside of
[   33.001448]  freed 128-byte region [fff00000c6763a00, fff00000c6763a80)
[   33.003992] 
[   33.004406] The buggy address belongs to the physical page:
[   33.005211] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106763
[   33.006548] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.007480] page_type: f5(slab)
[   33.008355] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.009229] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.010463] page dumped because: kasan: bad access detected
[   33.011013] 
[   33.011253] Memory state around the buggy address:
[   33.011725]  fff00000c6763900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.012557]  fff00000c6763980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.013226] >fff00000c6763a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.014575]                                                                 ^
[   33.016013]  fff00000c6763a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.016868]  fff00000c6763b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.017785] ==================================================================
[   32.909432] ==================================================================
[   32.910500] BUG: KASAN: slab-use-after-free in ksize_uaf+0x59c/0x600
[   32.911841] Read of size 1 at addr fff00000c6763a00 by task kunit_try_catch/184
[   32.912568] 
[   32.912934] CPU: 0 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   32.914774] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.915461] Hardware name: linux,dummy-virt (DT)
[   32.916251] Call trace:
[   32.916779]  show_stack+0x20/0x38 (C)
[   32.917530]  dump_stack_lvl+0x8c/0xd0
[   32.918465]  print_report+0x118/0x5e0
[   32.919459]  kasan_report+0xc8/0x118
[   32.920282]  __asan_report_load1_noabort+0x20/0x30
[   32.921048]  ksize_uaf+0x59c/0x600
[   32.921508]  kunit_try_run_case+0x14c/0x3d0
[   32.922817]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.923742]  kthread+0x24c/0x2d0
[   32.924304]  ret_from_fork+0x10/0x20
[   32.925098] 
[   32.925407] Allocated by task 184:
[   32.926668]  kasan_save_stack+0x3c/0x68
[   32.927261]  kasan_save_track+0x20/0x40
[   32.927727]  kasan_save_alloc_info+0x40/0x58
[   32.928181]  __kasan_kmalloc+0xd4/0xd8
[   32.928716]  __kmalloc_cache_noprof+0x15c/0x3c0
[   32.929437]  ksize_uaf+0xb8/0x600
[   32.930671]  kunit_try_run_case+0x14c/0x3d0
[   32.931510]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.932399]  kthread+0x24c/0x2d0
[   32.932959]  ret_from_fork+0x10/0x20
[   32.933651] 
[   32.934306] Freed by task 184:
[   32.934819]  kasan_save_stack+0x3c/0x68
[   32.935384]  kasan_save_track+0x20/0x40
[   32.936524]  kasan_save_free_info+0x4c/0x78
[   32.937432]  __kasan_slab_free+0x6c/0x98
[   32.938215]  kfree+0x114/0x3c8
[   32.939284]  ksize_uaf+0x11c/0x600
[   32.939847]  kunit_try_run_case+0x14c/0x3d0
[   32.940459]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.941266]  kthread+0x24c/0x2d0
[   32.941759]  ret_from_fork+0x10/0x20
[   32.942860] 
[   32.943427] The buggy address belongs to the object at fff00000c6763a00
[   32.943427]  which belongs to the cache kmalloc-128 of size 128
[   32.945429] The buggy address is located 0 bytes inside of
[   32.945429]  freed 128-byte region [fff00000c6763a00, fff00000c6763a80)
[   32.947160] 
[   32.947673] The buggy address belongs to the physical page:
[   32.948176] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106763
[   32.949307] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.950145] page_type: f5(slab)
[   32.950619] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.952669] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.954019] page dumped because: kasan: bad access detected
[   32.955290] 
[   32.955565] Memory state around the buggy address:
[   32.956534]  fff00000c6763900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.957619]  fff00000c6763980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.958878] >fff00000c6763a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.959862]                    ^
[   32.960961]  fff00000c6763a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.961993]  fff00000c6763b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.963034] ==================================================================
[   32.851199] ==================================================================
[   32.852616] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x600
[   32.854343] Read of size 1 at addr fff00000c6763a00 by task kunit_try_catch/184
[   32.855198] 
[   32.855476] CPU: 0 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   32.856986] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.858017] Hardware name: linux,dummy-virt (DT)
[   32.859085] Call trace:
[   32.859786]  show_stack+0x20/0x38 (C)
[   32.860304]  dump_stack_lvl+0x8c/0xd0
[   32.860914]  print_report+0x118/0x5e0
[   32.861397]  kasan_report+0xc8/0x118
[   32.862545]  __kasan_check_byte+0x54/0x70
[   32.863855]  ksize+0x30/0x88
[   32.864256]  ksize_uaf+0x168/0x600
[   32.865055]  kunit_try_run_case+0x14c/0x3d0
[   32.866218]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.867007]  kthread+0x24c/0x2d0
[   32.867616]  ret_from_fork+0x10/0x20
[   32.868187] 
[   32.868502] Allocated by task 184:
[   32.869510]  kasan_save_stack+0x3c/0x68
[   32.870257]  kasan_save_track+0x20/0x40
[   32.871046]  kasan_save_alloc_info+0x40/0x58
[   32.872256]  __kasan_kmalloc+0xd4/0xd8
[   32.872686]  __kmalloc_cache_noprof+0x15c/0x3c0
[   32.873132]  ksize_uaf+0xb8/0x600
[   32.873804]  kunit_try_run_case+0x14c/0x3d0
[   32.874896]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.876087]  kthread+0x24c/0x2d0
[   32.876472]  ret_from_fork+0x10/0x20
[   32.877351] 
[   32.877731] Freed by task 184:
[   32.878120]  kasan_save_stack+0x3c/0x68
[   32.879411]  kasan_save_track+0x20/0x40
[   32.880110]  kasan_save_free_info+0x4c/0x78
[   32.881025]  __kasan_slab_free+0x6c/0x98
[   32.881939]  kfree+0x114/0x3c8
[   32.882784]  ksize_uaf+0x11c/0x600
[   32.883347]  kunit_try_run_case+0x14c/0x3d0
[   32.883927]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.884412]  kthread+0x24c/0x2d0
[   32.885555]  ret_from_fork+0x10/0x20
[   32.886565] 
[   32.887256] The buggy address belongs to the object at fff00000c6763a00
[   32.887256]  which belongs to the cache kmalloc-128 of size 128
[   32.888884] The buggy address is located 0 bytes inside of
[   32.888884]  freed 128-byte region [fff00000c6763a00, fff00000c6763a80)
[   32.891288] 
[   32.891845] The buggy address belongs to the physical page:
[   32.892688] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106763
[   32.893827] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.894900] page_type: f5(slab)
[   32.895354] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.897241] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.898362] page dumped because: kasan: bad access detected
[   32.899608] 
[   32.899966] Memory state around the buggy address:
[   32.900773]  fff00000c6763900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.901651]  fff00000c6763980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.902983] >fff00000c6763a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.904291]                    ^
[   32.905028]  fff00000c6763a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.906445]  fff00000c6763b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.907325] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   32.795035] ==================================================================
[   32.796669] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x6a0/0x750
[   32.798048] Read of size 1 at addr fff00000c672c07f by task kunit_try_catch/182
[   32.799024] 
[   32.799447] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   32.800812] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.801396] Hardware name: linux,dummy-virt (DT)
[   32.802297] Call trace:
[   32.803111]  show_stack+0x20/0x38 (C)
[   32.804337]  dump_stack_lvl+0x8c/0xd0
[   32.805135]  print_report+0x118/0x5e0
[   32.805807]  kasan_report+0xc8/0x118
[   32.806373]  __asan_report_load1_noabort+0x20/0x30
[   32.807482]  ksize_unpoisons_memory+0x6a0/0x750
[   32.808442]  kunit_try_run_case+0x14c/0x3d0
[   32.809314]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.810177]  kthread+0x24c/0x2d0
[   32.811859]  ret_from_fork+0x10/0x20
[   32.812410] 
[   32.812835] Allocated by task 182:
[   32.813346]  kasan_save_stack+0x3c/0x68
[   32.813957]  kasan_save_track+0x20/0x40
[   32.814517]  kasan_save_alloc_info+0x40/0x58
[   32.815379]  __kasan_kmalloc+0xd4/0xd8
[   32.816382]  __kmalloc_cache_noprof+0x15c/0x3c0
[   32.817000]  ksize_unpoisons_memory+0xc0/0x750
[   32.818347]  kunit_try_run_case+0x14c/0x3d0
[   32.818872]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.819293]  kthread+0x24c/0x2d0
[   32.819560]  ret_from_fork+0x10/0x20
[   32.819894] 
[   32.820266] The buggy address belongs to the object at fff00000c672c000
[   32.820266]  which belongs to the cache kmalloc-128 of size 128
[   32.823374] The buggy address is located 12 bytes to the right of
[   32.823374]  allocated 115-byte region [fff00000c672c000, fff00000c672c073)
[   32.825003] 
[   32.825354] The buggy address belongs to the physical page:
[   32.826671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10672c
[   32.828713] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.829531] page_type: f5(slab)
[   32.830732] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.831709] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.832369] page dumped because: kasan: bad access detected
[   32.832746] 
[   32.832915] Memory state around the buggy address:
[   32.833225]  fff00000c672bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.833706]  fff00000c672bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.834442] >fff00000c672c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.836506]                                                                 ^
[   32.837533]  fff00000c672c080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.839303]  fff00000c672c100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.840309] ==================================================================
[   32.744892] ==================================================================
[   32.746555] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x750
[   32.747255] Read of size 1 at addr fff00000c672c078 by task kunit_try_catch/182
[   32.749184] 
[   32.749783] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   32.751575] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.752183] Hardware name: linux,dummy-virt (DT)
[   32.752645] Call trace:
[   32.753198]  show_stack+0x20/0x38 (C)
[   32.754169]  dump_stack_lvl+0x8c/0xd0
[   32.755186]  print_report+0x118/0x5e0
[   32.756011]  kasan_report+0xc8/0x118
[   32.756826]  __asan_report_load1_noabort+0x20/0x30
[   32.757274]  ksize_unpoisons_memory+0x628/0x750
[   32.758898]  kunit_try_run_case+0x14c/0x3d0
[   32.759532]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.760430]  kthread+0x24c/0x2d0
[   32.760992]  ret_from_fork+0x10/0x20
[   32.761570] 
[   32.762420] Allocated by task 182:
[   32.763335]  kasan_save_stack+0x3c/0x68
[   32.763787]  kasan_save_track+0x20/0x40
[   32.764211]  kasan_save_alloc_info+0x40/0x58
[   32.764967]  __kasan_kmalloc+0xd4/0xd8
[   32.765662]  __kmalloc_cache_noprof+0x15c/0x3c0
[   32.766590]  ksize_unpoisons_memory+0xc0/0x750
[   32.767888]  kunit_try_run_case+0x14c/0x3d0
[   32.768378]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.769438]  kthread+0x24c/0x2d0
[   32.770225]  ret_from_fork+0x10/0x20
[   32.771653] 
[   32.772334] The buggy address belongs to the object at fff00000c672c000
[   32.772334]  which belongs to the cache kmalloc-128 of size 128
[   32.774372] The buggy address is located 5 bytes to the right of
[   32.774372]  allocated 115-byte region [fff00000c672c000, fff00000c672c073)
[   32.776345] 
[   32.776652] The buggy address belongs to the physical page:
[   32.777391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10672c
[   32.779132] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.780050] page_type: f5(slab)
[   32.780544] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.782306] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.783234] page dumped because: kasan: bad access detected
[   32.784292] 
[   32.784546] Memory state around the buggy address:
[   32.785416]  fff00000c672bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.786180]  fff00000c672bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.788311] >fff00000c672c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.789375]                                                                 ^
[   32.790650]  fff00000c672c080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.791536]  fff00000c672c100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.792668] ==================================================================
[   32.697320] ==================================================================
[   32.699108] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x638/0x750
[   32.700444] Read of size 1 at addr fff00000c672c073 by task kunit_try_catch/182
[   32.701350] 
[   32.701712] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   32.704834] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.706262] Hardware name: linux,dummy-virt (DT)
[   32.707585] Call trace:
[   32.708034]  show_stack+0x20/0x38 (C)
[   32.708437]  dump_stack_lvl+0x8c/0xd0
[   32.709220]  print_report+0x118/0x5e0
[   32.709852]  kasan_report+0xc8/0x118
[   32.710490]  __asan_report_load1_noabort+0x20/0x30
[   32.711881]  ksize_unpoisons_memory+0x638/0x750
[   32.712431]  kunit_try_run_case+0x14c/0x3d0
[   32.712863]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.713757]  kthread+0x24c/0x2d0
[   32.714315]  ret_from_fork+0x10/0x20
[   32.714978] 
[   32.716045] Allocated by task 182:
[   32.716453]  kasan_save_stack+0x3c/0x68
[   32.716919]  kasan_save_track+0x20/0x40
[   32.717512]  kasan_save_alloc_info+0x40/0x58
[   32.718270]  __kasan_kmalloc+0xd4/0xd8
[   32.719514]  __kmalloc_cache_noprof+0x15c/0x3c0
[   32.720081]  ksize_unpoisons_memory+0xc0/0x750
[   32.720734]  kunit_try_run_case+0x14c/0x3d0
[   32.721321]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.722809]  kthread+0x24c/0x2d0
[   32.723307]  ret_from_fork+0x10/0x20
[   32.724072] 
[   32.724442] The buggy address belongs to the object at fff00000c672c000
[   32.724442]  which belongs to the cache kmalloc-128 of size 128
[   32.726677] The buggy address is located 0 bytes to the right of
[   32.726677]  allocated 115-byte region [fff00000c672c000, fff00000c672c073)
[   32.728078] 
[   32.728458] The buggy address belongs to the physical page:
[   32.729520] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10672c
[   32.730820] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.731435] page_type: f5(slab)
[   32.732247] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.733136] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.734196] page dumped because: kasan: bad access detected
[   32.735405] 
[   32.735735] Memory state around the buggy address:
[   32.736363]  fff00000c672bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.737192]  fff00000c672bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.738336] >fff00000c672c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.739487]                                                              ^
[   32.740921]  fff00000c672c080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.741941]  fff00000c672c100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.743005] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
[   32.627877] ==================================================================
[   32.629586] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   32.630744] Free of addr fff00000c5b31d20 by task kunit_try_catch/180
[   32.632043] 
[   32.632330] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   32.633606] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.634263] Hardware name: linux,dummy-virt (DT)
[   32.635207] Call trace:
[   32.635517]  show_stack+0x20/0x38 (C)
[   32.636122]  dump_stack_lvl+0x8c/0xd0
[   32.637196]  print_report+0x118/0x5e0
[   32.637932]  kasan_report_invalid_free+0xb0/0xd8
[   32.639252]  check_slab_allocation+0xd4/0x108
[   32.640025]  __kasan_slab_pre_free+0x2c/0x48
[   32.641150]  kfree+0xe8/0x3c8
[   32.641934]  kfree_sensitive+0x3c/0xb0
[   32.642667]  kmalloc_double_kzfree+0x168/0x308
[   32.643147]  kunit_try_run_case+0x14c/0x3d0
[   32.643661]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.644554]  kthread+0x24c/0x2d0
[   32.645063]  ret_from_fork+0x10/0x20
[   32.645719] 
[   32.646390] Allocated by task 180:
[   32.647329]  kasan_save_stack+0x3c/0x68
[   32.648226]  kasan_save_track+0x20/0x40
[   32.648836]  kasan_save_alloc_info+0x40/0x58
[   32.649417]  __kasan_kmalloc+0xd4/0xd8
[   32.650338]  __kmalloc_cache_noprof+0x15c/0x3c0
[   32.651393]  kmalloc_double_kzfree+0xb8/0x308
[   32.652180]  kunit_try_run_case+0x14c/0x3d0
[   32.652853]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.653693]  kthread+0x24c/0x2d0
[   32.654212]  ret_from_fork+0x10/0x20
[   32.654835] 
[   32.655206] Freed by task 180:
[   32.656278]  kasan_save_stack+0x3c/0x68
[   32.656915]  kasan_save_track+0x20/0x40
[   32.657587]  kasan_save_free_info+0x4c/0x78
[   32.658331]  __kasan_slab_free+0x6c/0x98
[   32.659229]  kfree+0x114/0x3c8
[   32.660560]  kfree_sensitive+0x80/0xb0
[   32.661163]  kmalloc_double_kzfree+0x11c/0x308
[   32.661907]  kunit_try_run_case+0x14c/0x3d0
[   32.662669]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.663431]  kthread+0x24c/0x2d0
[   32.664348]  ret_from_fork+0x10/0x20
[   32.664785] 
[   32.665057] The buggy address belongs to the object at fff00000c5b31d20
[   32.665057]  which belongs to the cache kmalloc-16 of size 16
[   32.667900] The buggy address is located 0 bytes inside of
[   32.667900]  16-byte region [fff00000c5b31d20, fff00000c5b31d30)
[   32.670325] 
[   32.671122] The buggy address belongs to the physical page:
[   32.672064] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b31
[   32.673130] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.674372] page_type: f5(slab)
[   32.675174] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   32.676269] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   32.677048] page dumped because: kasan: bad access detected
[   32.678095] 
[   32.678519] Memory state around the buggy address:
[   32.679908]  fff00000c5b31c00: 00 06 fc fc 00 06 fc fc fa fb fc fc 00 06 fc fc
[   32.681219]  fff00000c5b31c80: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.683061] >fff00000c5b31d00: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   32.683959]                                ^
[   32.684517]  fff00000c5b31d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.685382]  fff00000c5b31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.686520] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   31.984585] ==================================================================
[   31.985701] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   31.986511] Write of size 128 at addr fff00000c6723d00 by task kunit_try_catch/158
[   31.987480] 
[   31.988177] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   31.989371] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.990511] Hardware name: linux,dummy-virt (DT)
[   31.991135] Call trace:
[   31.991649]  show_stack+0x20/0x38 (C)
[   31.992230]  dump_stack_lvl+0x8c/0xd0
[   31.992881]  print_report+0x118/0x5e0
[   31.993407]  kasan_report+0xc8/0x118
[   31.994383]  kasan_check_range+0x100/0x1a8
[   31.995039]  __asan_memset+0x34/0x78
[   31.995586]  kmalloc_oob_in_memset+0x144/0x2d0
[   31.996316]  kunit_try_run_case+0x14c/0x3d0
[   31.996946]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.998126]  kthread+0x24c/0x2d0
[   31.998620]  ret_from_fork+0x10/0x20
[   31.999214] 
[   31.999573] Allocated by task 158:
[   32.000036]  kasan_save_stack+0x3c/0x68
[   32.000699]  kasan_save_track+0x20/0x40
[   32.001243]  kasan_save_alloc_info+0x40/0x58
[   32.001920]  __kasan_kmalloc+0xd4/0xd8
[   32.002808]  __kmalloc_cache_noprof+0x15c/0x3c0
[   32.003495]  kmalloc_oob_in_memset+0xb0/0x2d0
[   32.004179]  kunit_try_run_case+0x14c/0x3d0
[   32.004729]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.005545]  kthread+0x24c/0x2d0
[   32.006108]  ret_from_fork+0x10/0x20
[   32.006677] 
[   32.007036] The buggy address belongs to the object at fff00000c6723d00
[   32.007036]  which belongs to the cache kmalloc-128 of size 128
[   32.008839] The buggy address is located 0 bytes inside of
[   32.008839]  allocated 120-byte region [fff00000c6723d00, fff00000c6723d78)
[   32.011305] 
[   32.011796] The buggy address belongs to the physical page:
[   32.012893] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106723
[   32.013947] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.014879] page_type: f5(slab)
[   32.015503] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.016416] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.017391] page dumped because: kasan: bad access detected
[   32.018428] 
[   32.018955] Memory state around the buggy address:
[   32.019580]  fff00000c6723c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   32.020522]  fff00000c6723c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.022228] >fff00000c6723d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.023213]                                                                 ^
[   32.023924]  fff00000c6723d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.025016]  fff00000c6723e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.027048] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[   32.567388] ==================================================================
[   32.568896] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   32.569607] Read of size 1 at addr fff00000c5b31d20 by task kunit_try_catch/180
[   32.570769] 
[   32.571155] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   32.572345] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.573558] Hardware name: linux,dummy-virt (DT)
[   32.574201] Call trace:
[   32.575173]  show_stack+0x20/0x38 (C)
[   32.575998]  dump_stack_lvl+0x8c/0xd0
[   32.576891]  print_report+0x118/0x5e0
[   32.577550]  kasan_report+0xc8/0x118
[   32.578391]  __kasan_check_byte+0x54/0x70
[   32.579027]  kfree_sensitive+0x30/0xb0
[   32.579478]  kmalloc_double_kzfree+0x168/0x308
[   32.580699]  kunit_try_run_case+0x14c/0x3d0
[   32.581323]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.582358]  kthread+0x24c/0x2d0
[   32.582983]  ret_from_fork+0x10/0x20
[   32.584105] 
[   32.584368] Allocated by task 180:
[   32.585062]  kasan_save_stack+0x3c/0x68
[   32.586831]  kasan_save_track+0x20/0x40
[   32.587500]  kasan_save_alloc_info+0x40/0x58
[   32.588085]  __kasan_kmalloc+0xd4/0xd8
[   32.588604]  __kmalloc_cache_noprof+0x15c/0x3c0
[   32.589608]  kmalloc_double_kzfree+0xb8/0x308
[   32.590642]  kunit_try_run_case+0x14c/0x3d0
[   32.591545]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.592291]  kthread+0x24c/0x2d0
[   32.592920]  ret_from_fork+0x10/0x20
[   32.593616] 
[   32.595044] Freed by task 180:
[   32.595580]  kasan_save_stack+0x3c/0x68
[   32.596312]  kasan_save_track+0x20/0x40
[   32.597114]  kasan_save_free_info+0x4c/0x78
[   32.597888]  __kasan_slab_free+0x6c/0x98
[   32.599266]  kfree+0x114/0x3c8
[   32.599702]  kfree_sensitive+0x80/0xb0
[   32.600476]  kmalloc_double_kzfree+0x11c/0x308
[   32.601137]  kunit_try_run_case+0x14c/0x3d0
[   32.601842]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.603030]  kthread+0x24c/0x2d0
[   32.603413]  ret_from_fork+0x10/0x20
[   32.604160] 
[   32.604845] The buggy address belongs to the object at fff00000c5b31d20
[   32.604845]  which belongs to the cache kmalloc-16 of size 16
[   32.606657] The buggy address is located 0 bytes inside of
[   32.606657]  freed 16-byte region [fff00000c5b31d20, fff00000c5b31d30)
[   32.608048] 
[   32.608362] The buggy address belongs to the physical page:
[   32.609242] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b31
[   32.610179] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.611310] page_type: f5(slab)
[   32.612281] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   32.613723] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   32.615459] page dumped because: kasan: bad access detected
[   32.616509] 
[   32.617027] Memory state around the buggy address:
[   32.617820]  fff00000c5b31c00: 00 06 fc fc 00 06 fc fc fa fb fc fc 00 06 fc fc
[   32.618800]  fff00000c5b31c80: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.619834] >fff00000c5b31d00: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   32.622279]                                ^
[   32.623085]  fff00000c5b31d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.624149]  fff00000c5b31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.625105] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[   32.435402] ==================================================================
[   32.436489] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   32.437187] Write of size 33 at addr fff00000c66e4f00 by task kunit_try_catch/174
[   32.438501] 
[   32.439421] CPU: 0 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   32.440794] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.441086] Hardware name: linux,dummy-virt (DT)
[   32.441390] Call trace:
[   32.441595]  show_stack+0x20/0x38 (C)
[   32.442083]  dump_stack_lvl+0x8c/0xd0
[   32.442797]  print_report+0x118/0x5e0
[   32.444190]  kasan_report+0xc8/0x118
[   32.445008]  kasan_check_range+0x100/0x1a8
[   32.445686]  __asan_memset+0x34/0x78
[   32.446262]  kmalloc_uaf_memset+0x170/0x310
[   32.447244]  kunit_try_run_case+0x14c/0x3d0
[   32.448028]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.448742]  kthread+0x24c/0x2d0
[   32.449335]  ret_from_fork+0x10/0x20
[   32.450441] 
[   32.450734] Allocated by task 174:
[   32.451271]  kasan_save_stack+0x3c/0x68
[   32.451931]  kasan_save_track+0x20/0x40
[   32.452495]  kasan_save_alloc_info+0x40/0x58
[   32.453143]  __kasan_kmalloc+0xd4/0xd8
[   32.453746]  __kmalloc_cache_noprof+0x15c/0x3c0
[   32.454788]  kmalloc_uaf_memset+0xb8/0x310
[   32.455359]  kunit_try_run_case+0x14c/0x3d0
[   32.456015]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.457129]  kthread+0x24c/0x2d0
[   32.458049]  ret_from_fork+0x10/0x20
[   32.458790] 
[   32.459196] Freed by task 174:
[   32.459847]  kasan_save_stack+0x3c/0x68
[   32.460421]  kasan_save_track+0x20/0x40
[   32.461236]  kasan_save_free_info+0x4c/0x78
[   32.462128]  __kasan_slab_free+0x6c/0x98
[   32.462681]  kfree+0x114/0x3c8
[   32.463255]  kmalloc_uaf_memset+0x11c/0x310
[   32.463754]  kunit_try_run_case+0x14c/0x3d0
[   32.464516]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.465287]  kthread+0x24c/0x2d0
[   32.465824]  ret_from_fork+0x10/0x20
[   32.466321] 
[   32.467461] The buggy address belongs to the object at fff00000c66e4f00
[   32.467461]  which belongs to the cache kmalloc-64 of size 64
[   32.468973] The buggy address is located 0 bytes inside of
[   32.468973]  freed 64-byte region [fff00000c66e4f00, fff00000c66e4f40)
[   32.471118] 
[   32.471697] The buggy address belongs to the physical page:
[   32.472212] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e4
[   32.473044] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.473959] page_type: f5(slab)
[   32.474688] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.475687] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.476484] page dumped because: kasan: bad access detected
[   32.478132] 
[   32.478837] Memory state around the buggy address:
[   32.479348]  fff00000c66e4e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.480972]  fff00000c66e4e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.482456] >fff00000c66e4f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.483811]                    ^
[   32.484768]  fff00000c66e4f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.486435]  fff00000c66e5000: 00 00 00 fc fc fc fc fc 00 00 00 03 fc fc fc fc
[   32.488014] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   32.312678] ==================================================================
[   32.313990] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e8
[   32.315238] Read of size 64 at addr fff00000c66e4e04 by task kunit_try_catch/170
[   32.316816] 
[   32.317352] CPU: 0 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   32.318951] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.320087] Hardware name: linux,dummy-virt (DT)
[   32.320843] Call trace:
[   32.321318]  show_stack+0x20/0x38 (C)
[   32.322960]  dump_stack_lvl+0x8c/0xd0
[   32.323772]  print_report+0x118/0x5e0
[   32.324276]  kasan_report+0xc8/0x118
[   32.325163]  kasan_check_range+0x100/0x1a8
[   32.326195]  __asan_memmove+0x3c/0x98
[   32.327315]  kmalloc_memmove_invalid_size+0x154/0x2e8
[   32.328106]  kunit_try_run_case+0x14c/0x3d0
[   32.328859]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.329680]  kthread+0x24c/0x2d0
[   32.331217]  ret_from_fork+0x10/0x20
[   32.331777] 
[   32.332093] Allocated by task 170:
[   32.332544]  kasan_save_stack+0x3c/0x68
[   32.333232]  kasan_save_track+0x20/0x40
[   32.334122]  kasan_save_alloc_info+0x40/0x58
[   32.335294]  __kasan_kmalloc+0xd4/0xd8
[   32.336069]  __kmalloc_cache_noprof+0x15c/0x3c0
[   32.336802]  kmalloc_memmove_invalid_size+0xb0/0x2e8
[   32.337566]  kunit_try_run_case+0x14c/0x3d0
[   32.339272]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.340210]  kthread+0x24c/0x2d0
[   32.340973]  ret_from_fork+0x10/0x20
[   32.341503] 
[   32.342025] The buggy address belongs to the object at fff00000c66e4e00
[   32.342025]  which belongs to the cache kmalloc-64 of size 64
[   32.344192] The buggy address is located 4 bytes inside of
[   32.344192]  allocated 64-byte region [fff00000c66e4e00, fff00000c66e4e40)
[   32.346263] 
[   32.346603] The buggy address belongs to the physical page:
[   32.348384] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e4
[   32.349412] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.350813] page_type: f5(slab)
[   32.351307] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.352204] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.353110] page dumped because: kasan: bad access detected
[   32.353928] 
[   32.354202] Memory state around the buggy address:
[   32.355041]  fff00000c66e4d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   32.356436]  fff00000c66e4d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.357761] >fff00000c66e4e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   32.359515]                                            ^
[   32.360111]  fff00000c66e4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.361319]  fff00000c66e4f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.362451] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   32.258398] ==================================================================
[   32.259920] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   32.260504] Read of size 18446744073709551614 at addr fff00000c66e4d84 by task kunit_try_catch/168
[   32.262573] 
[   32.263100] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   32.264468] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.264868] Hardware name: linux,dummy-virt (DT)
[   32.265651] Call trace:
[   32.266415]  show_stack+0x20/0x38 (C)
[   32.267207]  dump_stack_lvl+0x8c/0xd0
[   32.267977]  print_report+0x118/0x5e0
[   32.268454]  kasan_report+0xc8/0x118
[   32.269044]  kasan_check_range+0x100/0x1a8
[   32.269936]  __asan_memmove+0x3c/0x98
[   32.270695]  kmalloc_memmove_negative_size+0x154/0x2e0
[   32.271475]  kunit_try_run_case+0x14c/0x3d0
[   32.272132]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.272898]  kthread+0x24c/0x2d0
[   32.273365]  ret_from_fork+0x10/0x20
[   32.274369] 
[   32.274685] Allocated by task 168:
[   32.275132]  kasan_save_stack+0x3c/0x68
[   32.275450]  kasan_save_track+0x20/0x40
[   32.275823]  kasan_save_alloc_info+0x40/0x58
[   32.276563]  __kasan_kmalloc+0xd4/0xd8
[   32.277760]  __kmalloc_cache_noprof+0x15c/0x3c0
[   32.278896]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   32.279650]  kunit_try_run_case+0x14c/0x3d0
[   32.280411]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.281321]  kthread+0x24c/0x2d0
[   32.282436]  ret_from_fork+0x10/0x20
[   32.283403] 
[   32.283727] The buggy address belongs to the object at fff00000c66e4d80
[   32.283727]  which belongs to the cache kmalloc-64 of size 64
[   32.285180] The buggy address is located 4 bytes inside of
[   32.285180]  64-byte region [fff00000c66e4d80, fff00000c66e4dc0)
[   32.286828] 
[   32.287324] The buggy address belongs to the physical page:
[   32.288263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e4
[   32.289309] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.290900] page_type: f5(slab)
[   32.291406] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.292528] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.293573] page dumped because: kasan: bad access detected
[   32.294719] 
[   32.295170] Memory state around the buggy address:
[   32.295867]  fff00000c66e4c80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   32.296809]  fff00000c66e4d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   32.298110] >fff00000c66e4d80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   32.299011]                    ^
[   32.299855]  fff00000c66e4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.300866]  fff00000c66e4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.302103] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset
[   32.036948] ==================================================================
[   32.038575] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   32.039731] Write of size 2 at addr fff00000c6723e77 by task kunit_try_catch/160
[   32.040613] 
[   32.041201] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   32.042762] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.043403] Hardware name: linux,dummy-virt (DT)
[   32.043923] Call trace:
[   32.044297]  show_stack+0x20/0x38 (C)
[   32.045001]  dump_stack_lvl+0x8c/0xd0
[   32.045567]  print_report+0x118/0x5e0
[   32.046358]  kasan_report+0xc8/0x118
[   32.047407]  kasan_check_range+0x100/0x1a8
[   32.048065]  __asan_memset+0x34/0x78
[   32.048653]  kmalloc_oob_memset_2+0x150/0x2f8
[   32.049326]  kunit_try_run_case+0x14c/0x3d0
[   32.050405]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.051216]  kthread+0x24c/0x2d0
[   32.051591]  ret_from_fork+0x10/0x20
[   32.052177] 
[   32.052572] Allocated by task 160:
[   32.053395]  kasan_save_stack+0x3c/0x68
[   32.054193]  kasan_save_track+0x20/0x40
[   32.054748]  kasan_save_alloc_info+0x40/0x58
[   32.055420]  __kasan_kmalloc+0xd4/0xd8
[   32.056270]  __kmalloc_cache_noprof+0x15c/0x3c0
[   32.056985]  kmalloc_oob_memset_2+0xb0/0x2f8
[   32.057674]  kunit_try_run_case+0x14c/0x3d0
[   32.058781]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.059557]  kthread+0x24c/0x2d0
[   32.060136]  ret_from_fork+0x10/0x20
[   32.060783] 
[   32.061156] The buggy address belongs to the object at fff00000c6723e00
[   32.061156]  which belongs to the cache kmalloc-128 of size 128
[   32.063324] The buggy address is located 119 bytes inside of
[   32.063324]  allocated 120-byte region [fff00000c6723e00, fff00000c6723e78)
[   32.065074] 
[   32.065380] The buggy address belongs to the physical page:
[   32.066504] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106723
[   32.067530] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.068323] page_type: f5(slab)
[   32.068930] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.069868] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.070769] page dumped because: kasan: bad access detected
[   32.071531] 
[   32.072179] Memory state around the buggy address:
[   32.072785]  fff00000c6723d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.073871]  fff00000c6723d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.074762] >fff00000c6723e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.075565]                                                                 ^
[   32.076525]  fff00000c6723e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.077366]  fff00000c6723f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.078290] ==================================================================
[   32.148114] ==================================================================
[   32.149309] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   32.150240] Write of size 8 at addr fff00000c6763071 by task kunit_try_catch/164
[   32.151999] 
[   32.152320] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   32.153681] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.154339] Hardware name: linux,dummy-virt (DT)
[   32.155776] Call trace:
[   32.156465]  show_stack+0x20/0x38 (C)
[   32.157266]  dump_stack_lvl+0x8c/0xd0
[   32.158083]  print_report+0x118/0x5e0
[   32.158831]  kasan_report+0xc8/0x118
[   32.159465]  kasan_check_range+0x100/0x1a8
[   32.160061]  __asan_memset+0x34/0x78
[   32.160849]  kmalloc_oob_memset_8+0x150/0x2f8
[   32.161648]  kunit_try_run_case+0x14c/0x3d0
[   32.162294]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.163561]  kthread+0x24c/0x2d0
[   32.164108]  ret_from_fork+0x10/0x20
[   32.164941] 
[   32.165293] Allocated by task 164:
[   32.166237]  kasan_save_stack+0x3c/0x68
[   32.166928]  kasan_save_track+0x20/0x40
[   32.167690]  kasan_save_alloc_info+0x40/0x58
[   32.168332]  __kasan_kmalloc+0xd4/0xd8
[   32.168913]  __kmalloc_cache_noprof+0x15c/0x3c0
[   32.169658]  kmalloc_oob_memset_8+0xb0/0x2f8
[   32.170938]  kunit_try_run_case+0x14c/0x3d0
[   32.171465]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.172211]  kthread+0x24c/0x2d0
[   32.173335]  ret_from_fork+0x10/0x20
[   32.173930] 
[   32.174351] The buggy address belongs to the object at fff00000c6763000
[   32.174351]  which belongs to the cache kmalloc-128 of size 128
[   32.176157] The buggy address is located 113 bytes inside of
[   32.176157]  allocated 120-byte region [fff00000c6763000, fff00000c6763078)
[   32.177598] 
[   32.178356] The buggy address belongs to the physical page:
[   32.179059] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106763
[   32.180064] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.180891] page_type: f5(slab)
[   32.181403] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.182816] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.183734] page dumped because: kasan: bad access detected
[   32.184323] 
[   32.184707] Memory state around the buggy address:
[   32.185277]  fff00000c6762f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.186756]  fff00000c6762f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.187791] >fff00000c6763000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.188670]                                                                 ^
[   32.189579]  fff00000c6763080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.191198]  fff00000c6763100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.191944] ==================================================================
[   32.091212] ==================================================================
[   32.092396] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   32.093115] Write of size 4 at addr fff00000c674d375 by task kunit_try_catch/162
[   32.094173] 
[   32.095910] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   32.097123] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.097692] Hardware name: linux,dummy-virt (DT)
[   32.098978] Call trace:
[   32.099433]  show_stack+0x20/0x38 (C)
[   32.100200]  dump_stack_lvl+0x8c/0xd0
[   32.100782]  print_report+0x118/0x5e0
[   32.101422]  kasan_report+0xc8/0x118
[   32.102386]  kasan_check_range+0x100/0x1a8
[   32.103024]  __asan_memset+0x34/0x78
[   32.103687]  kmalloc_oob_memset_4+0x150/0x300
[   32.104160]  kunit_try_run_case+0x14c/0x3d0
[   32.105357]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.106581]  kthread+0x24c/0x2d0
[   32.107104]  ret_from_fork+0x10/0x20
[   32.107698] 
[   32.108014] Allocated by task 162:
[   32.108443]  kasan_save_stack+0x3c/0x68
[   32.109141]  kasan_save_track+0x20/0x40
[   32.109604]  kasan_save_alloc_info+0x40/0x58
[   32.110741]  __kasan_kmalloc+0xd4/0xd8
[   32.111474]  __kmalloc_cache_noprof+0x15c/0x3c0
[   32.112499]  kmalloc_oob_memset_4+0xb0/0x300
[   32.113107]  kunit_try_run_case+0x14c/0x3d0
[   32.114249]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.115033]  kthread+0x24c/0x2d0
[   32.115777]  ret_from_fork+0x10/0x20
[   32.116296] 
[   32.116618] The buggy address belongs to the object at fff00000c674d300
[   32.116618]  which belongs to the cache kmalloc-128 of size 128
[   32.118988] The buggy address is located 117 bytes inside of
[   32.118988]  allocated 120-byte region [fff00000c674d300, fff00000c674d378)
[   32.122710] 
[   32.123468] The buggy address belongs to the physical page:
[   32.123959] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10674d
[   32.124427] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.125065] page_type: f5(slab)
[   32.125616] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.126957] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.127592] page dumped because: kasan: bad access detected
[   32.128750] 
[   32.129340] Memory state around the buggy address:
[   32.131405]  fff00000c674d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   32.132810]  fff00000c674d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.134025] >fff00000c674d300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.135526]                                                                 ^
[   32.136019]  fff00000c674d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.136435]  fff00000c674d400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.137076] ==================================================================
[   32.203199] ==================================================================
[   32.204475] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   32.205307] Write of size 16 at addr fff00000c6763169 by task kunit_try_catch/166
[   32.206857] 
[   32.207613] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   32.209055] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.210110] Hardware name: linux,dummy-virt (DT)
[   32.210745] Call trace:
[   32.211152]  show_stack+0x20/0x38 (C)
[   32.211939]  dump_stack_lvl+0x8c/0xd0
[   32.212563]  print_report+0x118/0x5e0
[   32.213312]  kasan_report+0xc8/0x118
[   32.214262]  kasan_check_range+0x100/0x1a8
[   32.215129]  __asan_memset+0x34/0x78
[   32.215809]  kmalloc_oob_memset_16+0x150/0x2f8
[   32.216418]  kunit_try_run_case+0x14c/0x3d0
[   32.217046]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.218273]  kthread+0x24c/0x2d0
[   32.219076]  ret_from_fork+0x10/0x20
[   32.219830] 
[   32.220247] Allocated by task 166:
[   32.220876]  kasan_save_stack+0x3c/0x68
[   32.222110]  kasan_save_track+0x20/0x40
[   32.222615]  kasan_save_alloc_info+0x40/0x58
[   32.223434]  __kasan_kmalloc+0xd4/0xd8
[   32.224129]  __kmalloc_cache_noprof+0x15c/0x3c0
[   32.224895]  kmalloc_oob_memset_16+0xb0/0x2f8
[   32.225568]  kunit_try_run_case+0x14c/0x3d0
[   32.227487]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.228191]  kthread+0x24c/0x2d0
[   32.228720]  ret_from_fork+0x10/0x20
[   32.229507] 
[   32.230151] The buggy address belongs to the object at fff00000c6763100
[   32.230151]  which belongs to the cache kmalloc-128 of size 128
[   32.231164] The buggy address is located 105 bytes inside of
[   32.231164]  allocated 120-byte region [fff00000c6763100, fff00000c6763178)
[   32.231956] 
[   32.232369] The buggy address belongs to the physical page:
[   32.233285] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106763
[   32.234370] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.235693] page_type: f5(slab)
[   32.236158] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.237109] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.238736] page dumped because: kasan: bad access detected
[   32.239395] 
[   32.239730] Memory state around the buggy address:
[   32.240456]  fff00000c6763000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.241374]  fff00000c6763080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.242660] >fff00000c6763100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   32.243507]                                                                 ^
[   32.244393]  fff00000c6763180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.245326]  fff00000c6763200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.246457] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[   32.500452] ==================================================================
[   32.501762] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   32.502643] Read of size 1 at addr fff00000c6743e28 by task kunit_try_catch/176
[   32.503349] 
[   32.504500] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   32.506346] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.507233] Hardware name: linux,dummy-virt (DT)
[   32.508239] Call trace:
[   32.509003]  show_stack+0x20/0x38 (C)
[   32.509607]  dump_stack_lvl+0x8c/0xd0
[   32.510315]  print_report+0x118/0x5e0
[   32.511354]  kasan_report+0xc8/0x118
[   32.512026]  __asan_report_load1_noabort+0x20/0x30
[   32.512680]  kmalloc_uaf2+0x3f4/0x468
[   32.513322]  kunit_try_run_case+0x14c/0x3d0
[   32.514036]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.514784]  kthread+0x24c/0x2d0
[   32.515375]  ret_from_fork+0x10/0x20
[   32.515895] 
[   32.516252] Allocated by task 176:
[   32.516871]  kasan_save_stack+0x3c/0x68
[   32.517396]  kasan_save_track+0x20/0x40
[   32.518149]  kasan_save_alloc_info+0x40/0x58
[   32.519046]  __kasan_kmalloc+0xd4/0xd8
[   32.519668]  __kmalloc_cache_noprof+0x15c/0x3c0
[   32.520522]  kmalloc_uaf2+0xc4/0x468
[   32.521026]  kunit_try_run_case+0x14c/0x3d0
[   32.521831]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.522770]  kthread+0x24c/0x2d0
[   32.523292]  ret_from_fork+0x10/0x20
[   32.523907] 
[   32.524266] Freed by task 176:
[   32.524793]  kasan_save_stack+0x3c/0x68
[   32.525304]  kasan_save_track+0x20/0x40
[   32.526058]  kasan_save_free_info+0x4c/0x78
[   32.526745]  __kasan_slab_free+0x6c/0x98
[   32.527444]  kfree+0x114/0x3c8
[   32.528009]  kmalloc_uaf2+0x134/0x468
[   32.528539]  kunit_try_run_case+0x14c/0x3d0
[   32.529113]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.530024]  kthread+0x24c/0x2d0
[   32.530454]  ret_from_fork+0x10/0x20
[   32.531119] 
[   32.531513] The buggy address belongs to the object at fff00000c6743e00
[   32.531513]  which belongs to the cache kmalloc-64 of size 64
[   32.532969] The buggy address is located 40 bytes inside of
[   32.532969]  freed 64-byte region [fff00000c6743e00, fff00000c6743e40)
[   32.534448] 
[   32.534780] The buggy address belongs to the physical page:
[   32.535562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106743
[   32.536508] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.537418] page_type: f5(slab)
[   32.537924] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   32.538843] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   32.539822] page dumped because: kasan: bad access detected
[   32.540588] 
[   32.541002] Memory state around the buggy address:
[   32.541547]  fff00000c6743d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   32.542541]  fff00000c6743d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.543364] >fff00000c6743e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.544302]                                   ^
[   32.545001]  fff00000c6743e80: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   32.545951]  fff00000c6743f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.546957] ==================================================================
[   31.919259] ==================================================================
[   31.920507] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   31.921435] Read of size 16 at addr fff00000c6153d60 by task kunit_try_catch/156
[   31.922458] 
[   31.922958] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   31.925428] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.926654] Hardware name: linux,dummy-virt (DT)
[   31.927331] Call trace:
[   31.927860]  show_stack+0x20/0x38 (C)
[   31.928383]  dump_stack_lvl+0x8c/0xd0
[   31.929060]  print_report+0x118/0x5e0
[   31.929562]  kasan_report+0xc8/0x118
[   31.930452]  __asan_report_load16_noabort+0x20/0x30
[   31.931143]  kmalloc_uaf_16+0x3bc/0x438
[   31.931785]  kunit_try_run_case+0x14c/0x3d0
[   31.932380]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.933168]  kthread+0x24c/0x2d0
[   31.933655]  ret_from_fork+0x10/0x20
[   31.934320] 
[   31.934986] Allocated by task 156:
[   31.935798]  kasan_save_stack+0x3c/0x68
[   31.936477]  kasan_save_track+0x20/0x40
[   31.937281]  kasan_save_alloc_info+0x40/0x58
[   31.938303]  __kasan_kmalloc+0xd4/0xd8
[   31.939001]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.939817]  kmalloc_uaf_16+0x140/0x438
[   31.940494]  kunit_try_run_case+0x14c/0x3d0
[   31.941140]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.942487]  kthread+0x24c/0x2d0
[   31.943475]  ret_from_fork+0x10/0x20
[   31.943889] 
[   31.944136] Freed by task 156:
[   31.944805]  kasan_save_stack+0x3c/0x68
[   31.945399]  kasan_save_track+0x20/0x40
[   31.946731]  kasan_save_free_info+0x4c/0x78
[   31.947386]  __kasan_slab_free+0x6c/0x98
[   31.947969]  kfree+0x114/0x3c8
[   31.948434]  kmalloc_uaf_16+0x190/0x438
[   31.949043]  kunit_try_run_case+0x14c/0x3d0
[   31.949657]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.950899]  kthread+0x24c/0x2d0
[   31.951731]  ret_from_fork+0x10/0x20
[   31.952385] 
[   31.952759] The buggy address belongs to the object at fff00000c6153d60
[   31.952759]  which belongs to the cache kmalloc-16 of size 16
[   31.954651] The buggy address is located 0 bytes inside of
[   31.954651]  freed 16-byte region [fff00000c6153d60, fff00000c6153d70)
[   31.956009] 
[   31.956341] The buggy address belongs to the physical page:
[   31.957091] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153
[   31.958377] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.959381] page_type: f5(slab)
[   31.959898] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   31.961093] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   31.962372] page dumped because: kasan: bad access detected
[   31.964202] 
[   31.964545] Memory state around the buggy address:
[   31.965082]  fff00000c6153c00: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   31.966355]  fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   31.968699] >fff00000c6153d00: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   31.969469]                                                        ^
[   31.970552]  fff00000c6153d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.971584]  fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.972462] ==================================================================
[   32.373130] ==================================================================
[   32.374483] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   32.375357] Read of size 1 at addr fff00000c5b31d08 by task kunit_try_catch/172
[   32.376583] 
[   32.377009] CPU: 0 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   32.379244] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.379801] Hardware name: linux,dummy-virt (DT)
[   32.380416] Call trace:
[   32.380891]  show_stack+0x20/0x38 (C)
[   32.381576]  dump_stack_lvl+0x8c/0xd0
[   32.382767]  print_report+0x118/0x5e0
[   32.383334]  kasan_report+0xc8/0x118
[   32.384018]  __asan_report_load1_noabort+0x20/0x30
[   32.384782]  kmalloc_uaf+0x300/0x338
[   32.385432]  kunit_try_run_case+0x14c/0x3d0
[   32.386600]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.387368]  kthread+0x24c/0x2d0
[   32.387920]  ret_from_fork+0x10/0x20
[   32.388662] 
[   32.389021] Allocated by task 172:
[   32.389571]  kasan_save_stack+0x3c/0x68
[   32.390858]  kasan_save_track+0x20/0x40
[   32.391604]  kasan_save_alloc_info+0x40/0x58
[   32.392240]  __kasan_kmalloc+0xd4/0xd8
[   32.392798]  __kmalloc_cache_noprof+0x15c/0x3c0
[   32.393522]  kmalloc_uaf+0xb8/0x338
[   32.394290]  kunit_try_run_case+0x14c/0x3d0
[   32.395217]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.396215]  kthread+0x24c/0x2d0
[   32.396675]  ret_from_fork+0x10/0x20
[   32.397259] 
[   32.397543] Freed by task 172:
[   32.398184]  kasan_save_stack+0x3c/0x68
[   32.399269]  kasan_save_track+0x20/0x40
[   32.400310]  kasan_save_free_info+0x4c/0x78
[   32.400980]  __kasan_slab_free+0x6c/0x98
[   32.401683]  kfree+0x114/0x3c8
[   32.402165]  kmalloc_uaf+0x11c/0x338
[   32.403192]  kunit_try_run_case+0x14c/0x3d0
[   32.403918]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.404554]  kthread+0x24c/0x2d0
[   32.405176]  ret_from_fork+0x10/0x20
[   32.406045] 
[   32.406483] The buggy address belongs to the object at fff00000c5b31d00
[   32.406483]  which belongs to the cache kmalloc-16 of size 16
[   32.408098] The buggy address is located 8 bytes inside of
[   32.408098]  freed 16-byte region [fff00000c5b31d00, fff00000c5b31d10)
[   32.409515] 
[   32.409897] The buggy address belongs to the physical page:
[   32.410702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b31
[   32.412383] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.413320] page_type: f5(slab)
[   32.413907] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   32.415183] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   32.416271] page dumped because: kasan: bad access detected
[   32.416968] 
[   32.417294] Memory state around the buggy address:
[   32.418572]  fff00000c5b31c00: 00 06 fc fc 00 06 fc fc fa fb fc fc 00 06 fc fc
[   32.419486]  fff00000c5b31c80: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.420462] >fff00000c5b31d00: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.421324]                       ^
[   32.421931]  fff00000c5b31d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.422998]  fff00000c5b31e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.423841] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob
[   31.864276] ==================================================================
[   31.865558] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   31.866175] Write of size 16 at addr fff00000c6153d00 by task kunit_try_catch/154
[   31.867258] 
[   31.868031] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   31.869278] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.870969] Hardware name: linux,dummy-virt (DT)
[   31.871471] Call trace:
[   31.871776]  show_stack+0x20/0x38 (C)
[   31.872322]  dump_stack_lvl+0x8c/0xd0
[   31.872754]  print_report+0x118/0x5e0
[   31.873593]  kasan_report+0xc8/0x118
[   31.874217]  __asan_report_store16_noabort+0x20/0x30
[   31.875194]  kmalloc_oob_16+0x3a0/0x3f8
[   31.875825]  kunit_try_run_case+0x14c/0x3d0
[   31.876414]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.877510]  kthread+0x24c/0x2d0
[   31.878463]  ret_from_fork+0x10/0x20
[   31.878997] 
[   31.879353] Allocated by task 154:
[   31.879970]  kasan_save_stack+0x3c/0x68
[   31.880557]  kasan_save_track+0x20/0x40
[   31.881454]  kasan_save_alloc_info+0x40/0x58
[   31.882474]  __kasan_kmalloc+0xd4/0xd8
[   31.883037]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.883686]  kmalloc_oob_16+0xb4/0x3f8
[   31.884315]  kunit_try_run_case+0x14c/0x3d0
[   31.884957]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.886298]  kthread+0x24c/0x2d0
[   31.886700]  ret_from_fork+0x10/0x20
[   31.887292] 
[   31.887699] The buggy address belongs to the object at fff00000c6153d00
[   31.887699]  which belongs to the cache kmalloc-16 of size 16
[   31.889313] The buggy address is located 0 bytes inside of
[   31.889313]  allocated 13-byte region [fff00000c6153d00, fff00000c6153d0d)
[   31.890955] 
[   31.891272] The buggy address belongs to the physical page:
[   31.892791] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106153
[   31.893749] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.894743] page_type: f5(slab)
[   31.895328] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   31.896381] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   31.897368] page dumped because: kasan: bad access detected
[   31.898411] 
[   31.898741] Memory state around the buggy address:
[   31.899352]  fff00000c6153c00: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   31.900218]  fff00000c6153c80: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   31.901612] >fff00000c6153d00: 00 05 fc fc 00 00 fc fc fc fc fc fc fc fc fc fc
[   31.903162]                       ^
[   31.903724]  fff00000c6153d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.904685]  fff00000c6153e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.905678] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[   31.791454] ==================================================================
[   31.792085] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   31.793161] Read of size 1 at addr fff00000c1dd4e00 by task kunit_try_catch/152
[   31.795032] 
[   31.795471] CPU: 1 UID: 0 PID: 152 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   31.796507] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.797303] Hardware name: linux,dummy-virt (DT)
[   31.797999] Call trace:
[   31.799445]  show_stack+0x20/0x38 (C)
[   31.800110]  dump_stack_lvl+0x8c/0xd0
[   31.800796]  print_report+0x118/0x5e0
[   31.801484]  kasan_report+0xc8/0x118
[   31.802177]  __asan_report_load1_noabort+0x20/0x30
[   31.802991]  krealloc_uaf+0x4c8/0x520
[   31.803707]  kunit_try_run_case+0x14c/0x3d0
[   31.804410]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.805407]  kthread+0x24c/0x2d0
[   31.807147]  ret_from_fork+0x10/0x20
[   31.807767] 
[   31.808127] Allocated by task 152:
[   31.808671]  kasan_save_stack+0x3c/0x68
[   31.809167]  kasan_save_track+0x20/0x40
[   31.810185]  kasan_save_alloc_info+0x40/0x58
[   31.811026]  __kasan_kmalloc+0xd4/0xd8
[   31.812160]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.812929]  krealloc_uaf+0xc8/0x520
[   31.813549]  kunit_try_run_case+0x14c/0x3d0
[   31.814290]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.815279]  kthread+0x24c/0x2d0
[   31.816536]  ret_from_fork+0x10/0x20
[   31.817128] 
[   31.817580] Freed by task 152:
[   31.818106]  kasan_save_stack+0x3c/0x68
[   31.819021]  kasan_save_track+0x20/0x40
[   31.819954]  kasan_save_free_info+0x4c/0x78
[   31.820797]  __kasan_slab_free+0x6c/0x98
[   31.821417]  kfree+0x114/0x3c8
[   31.822093]  krealloc_uaf+0x12c/0x520
[   31.823726]  kunit_try_run_case+0x14c/0x3d0
[   31.824363]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.825303]  kthread+0x24c/0x2d0
[   31.826023]  ret_from_fork+0x10/0x20
[   31.826878] 
[   31.827333] The buggy address belongs to the object at fff00000c1dd4e00
[   31.827333]  which belongs to the cache kmalloc-256 of size 256
[   31.828769] The buggy address is located 0 bytes inside of
[   31.828769]  freed 256-byte region [fff00000c1dd4e00, fff00000c1dd4f00)
[   31.830334] 
[   31.830995] The buggy address belongs to the physical page:
[   31.831543] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101dd4
[   31.833165] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.834138] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.835475] page_type: f5(slab)
[   31.836151] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.837047] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.838203] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.839169] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.840210] head: 0bfffe0000000001 ffffc1ffc3077501 ffffffffffffffff 0000000000000000
[   31.841131] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   31.843080] page dumped because: kasan: bad access detected
[   31.843736] 
[   31.844130] Memory state around the buggy address:
[   31.844846]  fff00000c1dd4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.845802]  fff00000c1dd4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.847084] >fff00000c1dd4e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.848034]                    ^
[   31.848619]  fff00000c1dd4e80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.850424]  fff00000c1dd4f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.851187] ==================================================================
[   31.729674] ==================================================================
[   31.732335] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   31.733168] Read of size 1 at addr fff00000c1dd4e00 by task kunit_try_catch/152
[   31.734120] 
[   31.735100] CPU: 1 UID: 0 PID: 152 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   31.736457] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.737085] Hardware name: linux,dummy-virt (DT)
[   31.738019] Call trace:
[   31.738743]  show_stack+0x20/0x38 (C)
[   31.739695]  dump_stack_lvl+0x8c/0xd0
[   31.740817]  print_report+0x118/0x5e0
[   31.741528]  kasan_report+0xc8/0x118
[   31.742577]  __kasan_check_byte+0x54/0x70
[   31.743217]  krealloc_noprof+0x44/0x360
[   31.743932]  krealloc_uaf+0x180/0x520
[   31.744568]  kunit_try_run_case+0x14c/0x3d0
[   31.745219]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.746281]  kthread+0x24c/0x2d0
[   31.747008]  ret_from_fork+0x10/0x20
[   31.747643] 
[   31.748011] Allocated by task 152:
[   31.748489]  kasan_save_stack+0x3c/0x68
[   31.749603]  kasan_save_track+0x20/0x40
[   31.750789]  kasan_save_alloc_info+0x40/0x58
[   31.751374]  __kasan_kmalloc+0xd4/0xd8
[   31.751979]  __kmalloc_cache_noprof+0x15c/0x3c0
[   31.752604]  krealloc_uaf+0xc8/0x520
[   31.753280]  kunit_try_run_case+0x14c/0x3d0
[   31.753903]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.755287]  kthread+0x24c/0x2d0
[   31.755701]  ret_from_fork+0x10/0x20
[   31.756469] 
[   31.757164] Freed by task 152:
[   31.758417]  kasan_save_stack+0x3c/0x68
[   31.759030]  kasan_save_track+0x20/0x40
[   31.759500]  kasan_save_free_info+0x4c/0x78
[   31.760178]  __kasan_slab_free+0x6c/0x98
[   31.760783]  kfree+0x114/0x3c8
[   31.761225]  krealloc_uaf+0x12c/0x520
[   31.761946]  kunit_try_run_case+0x14c/0x3d0
[   31.762855]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.763710]  kthread+0x24c/0x2d0
[   31.764323]  ret_from_fork+0x10/0x20
[   31.765111] 
[   31.765364] The buggy address belongs to the object at fff00000c1dd4e00
[   31.765364]  which belongs to the cache kmalloc-256 of size 256
[   31.767605] The buggy address is located 0 bytes inside of
[   31.767605]  freed 256-byte region [fff00000c1dd4e00, fff00000c1dd4f00)
[   31.769213] 
[   31.769535] The buggy address belongs to the physical page:
[   31.770655] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101dd4
[   31.772144] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.773049] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.773989] page_type: f5(slab)
[   31.774787] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.775804] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.776684] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.777733] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.778706] head: 0bfffe0000000001 ffffc1ffc3077501 ffffffffffffffff 0000000000000000
[   31.779618] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   31.780422] page dumped because: kasan: bad access detected
[   31.781742] 
[   31.781990] Memory state around the buggy address:
[   31.782355]  fff00000c1dd4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.783316]  fff00000c1dd4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.785184] >fff00000c1dd4e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.786490]                    ^
[   31.786991]  fff00000c1dd4e80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.787996]  fff00000c1dd4f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.788563] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   31.569709] ==================================================================
[   31.571029] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   31.571980] Write of size 1 at addr fff00000c5e720d0 by task kunit_try_catch/150
[   31.573465] 
[   31.573967] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   31.575142] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.575799] Hardware name: linux,dummy-virt (DT)
[   31.576549] Call trace:
[   31.577863]  show_stack+0x20/0x38 (C)
[   31.578528]  dump_stack_lvl+0x8c/0xd0
[   31.579222]  print_report+0x118/0x5e0
[   31.580301]  kasan_report+0xc8/0x118
[   31.581233]  __asan_report_store1_noabort+0x20/0x30
[   31.581970]  krealloc_less_oob_helper+0xb9c/0xc50
[   31.582618]  krealloc_large_less_oob+0x20/0x38
[   31.583995]  kunit_try_run_case+0x14c/0x3d0
[   31.584603]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.585458]  kthread+0x24c/0x2d0
[   31.586378]  ret_from_fork+0x10/0x20
[   31.587034] 
[   31.587453] The buggy address belongs to the physical page:
[   31.588902] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e70
[   31.589908] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.590931] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.591838] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.592912] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   31.594011] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.594896] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   31.596173] head: 0bfffe0000000002 ffffc1ffc3179c01 ffffffffffffffff 0000000000000000
[   31.597116] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   31.598593] page dumped because: kasan: bad access detected
[   31.599172] 
[   31.599502] Memory state around the buggy address:
[   31.600191]  fff00000c5e71f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.601060]  fff00000c5e72000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.602806] >fff00000c5e72080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   31.603594]                                                  ^
[   31.604608]  fff00000c5e72100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.606003]  fff00000c5e72180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.606971] ==================================================================
[   31.609281] ==================================================================
[   31.610480] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   31.611377] Write of size 1 at addr fff00000c5e720da by task kunit_try_catch/150
[   31.612706] 
[   31.613235] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   31.614963] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.615751] Hardware name: linux,dummy-virt (DT)
[   31.616550] Call trace:
[   31.616815]  show_stack+0x20/0x38 (C)
[   31.617882]  dump_stack_lvl+0x8c/0xd0
[   31.619000]  print_report+0x118/0x5e0
[   31.619536]  kasan_report+0xc8/0x118
[   31.620169]  __asan_report_store1_noabort+0x20/0x30
[   31.620966]  krealloc_less_oob_helper+0xa80/0xc50
[   31.621927]  krealloc_large_less_oob+0x20/0x38
[   31.622594]  kunit_try_run_case+0x14c/0x3d0
[   31.624079]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.624711]  kthread+0x24c/0x2d0
[   31.625351]  ret_from_fork+0x10/0x20
[   31.625984] 
[   31.626394] The buggy address belongs to the physical page:
[   31.627292] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e70
[   31.628793] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.630607] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.631470] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.632374] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   31.633391] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.634406] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   31.635395] head: 0bfffe0000000002 ffffc1ffc3179c01 ffffffffffffffff 0000000000000000
[   31.636662] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   31.637527] page dumped because: kasan: bad access detected
[   31.638603] 
[   31.638886] Memory state around the buggy address:
[   31.639355]  fff00000c5e71f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.640050]  fff00000c5e72000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.640743] >fff00000c5e72080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   31.641750]                                                     ^
[   31.642929]  fff00000c5e72100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.643911]  fff00000c5e72180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.644903] ==================================================================
[   31.234737] ==================================================================
[   31.235719] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   31.236516] Write of size 1 at addr fff00000c09730d0 by task kunit_try_catch/146
[   31.237234] 
[   31.237582] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   31.239611] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.240478] Hardware name: linux,dummy-virt (DT)
[   31.241090] Call trace:
[   31.241643]  show_stack+0x20/0x38 (C)
[   31.242570]  dump_stack_lvl+0x8c/0xd0
[   31.243292]  print_report+0x118/0x5e0
[   31.244119]  kasan_report+0xc8/0x118
[   31.244931]  __asan_report_store1_noabort+0x20/0x30
[   31.246116]  krealloc_less_oob_helper+0xb9c/0xc50
[   31.246936]  krealloc_less_oob+0x20/0x38
[   31.247488]  kunit_try_run_case+0x14c/0x3d0
[   31.248015]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.248717]  kthread+0x24c/0x2d0
[   31.249349]  ret_from_fork+0x10/0x20
[   31.250179] 
[   31.250578] Allocated by task 146:
[   31.251153]  kasan_save_stack+0x3c/0x68
[   31.251977]  kasan_save_track+0x20/0x40
[   31.252684]  kasan_save_alloc_info+0x40/0x58
[   31.253395]  __kasan_krealloc+0x118/0x178
[   31.254595]  krealloc_noprof+0x128/0x360
[   31.255500]  krealloc_less_oob_helper+0x168/0xc50
[   31.256197]  krealloc_less_oob+0x20/0x38
[   31.256769]  kunit_try_run_case+0x14c/0x3d0
[   31.257365]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.258479]  kthread+0x24c/0x2d0
[   31.258989]  ret_from_fork+0x10/0x20
[   31.259503] 
[   31.259844] The buggy address belongs to the object at fff00000c0973000
[   31.259844]  which belongs to the cache kmalloc-256 of size 256
[   31.261973] The buggy address is located 7 bytes to the right of
[   31.261973]  allocated 201-byte region [fff00000c0973000, fff00000c09730c9)
[   31.263811] 
[   31.264108] The buggy address belongs to the physical page:
[   31.264815] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100972
[   31.265865] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.267461] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.268563] page_type: f5(slab)
[   31.269242] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.270684] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.271562] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.272579] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.273520] head: 0bfffe0000000001 ffffc1ffc3025c81 ffffffffffffffff 0000000000000000
[   31.274399] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   31.275693] page dumped because: kasan: bad access detected
[   31.276364] 
[   31.276867] Memory state around the buggy address:
[   31.277555]  fff00000c0972f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.278966]  fff00000c0973000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.281059] >fff00000c0973080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   31.282850]                                                  ^
[   31.283576]  fff00000c0973100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.284422]  fff00000c0973180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.285355] ==================================================================
[   31.289305] ==================================================================
[   31.290554] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   31.291451] Write of size 1 at addr fff00000c09730da by task kunit_try_catch/146
[   31.292218] 
[   31.292528] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   31.293722] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.294416] Hardware name: linux,dummy-virt (DT)
[   31.295461] Call trace:
[   31.295927]  show_stack+0x20/0x38 (C)
[   31.296499]  dump_stack_lvl+0x8c/0xd0
[   31.297072]  print_report+0x118/0x5e0
[   31.297736]  kasan_report+0xc8/0x118
[   31.298271]  __asan_report_store1_noabort+0x20/0x30
[   31.299170]  krealloc_less_oob_helper+0xa80/0xc50
[   31.300215]  krealloc_less_oob+0x20/0x38
[   31.300827]  kunit_try_run_case+0x14c/0x3d0
[   31.301477]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.302333]  kthread+0x24c/0x2d0
[   31.302981]  ret_from_fork+0x10/0x20
[   31.303560] 
[   31.303943] Allocated by task 146:
[   31.304434]  kasan_save_stack+0x3c/0x68
[   31.305211]  kasan_save_track+0x20/0x40
[   31.305727]  kasan_save_alloc_info+0x40/0x58
[   31.306947]  __kasan_krealloc+0x118/0x178
[   31.307523]  krealloc_noprof+0x128/0x360
[   31.308194]  krealloc_less_oob_helper+0x168/0xc50
[   31.309424]  krealloc_less_oob+0x20/0x38
[   31.310459]  kunit_try_run_case+0x14c/0x3d0
[   31.311107]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.311791]  kthread+0x24c/0x2d0
[   31.312404]  ret_from_fork+0x10/0x20
[   31.312970] 
[   31.313399] The buggy address belongs to the object at fff00000c0973000
[   31.313399]  which belongs to the cache kmalloc-256 of size 256
[   31.315049] The buggy address is located 17 bytes to the right of
[   31.315049]  allocated 201-byte region [fff00000c0973000, fff00000c09730c9)
[   31.316595] 
[   31.316939] The buggy address belongs to the physical page:
[   31.317712] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100972
[   31.319326] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.320213] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.321251] page_type: f5(slab)
[   31.322322] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.323377] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.324317] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.325245] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.326265] head: 0bfffe0000000001 ffffc1ffc3025c81 ffffffffffffffff 0000000000000000
[   31.327143] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   31.328080] page dumped because: kasan: bad access detected
[   31.328745] 
[   31.329122] Memory state around the buggy address:
[   31.330651]  fff00000c0972f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.331852]  fff00000c0973000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.332704] >fff00000c0973080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   31.334182]                                                     ^
[   31.335004]  fff00000c0973100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.335922]  fff00000c0973180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.336824] ==================================================================
[   31.647247] ==================================================================
[   31.648219] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   31.649075] Write of size 1 at addr fff00000c5e720ea by task kunit_try_catch/150
[   31.649777] 
[   31.650256] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   31.651477] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.652130] Hardware name: linux,dummy-virt (DT)
[   31.653328] Call trace:
[   31.653659]  show_stack+0x20/0x38 (C)
[   31.654287]  dump_stack_lvl+0x8c/0xd0
[   31.654997]  print_report+0x118/0x5e0
[   31.655569]  kasan_report+0xc8/0x118
[   31.656720]  __asan_report_store1_noabort+0x20/0x30
[   31.657116]  krealloc_less_oob_helper+0xae4/0xc50
[   31.657447]  krealloc_large_less_oob+0x20/0x38
[   31.658269]  kunit_try_run_case+0x14c/0x3d0
[   31.659202]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.659877]  kthread+0x24c/0x2d0
[   31.660503]  ret_from_fork+0x10/0x20
[   31.661232] 
[   31.661993] The buggy address belongs to the physical page:
[   31.662990] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e70
[   31.663996] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.665069] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.666932] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.668050] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   31.669029] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.670547] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   31.671738] head: 0bfffe0000000002 ffffc1ffc3179c01 ffffffffffffffff 0000000000000000
[   31.672713] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   31.673556] page dumped because: kasan: bad access detected
[   31.674202] 
[   31.674540] Memory state around the buggy address:
[   31.675243]  fff00000c5e71f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.676601]  fff00000c5e72000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.677500] >fff00000c5e72080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   31.679079]                                                           ^
[   31.679665]  fff00000c5e72100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.680584]  fff00000c5e72180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.681400] ==================================================================
[   31.183468] ==================================================================
[   31.184777] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   31.185798] Write of size 1 at addr fff00000c09730c9 by task kunit_try_catch/146
[   31.187150] 
[   31.187523] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   31.188721] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.189482] Hardware name: linux,dummy-virt (DT)
[   31.190690] Call trace:
[   31.191104]  show_stack+0x20/0x38 (C)
[   31.191690]  dump_stack_lvl+0x8c/0xd0
[   31.192284]  print_report+0x118/0x5e0
[   31.192928]  kasan_report+0xc8/0x118
[   31.193527]  __asan_report_store1_noabort+0x20/0x30
[   31.194227]  krealloc_less_oob_helper+0xa48/0xc50
[   31.195345]  krealloc_less_oob+0x20/0x38
[   31.196039]  kunit_try_run_case+0x14c/0x3d0
[   31.196817]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.197602]  kthread+0x24c/0x2d0
[   31.198405]  ret_from_fork+0x10/0x20
[   31.199011] 
[   31.199284] Allocated by task 146:
[   31.199884]  kasan_save_stack+0x3c/0x68
[   31.200544]  kasan_save_track+0x20/0x40
[   31.201127]  kasan_save_alloc_info+0x40/0x58
[   31.202120]  __kasan_krealloc+0x118/0x178
[   31.202574]  krealloc_noprof+0x128/0x360
[   31.203288]  krealloc_less_oob_helper+0x168/0xc50
[   31.203958]  krealloc_less_oob+0x20/0x38
[   31.204531]  kunit_try_run_case+0x14c/0x3d0
[   31.205143]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.206425]  kthread+0x24c/0x2d0
[   31.207034]  ret_from_fork+0x10/0x20
[   31.207662] 
[   31.207988] The buggy address belongs to the object at fff00000c0973000
[   31.207988]  which belongs to the cache kmalloc-256 of size 256
[   31.209800] The buggy address is located 0 bytes to the right of
[   31.209800]  allocated 201-byte region [fff00000c0973000, fff00000c09730c9)
[   31.212167] 
[   31.212549] The buggy address belongs to the physical page:
[   31.213180] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100972
[   31.214438] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.215385] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.216188] page_type: f5(slab)
[   31.216729] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.217651] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.219075] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.220139] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.221075] head: 0bfffe0000000001 ffffc1ffc3025c81 ffffffffffffffff 0000000000000000
[   31.222210] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   31.223398] page dumped because: kasan: bad access detected
[   31.223927] 
[   31.224393] Memory state around the buggy address:
[   31.225030]  fff00000c0972f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.226175]  fff00000c0973000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.227202] >fff00000c0973080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   31.228659]                                               ^
[   31.229260]  fff00000c0973100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.229889]  fff00000c0973180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.231107] ==================================================================
[   31.386891] ==================================================================
[   31.387759] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   31.388471] Write of size 1 at addr fff00000c09730eb by task kunit_try_catch/146
[   31.389350] 
[   31.389769] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   31.390993] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.391462] Hardware name: linux,dummy-virt (DT)
[   31.392312] Call trace:
[   31.392758]  show_stack+0x20/0x38 (C)
[   31.393278]  dump_stack_lvl+0x8c/0xd0
[   31.393870]  print_report+0x118/0x5e0
[   31.394526]  kasan_report+0xc8/0x118
[   31.395269]  __asan_report_store1_noabort+0x20/0x30
[   31.396081]  krealloc_less_oob_helper+0xa58/0xc50
[   31.396748]  krealloc_less_oob+0x20/0x38
[   31.397420]  kunit_try_run_case+0x14c/0x3d0
[   31.397999]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.398833]  kthread+0x24c/0x2d0
[   31.399419]  ret_from_fork+0x10/0x20
[   31.400036] 
[   31.400449] Allocated by task 146:
[   31.401009]  kasan_save_stack+0x3c/0x68
[   31.401562]  kasan_save_track+0x20/0x40
[   31.402200]  kasan_save_alloc_info+0x40/0x58
[   31.402832]  __kasan_krealloc+0x118/0x178
[   31.403367]  krealloc_noprof+0x128/0x360
[   31.404051]  krealloc_less_oob_helper+0x168/0xc50
[   31.404716]  krealloc_less_oob+0x20/0x38
[   31.405265]  kunit_try_run_case+0x14c/0x3d0
[   31.405844]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.406684]  kthread+0x24c/0x2d0
[   31.407211]  ret_from_fork+0x10/0x20
[   31.407741] 
[   31.408181] The buggy address belongs to the object at fff00000c0973000
[   31.408181]  which belongs to the cache kmalloc-256 of size 256
[   31.409670] The buggy address is located 34 bytes to the right of
[   31.409670]  allocated 201-byte region [fff00000c0973000, fff00000c09730c9)
[   31.411121] 
[   31.411436] The buggy address belongs to the physical page:
[   31.412110] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100972
[   31.413082] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.414066] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.415051] page_type: f5(slab)
[   31.415534] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.416416] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.417349] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.418281] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.419264] head: 0bfffe0000000001 ffffc1ffc3025c81 ffffffffffffffff 0000000000000000
[   31.420165] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   31.421205] page dumped because: kasan: bad access detected
[   31.421884] 
[   31.422191] Memory state around the buggy address:
[   31.422841]  fff00000c0972f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.423748]  fff00000c0973000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.424590] >fff00000c0973080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   31.425495]                                                           ^
[   31.426386]  fff00000c0973100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.427296]  fff00000c0973180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.428185] ==================================================================
[   31.529056] ==================================================================
[   31.530235] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   31.531506] Write of size 1 at addr fff00000c5e720c9 by task kunit_try_catch/150
[   31.532511] 
[   31.532965] CPU: 0 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   31.534663] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.535321] Hardware name: linux,dummy-virt (DT)
[   31.536227] Call trace:
[   31.536614]  show_stack+0x20/0x38 (C)
[   31.537226]  dump_stack_lvl+0x8c/0xd0
[   31.537808]  print_report+0x118/0x5e0
[   31.538792]  kasan_report+0xc8/0x118
[   31.539356]  __asan_report_store1_noabort+0x20/0x30
[   31.540056]  krealloc_less_oob_helper+0xa48/0xc50
[   31.540832]  krealloc_large_less_oob+0x20/0x38
[   31.541463]  kunit_try_run_case+0x14c/0x3d0
[   31.542403]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.543175]  kthread+0x24c/0x2d0
[   31.543789]  ret_from_fork+0x10/0x20
[   31.544398] 
[   31.544733] The buggy address belongs to the physical page:
[   31.545475] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e70
[   31.546979] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.547850] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.548831] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.549670] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   31.551647] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.552996] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   31.554023] head: 0bfffe0000000002 ffffc1ffc3179c01 ffffffffffffffff 0000000000000000
[   31.555328] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   31.556248] page dumped because: kasan: bad access detected
[   31.556885] 
[   31.557252] Memory state around the buggy address:
[   31.557890]  fff00000c5e71f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.559114]  fff00000c5e72000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.559964] >fff00000c5e72080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   31.560940]                                               ^
[   31.561682]  fff00000c5e72100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.563153]  fff00000c5e72180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.564003] ==================================================================
[   31.683280] ==================================================================
[   31.685340] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   31.687547] Write of size 1 at addr fff00000c5e720eb by task kunit_try_catch/150
[   31.690180] 
[   31.690977] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   31.692258] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.692942] Hardware name: linux,dummy-virt (DT)
[   31.693535] Call trace:
[   31.694528]  show_stack+0x20/0x38 (C)
[   31.695013]  dump_stack_lvl+0x8c/0xd0
[   31.695490]  print_report+0x118/0x5e0
[   31.695837]  kasan_report+0xc8/0x118
[   31.696455]  __asan_report_store1_noabort+0x20/0x30
[   31.697687]  krealloc_less_oob_helper+0xa58/0xc50
[   31.698899]  krealloc_large_less_oob+0x20/0x38
[   31.699608]  kunit_try_run_case+0x14c/0x3d0
[   31.700430]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.701261]  kthread+0x24c/0x2d0
[   31.701544]  ret_from_fork+0x10/0x20
[   31.702300] 
[   31.702788] The buggy address belongs to the physical page:
[   31.703930] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e70
[   31.705237] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.706509] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.707071] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.707518] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   31.707992] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.708440] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   31.709298] head: 0bfffe0000000002 ffffc1ffc3179c01 ffffffffffffffff 0000000000000000
[   31.710134] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   31.712293] page dumped because: kasan: bad access detected
[   31.712965] 
[   31.713212] Memory state around the buggy address:
[   31.714691]  fff00000c5e71f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.716078]  fff00000c5e72000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.716983] >fff00000c5e72080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   31.718082]                                                           ^
[   31.718753]  fff00000c5e72100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.719391]  fff00000c5e72180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.720313] ==================================================================
[   31.339516] ==================================================================
[   31.341151] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   31.341616] Write of size 1 at addr fff00000c09730ea by task kunit_try_catch/146
[   31.343799] 
[   31.344234] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   31.345491] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.346315] Hardware name: linux,dummy-virt (DT)
[   31.346954] Call trace:
[   31.347472]  show_stack+0x20/0x38 (C)
[   31.348131]  dump_stack_lvl+0x8c/0xd0
[   31.348873]  print_report+0x118/0x5e0
[   31.349449]  kasan_report+0xc8/0x118
[   31.350023]  __asan_report_store1_noabort+0x20/0x30
[   31.350693]  krealloc_less_oob_helper+0xae4/0xc50
[   31.351482]  krealloc_less_oob+0x20/0x38
[   31.352026]  kunit_try_run_case+0x14c/0x3d0
[   31.352870]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.353607]  kthread+0x24c/0x2d0
[   31.354142]  ret_from_fork+0x10/0x20
[   31.354703] 
[   31.355055] Allocated by task 146:
[   31.355649]  kasan_save_stack+0x3c/0x68
[   31.356265]  kasan_save_track+0x20/0x40
[   31.356940]  kasan_save_alloc_info+0x40/0x58
[   31.357613]  __kasan_krealloc+0x118/0x178
[   31.358149]  krealloc_noprof+0x128/0x360
[   31.358826]  krealloc_less_oob_helper+0x168/0xc50
[   31.359598]  krealloc_less_oob+0x20/0x38
[   31.360171]  kunit_try_run_case+0x14c/0x3d0
[   31.360831]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.361477]  kthread+0x24c/0x2d0
[   31.362077]  ret_from_fork+0x10/0x20
[   31.362729] 
[   31.363069] The buggy address belongs to the object at fff00000c0973000
[   31.363069]  which belongs to the cache kmalloc-256 of size 256
[   31.364559] The buggy address is located 33 bytes to the right of
[   31.364559]  allocated 201-byte region [fff00000c0973000, fff00000c09730c9)
[   31.366123] 
[   31.366420] The buggy address belongs to the physical page:
[   31.367229] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100972
[   31.368154] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.369065] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.369927] page_type: f5(slab)
[   31.370490] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.371438] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.372426] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.373439] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.374342] head: 0bfffe0000000001 ffffc1ffc3025c81 ffffffffffffffff 0000000000000000
[   31.375372] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   31.376287] page dumped because: kasan: bad access detected
[   31.376962] 
[   31.377292] Memory state around the buggy address:
[   31.377874]  fff00000c0972f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.378797]  fff00000c0973000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.379752] >fff00000c0973080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   31.380683]                                                           ^
[   31.381517]  fff00000c0973100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.382492]  fff00000c0973180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.383321] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   31.480477] ==================================================================
[   31.481260] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680
[   31.483537] Write of size 1 at addr fff00000c5de20f0 by task kunit_try_catch/148
[   31.484528] 
[   31.484902] CPU: 1 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   31.486765] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.487802] Hardware name: linux,dummy-virt (DT)
[   31.488941] Call trace:
[   31.489495]  show_stack+0x20/0x38 (C)
[   31.489979]  dump_stack_lvl+0x8c/0xd0
[   31.491376]  print_report+0x118/0x5e0
[   31.492067]  kasan_report+0xc8/0x118
[   31.492671]  __asan_report_store1_noabort+0x20/0x30
[   31.493236]  krealloc_more_oob_helper+0x5c8/0x680
[   31.494251]  krealloc_large_more_oob+0x20/0x38
[   31.495420]  kunit_try_run_case+0x14c/0x3d0
[   31.495901]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.496802]  kthread+0x24c/0x2d0
[   31.497312]  ret_from_fork+0x10/0x20
[   31.497963] 
[   31.498399] The buggy address belongs to the physical page:
[   31.499064] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105de0
[   31.500513] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.501176] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.503049] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.504137] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   31.505095] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.505975] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   31.507849] head: 0bfffe0000000002 ffffc1ffc3177801 ffffffffffffffff 0000000000000000
[   31.509856] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   31.511232] page dumped because: kasan: bad access detected
[   31.511917] 
[   31.512277] Memory state around the buggy address:
[   31.512907]  fff00000c5de1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.514172]  fff00000c5de2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.514961] >fff00000c5de2080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   31.516691]                                                              ^
[   31.517406]  fff00000c5de2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.518878]  fff00000c5de2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.519920] ==================================================================
[   31.122019] ==================================================================
[   31.123553] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c8/0x680
[   31.125049] Write of size 1 at addr fff00000c0972ef0 by task kunit_try_catch/144
[   31.126773] 
[   31.127560] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   31.129146] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.129764] Hardware name: linux,dummy-virt (DT)
[   31.130731] Call trace:
[   31.131324]  show_stack+0x20/0x38 (C)
[   31.131881]  dump_stack_lvl+0x8c/0xd0
[   31.132190]  print_report+0x118/0x5e0
[   31.132478]  kasan_report+0xc8/0x118
[   31.132875]  __asan_report_store1_noabort+0x20/0x30
[   31.133400]  krealloc_more_oob_helper+0x5c8/0x680
[   31.134016]  krealloc_more_oob+0x20/0x38
[   31.135009]  kunit_try_run_case+0x14c/0x3d0
[   31.135689]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.136512]  kthread+0x24c/0x2d0
[   31.137068]  ret_from_fork+0x10/0x20
[   31.137592] 
[   31.138055] Allocated by task 144:
[   31.139066]  kasan_save_stack+0x3c/0x68
[   31.139617]  kasan_save_track+0x20/0x40
[   31.140263]  kasan_save_alloc_info+0x40/0x58
[   31.140881]  __kasan_krealloc+0x118/0x178
[   31.141437]  krealloc_noprof+0x128/0x360
[   31.142954]  krealloc_more_oob_helper+0x168/0x680
[   31.143549]  krealloc_more_oob+0x20/0x38
[   31.143928]  kunit_try_run_case+0x14c/0x3d0
[   31.144234]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.144582]  kthread+0x24c/0x2d0
[   31.145227]  ret_from_fork+0x10/0x20
[   31.146340] 
[   31.146764] The buggy address belongs to the object at fff00000c0972e00
[   31.146764]  which belongs to the cache kmalloc-256 of size 256
[   31.148329] The buggy address is located 5 bytes to the right of
[   31.148329]  allocated 235-byte region [fff00000c0972e00, fff00000c0972eeb)
[   31.150386] 
[   31.150816] The buggy address belongs to the physical page:
[   31.151457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100972
[   31.152681] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.153755] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.154592] page_type: f5(slab)
[   31.155091] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.156793] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.157256] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.157813] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.159653] head: 0bfffe0000000001 ffffc1ffc3025c81 ffffffffffffffff 0000000000000000
[   31.160709] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   31.161573] page dumped because: kasan: bad access detected
[   31.163287] 
[   31.163769] Memory state around the buggy address:
[   31.164605]  fff00000c0972d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.165457]  fff00000c0972e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.166505] >fff00000c0972e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   31.167500]                                                              ^
[   31.168671]  fff00000c0972f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.169962]  fff00000c0972f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.171244] ==================================================================
[   31.439095] ==================================================================
[   31.440486] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680
[   31.441498] Write of size 1 at addr fff00000c5de20eb by task kunit_try_catch/148
[   31.442715] 
[   31.443424] CPU: 1 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   31.444778] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.445379] Hardware name: linux,dummy-virt (DT)
[   31.446520] Call trace:
[   31.446987]  show_stack+0x20/0x38 (C)
[   31.448050]  dump_stack_lvl+0x8c/0xd0
[   31.448512]  print_report+0x118/0x5e0
[   31.449606]  kasan_report+0xc8/0x118
[   31.450561]  __asan_report_store1_noabort+0x20/0x30
[   31.452356]  krealloc_more_oob_helper+0x614/0x680
[   31.453009]  krealloc_large_more_oob+0x20/0x38
[   31.453761]  kunit_try_run_case+0x14c/0x3d0
[   31.454854]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.455691]  kthread+0x24c/0x2d0
[   31.456407]  ret_from_fork+0x10/0x20
[   31.457071] 
[   31.457476] The buggy address belongs to the physical page:
[   31.458428] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105de0
[   31.459416] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.460439] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.461744] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.463659] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   31.464602] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   31.465820] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   31.467531] head: 0bfffe0000000002 ffffc1ffc3177801 ffffffffffffffff 0000000000000000
[   31.468281] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   31.469145] page dumped because: kasan: bad access detected
[   31.470369] 
[   31.470868] Memory state around the buggy address:
[   31.471591]  fff00000c5de1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.472670]  fff00000c5de2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.473475] >fff00000c5de2080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   31.474613]                                                           ^
[   31.476530]  fff00000c5de2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.477605]  fff00000c5de2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   31.478697] ==================================================================
[   31.071601] ==================================================================
[   31.072861] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x614/0x680
[   31.073468] Write of size 1 at addr fff00000c0972eeb by task kunit_try_catch/144
[   31.074568] 
[   31.074939] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   31.076928] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.077521] Hardware name: linux,dummy-virt (DT)
[   31.078563] Call trace:
[   31.078981]  show_stack+0x20/0x38 (C)
[   31.079654]  dump_stack_lvl+0x8c/0xd0
[   31.080256]  print_report+0x118/0x5e0
[   31.080825]  kasan_report+0xc8/0x118
[   31.081435]  __asan_report_store1_noabort+0x20/0x30
[   31.082565]  krealloc_more_oob_helper+0x614/0x680
[   31.083246]  krealloc_more_oob+0x20/0x38
[   31.083916]  kunit_try_run_case+0x14c/0x3d0
[   31.084665]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.085388]  kthread+0x24c/0x2d0
[   31.086336]  ret_from_fork+0x10/0x20
[   31.086928] 
[   31.087313] Allocated by task 144:
[   31.087948]  kasan_save_stack+0x3c/0x68
[   31.088649]  kasan_save_track+0x20/0x40
[   31.089122]  kasan_save_alloc_info+0x40/0x58
[   31.090175]  __kasan_krealloc+0x118/0x178
[   31.090653]  krealloc_noprof+0x128/0x360
[   31.091300]  krealloc_more_oob_helper+0x168/0x680
[   31.091961]  krealloc_more_oob+0x20/0x38
[   31.092494]  kunit_try_run_case+0x14c/0x3d0
[   31.093287]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.094541]  kthread+0x24c/0x2d0
[   31.095187]  ret_from_fork+0x10/0x20
[   31.095658] 
[   31.096487] The buggy address belongs to the object at fff00000c0972e00
[   31.096487]  which belongs to the cache kmalloc-256 of size 256
[   31.098544] The buggy address is located 0 bytes to the right of
[   31.098544]  allocated 235-byte region [fff00000c0972e00, fff00000c0972eeb)
[   31.100047] 
[   31.100366] The buggy address belongs to the physical page:
[   31.101264] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100972
[   31.102607] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.103564] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   31.104450] page_type: f5(slab)
[   31.104900] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.106250] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.107107] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   31.108245] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.109382] head: 0bfffe0000000001 ffffc1ffc3025c81 ffffffffffffffff 0000000000000000
[   31.110780] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   31.111729] page dumped because: kasan: bad access detected
[   31.112378] 
[   31.112735] Memory state around the buggy address:
[   31.113299]  fff00000c0972d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.114482]  fff00000c0972e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.115860] >fff00000c0972e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   31.116767]                                                           ^
[   31.118020]  fff00000c0972f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.119680]  fff00000c0972f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.120372] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[   31.031381] ==================================================================
[   31.032966] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   31.033613] Read of size 1 at addr fff00000c5e30000 by task kunit_try_catch/142
[   31.035923] 
[   31.036372] CPU: 0 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   31.037767] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.038322] Hardware name: linux,dummy-virt (DT)
[   31.039495] Call trace:
[   31.039971]  show_stack+0x20/0x38 (C)
[   31.040521]  dump_stack_lvl+0x8c/0xd0
[   31.041102]  print_report+0x118/0x5e0
[   31.041811]  kasan_report+0xc8/0x118
[   31.042609]  __asan_report_load1_noabort+0x20/0x30
[   31.043472]  page_alloc_uaf+0x328/0x350
[   31.044089]  kunit_try_run_case+0x14c/0x3d0
[   31.044844]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.045494]  kthread+0x24c/0x2d0
[   31.046348]  ret_from_fork+0x10/0x20
[   31.047007] 
[   31.047357] The buggy address belongs to the physical page:
[   31.048052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e30
[   31.049034] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.049906] page_type: f0(buddy)
[   31.050462] raw: 0bfffe0000000000 fff00000ff6150e0 fff00000ff6150e0 0000000000000000
[   31.051364] raw: 0000000000000000 0000000000000004 00000000f0000000 0000000000000000
[   31.052717] page dumped because: kasan: bad access detected
[   31.053649] 
[   31.054928] Memory state around the buggy address:
[   31.055527]  fff00000c5e2ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.056427]  fff00000c5e2ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.057364] >fff00000c5e30000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.058679]                    ^
[   31.059120]  fff00000c5e30080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.060080]  fff00000c5e30100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.060882] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[   30.972417] ==================================================================
[   30.973607] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   30.974272] Free of addr fff00000c5e70001 by task kunit_try_catch/138
[   30.976151] 
[   30.976863] CPU: 0 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   30.979306] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.979983] Hardware name: linux,dummy-virt (DT)
[   30.980581] Call trace:
[   30.980971]  show_stack+0x20/0x38 (C)
[   30.981672]  dump_stack_lvl+0x8c/0xd0
[   30.982217]  print_report+0x118/0x5e0
[   30.983155]  kasan_report_invalid_free+0xb0/0xd8
[   30.984648]  __kasan_kfree_large+0x5c/0xa8
[   30.985324]  free_large_kmalloc+0x58/0x140
[   30.986222]  kfree+0x270/0x3c8
[   30.986937]  kmalloc_large_invalid_free+0x108/0x270
[   30.987664]  kunit_try_run_case+0x14c/0x3d0
[   30.988297]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.989152]  kthread+0x24c/0x2d0
[   30.989665]  ret_from_fork+0x10/0x20
[   30.990562] 
[   30.991374] The buggy address belongs to the physical page:
[   30.992272] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e70
[   30.993179] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.994326] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.995750] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.996792] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.998499] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.999519] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   31.000508] head: 0bfffe0000000002 ffffc1ffc3179c01 ffffffffffffffff 0000000000000000
[   31.001531] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   31.002790] page dumped because: kasan: bad access detected
[   31.003428] 
[   31.003820] Memory state around the buggy address:
[   31.004457]  fff00000c5e6ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.005420]  fff00000c5e6ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.006849] >fff00000c5e70000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.007771]                    ^
[   31.008214]  fff00000c5e70080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.009398]  fff00000c5e70100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.010475] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[   30.931180] ==================================================================
[   30.932514] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   30.933457] Read of size 1 at addr fff00000c5e70000 by task kunit_try_catch/136
[   30.934549] 
[   30.935106] CPU: 0 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   30.936709] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.937433] Hardware name: linux,dummy-virt (DT)
[   30.938294] Call trace:
[   30.938845]  show_stack+0x20/0x38 (C)
[   30.940253]  dump_stack_lvl+0x8c/0xd0
[   30.941284]  print_report+0x118/0x5e0
[   30.942064]  kasan_report+0xc8/0x118
[   30.943015]  __asan_report_load1_noabort+0x20/0x30
[   30.943822]  kmalloc_large_uaf+0x2cc/0x2f8
[   30.944494]  kunit_try_run_case+0x14c/0x3d0
[   30.945173]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.946001]  kthread+0x24c/0x2d0
[   30.946924]  ret_from_fork+0x10/0x20
[   30.947614] 
[   30.948078] The buggy address belongs to the physical page:
[   30.948896] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e70
[   30.949833] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.951303] raw: 0bfffe0000000000 ffffc1ffc3179d08 fff00000da4e2f80 0000000000000000
[   30.952289] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   30.953243] page dumped because: kasan: bad access detected
[   30.954241] 
[   30.954818] Memory state around the buggy address:
[   30.955470]  fff00000c5e6ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.956330]  fff00000c5e6ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.957552] >fff00000c5e70000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.958865]                    ^
[   30.959450]  fff00000c5e70080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.960261]  fff00000c5e70100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.961196] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   30.885273] ==================================================================
[   30.887081] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   30.888298] Write of size 1 at addr fff00000c5e7200a by task kunit_try_catch/134
[   30.889487] 
[   30.890091] CPU: 0 UID: 0 PID: 134 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   30.892300] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.893178] Hardware name: linux,dummy-virt (DT)
[   30.893960] Call trace:
[   30.894757]  show_stack+0x20/0x38 (C)
[   30.895382]  dump_stack_lvl+0x8c/0xd0
[   30.895969]  print_report+0x118/0x5e0
[   30.896697]  kasan_report+0xc8/0x118
[   30.897400]  __asan_report_store1_noabort+0x20/0x30
[   30.898257]  kmalloc_large_oob_right+0x278/0x2b8
[   30.899140]  kunit_try_run_case+0x14c/0x3d0
[   30.899814]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.900487]  kthread+0x24c/0x2d0
[   30.901128]  ret_from_fork+0x10/0x20
[   30.901744] 
[   30.902450] The buggy address belongs to the physical page:
[   30.903291] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e70
[   30.904278] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.905320] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.906664] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.908084] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.909060] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   30.910147] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.911469] head: 0bfffe0000000002 ffffc1ffc3179c01 ffffffffffffffff 0000000000000000
[   30.912395] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   30.913320] page dumped because: kasan: bad access detected
[   30.914103] 
[   30.915164] Memory state around the buggy address:
[   30.915997]  fff00000c5e71f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.917065]  fff00000c5e71f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.917832] >fff00000c5e72000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.918702]                       ^
[   30.919014]  fff00000c5e72080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.919427]  fff00000c5e72100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   30.919860] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[   30.822873] ==================================================================
[   30.824258] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   30.825199] Write of size 1 at addr fff00000c6025f00 by task kunit_try_catch/132
[   30.827289] 
[   30.827964] CPU: 1 UID: 0 PID: 132 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   30.830338] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.831350] Hardware name: linux,dummy-virt (DT)
[   30.831726] Call trace:
[   30.831940]  show_stack+0x20/0x38 (C)
[   30.832246]  dump_stack_lvl+0x8c/0xd0
[   30.832544]  print_report+0x118/0x5e0
[   30.833447]  kasan_report+0xc8/0x118
[   30.834336]  __asan_report_store1_noabort+0x20/0x30
[   30.835425]  kmalloc_big_oob_right+0x2a4/0x2f0
[   30.836374]  kunit_try_run_case+0x14c/0x3d0
[   30.837259]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.838151]  kthread+0x24c/0x2d0
[   30.839249]  ret_from_fork+0x10/0x20
[   30.839852] 
[   30.840255] Allocated by task 132:
[   30.840844]  kasan_save_stack+0x3c/0x68
[   30.841448]  kasan_save_track+0x20/0x40
[   30.842108]  kasan_save_alloc_info+0x40/0x58
[   30.843017]  __kasan_kmalloc+0xd4/0xd8
[   30.844154]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.845006]  kmalloc_big_oob_right+0xb8/0x2f0
[   30.846031]  kunit_try_run_case+0x14c/0x3d0
[   30.847033]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.848089]  kthread+0x24c/0x2d0
[   30.848519]  ret_from_fork+0x10/0x20
[   30.849125] 
[   30.849491] The buggy address belongs to the object at fff00000c6024000
[   30.849491]  which belongs to the cache kmalloc-8k of size 8192
[   30.851681] The buggy address is located 0 bytes to the right of
[   30.851681]  allocated 7936-byte region [fff00000c6024000, fff00000c6025f00)
[   30.853534] 
[   30.854359] The buggy address belongs to the physical page:
[   30.855487] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106020
[   30.856520] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.857475] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.858695] page_type: f5(slab)
[   30.859105] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   30.859897] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   30.861185] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   30.862577] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   30.863570] head: 0bfffe0000000003 ffffc1ffc3180801 ffffffffffffffff 0000000000000000
[   30.864600] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000
[   30.865559] page dumped because: kasan: bad access detected
[   30.866645] 
[   30.866935] Memory state around the buggy address:
[   30.868361]  fff00000c6025e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.869267]  fff00000c6025e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.870262] >fff00000c6025f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.871136]                    ^
[   30.871600]  fff00000c6025f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.872991]  fff00000c6026000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.873571] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[   30.720088] ==================================================================
[   30.721336] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x414/0x490
[   30.722231] Write of size 1 at addr fff00000c66da478 by task kunit_try_catch/130
[   30.723033] 
[   30.723403] CPU: 1 UID: 0 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   30.724608] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.725204] Hardware name: linux,dummy-virt (DT)
[   30.726136] Call trace:
[   30.726689]  show_stack+0x20/0x38 (C)
[   30.727754]  dump_stack_lvl+0x8c/0xd0
[   30.728935]  print_report+0x118/0x5e0
[   30.729858]  kasan_report+0xc8/0x118
[   30.730586]  __asan_report_store1_noabort+0x20/0x30
[   30.731879]  kmalloc_track_caller_oob_right+0x414/0x490
[   30.733254]  kunit_try_run_case+0x14c/0x3d0
[   30.734111]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.734928]  kthread+0x24c/0x2d0
[   30.735285]  ret_from_fork+0x10/0x20
[   30.735579] 
[   30.735866] Allocated by task 130:
[   30.736253]  kasan_save_stack+0x3c/0x68
[   30.736735]  kasan_save_track+0x20/0x40
[   30.737301]  kasan_save_alloc_info+0x40/0x58
[   30.738408]  __kasan_kmalloc+0xd4/0xd8
[   30.739107]  __kmalloc_node_track_caller_noprof+0x184/0x4b8
[   30.739874]  kmalloc_track_caller_oob_right+0xa8/0x490
[   30.740582]  kunit_try_run_case+0x14c/0x3d0
[   30.741295]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.742684]  kthread+0x24c/0x2d0
[   30.743212]  ret_from_fork+0x10/0x20
[   30.743731] 
[   30.744164] The buggy address belongs to the object at fff00000c66da400
[   30.744164]  which belongs to the cache kmalloc-128 of size 128
[   30.745557] The buggy address is located 0 bytes to the right of
[   30.745557]  allocated 120-byte region [fff00000c66da400, fff00000c66da478)
[   30.747838] 
[   30.748251] The buggy address belongs to the physical page:
[   30.749131] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066da
[   30.750786] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.751578] page_type: f5(slab)
[   30.752080] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.752964] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.754149] page dumped because: kasan: bad access detected
[   30.754783] 
[   30.755208] Memory state around the buggy address:
[   30.756242]  fff00000c66da300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   30.757227]  fff00000c66da380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.758642] >fff00000c66da400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.759359]                                                                 ^
[   30.760257]  fff00000c66da480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.761270]  fff00000c66da500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.762467] ==================================================================
[   30.765065] ==================================================================
[   30.766381] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x420/0x490
[   30.769091] Write of size 1 at addr fff00000c66da578 by task kunit_try_catch/130
[   30.770852] 
[   30.771311] CPU: 1 UID: 0 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   30.773746] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.774150] Hardware name: linux,dummy-virt (DT)
[   30.774489] Call trace:
[   30.774770]  show_stack+0x20/0x38 (C)
[   30.775811]  dump_stack_lvl+0x8c/0xd0
[   30.777120]  print_report+0x118/0x5e0
[   30.778120]  kasan_report+0xc8/0x118
[   30.778689]  __asan_report_store1_noabort+0x20/0x30
[   30.779202]  kmalloc_track_caller_oob_right+0x420/0x490
[   30.780239]  kunit_try_run_case+0x14c/0x3d0
[   30.781298]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.782521]  kthread+0x24c/0x2d0
[   30.783084]  ret_from_fork+0x10/0x20
[   30.783672] 
[   30.784050] Allocated by task 130:
[   30.784543]  kasan_save_stack+0x3c/0x68
[   30.785248]  kasan_save_track+0x20/0x40
[   30.785776]  kasan_save_alloc_info+0x40/0x58
[   30.786495]  __kasan_kmalloc+0xd4/0xd8
[   30.787052]  __kmalloc_node_track_caller_noprof+0x184/0x4b8
[   30.787905]  kmalloc_track_caller_oob_right+0x184/0x490
[   30.788919]  kunit_try_run_case+0x14c/0x3d0
[   30.790018]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.790970]  kthread+0x24c/0x2d0
[   30.792392]  ret_from_fork+0x10/0x20
[   30.792935] 
[   30.793283] The buggy address belongs to the object at fff00000c66da500
[   30.793283]  which belongs to the cache kmalloc-128 of size 128
[   30.795495] The buggy address is located 0 bytes to the right of
[   30.795495]  allocated 120-byte region [fff00000c66da500, fff00000c66da578)
[   30.797464] 
[   30.798212] The buggy address belongs to the physical page:
[   30.799004] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066da
[   30.800112] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.800913] page_type: f5(slab)
[   30.801868] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.803129] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.803947] page dumped because: kasan: bad access detected
[   30.804735] 
[   30.805043] Memory state around the buggy address:
[   30.805571]  fff00000c66da400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.807693]  fff00000c66da480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.808490] >fff00000c66da500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.809487]                                                                 ^
[   30.810494]  fff00000c66da580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.811536]  fff00000c66da600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.812617] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[   30.639539] ==================================================================
[   30.642929] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   30.643580] Read of size 1 at addr fff00000c638b000 by task kunit_try_catch/128
[   30.645974] 
[   30.646926] CPU: 0 UID: 0 PID: 128 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   30.650006] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.651265] Hardware name: linux,dummy-virt (DT)
[   30.652543] Call trace:
[   30.653482]  show_stack+0x20/0x38 (C)
[   30.654521]  dump_stack_lvl+0x8c/0xd0
[   30.655970]  print_report+0x118/0x5e0
[   30.657561]  kasan_report+0xc8/0x118
[   30.658041]  __asan_report_load1_noabort+0x20/0x30
[   30.658505]  kmalloc_node_oob_right+0x2f4/0x330
[   30.661927]  kunit_try_run_case+0x14c/0x3d0
[   30.663410]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.665096]  kthread+0x24c/0x2d0
[   30.666725]  ret_from_fork+0x10/0x20
[   30.667430] 
[   30.667684] Allocated by task 128:
[   30.668033]  kasan_save_stack+0x3c/0x68
[   30.668426]  kasan_save_track+0x20/0x40
[   30.671312]  kasan_save_alloc_info+0x40/0x58
[   30.673038]  __kasan_kmalloc+0xd4/0xd8
[   30.673508]  __kmalloc_cache_node_noprof+0x168/0x3d0
[   30.674264]  kmalloc_node_oob_right+0xbc/0x330
[   30.674709]  kunit_try_run_case+0x14c/0x3d0
[   30.675138]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.675611]  kthread+0x24c/0x2d0
[   30.677099]  ret_from_fork+0x10/0x20
[   30.677883] 
[   30.678171] The buggy address belongs to the object at fff00000c638a000
[   30.678171]  which belongs to the cache kmalloc-4k of size 4096
[   30.684790] The buggy address is located 0 bytes to the right of
[   30.684790]  allocated 4096-byte region [fff00000c638a000, fff00000c638b000)
[   30.687735] 
[   30.688436] The buggy address belongs to the physical page:
[   30.689459] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106388
[   30.691960] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   30.692692] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   30.693597] page_type: f5(slab)
[   30.694283] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   30.696072] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   30.697299] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   30.699083] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   30.699882] head: 0bfffe0000000003 ffffc1ffc318e201 ffffffffffffffff 0000000000000000
[   30.700807] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000
[   30.701749] page dumped because: kasan: bad access detected
[   30.702925] 
[   30.703203] Memory state around the buggy address:
[   30.703893]  fff00000c638af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.704811]  fff00000c638af80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.705667] >fff00000c638b000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.706896]                    ^
[   30.707515]  fff00000c638b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.708402]  fff00000c638b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.709463] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   30.576959] ==================================================================
[   30.578833] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   30.579811] Read of size 1 at addr fff00000c5b31cdf by task kunit_try_catch/126
[   30.580939] 
[   30.581375] CPU: 0 UID: 0 PID: 126 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   30.583001] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.583604] Hardware name: linux,dummy-virt (DT)
[   30.584355] Call trace:
[   30.584827]  show_stack+0x20/0x38 (C)
[   30.585430]  dump_stack_lvl+0x8c/0xd0
[   30.586096]  print_report+0x118/0x5e0
[   30.586803]  kasan_report+0xc8/0x118
[   30.587748]  __asan_report_load1_noabort+0x20/0x30
[   30.588413]  kmalloc_oob_left+0x2ec/0x320
[   30.589199]  kunit_try_run_case+0x14c/0x3d0
[   30.590054]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.590611]  kthread+0x24c/0x2d0
[   30.591158]  ret_from_fork+0x10/0x20
[   30.592191] 
[   30.592661] Allocated by task 28:
[   30.593153]  kasan_save_stack+0x3c/0x68
[   30.593817]  kasan_save_track+0x20/0x40
[   30.594586]  kasan_save_alloc_info+0x40/0x58
[   30.595355]  __kasan_kmalloc+0xd4/0xd8
[   30.596015]  __kmalloc_node_track_caller_noprof+0x184/0x4b8
[   30.596802]  kstrdup+0x54/0xc8
[   30.597317]  devtmpfs_work_loop+0x384/0x590
[   30.598034]  devtmpfsd+0x50/0x58
[   30.598596]  kthread+0x24c/0x2d0
[   30.599104]  ret_from_fork+0x10/0x20
[   30.600258] 
[   30.600977] Freed by task 28:
[   30.601525]  kasan_save_stack+0x3c/0x68
[   30.602125]  kasan_save_track+0x20/0x40
[   30.603180]  kasan_save_free_info+0x4c/0x78
[   30.603919]  __kasan_slab_free+0x6c/0x98
[   30.604364]  kfree+0x114/0x3c8
[   30.604784]  devtmpfs_work_loop+0x498/0x590
[   30.605292]  devtmpfsd+0x50/0x58
[   30.606131]  kthread+0x24c/0x2d0
[   30.606988]  ret_from_fork+0x10/0x20
[   30.607925] 
[   30.608369] The buggy address belongs to the object at fff00000c5b31cc0
[   30.608369]  which belongs to the cache kmalloc-16 of size 16
[   30.610132] The buggy address is located 15 bytes to the right of
[   30.610132]  allocated 16-byte region [fff00000c5b31cc0, fff00000c5b31cd0)
[   30.611924] 
[   30.612305] The buggy address belongs to the physical page:
[   30.613107] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b31
[   30.613960] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.615328] page_type: f5(slab)
[   30.615954] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   30.617011] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   30.618128] page dumped because: kasan: bad access detected
[   30.618718] 
[   30.619353] Memory state around the buggy address:
[   30.620188]  fff00000c5b31b80: fa fb fc fc 00 02 fc fc 00 02 fc fc 00 00 fc fc
[   30.620984]  fff00000c5b31c00: 00 06 fc fc 00 06 fc fc fa fb fc fc 00 06 fc fc
[   30.622644] >fff00000c5b31c80: 00 06 fc fc fa fb fc fc fa fb fc fc 00 07 fc fc
[   30.623401]                                                     ^
[   30.624428]  fff00000c5b31d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.625589]  fff00000c5b31d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.626604] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   30.478515] ==================================================================
[   30.479507] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   30.480359] Write of size 1 at addr fff00000c66da078 by task kunit_try_catch/124
[   30.481063] 
[   30.481333] CPU: 1 UID: 0 PID: 124 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   30.482896] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.483445] Hardware name: linux,dummy-virt (DT)
[   30.484265] Call trace:
[   30.484678]  show_stack+0x20/0x38 (C)
[   30.485849]  dump_stack_lvl+0x8c/0xd0
[   30.486875]  print_report+0x118/0x5e0
[   30.487696]  kasan_report+0xc8/0x118
[   30.488117]  __asan_report_store1_noabort+0x20/0x30
[   30.488672]  kmalloc_oob_right+0x538/0x660
[   30.489148]  kunit_try_run_case+0x14c/0x3d0
[   30.490641]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.491608]  kthread+0x24c/0x2d0
[   30.492156]  ret_from_fork+0x10/0x20
[   30.492780] 
[   30.493099] Allocated by task 124:
[   30.493664]  kasan_save_stack+0x3c/0x68
[   30.494274]  kasan_save_track+0x20/0x40
[   30.495802]  kasan_save_alloc_info+0x40/0x58
[   30.496377]  __kasan_kmalloc+0xd4/0xd8
[   30.496942]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.498001]  kmalloc_oob_right+0xb0/0x660
[   30.498658]  kunit_try_run_case+0x14c/0x3d0
[   30.499229]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.500302]  kthread+0x24c/0x2d0
[   30.500804]  ret_from_fork+0x10/0x20
[   30.501357] 
[   30.502721] The buggy address belongs to the object at fff00000c66da000
[   30.502721]  which belongs to the cache kmalloc-128 of size 128
[   30.504171] The buggy address is located 5 bytes to the right of
[   30.504171]  allocated 115-byte region [fff00000c66da000, fff00000c66da073)
[   30.506311] 
[   30.506574] The buggy address belongs to the physical page:
[   30.507406] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066da
[   30.508326] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.509345] page_type: f5(slab)
[   30.509861] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.511787] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.512711] page dumped because: kasan: bad access detected
[   30.513338] 
[   30.514134] Memory state around the buggy address:
[   30.514670]  fff00000c66d9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.515620]  fff00000c66d9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.516583] >fff00000c66da000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.517487]                                                                 ^
[   30.518455]  fff00000c66da080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.519188]  fff00000c66da100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.520142] ==================================================================
[   30.425199] ==================================================================
[   30.427052] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   30.429365] Write of size 1 at addr fff00000c66da073 by task kunit_try_catch/124
[   30.430414] 
[   30.432816] CPU: 1 UID: 0 PID: 124 Comm: kunit_try_catch Tainted: G                 N 6.13.0-rc1-next-20241204 #1
[   30.434575] Tainted: [N]=TEST
[   30.435415] Hardware name: linux,dummy-virt (DT)
[   30.437175] Call trace:
[   30.438148]  show_stack+0x20/0x38 (C)
[   30.438994]  dump_stack_lvl+0x8c/0xd0
[   30.439700]  print_report+0x118/0x5e0
[   30.440227]  kasan_report+0xc8/0x118
[   30.440847]  __asan_report_store1_noabort+0x20/0x30
[   30.441537]  kmalloc_oob_right+0x5a4/0x660
[   30.442194]  kunit_try_run_case+0x14c/0x3d0
[   30.442955]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.443612]  kthread+0x24c/0x2d0
[   30.444301]  ret_from_fork+0x10/0x20
[   30.445100] 
[   30.445576] Allocated by task 124:
[   30.446575]  kasan_save_stack+0x3c/0x68
[   30.447153]  kasan_save_track+0x20/0x40
[   30.447839]  kasan_save_alloc_info+0x40/0x58
[   30.448420]  __kasan_kmalloc+0xd4/0xd8
[   30.449028]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.449603]  kmalloc_oob_right+0xb0/0x660
[   30.450412]  kunit_try_run_case+0x14c/0x3d0
[   30.451099]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.452302]  kthread+0x24c/0x2d0
[   30.452937]  ret_from_fork+0x10/0x20
[   30.453592] 
[   30.455198] The buggy address belongs to the object at fff00000c66da000
[   30.455198]  which belongs to the cache kmalloc-128 of size 128
[   30.456616] The buggy address is located 0 bytes to the right of
[   30.456616]  allocated 115-byte region [fff00000c66da000, fff00000c66da073)
[   30.458498] 
[   30.459047] The buggy address belongs to the physical page:
[   30.460197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066da
[   30.461499] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.463381] page_type: f5(slab)
[   30.464478] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.465439] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.466951] page dumped because: kasan: bad access detected
[   30.467524] 
[   30.467841] Memory state around the buggy address:
[   30.468746]  fff00000c66d9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.470458]  fff00000c66d9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.471803] >fff00000c66da000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.472566]                                                              ^
[   30.473300]  fff00000c66da080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.474083]  fff00000c66da100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.475037] ==================================================================
[   30.521889] ==================================================================
[   30.522989] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   30.524262] Read of size 1 at addr fff00000c66da080 by task kunit_try_catch/124
[   30.525577] 
[   30.526095] CPU: 1 UID: 0 PID: 124 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   30.527784] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.528199] Hardware name: linux,dummy-virt (DT)
[   30.528868] Call trace:
[   30.529240]  show_stack+0x20/0x38 (C)
[   30.529685]  dump_stack_lvl+0x8c/0xd0
[   30.530779]  print_report+0x118/0x5e0
[   30.531956]  kasan_report+0xc8/0x118
[   30.532975]  __asan_report_load1_noabort+0x20/0x30
[   30.533668]  kmalloc_oob_right+0x5d0/0x660
[   30.534833]  kunit_try_run_case+0x14c/0x3d0
[   30.535779]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.536784]  kthread+0x24c/0x2d0
[   30.537169]  ret_from_fork+0x10/0x20
[   30.538175] 
[   30.538537] Allocated by task 124:
[   30.539488]  kasan_save_stack+0x3c/0x68
[   30.540195]  kasan_save_track+0x20/0x40
[   30.540494]  kasan_save_alloc_info+0x40/0x58
[   30.540916]  __kasan_kmalloc+0xd4/0xd8
[   30.541568]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.543358]  kmalloc_oob_right+0xb0/0x660
[   30.543797]  kunit_try_run_case+0x14c/0x3d0
[   30.544617]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.545376]  kthread+0x24c/0x2d0
[   30.545856]  ret_from_fork+0x10/0x20
[   30.546497] 
[   30.546937] The buggy address belongs to the object at fff00000c66da000
[   30.546937]  which belongs to the cache kmalloc-128 of size 128
[   30.549380] The buggy address is located 13 bytes to the right of
[   30.549380]  allocated 115-byte region [fff00000c66da000, fff00000c66da073)
[   30.551347] 
[   30.551614] The buggy address belongs to the physical page:
[   30.552165] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066da
[   30.552942] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.553539] page_type: f5(slab)
[   30.554735] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.555954] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.557007] page dumped because: kasan: bad access detected
[   30.558137] 
[   30.558392] Memory state around the buggy address:
[   30.559540]  fff00000c66d9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.560831]  fff00000c66da000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.561933] >fff00000c66da080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.563341]                    ^
[   30.564064]  fff00000c66da100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.565018]  fff00000c66da180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.566457] ==================================================================
Failure - log-parser-boot - internal-error-oops-oops-preempt-smp KNOWN ISSUE - kunit_test_null_dereference internal oops on qemu-arm64 KUNIT KASAN
[  154.910228] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
[  154.911498] Modules linked in:
[  154.912300] CPU: 0 UID: 0 PID: 620 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[  154.913616] Tainted: [B]=BAD_PAGE, [N]=TEST
[  154.914521] Hardware name: linux,dummy-virt (DT)
[  154.915404] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[  154.916376] pc : kunit_test_null_dereference+0x70/0x170
[  154.917067] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[  154.918037] sp : ffff8000832f7dc0
[  154.918978] x29: ffff8000832f7e20 x28: 0000000000000000 x27: 0000000000000000
[  154.920713] x26: 0000000000000000 x25: 0000000000000000 x24: fff00000c81cec80
[  154.922181] x23: ffff98263c1c2800 x22: ffff98263c1cb3c0 x21: fff00000c81cec88
[  154.923702] x20: 1ffff0001065efb8 x19: ffff8000800879f0 x18: 000000006f3e42e4
[  154.925428] x17: 0000000000000001 x16: fff00000da4deca0 x15: fff00000ff615b48
[  154.927598] x14: 1ffe00001b49bd78 x13: 0000000000000000 x12: fffd8000194813a2
[  154.928507] x11: 1ffe0000194813a1 x10: fffd8000194813a1 x9 : ffff98263c1c2888
[  154.929663] x8 : ffff8000832f7cb8 x7 : 0000000000000001 x6 : 0000000041b58ab3
[  154.930827] x5 : ffff70001065efb8 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[  154.932014] x2 : dfff800000000000 x1 : fff00000ca409440 x0 : ffff8000800879f0
[  154.933200] Call trace:
[  154.933732]  kunit_test_null_dereference+0x70/0x170 (P)
[  154.934548]  kunit_generic_run_threadfn_adapter+0x88/0x100 (L)
[  154.935313]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  154.936230]  kthread+0x24c/0x2d0
[  154.936775]  ret_from_fork+0x10/0x20
[  154.937930] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[  154.939697] ---[ end trace 0000000000000000 ]---